Distributed collaborative signaling in full duplex wireless transceivers

Abstract
Two-way (full-duplex) wireless links in facilitating network management and improve network performance. Once aspect includes methods for network management using a high-throughput channel and a low-throughput channel. Other aspects include methods to facilitate practical realization and improve performance of some of the network information theoretic configurations, such as Space-Division Multiple Access (SDMA) in uplink and downlink, Interference Channel, and other forms of distributed collaborative signaling schemes. Another aspect includes methods to support cognitive wireless networks.
Description
FIELD

The present disclosure relates to wireless communications. In particular, the present disclosure relates to systems and methods using two-way (full-duplex) wireless links.


BACKGROUND OF THE INVENTION

A communication link (e.g. between node A and node B) with the capability to support the connection in both directions at the same time is called full-duplex, or two-way. In contrast, a link that can support the connection in only one direction at a time is called one-way or half-duplex.


Current wireless systems are one-way and rely on either separate time slots (Time Division Duplex, TDD) or separate frequency bands (Frequency Division Duplex, FDD) to transmit and to receive. These alternatives have their relative pros and cons, but both suffer from lack of ability to transmit and to receive simultaneously and over the entire frequency band. Full-duplex capability is particularly useful when several wireless nodes share a frequency band, as it helps in managing the impact of multi-user interference, maximizing spectral efficiency, and improving network quality of service.


Point-to-point communications primarily concerns transmission between a single transmitter and a single receiver, while networking concerns scenarios where more than two users share the channel. The impact of full-duplex links in point-to-point communications is limited to doubling the rate by providing two symmetrical pipes of data flowing in opposite directions. This affects the point-to-point throughput with no direct impact on networking. In contrast, in multi-user wireless systems, due to the nature of transmission that everyone hears everyone else, full-duplex capability provides new ways to facilitate sharing of a common spectrum.


A basic feature of wireless transmission is that the transmission media is shared among all users and everyone hears everyone else. This feature can cause harmful effects in terms of multi-user interference and normally necessitates sophisticated network management. Full-duplex capability with support for asynchronous clients provides the means to benefit from the same basic feature of wireless transmission and facilitate network management.





BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments.



FIGS. 1 and 2 show block diagrams of a communication network in which an access point (AP) is communicating with multiple clients with full-duplex links to each client and where the access point of FIG. 2 communicates with multiple clients using OFDMA for sharing the bandwidth among users with full-duplex link over OFDM tone and with support for multiple transmit and multiple receive antennas;



FIG. 3 is a block diagram showing cooperative communications 20 between a central wireless communications device 200 and K other devices, 201, 202, . . . (Unit1-UnitK);



FIG. 4 depicts block diagrams showing cooperative communication in accordance with one example. Unit A has a message intended to be sent to Unit A′ and Unit B has a message intended to be sent to Unit B′.



FIG. 5 is a flowchart showing a method with operations 400 for a wireless communication device for establishing and/or handling communications over a Low Throughput Overlaid (LTO) channel asynchronously and in parallel (i.e. with overlap in time and frequency) with communications over a Higher Throughput Main (HTM) data channel in accordance with one embodiment;



FIG. 6 shows a schematic view of units operating in the same frequency band, which filter and super-impose/forward the signal received from each other to cancel (pre-compensate) the interference at their intended receiver;



FIG. 7 shows a more detailed schematic view of units operating in the same frequency band, which filter and super-impose/forward the signal received from each other to cancel (pre-compensate) the interference at their intended receiver.





Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention.


The apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.


DETAILED DESCRIPTION OF THE INVENTION

Methods are disclosed to benefit from full-duplex capability to simplify practical implementation of network structures, simplify network management, or improve network performance. This includes a traditional network structure, as well as some basic information theoretic setups, such as space division multiple access (SDMA) in down-link (MIMO broadcast) and in the uplink (MIMO multiple access), cooperative signaling towards reducing multi-user interference, and interference channel. The methods mat be explained in terms of using OFDMA for multi-user multiplexing, similar concepts are applicable to other means of multi-user multiplexing, such as CDMA, TDMA and SDMA.


Cognitive transmission is a method to improve spectral efficiency of wireless networks by allowing secondary users to transmit over a spectrum primarily assigned to some primary users as long as the negative side effect on the primary users in managed. One example is the case of sharing a licensed spectrum with un-licensed users, which are allowed to transmit subject to causing zero or minimal interference to the licensed users. In conventional half-duplex networks, it is difficult to manage such a sharing of spectrum, as nodes inherently cannot listen while transmitting. Even in FDD systems, although users can listen while transmitting, they will not be able to manage the impact of their transmission on the reception of the other users in the network as reception and transmission are not in the same frequency band. This can be further generalized to scenarios in which there are several classes of QoS, corresponding to several classes of users, or to different types of data within the same class, e.g., depending on delay sensitivity of data or being emergency information. This disclosure includes strategies to handle the above scenarios. Primary users, or users sending data of a higher QoS requirement, send a signature signal that will be immediately detected by the secondary users, or by users sending data with a lower QoS requirement. Such secondary users will be continually listening and searching for such a signature. Once the signature is detected, secondary users adjust their transmission parameters accordingly, or stop their transmission altogether and continue with the remaining part at a later time when the network becomes once again available to them. Parameters of the periodic signal can be used to identify different classes of users or convey some critical information.


To describe the systems and methods a basic setup is employed. For this purpose, aspects relevant to supporting multiple clients and networking are described assuming OFDMA. However, techniques herein will be applicable if OFDMA is replaced by some other known alternatives, e.g., CDMA, OFDM-CDMA, Direct Sequence (DS)-CDMA, Time-division Multiple Access (TDMA), constellation construction/transmission in time with pulse shaping and equalization, Space Division Multiple Access (SDMA), and their possible combinations.



FIGS. 1 and 2 show block diagrams of respective full duplex communication networks 100A and 100B, albeit simplified, in which an access point (AP) (e.g., 104 or 108) is communicating with multiple clients (106A, 106B 106C and 106D) with full-duplex links to each client. Access point 108 of FIG. 2 communicates with multiple clients using OFDMA for sharing the bandwidth among users with full-duplex links over each OFDM tone and with support for multiple transmit and multiple receive antennas 110 (e.g., N×N). Though described as access points, the components 104 and 108 may be configured as base stations (BS) or other communication components such as relays, range extenders, wireless terminals, and wireless nodes involved in ad hoc or wireless mesh networks.


This disclosure encompasses systems and methods wherein signals for control of Physical Layer (PHY) operations are communicated in parallel with the flow of data. In particular, one of the nodes inserts pilots in its transmit signal to help in synchronizing distant nodes. As another example, transmitting nodes can simultaneously listen to a common synchronizing pilot sent by an external nodes, such as a satellite, and use it towards forming a coherent distributed/co-operative scheme, such as Interference Alignment or distributed MIMO, with support for joint detection of separately encoded messages. In particular, this technique can be applied to an interference channel, and to a MIMO multiple access channel. In the case of SDMA in MIMO broadcast channel, the central node sends a pilot in downlink to synchronize all its client nodes, and each of the client nodes uses part of its up-link channel to feedback its corresponding channel state. In the case of SDMA in MIMO uplink, the central node sends a pilot in downlink to synchronize all its client nodes.



FIG. 3 is a block diagram showing cooperative communications 200 between a central wireless communications device 200 and K other devices (Unit1-UnitK). Central unit has M multiple antennas, typically where M=K. There is established 2K virtual pipes of data/control communications over the same time/frequency where control communications include reference for time/frequency/clock synchronization, channel gain/phase, information for user selection and channel inversion in SDMA, beam-forming vectors, beam-forming gains, channel matrix in MIMO, ARQ, power control, instruction for adaptive coding and modulation, etc. In SDMA down-link, main data flow is out of a central unit, while in SDMA uplink most data flow is into the central unit. Common control is used by all nodes in the network and in particular includes reference for time/frequency/clock synchronization. Such a common reference for time/frequency/clock enables all the units to be globally synchronized, instead of local synchronization, which is used in traditional alternatives using half-duplex links. This is particularly important in the SDMA uplink, in which case all transmitting nodes can locally deal with any mismatch they may have with the central receiving node prior to transmission, and this can be achieved without the need for feedback. Note that in traditional half-duplex links such mismatches are usually measured and compensated in the receiver side. This would not be possible in the SDMA uplink due to the reason that the common receiver would usually have different mismatches with different transmitters and consequently would not be able to compensate for all of them. If an SDMA uplink is based on half-duplex links, the only option would be to feedback the measured mismatches to their respective transmitting nodes to be compensated prior to transmission. However, this would require complicated signaling and use of feedback. These problems are avoided using full-duplex links and methods explained above. Although this feature is explained in terms of SDMA, similar strategy could be used to solve similar problems in the case of interfering nodes by enabling global synchronization at the transmitters' sides.


It is desirable that new clients, through sending request-to-join signal, can join an existing network without prior co-ordination. Exploiting full-duplex capability, the Base-Station (BS) or Access Point (AP) can continually monitor its incoming signal in search for such a request-to-join signal. Once such a signal is detected, the node allocates resources to the new client and synchronizes it with the rest (i.e., synchronization within the cyclic prefix of the underling OFDM).


To handle asynchronous clients, receiving node (e.g., AP) will be always listening to detect a valid request-to-join signal, while supporting full-duplex connections to its current clients. In one embodiment, several repetitions of a sequence (i.e., several periods of a periodic sequence) are used as the request-to-join signal. Once such a signal passes through the linear system corresponding to the channel, it results in an almost periodic sequence of the same period. This can be detected at the receiver end by using a simple correlation calculation by sliding two consecutive windows of the length of that period, shifting them through the incoming signal sample by sample, and computing the inner product of the vectors within the two windows. This produces a peak when the periodicity starts, and this peak will continue until the periodicity lasts. It should be ensured that the remaining amount of self-interference does not cause complete loss of this correlation peak. Note that correlation calculation on its own provides a significant boost in signal to noise.


The possibility of supporting two-way links with multiple (initially asynchronous) clients helps with many of the current challenges of wireless networks (cellular and WLAN). Examples are problems of Multiple Access Control (MAC), resource allocation, Quality of Service (QoS), co-operative communications, interference management and scheduling.


Access to a return channel can be used in part (e.g., by allocating a subset of OFDM tones) to facilitate control signaling. This includes sending pilots for time and/or frequency synchronization, ARQ, power control, adaptive coding and modulation, etc. An important usage scenario in this category is the case of co-operative signaling. In recent years, there have been significant work on setups like broadcast channel, multiple access channel and interference channel. Time and frequency synchronization in such setups is a major issue. Access to full-duplex links can facilitate practical implementation of such setups. In one embodiment, one node broadcasts a set of pilots to be used by all network nodes as a reference for their carrier. Another embodiment concerns a scenario that a large number of transmit antennas, each with low transmission power, are used to perform beam-forming in phase and/or polarization for a receiver which has a small number, and in particular, a single antenna.


Access to a return channel also enables the receiver to periodically feedback the channel state (phase, magnitude and/or polarization) corresponding to each transmit antenna to be used by the multiple antenna transmitter for beam forming. This setup can be used to reduce transmit power, and in particular is useful in scenarios that transmit power is limited due to regulatory considerations. In another embodiment, transmitting nodes gather an indication of the amount of interference in different frequency bands through listening while transmitting, and adjust their transmission parameters accordingly.


Possibility of supporting two-way links solves many of resource allocation and scheduling issues that are currently prominent bottlenecks in cost effective and efficient realization of wireless networks. This disclosure includes methods wherein interfering nodes, by listening to each other while transmitting, can form a distributed collaborative signaling scheme. For example, in the case of two-user Interference Channel (IC), the two transmitting nodes can listen to each other during one symbol and then form a distributed space-time code, e.g., an Alamouti code, in the next symbol. This can be achieved by listening to several symbols gathered in a coded block and use this information (after partial or complete decoding of the coded block) to help in the following block(s). Likewise, the two transmitting nodes can listen to each other during one coded block and then form a distributed Alamouti code in the next block. Such setups can be also useful in multiple access scenarios, e.g., when two clients send data to an access point. As an alternative to Alamouti code, transmitter/receiver nodes can adjust their transmission/detection strategies such that each receiver detects its own message, rather than detecting both messages. In the case that the receiver nodes are also full duplex, it is possible to base the second phase (collaboration phase) on either the transmitter (as above) or the receiver. In other words, during the collaboration phase, either or both receivers relay their received message to the other receiver. This feature increases the achieved diversity gain. For example, in the case of two-user interference channel composed of interfering links T1custom characterR1 and T2custom characterR2, the following configurations can be used in the collaboration phase (T1,T2), (T1,R1), (T1,R2), (T2,R1), or (T2,R2).


The above cooperative setup can be used in the case of a multiple access channel (the two nodes send data to the same access point). In a more general setup that multiple transmitter/receiver pairs share the spectrum, once a node has access to a data symbol relevant to the other node(s), it can decide to activate its transmitter to relay the received signal within the OFDM cyclic prefix, while continuing to listen to subsequent incoming signals. This feature can be used to enhance diversity, or save energy through a relaying operation (when the relaying nodes enjoy good outgoing channel conditions).



FIG. 4 are block diagrams showing cooperative communication in accordance with one example. Unit A has a message intended to be sent to Unit A′ and Unit B has a message intended to be sent to Unit B′. All receivers hear transmitters. In a phase 1, transmitters in subunits in A and B transmit their respective messages. This may include a single transmission, or a coded block protected by Forward Error Correction (FEC). A phase 2 of co-operation starts after phase 1. All receivers hear transmissions in phase 1 and phase 2, but a selected subset of receivers will be active and listen to the incoming signal. In FIG. 4, subunits specified in smaller boxes with bold-ace fonts specify subunits that are active in phase 1 and phase 2, either as transmitter or as receiver. Direction of arrows in FIG. 4 show the flow of information in the sense of specifying, which receive subunit, is listening to which transmit subunit. In phase 2, two transmit subunits and two receive subunits are active. Active receive subunits are on the receive side, but active transmit subunits can be on either sides depending on the quality of their received signal in phase 1, which in turn is dictated by the channel gains and respective signal-to-noise ratios in phase 1. This results in 4 protocols for phase 2 as shown in FIG. 4. A decision about which of these protocols should be followed in phase 2 can be made by a central node, which informs all the units of the policy to be used. Such a policy can be revised in periods determined by how fast the channel conditions are changing. As mentioned earlier, phase 1 can be as short as a single transmission, and as long as a coded block protected by FEC. Correspondingly, phase 2 will operate on the single symbol, or on the coded block. Phase 2 can relay the noisy signal, or perform complete or partial decoding to remove or reduce the effect of the noise. To reduce or remove noise, this operation involves hard decision, soft decision or soft output decoding. Accordingly, transmission policy of each transmit subunit active in phase 2, say in terms of transmit energy, can be locally optimized according to the instantaneous quality of the corresponding received signal in phase 1. These local adjustments to policy will be complementary to the global policy determined by the central node.


Traditional wireless networks rely on two types of links for exchange of two types of information, namely data and control. One type is to handle the main bulk of data to be communicated (data link) and another type is to handle various control information (control link). Data link is usually of high throughput, and control link is usually of low throughput. A major bottleneck is to establish the control link in a timely manner without causing too much disturbance on the network operation. In current half-duplex networks, data and control links are established either using different frequency bands, or using different time slots. Existing solutions based on frequency division duplex are usually expensive, and existing solutions based on time division duplex are usually inefficient. For example, in 802.11, which is based on time division duplex, a new node that wants to transmit information (data or control) has to wait until channel is idle. This is called Carrier Sense Multiple Access (CSMA) and is the main source of poor efficiency in 802.11. With the wide spread use of smart phones, this problem is expected to become more severe. The reason is that as smart phones move in areas covered by 802.11, they can easily get disconnected from their current access point and subsequently try to get associated with another access point and this requires significant control signaling. Ironically, in most cases, the moving smart phones do not have any actual data to send or receive, but their control signaling usually imposes overwhelming degradations in network delay and throughput. It will be useful if low throughput control links could be established asynchronously and in parallel with high throughput data links. In an embodiment, this is achieved by overlaying a network of low throughput control links on top of the high throughput network of data links. Transmission on the Low Throughput Overlay (LTO) channel forming the control links uses signaling schemes with low power and thereby low spectral efficiency. For example, a transmitter can send several periods of a periodic signal in time domain, which can be detected by a simple correlation calculation using sliding windows. The presence of such a signal indicates incoming control data, and the amplitude and/or phase and/or duration of a basic periodic signal can be varied (with respect a starting periodic signal used as a preamble) to embed the control data. This may also include FEC with a short block length. Nodes, which are interested to participate in the overlay control network, will sense the LTO channel and transmit if the channel is idle (can possibly use a back-off strategy similar to CSMA protocol used in 802.11). To avoid collisions, there is provided a manner to indicate occupancy of the LTO channel which shares (is overlaid on top of) the spectrum used for the main data network. Main data links operate with relatively higher power over the High Throughput Main (HTM) channel. Using methods described herein, this is achieved by searching for the basic periodic signal as a sign of LTO channel being idle or occupied. Nodes involved in signaling over HTM channel can first search for the LTO signal, perform signal detection on it, and then (partially or fully) cancel the LTO signal to reduce its harmful effect on the HTM channel. There is provided a method, in the context of handing asynchronous clients, to establish a framework to implement the above setup of an LTO channel working asynchronously and in parallel with the HTM channel without significantly degrading the HTM channel due to the inherent interference between LTO and HTM channels due to the sharing of spectrum.



FIG. 5 is a flowchart showing a method with operations 400 for a wireless communication device for establishing and/or handling communications over an LTO channel asynchronously and in parallel with communications over an HTM data channel in accordance with one embodiment. It will be understood that operations 402-404 relate to HTM data channel communications and operations 406-422 relate to LTO channel communications. Respective operations may be performed by respective subunits of the wireless communication device. FIG. 5 applies to either access point, or client. In particular any unit which may get involved in ad-hoc or mesh networking should have equal capabilities in this respect. However, in a simple network setup, clients may use the LTO channel in the uplink to announce their presence, and then listen for response from the AP in the HTM channel.


At 402, a determination is made whether the communications are over the HTO. If no operations return to the start of operations 400. If yes, operations perform self-interference cancellation in frequency domain, OFDMA networking and transmit/receive operations, possibly detecting/cancelling signal from LTO receive channel prior to decoding data 404.


At 406, a determination is made whether data is received over LTO channel. If yes, at 408, operations perform self-interference cancellation in the time domain and receive data via the LTO channel until all data is received. If data is not received, there may be data to send over the LTO channel (determination at 410). If yes, at 412, operations perform self-interference cancellation in the time domain and search for the periodic sequence indicating if the LTO channel is occupied. At 414 operations determine whether the LTO channel is idle (i.e. available for the communication device). If no, operations return to 412 to try again. If yes, at 416 data is transmitted over the LTO channel superimposed on the periodic signal indicating LTO channel occupancy. At 418, a determination is made whether more data is to be sent over the LTO channel. If yes, operations return to 416. If not, at 420 the device performs self-interference cancellation in the time domain and searches for the periodic sequence indicating if another node (device) wants to initiate communications over the LTO channel. If at 422 there is no incoming communication over the LTO channel, operations may continue at 410. If yes, operations continue at 408 as previously described.


In the context of IC, this disclosure includes methods to cancel the interference at a receiving node through filtering and super-imposing/relaying of the received signal. This feature makes it possible to achieve a multiplexing gain of one in a two-user IC, which is in contrast to the limit of ½ using traditional half-duplex radios. In particular, there is presented a setup in which each transmitter listen to the incoming signal and forwards it (after proper filtering in time domain) to its respective receiver (on top of the desired signal) such that it cancels the interference signal arriving through the cross link. To realize such a cooperative scheme, one needs to account for the delay in exchanging information between transmitters. Methods described herein use a minimum delay dictated by the channel memory as captured in OFDM cyclic prefix. In contrast, in the literature based on using a discrete time model for the underlying channels, the minimum delay for cooperation is assumed to be limited to at least one symbol interval in the discrete time axis. Relying on such a discrete time model limits the potential gain due to such collaborations. The embodiments herein handle the minimum delay requirement at a finer level of granularity. This exploits the fact that tolerance to transmission delay is governed by OFDM cyclic prefix, which is larger than the minimum delay requirement for cooperation as governed by the underlying filtering/relaying operation.


Another embodiment for the application of full-duplex link is a basic interference channel (FIGS. 6 and 7) where there are transfer functions G11, G12, G21, and G22 from the transmitters to the receivers, C12, C21 for the links between them, and C11, C22 for the self-interference of each transmitter to itself. In this setup, there is an interference channel that the transmitters want to collaborate and reduce the effect of their mutual interference. In Information Theoretical approaches, such a collaboration is based on the assumption that transmit units require to wait for one symbol (collaboration is restricted to have a delay of at least one symbol). However, the methods herein exploit the observation that relative delays within OFDM cyclic prefix (capturing channel memory) are acceptable. Relying on this observation, to cancel the interference at the distant receiver, transmitters TX1 and TX2 apply a filter (in time domain) in the base-band of their receive chain, and forward the signal from the other node superimposed on their own signal such that it cancels the interference coming from the cross link. Receive filters should have the following expressions:







R
1

=



G

2

1





G

2

1




C

1

1



-


G

1

1




C

2

1










and








R
2

=


G

1

2





G

1

2




C

2

2



-


G

2

2




C

1

2









Note that using such filters increases the transmit energy and thereby results in decreasing the signal to noise ratio, but it will cancel the interference, and consequently, the multiplexing gain is 1 instead of 0.5 which is the limit for interference channel with half-duplex links. FIG. 7 shows a more detailed schematic view of units operating in the same frequency band, which filter and super-impose/forward the signal received from each other to cancel (pre-compensate) the interference at their intended receiver. Accordingly:

t1=R1r1′+s1
t2=R2r2′+s2
r1=C11t1+C21t2
r2=C12t1C22t2
r1=G11t1+G21t2
r2=G12t1+G22t2



FIG. 7 models the above operations in base-band wherein s1 and s2 are information-bearing signals aimed from each transmitter to its respective receiver.


Another aspect of this disclosure concerns the situation that some or all the control signaling can affect the propagation environment in small increments. In this case, relying on a full duplex link, this disclosure includes methods to form a closed loop between a transmitter and its respective receiver wherein the control signals (affecting the channel impulse response) are adjusted relying on closed loop feedback, e.g., using methods known in the context of adaptive signal processing. Channel impulse response can be changed by modifying the RF properties of the environment external, but close, to the transmit and/or receive antenna(s). The criterion in such adaptive algorithms can be maximizing desired signal, and/or minimizing interference, and/or increasing frequency selectivity for diversity purposes. In such a setup, stability may be compromised due to closed loops. These are one local loop at each node (between transmitter and receiver in the same node due to the remaining self-interference) and the third one is the loop formed between transmitter/receiver of one node and receiver/transmitter of the other node. It should be clear to those skilled in the area that transmit gain, receive gain and gains in local loops of the two units can be adjusted to avoid such undesirable oscillations.


In some embodiments, a method of operating a wireless communication network for establishing communication between a Central Node, e.g., Access Point (AP), Base-station (BS), and respective multiple clients with two-way wireless links, i.e., complete or partial overlap in time as well as in frequency, the wireless communication node comprising a Multiple-Input Multiple-Output (MIMO) antenna system, the method comprising:

    • 1) a new client is allowed to send a request-to-join signal without prior coordination, and with overlap in time and frequency with the existing clients, and wherein,
    • 2) central node is continually listening to detect a valid incoming request-to-join signal, or other forms of control signaling, of any client while communicating with the multiple clients of the existing network using full-duplex connectivity for both data and control flow, and wherein
    • 3) a first stage of base-band self-interference cancellation is followed by an algorithmic base-band block, which works synchronously with the transmit signal of a central node A to detect the request-to-join signal and subsequently trigger a sequence of operations required for the node B to join the network associated with node A, or perform other network management operation such as bandwidth allocation and scheduling.


Alternative embodiments may include multiple clients connected to the central node sharing a common spectrum using Orthogonal Frequency Division Multiple Access (OFDMA). The method may include neighboring nodes, by listening to each other while transmitting, collaborating in the subsequent transmission symbol(s), or collaborate in subsequent transmission block(s). The method may include the use of part of a return link as a control channel to, at least one of:

    • 1) send pilots for synchronization;
    • 2) coordinate retransmission of erroneous frames in ARQ without severely interrupting a forward link;
    • 3) coordinate adaptive coding and modulation and power control based on the quality of the forward link, e.g., using channel gain or features of observed multi-user interference across frequency;
    • 4) feedback the channel state (phase, magnitude, polarization) in an asymmetric link wherein transmitter node possesses many antennas and rely on beam-forming in terms of channel state (phase, magnitude, polarization) to achieve high reliability with low transmit energy (e.g., below noise level); and,
    • 5) feedback features of its received signal to improve the capacity of the forward link in an interference channel.


The method of some further embodiments may include a central node using part of a forward link to broadcast a common pilot to be used by other nodes for synchronization and thereby enabling joint decoding in a multiple access channel or in an interference channel. Further embodiments may use a MIMO-SDMA network environment wherein part of a return link from each receiver node is used to periodically feedback its corresponding channel state, and wherein part of a forward link from a main transmitter node is used to periodically broadcast a common pilot for synchronization. The methods of further embodiments include a network environment wherein nodes periodically listen while transmitting to measure features of their observed multi-user interference terms, for example energy of interference in different frequency segments, and accordingly adjust their transmit/receive strategies.


Embodiments may also include methods described above used in a network environment wherein a plurality of nodes filter and forward respective receive signals by super-imposing on the respective transmit signals of each respective node such that the corresponding interference term(s) at the respective intended receiver for a node is cancelled. The methods may use a 2-user interference channel wherein a transmit and/or a receive node filter and forward their received signal, including through super-imposing it on their transmit signal if applicable, to cancel the multi-user interference at either or both of receiving nodes. The method may be generalized to more than 2 interfering nodes, wherein transmit and/or receive nodes rely on multiple antennas in order to cancel the multi-user interference terms from several interfering nodes.


Further methods may be used in a cognitive transmission network, wherein

    • 1) primary users are distinguished by a signature signal, e.g., a periodic preamble, to be sent at the beginning of their transmission, and wherein
    • 2) primary users start transmission without attention to the channel occupancy by the secondary users,
    • 3) secondary users will be continually listening and searching for the signature of the primary users, and, wherein
    • 4) secondary users adjust their transmission parameters once the signature of the primary users is detected, e.g., stop their transmission and continue with the remaining part at a later time when the network becomes once again available to secondary users.


Additional methods may be used in a cognitive network, wherein

    • 1) users are distinguished by a signature signal according to their class of service, e.g., CDMA codes which are superimposed on their main signal, and wherein
    • 2) users check for the channel occupancy, detect the class of the users using the channel, and adjust their transmission strategy accordingly.


An embodiment includes a method for overlaying a network of Low Throughput Control (LTC) links on top of the High Throughput Main (HTM) data links with overlap in time and frequency, and wherein, to enable cancellation on the HTM channel, transmission on the LTO channel uses signaling schemes with low power and thereby low spectral efficiency.


These methods may be used where,

    • 1) an LTO transmitter sends several periods of a periodic signal in time domain, which are detected by a correlation calculation using sliding windows, and wherein
    • 2) the presence of such a signal indicates incoming control data, and wherein
    • 3) the amplitude and/or phase and/or duration of a basic periodic signal are varied (with respect a starting periodic signal used as a preamble) to embed the control data, and wherein
    • 4) data on LTO includes Forward Error Correction (FEC) with a short block length.


To avoid collisions, some of the above methods may use:

    • 1) an overlaid signature signal is used to indicate occupancy of the LTO channel, and wherein
    • 2) nodes which are interested to participate in the overlay control network will sense the LTO channel and transmit if the channel is idle, e.g., by searching for the basic periodic signal as a sign of LTO channel being idle or occupied, and wherein
    • 3) LTO links use a back-off strategy, e.g., similar to the CSMA protocol used in 802.11, among themselves, and wherein,
    • 4) HTM links operate with relatively higher power, and wherein,
    • 5) nodes involved in signaling over HTM links first search for the LTO signal, detect its timing and synchronize with it, perform signal detection on it, and then (partially or fully) cancel the LTO signal to reduce its harmful interference effect on their respective HTM link.


Further methods may rely on a full duplex link to form a closed loop between a transmitter and its respective receiver, wherein the control signals (affecting the channel impulse response) are adjusted relying on closed loop feedback, e.g., using methods known in the context of adaptive signal processing.


Many of the methods described above may be used even where at least one of the clients does not have full-duplex capability.


Still further embodiments include a wireless communication node configured to perform a method according to any one of the previous method claims.


In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present teachings.


The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.


Moreover in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” “has”, “having,” “includes”, “including,” “contains”, “containing” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein. The terms “substantially”, “essentially”, “approximately”, “about” or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.


It will be appreciated that some embodiments may be comprised of one or more generic or specialized processors (or “processing devices”) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used.


Moreover, an embodiment can be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation.


The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.

Claims
  • 1. A method comprising: at a wireless node of a wireless network, obtaining a class identification signature signal associated with a first class of wireless nodes selected from a plurality of classes of wireless nodes, the class identification signature signal comprising a signal transmitted by all wireless nodes of the first class of wireless nodes;transmitting data packets by the wireless node,wherein the data packets include the obtained class identification signature signal indicating the first class of wireless nodes;at the wireless node, monitoring received signals from other communication nodes, and upon detection of a class identification signature signal transmitted from another communication node:determining that the detected class identification signature signal is associated with a relatively higher-priority communication node assigned to a class of wireless nodes having a relatively higher priority of service, and responsively adjusting the wireless node transmission parameters; andafter adjusting transmission parameters, subsequently reinitiating transmissions after determining that either (i) no further class identification signature signals transmitted from another communication node have been detected or (ii) any further detected class identification signature signals transmitted from another communication node belong to a relatively lower-priority communication node.
  • 2. The method of claim 1, wherein adjusting the wireless node transmission parameters comprises ceasing transmissions in deference to the relatively higher-priority communication node.
  • 3. The method of claim 1, wherein the class identification signature signal is a code-division multiple access code overlayed on a main transmission signal.
  • 4. The method of claim 1, wherein the class identification signature signal is a periodic preamble signal sent preceding a main transmission signal.
  • 5. The method of claim 1, wherein the wireless node is a full-duplex wireless node that performs the monitoring the received signals from the other communication nodes and transmitting signals containing the obtained class identification signature signal.
  • 6. A wireless network for data communications comprising: at least a first set of wireless communication nodes and a second set of wireless communication nodes, each set of wireless communication nodes assigned to a respective transmission class and configured to transmit messages containing a corresponding class identification signature signal;each wireless communication node of the first set of wireless communication nodes and second set of wireless communication nodes configured to monitor received signals from other wireless communication nodes, and upon detection of a class identification signature signal transmitted from another wireless communication node: determining that the detected class identification signature signal is associated with a relatively higher-priority communication node assigned to a class of wireless nodes having a relatively higher priority, and responsively adjusting the wireless communication node transmission parameters in deference to the relatively higher-priority wireless communication node;wherein each wireless communication node of the at least first set of wireless communication nodes and second set of wireless communication nodes is further configured to, after adjusting transmission parameters, subsequently reinitiating transmissions after determining that either (i) no further class identification signature signals transmitted from another wireless communication node have been detected or (ii) any further detected class identification signature signals transmitted from another wireless communication node belong to a relatively lower-priority wireless communication node.
  • 7. The wireless network of claim 6, wherein adjusting the wireless communication node transmission parameters comprises ceasing transmissions in deference to the relatively higher-priority communication node.
  • 8. The wireless network of claim 6, wherein the class identification signature signal is a code-division multiple access code overlayed on a main transmission signal.
  • 9. The wireless network of claim 6, wherein the class identification signature signal is a periodic preamble signal sent preceding a main transmission signal.
  • 10. The wireless network of claim 6, wherein the wireless communication node is a full-duplex wireless communication node that performs the monitoring the received signals from the other wireless communication nodes and transmitting signals containing the corresponding class identification signature signal.
  • 11. The wireless network of claim 6, wherein the wireless communication nodes are wireless client communication nodes.
  • 12. The wireless network of claim 6, wherein the class identification signature signal includes a periodic preamble.
  • 13. The wireless network of claim 6, wherein the class identification signature signal comprises a Code Division Multiple Access superimposed on at least one of the data packets.
  • 14. The wireless network of claim 6, wherein each wireless communication node is further configured to, upon detection of the class identification signature signal transmitted from another wireless communication node, determining that the detected class identification signature signal is associated with a relatively lower-priority wireless communication node assigned to a class of wireless nodes having a relatively lower priority, and responsively continuing transmissions.
  • 15. The method of claim 1, wherein, when the wireless node has a relatively higher priority, the wireless node starts transmission without regard to channel occupancy by a wireless node having a relatively lower priority.
  • 16. The method of claim 1, wherein the class identification signature signal includes a periodic preamble.
  • 17. The method of claim 1, wherein the first class of wireless nodes has a quality of service requirement.
  • 18. The method of claim 1, further comprising, upon detection of the class identification signature signal transmitted from another communication node, determining that the detected class identification signature signal is associated with a relatively lower-priority communication node assigned to a class of wireless nodes having a relatively lower transmission priority, and responsively continuing transmissions.
CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is continuation application of pending U.S. patent application Ser. No. 15/701,076, entitled “Distributed Collaborative Signaling in Full Duplex Wireless Transceivers,” filed on Sep. 11, 2017, which is continuation application of U.S. patent application Ser. No. 13/893,299, entitled “Distributed Collaborative Signaling in Full Duplex Wireless Transceivers,” filed May 13, 2013, now U.S. Pat. No. 9,763,104, which is a non-provisional filing of, and claims benefit under 35 U.S.C. § 119(e) from, U.S. Provisional Patent Application Ser. No. 61/646,312, entitled “Two-way Wireless Systems and Applications,” filed May 13, 2012, and U.S. Provisional Patent Application Ser. No. 61/771,815, entitled “Two-way (True Full-duplex) Wireless,” filed Mar. 2, 2013, all of which are hereby incorporated herein by reference in their entirety. In addition, this application is related to the following applications, all of which are also incorporated herein by reference in their entirety: 1) U.S. patent application Ser. No. 13/893,288, entitled “Full Duplex Wireless Transmission with Self-Interference Cancellation,” filed on May 13, 2013, now U.S. Pat. No. 9,713,010; 2) U.S. patent application Ser. No. 13/893,296, entitled “Wireless Transmission with Channel State Perturbation,” filed May 13, 2013, now U.S. Pat. No. 9,008,208; 3) U.S. application Ser. No. 13/893,297, entitled “Full Duplex Wireless Transmission with Channel Phase-Based Encryption,” filed May 13, 2013, now U.S. Pat. No. 9,572,038.

US Referenced Citations (283)
Number Name Date Kind
2995752 Nicholas et al. Aug 1961 A
3082421 Nicholas Mar 1963 A
3184747 Alfred May 1965 A
3725920 Kupfer et al. Apr 1973 A
3965475 Deerkoski et al. Jun 1976 A
4112430 Ladstatter Sep 1978 A
4268727 Agrawal et al. May 1981 A
4343005 Han et al. Aug 1982 A
4701935 Namiki Oct 1987 A
4750165 Champagne et al. Jun 1988 A
5383224 Mizoguchi Jan 1995 A
5388124 Laroia et al. Feb 1995 A
5596439 Dankberg et al. Jan 1997 A
5630154 Bolstad et al. May 1997 A
5691978 Kenworthy Nov 1997 A
5805116 Morley Sep 1998 A
5892769 Lee Apr 1999 A
6034638 Thiel et al. Mar 2000 A
6084919 Kleider et al. Jul 2000 A
6255997 Ratkorn et al. Jul 2001 B1
6281988 Leung Aug 2001 B1
6317092 De et al. Nov 2001 B1
6369758 Zhang Apr 2002 B1
6608864 Strait Aug 2003 B1
6621876 Camp et al. Sep 2003 B2
6731908 Berliner et al. May 2004 B2
6745009 Raghothaman Jun 2004 B2
6781991 Anderlind Aug 2004 B1
6864852 Chiang et al. Mar 2005 B2
6870515 Kitchener et al. Mar 2005 B2
6917597 Schmidl et al. Jul 2005 B1
6934511 Lovinggood et al. Aug 2005 B1
7002518 Lin et al. Feb 2006 B2
7065036 Ryan Jun 2006 B1
7091894 Fudge et al. Aug 2006 B2
7096042 Marinier Aug 2006 B2
7184466 Seemann et al. Feb 2007 B1
7187907 Widrow Mar 2007 B2
7221688 Vanness May 2007 B2
7263143 Rothaar et al. Aug 2007 B1
7272366 Haapoja et al. Sep 2007 B2
7286096 Jaffer et al. Oct 2007 B2
7321611 Fullerton Jan 2008 B2
7346100 Kumar Mar 2008 B2
7471204 Safarian et al. Dec 2008 B2
7482058 Ahmed et al. Jan 2009 B2
7522115 Waltman Apr 2009 B2
7627325 McCoy Dec 2009 B2
7693174 Ishibashi et al. Apr 2010 B2
7706744 Rodgers et al. Apr 2010 B2
7817641 Khandani Oct 2010 B1
7920539 Stanford et al. Apr 2011 B2
7944871 Imamura et al. May 2011 B2
7991160 Guccione et al. Aug 2011 B2
3023438 Kangasmaa et al. Sep 2011 A1
8031744 Radunovic et al. Oct 2011 B2
8064502 Sawai et al. Nov 2011 B2
8107906 Lum et al. Jan 2012 B2
8175535 Mu May 2012 B2
8184052 Wu et al. May 2012 B1
8184061 Sanford May 2012 B2
8208628 Yener et al. Jun 2012 B2
8238551 Reznik et al. Aug 2012 B2
8280046 Rudolf et al. Oct 2012 B2
8306480 Muhammad et al. Nov 2012 B2
8351874 Dent et al. Jan 2013 B2
8373582 Hoffberg Feb 2013 B2
8385235 Chiu et al. Feb 2013 B2
8401196 Goldberg et al. Mar 2013 B2
8405543 Kluge et al. Mar 2013 B2
8423986 Grechanik Apr 2013 B1
8498585 Vandenameele Jul 2013 B2
8520855 Kohno et al. Aug 2013 B1
8587492 Runyon Nov 2013 B2
8628650 Ah et al. Jan 2014 B2
8629650 Mohammadian et al. Jan 2014 B2
8644768 Kluge et al. Feb 2014 B2
8744377 Rimini et al. Jun 2014 B2
8767869 Rimini et al. Jul 2014 B2
8823577 Smid et al. Sep 2014 B2
8836581 Nysen Sep 2014 B2
8836601 Sanford et al. Sep 2014 B2
8836606 Kish et al. Sep 2014 B2
8837615 Baldemair Sep 2014 B2
8842044 Nysen et al. Sep 2014 B2
8860629 Shtrom et al. Oct 2014 B2
8897269 Ji et al. Nov 2014 B2
8918692 Braithwaite Dec 2014 B2
8976641 Choi et al. Mar 2015 B2
9008208 Khandani Apr 2015 B2
9019165 Shtrom et al. Apr 2015 B2
9036749 Choi et al. May 2015 B2
9054795 Choi et al. Jun 2015 B2
9059879 Jaeger et al. Jun 2015 B2
9071313 Monsen Jun 2015 B2
9077071 Shtrom et al. Jul 2015 B2
9077407 Koren et al. Jul 2015 B2
9077421 Mehlman et al. Jul 2015 B1
9093758 Kish et al. Jul 2015 B2
9130693 Reznik et al. Sep 2015 B2
9236996 Khandani Jan 2016 B2
9246234 Rao et al. Jan 2016 B2
9276682 Bharadia et al. Mar 2016 B2
9277591 Amini et al. Mar 2016 B2
9281979 Maltsev et al. Mar 2016 B2
9337885 Mehlman et al. May 2016 B2
9413516 Khandani Aug 2016 B2
9479322 Khandani Oct 2016 B2
9571205 Suarez et al. Feb 2017 B1
9572038 Khandani Feb 2017 B2
9608705 Maru Mar 2017 B2
9622098 Emmanuel et al. Apr 2017 B2
9713010 Khandani Jul 2017 B2
9763104 Khandani Sep 2017 B2
9791552 Schuman Oct 2017 B1
9820311 Khandani Nov 2017 B2
9924512 Zhang Mar 2018 B1
9997830 Khandani Jun 2018 B2
10063364 Khandani Aug 2018 B2
10067746 Yu Sep 2018 B1
10068228 Winklevoss et al. Sep 2018 B1
10069479 Desclos Sep 2018 B1
10177896 Khandani Jan 2019 B2
10700766 Khandani Jun 2020 B2
10778295 Khandani Sep 2020 B2
11012144 Khandani May 2021 B2
20010010495 Helms et al. Aug 2001 A1
20010024434 Ayyagari et al. Sep 2001 A1
20020028655 Rosener et al. Mar 2002 A1
20020032004 Widrow Mar 2002 A1
20020097810 Seki Jul 2002 A1
20030043071 Lilly et al. Mar 2003 A1
20030114128 Haapoja et al. Jun 2003 A1
20030189974 Ferry Oct 2003 A1
20030189975 Fullerton Oct 2003 A1
20030206579 Bryant Nov 2003 A1
20040022229 Vanness Feb 2004 A1
20040027304 Chiang et al. Feb 2004 A1
20040076246 Vanderperren et al. Apr 2004 A1
20040106381 Tiller Jun 2004 A1
20040132414 Sendyk et al. Jul 2004 A1
20050020771 Ahmed et al. Jan 2005 A1
20050024540 Kim et al. Feb 2005 A1
20050052330 Mehltretter Mar 2005 A1
20050057420 Lin et al. Mar 2005 A1
20050083863 Umei et al. Apr 2005 A1
20050129223 Piket et al. Jun 2005 A1
20050275576 Fudge et al. Dec 2005 A1
20060014491 Cleveland Jan 2006 A1
20060045063 Stanford et al. Mar 2006 A1
20060109067 Shtrom May 2006 A1
20060192720 Shtrom Aug 2006 A1
20060274776 Malik Dec 2006 A1
20060280147 Rizvi Dec 2006 A1
20070026804 Ishibashi et al. Feb 2007 A1
20070026807 Kish Feb 2007 A1
20070036353 Reznik et al. Feb 2007 A1
20070057860 Jaffer et al. Mar 2007 A1
20070063875 Hoffberg Mar 2007 A1
20070070902 Elaoud et al. Mar 2007 A1
20070080891 De et al. Apr 2007 A1
20070082617 McCallister Apr 2007 A1
20070082622 Leinonen et al. Apr 2007 A1
20070118749 Hagn et al. May 2007 A1
20070132651 Nilsson Jun 2007 A1
20070189528 Ueda Aug 2007 A1
20070254692 McCoy Nov 2007 A1
20080009257 Safarian et al. Jan 2008 A1
20080063113 Gao et al. Mar 2008 A1
20080107046 Kangasmaa et al. May 2008 A1
20080123851 Guccione et al. May 2008 A1
20080125033 Lee May 2008 A1
20080129640 Shtrom et al. Jun 2008 A1
20080165874 Steele et al. Jul 2008 A1
20080233966 Scheim et al. Sep 2008 A1
20080294970 Gross et al. Nov 2008 A1
20090092072 Imamura et al. Apr 2009 A1
20090100313 Gross et al. Apr 2009 A1
20090135748 Lindoff et al. May 2009 A1
20090141900 Ye et al. Jun 2009 A1
20090186582 Muhammad et al. Jul 2009 A1
20090190558 Strutt et al. Jul 2009 A1
20090213770 Mu Aug 2009 A1
20090253385 Dent et al. Oct 2009 A1
20090284218 Mohammadian et al. Nov 2009 A1
20090323582 Proctor et al. Dec 2009 A1
20100003931 Krishnan et al. Jan 2010 A1
20100008406 Sawai et al. Jan 2010 A1
20100020771 Ji et al. Jan 2010 A1
20100022201 Vandenameele Jan 2010 A1
20100086012 Rofougaran et al. Apr 2010 A1
20100165866 Sachse et al. Jul 2010 A1
20100165895 Elahi et al. Jul 2010 A1
20100167662 Kluge et al. Jul 2010 A1
20100232324 Radunovic Sep 2010 A1
20100246434 Wang Sep 2010 A1
20100248714 Kang et al. Sep 2010 A1
20100271987 Chiu et al. Oct 2010 A1
20100321245 Aoki Dec 2010 A1
20100322225 Kumar Dec 2010 A1
20110080325 Livneh et al. Apr 2011 A1
20110110451 Tsai et al. May 2011 A1
20110116639 Kamada et al. May 2011 A1
20110143655 Ahn et al. Jun 2011 A1
20110149714 Rimini et al. Jun 2011 A1
20110268100 Gorokhov et al. Nov 2011 A1
20120027113 Gaal et al. Feb 2012 A1
20120068904 Shtrom Mar 2012 A1
20120087424 Brown et al. Apr 2012 A1
20120113862 Santhanam et al. May 2012 A1
20120159279 Braithwaite Jun 2012 A1
20120200158 Takei Aug 2012 A1
20120201153 Bharadia et al. Aug 2012 A1
20120201173 Jain et al. Aug 2012 A1
20120220246 Kushnir et al. Aug 2012 A1
20120281834 Reznik et al. Nov 2012 A1
20120300680 Pietsch et al. Nov 2012 A1
20120327881 Nakano et al. Dec 2012 A1
20130010851 Jaeger et al. Jan 2013 A1
20130044791 Rimini et al. Feb 2013 A1
20130089009 Li et al. Apr 2013 A1
20130089021 Gaal et al. Apr 2013 A1
20130099974 Wang et al. Apr 2013 A1
20130102254 Cyzs et al. Apr 2013 A1
20130114468 Hui et al. May 2013 A1
20130223419 Ghosh Aug 2013 A1
20130286903 Khojastepour et al. Oct 2013 A1
20130301487 Khandani Nov 2013 A1
20140006797 Cordella et al. Jan 2014 A1
20140126675 Monsen May 2014 A1
20140135056 Wang May 2014 A1
20140157367 Zhang Jun 2014 A1
20140169236 Choi et al. Jun 2014 A1
20140204808 Choi et al. Jul 2014 A1
20140210681 Shtrom Jul 2014 A1
20140218248 Schulz et al. Aug 2014 A1
20140219139 Choi et al. Aug 2014 A1
20140225788 Schulz et al. Aug 2014 A1
20140269964 Du et al. Sep 2014 A1
20140331061 Wright et al. Nov 2014 A1
20140333466 Mohamadi Nov 2014 A1
20140334322 Shtrom et al. Nov 2014 A1
20140348018 Bharadia et al. Nov 2014 A1
20140348032 Hua et al. Nov 2014 A1
20140363008 Chen et al. Dec 2014 A1
20150029906 Jana et al. Jan 2015 A1
20150043323 Choi et al. Feb 2015 A1
20150043685 Choi et al. Feb 2015 A1
20150049834 Choi et al. Feb 2015 A1
20150063176 Hong et al. Mar 2015 A1
20150070243 Kish et al. Mar 2015 A1
20150078217 Choi et al. Mar 2015 A1
20150085830 Nozaki et al. Mar 2015 A1
20150139284 Choi et al. May 2015 A1
20150146539 Mehta May 2015 A1
20150171903 Mehlman et al. Jun 2015 A1
20150188646 Bharadia et al. Jul 2015 A1
20150223173 Khojastepour et al. Aug 2015 A1
20150236750 Choi et al. Aug 2015 A1
20150249997 Clegg Sep 2015 A1
20150261973 Ohare et al. Sep 2015 A1
20150263780 Mehlman et al. Sep 2015 A1
20150280893 Choi et al. Oct 2015 A1
20150311599 Shtrom et al. Oct 2015 A1
20150312905 Seo et al. Oct 2015 A1
20150318976 Eltawil et al. Nov 2015 A1
20150333847 Bharadia et al. Nov 2015 A1
20150334745 Zhao Nov 2015 A1
20150341125 Bharadia et al. Nov 2015 A1
20150341879 Shtrom et al. Nov 2015 A1
20160127876 Kish et al. May 2016 A1
20160226653 Bharadia et al. Aug 2016 A1
20160248160 Shtrom Aug 2016 A1
20160249376 Kish Aug 2016 A1
20160283937 Reese et al. Sep 2016 A1
20170012696 Jang Jan 2017 A1
20170161635 Oono et al. Jun 2017 A1
20170195003 Rosson et al. Jul 2017 A1
20180075347 Alistarh et al. Mar 2018 A1
20180131502 Askar May 2018 A1
20180234162 Kim Aug 2018 A1
20180288019 Dinia et al. Oct 2018 A1
20180373978 Yu et al. Dec 2018 A1
Foreign Referenced Citations (17)
Number Date Country
2180623 Apr 2010 EP
1091437 Nov 1967 GB
H10502220 Feb 1998 JP
20040096404 Nov 2004 KR
20070072629 Jul 2007 KR
20120080231 Jul 2012 KR
9428585 Dec 1994 WO
9622643 Jul 1996 WO
03098823 Nov 2003 WO
2004007497 Jan 2004 WO
2009156510 Dec 2009 WO
2010005951 Jan 2010 WO
2010051232 May 2010 WO
2011065020 Jun 2011 WO
2011148341 Dec 2011 WO
2012042256 Apr 2012 WO
2016014016 Jan 2016 WO
Non-Patent Literature Citations (20)
Entry
International Search Report and Written Opinion for PCT/US2014/042136, dated Dec. 9, 2014, (13 pages).
European Extended Search Report for EP App. No. 13790160.9, dated Jan. 20, 2016, (9 pages).
International Search Report and Written Opinion for PCT/US2013/040822, dated Jul. 18, 2013, (8 pages).
International Search Report for PCT/US2013/040818, dated Jul. 24, 2013, (2 pages).
European Extended Search Report for EP App. No. 14865287.8, dated Jul. 4, 2017, (7 pages).
European Extended Search Report for EP App. No. 13790076.7, dated Mar. 2, 2016, (8 pages).
International Search Report and Written Opinion from PCT/US2014/050968, dated Nov. 19, 2014, (9 pages).
International Search Report and Written Opinion for PCT/US2014/051137, dated Nov. 24, 2014, (10 pages).
European Extended Search Report for EP App. No. 13790948.7, dated Nov. 4, 2015, (9 pages).
Aono, Tomoyuki, et al., “Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels”, IEEE Transactions On Antennas and Propagation, IEEE Service Center, Piscataway, NJ, US, vol. 53, No. 11; XP001512766, ISSN: 0018-926X, DOI: 10.1109/TAP.2005.858853, Nov. 2005, 3776-3784.
Chen, Brian , et al., “Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding”, IEEE Transaction on Information Theory, vol. 47, May 2001, 1423-1443.
Choi, Jung Il, et al., “Achieving Single Channel, Full Duplex Wireless Communication”, Proceedings from the Annual International Conference on Mobile Computing and Networking, MOBICOM-MOBICOM 10 And MOBIHOC 10-Proceedings of the 16th Annual Intl Conference on Mobile Computing and Networking and 11th ACM Intl Symposi, XP002696691., Sep. 20, 2010, 1-12.
Gharavol, Ebrahim A, et al., “Robust Joint Optimization of MIMO Two-Way Relay Channels With Imperfect CSI”, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA , IEEE, Sep. 28, 2011, 1665-1669.
Jain, Mayank , et al., “Practical, Real-Time, Full Duplex Wireless”, MobiCom '11 Proceedings of the 17th annual International conference on Mobile computing and networking; Las Vegas, Nevada, USA, Sep. 19, 2011, 1-12.
Khandani, Amir K, “Two-way (true full-duplex) wireless”, 2013 13th Canadian Workshop on Information Theory, IEEE, XP032495648, DOI: 10.1109/CWIT.2013 6621588 , [retrieved on Oct. 4, 2013], Jun. 18, 2013, 33-38.
McMichael, Joseph G, et al., “Optimal tuning of analog self-interference cancellers for full-duplex wireless communication”, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), IEEE, Monticello, IL, USA, Oct. 1, 2012, 246-251.0
Persson, Daniel , et al., “Joint Source-Channel Coding for the MIMO Broadcast Channel”, IEEE Transactions on Signal Processing, vol. 60, No. 4, IEEE Signal Processing Society, Dec. 21, 2011, 2085-2090.
Vaze, Rahul , et al., “To Code or Not to Code in Multi-Hop Relay Channels”, Arxiv.org, Cornell University Library, May 20, 2008, 1-30.
Ding, Cunsheng , et al., “A Generic Construction of Cartesian Authentication Codes”, IEEE Transactions On Information Theory, vol. 53, No. 6, Jun. 2007, 2229-2235.
International Preliminary Report on Patentability for PCT/US2013/040822, dated Nov. 18, 2014, (6 pages).
Related Publications (1)
Number Date Country
20200220705 A1 Jul 2020 US
Provisional Applications (2)
Number Date Country
61771815 Mar 2013 US
61646312 May 2012 US
Continuations (2)
Number Date Country
Parent 15701076 Sep 2017 US
Child 16730531 US
Parent 13893299 May 2013 US
Child 15701076 US