I. Field
The present disclosure relates generally to wireless communications, and more specifically to techniques for fast other sector interference and communication resource adjustment in a wireless communication system.
II. Background
Wireless communication has penetrated nearly every aspect of a person's daily routine. To facilitate work/office activities as well as entertainment, wireless systems are widely deployed to provide various types of communication content such as voice, data, video, and so on. These systems can be multiple-access systems that are capable of supporting communication for multiple terminals by sharing available system resources. Examples of such multiple-access systems include Code Division Multiple Access (CDMA) systems, Time Division Multiple Access (TDMA) systems, Frequency Division Multiple Access (FDMA) systems, and Orthogonal Frequency Division Multiple Access (OFDMA) systems.
A wireless multiple-access communication system can simultaneously support communication for multiple wireless terminals. In such a system, each terminal can communicate with one or more sectors via transmissions on the forward and reverse links. The forward link (or downlink) refers to the communication link from the sectors to the terminals, and the reverse link (or uplink) refers to the communication link from the terminals to the sectors. These communication links can be established via a single-input-single-output (SISO), multiple-input-single-output (MISO), and/or multiple-input-multiple-output (MIMO) systems.
Multiple terminals can simultaneously transmit on the reverse link by multiplexing their transmissions to be orthogonal to one another in the time, frequency, and/or code domain. If full orthogonality between transmissions is achieved, transmissions from each terminal will not interfere with transmissions from other terminals at a receiving sector. However, complete orthogonality among transmissions from different terminals is often not realized due to channel conditions, receiver imperfections, and other factors. As a result, terminals often cause some amount of interference to other terminals communicating with the same sector. Furthermore, because transmissions from terminals communicating with different sectors are typically not orthogonal to one another, each terminal can also cause interference to terminals communicating with nearby sectors. This interference results in a decrease in performance at each terminal in the system. Accordingly, there is a need in the art for effective techniques to mitigate the effects of interference in a wireless communication system.
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview and is intended to neither identify key or critical elements nor delineate the scope of such embodiments. Its purpose is to present some concepts of the described embodiments in a simplified form as a prelude to the more detailed description that is presented later.
In an aspect, a method for resource management in a wireless system is disclosed, the method comprising: receiving an indication of other-sector interference (OSI); determining whether a delta value associated with a communication resource should be adjusted in response to the received OSI indication; the determination includes identifying the time-frequency resources corresponding to the OSI indication; and adjusting the delta value associated with the communication resource.
In another aspect, the subject specification discloses a wireless communication apparatus, comprising: an integrated circuit configured to acquire a set of access points, to receive an indication of excessive other-sector interference (OSI) from an access point in a set of acquired access points, to adjust an offset value associated with a communication resource according to the excessive OSI indication, and to retain the adjusted offset value; and a memory coupled to the integrated circuit for storing data.
In yet another aspect, an apparatus that facilitates managing resources in a wireless communication system, the apparatus comprising: means for establishing a set of non-serving access points (APs) to monitor for other-sector interference indications; means for receiving an other-sector interference (OSI) indication from one or more APs in the monitor set; and means for adjusting an offset value associated with a communication resource according to the received OSI indication.
In still another aspect, a computer-readable mediums comprising: code for causing a computer to receive an indication of excessive other-sector interference from a set of non-serving access points; code for causing a computer to adjust an offset value associated with a communication resource assigned by an access point; and code for causing a computer to communicate the adjusted offset value to an access point to update subsequent resource assignments.
In an aspect, a method for managing interference in a wireless system, comprising: determining an interference level based on an interference metric; generating an indication of other-sector interference (OSI) based on the determined interference level; and transmitting the OSI indication.
In another aspect, an apparatus used in wireless communications, comprising: means for determining a fast interference level based on an interference metric; means for generating an indication of fast other-sector interference (OSI) according to the fast interference level; and means for transmitting the generated OSI indication.
In yet another aspect, a computer-readable medium comprising: code for causing a computer to measure interference levels on a frame time scale and a superframe time scale, the time scales dictated by a symbol numerology of a wireless system; code for causing a computer to compute an effective interference level based on the interference level measurements; and code for causing a computer to issue an excess other-sector interference indication according to the computed effective interference level.
In still another aspect, an electronic appliance that operates in a wireless communication environment, the appliance comprising: an integrated circuit configured to facilitate measurements of an interference level in frequency-domain and time-domain, the measurements conducted at disparate time scales, to compute effective interference levels employing results of the measurements in slow and fast time regimes, and to broadcast an indication of excessive other-sector interference; and a memory coupled to the integrated circuit to store measured and computed data.
In further yet another aspect, an apparatus that facilitates wireless communications, the system comprising: an integrated circuit configured to transmit a resource assignment, and to receive an adjusted offset value associated with an assigned resource; and a memory coupled to the integrated circuit for storing data, the data includes the adjusted value of an offset associated with a communication resource.
To the accomplishment of the foregoing and related ends, one or more embodiments comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative aspects and are indicative of but a few of the various ways in which the principles of the embodiments may be employed. Other advantages and novel features will become apparent from the following detailed description when considered in conjunction with the drawings and the disclosed embodiments are intended to include all such aspects and their equivalents.
Various embodiments are now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more embodiments. It may be evident; however, that such embodiment(s) may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing one or more embodiments.
Moreover, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form.
As used in this application, the terms “component,” “module,” “system,” and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal).
Furthermore, various embodiments are described herein in connection with a mobile device. A mobile device can also be called a system, subscriber unit, subscriber station, mobile station, mobile, remote station, remote terminal, access terminal, user terminal, terminal, wireless communication device, user agent, user device, or user equipment (UE). A mobile device may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having wireless connection capability, computing device, or other processing device connected to a wireless modem. Moreover, various embodiments are described herein in connection with a base station. A base station may be utilized for communicating with mobile device(s) and may also be referred to as an access point, Node B, evolved Node B (eNodeB), or some other terminology.
Referring now to the drawings,
To improve system capacity, the coverage area 102a, 102b, or 102c corresponding to a base station 110 can be partitioned into multiple smaller areas (e.g., areas 104a, 104b, and 104c). Each of the smaller areas 104a, 104b, and 104c can be served by a respective base transceiver subsystem (BTS, not shown). As used herein and generally in the art, the term “sector” can refer to a BTS and/or its coverage area depending on the context in which the term is used. In one example, sectors 104a, 104b, and 104c in a cell 102a, 102b, or 102c can be formed by groups of antennas (not shown) at base station 110, where each group of antennas is responsible for communication with terminals 120 in a portion of the cell 102a, 102b, or 102c. For example, a base station 110 serving cell 102a can have a first antenna group corresponding to sector 104a, a second antenna group corresponding to sector 104b, and a third antenna group corresponding to sector 104c. However, it should be appreciated that the various aspects disclosed herein can be used in a system having sectorized and/or unsectorized cells. Further, it should be appreciated that all suitable wireless communication networks having any number of sectorized and/or unsectorized cells are intended to fall within the scope of the hereto appended claims. For simplicity, the term “base station” as used herein can refer both to a station that serves a sector as well as a station that serves a cell. As further used herein, a “serving” access point is one with which a terminal has RL traffic (data) transmissions, and a “neighbor” (non-serving) access point is one with which a terminal can have FL traffic and/or both FL and RL control transmissions but no RL traffic. It should be appreciated that as used herein, a FL sector in a disjoint link scenario is a neighbor sector. While the following description generally relates to a system in which each terminal communicates with one serving access point for simplicity, it should be appreciated that terminals can communicate with any number of serving access points.
In accordance with one aspect, terminals 120 can be dispersed throughout the system 100. Each terminal 120 can be stationary or mobile. By way of non-limiting example, a terminal 120 can be an access terminal (AT), a mobile station, user equipment, a subscriber station, and/or another appropriate network entity. A terminal 120 can be a wireless device, a cellular phone, a personal digital assistant (PDA), a wireless modem, a handheld device, or another appropriate device. Further, a terminal 120 can communicate with any number of base stations 110 or no base stations 110 at any given moment.
In another example, the system 100 can utilize a centralized architecture by employing a system controller 130 that can be coupled to one or more base stations 110 and provide coordination and control for the base stations 110. In accordance with alternative aspects, system controller 130 can be a single network entity or a collection of network entities. Additionally, the system 100 can utilize a distributed architecture to allow the base stations 110 to communicate with each other as needed. In one example, system controller 130 can additionally contain one or more connections to multiple networks. These networks can include the Internet, other packet based networks, and/or circuit switched voice networks that can provide information to and/or from terminals 120 in communication with one or more base stations 110 in system 100. In another example, system controller 130 can include or be coupled with a scheduler (not shown) that can schedule transmissions to and/or from terminals 120. Alternatively, the scheduler can reside in each individual cell 102a-c, each sector 104a-c, or a combination thereof
In an example, system 100 can utilize one or more multiple-access schemes, such as CDMA, TDMA, FDMA, OFDMA, Single-Carrier FDMA (SC-FDMA), and/or other suitable multiple-access schemes. TDMA utilizes time division multiplexing (TDM), wherein transmissions for different terminals 120 are orthogonalized by transmitting in different time intervals. FDMA utilizes frequency division multiplexing (FDM), wherein transmissions for different terminals 120 are orthogonalized by transmitting in different frequency subcarriers. In one example, TDMA and FDMA systems can also use code division multiplexing (CDM), wherein transmissions for multiple terminals can be orthogonalized using different orthogonal codes (e.g., Walsh codes) even though they are sent in the same time interval or frequency sub-carrier. OFDMA utilizes Orthogonal Frequency Division Multiplexing (OFDM), and SC-FDMA utilizes Single-Carrier Frequency Division Multiplexing (SC-FDM). OFDM and SC-FDM can partition the system bandwidth into multiple orthogonal subcarriers (e.g., tones, bins, . . . ), each of which can be modulated with data. Typically, modulation symbols are sent in the frequency domain with OFDM and in the time domain with SC-FDM. Additionally and/or alternatively, the system bandwidth can be divided into one or more frequency carriers, each of which can contain one or more subcarriers. System 100 can also utilize a combination of multiple-access schemes, such as OFDMA and CDMA. While the power control techniques provided herein are generally described for an OFDMA system, it should be appreciated that the techniques described herein can similarly be applied to any wireless communication system.
In another example, base stations 110 and terminals 120 in system 100 can communicate data using one or more data channels and signaling using one or more control channels. Data channels utilized by system 100 can be assigned to active terminals 120 such that each data channel is used by only one terminal at any given time. Alternatively, data channels can be assigned to multiple terminals 120, which can be superimposed or orthogonally scheduled on a data channel. To conserve system resources, control channels utilized by system 100 can also be shared among multiple terminals 120 using, for example, code division multiplexing. In one example, data channels orthogonally multiplexed only in frequency and time (e.g., data channels not multiplexed using CDM) can be less susceptible to loss in orthogonality due to channel conditions and receiver imperfections than corresponding control channels.
In accordance with an aspect, system 100 can employ centralized scheduling via one or more schedulers implemented at, for example, system controller 130 and/or each base station 110. In a system utilizing centralized scheduling, scheduler(s) can rely on feedback from terminals 120 to make appropriate scheduling decisions. In one example, this feedback can include delta offset added to the OSI information for feedback in order to allow the scheduler to estimate a supportable reverse link peak rate for a terminal 120 from which such feedback is received and to allocate system bandwidth accordingly.
In accordance with another aspect, in system 100, reverse link interference and resources control can result in a guaranteed minimum system stability and quality of service (QoS) parameters for the system. As an example, decoding error probability of reverse link (RL) acknowledgement messages can result in an error floor for all forward link transmissions. By employing tight interference control on the RL, system 100 can facilitate power efficient transmission of control and QoS traffic and/or other traffic with stringent error requirements.
Access terminal 220 can receive information from non-service access point 280 over forward link 295. While a single non-serving AP is illustrated in example system 200, it is noted that AT 220 can receive information from a plurality of non-serving APs. Such access points can be acquired at the time serving AP 250 is acquired, and can form an active set for AT 220. (The active set can be stored, for example, in memory 232.) Moreover, AT 220 can refine such active set after acquisition, according to predetermined thresholds in connection with received power of pilots and interference over thermal noise (IoT). Information transmitted/broadcasted by non-serving AP 280 (or another non-serving AP in the refined active set) can be monitored. In particular, AT 220 can monitor an indication of other-sector interference (OSI). It is noted that APs outside an active set can also be monitored (see below). The decision at the mobile as to whether or not monitor OSI indications from a given sector can be based on the sector's FL geometry (e.g., filtered signal-to-interference-and-noise ratio (SINR) of acquisition pilots) in conjunction with predefined thresholds.
Indication of excessive OSI 299 can be transmitted or broadcasted over physical channels of forward link 295. In an aspect, in third generation ultra mobile broadband (3 G UMB) systems, the forward OSI channel (F-OSICH) carries the OSI indications. Despite system specifications, it should be appreciated that a requirement for such channels can be large coverage area, as the channel needs to be decoded at access terminals that are not being served by the transmitting sector (e.g., sectors 104a-c). Particularly, a channel carrying an OSI indication can have the same coverage as the acquisition pilot channels (e.g., forward common pilot channel (F-CPICH), forward channel quality indicator pilot channel (F-CQIPICH) in 3 G UMB) which penetrate far into the neighboring sectors (e.g., second and third nearest neighbors). Moreover, a physical channel carrying an OSI 299 indication needs to be decodable without requiring additional information regarding its transmitting sector other than the pilot pseudonoise code sequence. Such requirements (i) make a physical control channel carrying OSI indications (such as F-OSICH in 3 G UMB) significantly costly in terms of required power and time-frequency resources, as well as (ii) limit the rate at which OSI indications can be transmitted over the channel—typically once every superframe (see below). The large coverage of a channel like F-OSICH, in 3 G UMB, can result in OSI indications transmitted by sectors outside an acquired active set being monitored, e.g. decoded by an access terminal.
Non-serving access point 280 can include an OSI generation component 284, which can be coupled to a processor 288 and memory 292. Component 284 can generate an OSI 299 indication over long or short periods of time with respect to a transmission time interval (e.g. a frame, a sub-frame). Such indications are described next. (i) Slow OSI. Long periods of time can correspond to one or more superframes or radio frames. In an aspect, in 3 G UMB, a superframe encompasses 25 frames and, depending on time guards and cyclic prefixes, it can span nearly 24-28 ms. In another aspect, a radio frame in a third generation long-term evolution (3 G LTE) system spans 10 ms. An OSI 299 indication generated by component 284 in such time intervals, or longer, is termed herein “slow” OSI or regular OSI. It is noted that slow OSI can correspond to an average indication over the probed time interval (e.g., a superframe) and it can be effective in reflecting the interference observed by a non-serving AP (e.g., 250) when variations of channel interference are slow. Moreover, slow OSI can be effective in sectors that present a fix pattern of transmission, e.g. bandwidth (BW) assignments as well as buffer status do not change appreciably over the course of a transmission involving several superframes. Slow OSI can also accurately represent interference levels in a sector if there is enough statistical multiplexing in the system, e.g. terminals increasing BW compensate those wireless devices whose BW decrease, or the network is fully loaded.
(ii) Fast OSI. In some scenarios, such as those communication systems which are not fully loaded and bursty users are present, OSI 299 indications over a short period of time can be necessary. In an aspect, such a scenario can be realized where a single access terminal, located near the boundary of two sectors, suddenly initiates a new transmission after a substantially long period of silence, and causes a significant amount of interference to reverse link transmissions currently taking place in a neighboring sector. It should be appreciated that employing a physical forward link channel carrying slow OSI 299 indications, e.g. F-OSICH in 3 G UMB, it may take several superframe time intervals for a neighboring sector to force such a terminal to lower its transmit power in order to reduce interference to an acceptable level. During such extended interval the reverse link transmissions in that sector can suffer from severe interference, and may experience a large number of packet errors. OSI 299 indications that arise from measurement of interference per frame or sub-frame, are termed herein “fast” OSI.
It should be appreciated that OSI generation component 284 can generate both slow and fast OSI indications per subcarrier or per subband, e.g., a set of subcarriers (
The effects of a bursty terminal (e.g., access terminal 220) can be addressed/mitigated by exploiting the fact that long term channel qualities on forward and reverse links can often be highly correlated: A terminal causing strong interference at a non-serving sector on the reverse link, can most likely observe a strong signal (e.g. pilot signal) from the non-serving sector on the forward link (e.g., forward link 295), and can have that sector in its active set. Thus, each access point on non-serving sectors (e.g., access point 280) can transmit fast OSI indications, in addition to transmitting slow OSI indications, to an access terminal via a forward link control channel with lower overhead than that of the slow OSI indication channel. To the accomplishment of such transmission, the access terminal needs to have the transmitting access points in its active set. In an aspect, such channel can be embodied in a forward link fast OSI channel (F-FOSICH) that can transmit in 3 G UMB systems. It should be appreciated that since a fast OSI indication can be intended for a substantially restricted group of access terminals, e.g., those which have the transmitting AP in their active set, the coverage requirements for conveying such information need not be as large as the requirements for a channel carrying a slow OSI indication. In another aspect, the F-FOSICH mentioned supra can be present in every FL physical layer frame (hence revealing the root of its name), allowing for a non-serving access point (e.g., 280) to rapidly address/mitigate the interference from a bursty access terminal (e.g., 220) in a neighboring sector before such a terminal causes packet errors in the sector serviced by the access point.
Next, the functionality of OSI generation component 284 is described in greater detail. To illustrate aspects of the functionality, the description makes reference to
In an aspect, procedures/methods to determine an interference level can be devised, which can include the following four. (1) A typical metric can be the average interference for both slow OSI and fast OSI. An average over all frequency resources (e.g., subcarriers 4101-410M,
A processor (e.g., processor 288) can compute the averages, as well as other computations relevant to procedure (1), and results can be stored in a memory (e.g., memory 292). Moreover, a processor (e.g., processor 288) can facilitate conducting measurement of interference levels in the time-frequency domain; data can be stored in a memory (e.g., memory 292).
(2) A method consisting of monitoring high percentiles (e.g., tails) of cumulative distribution functions (CDF) of interference measurement distributions (e.g., values 3401-340K represent a distribution over frames 3101-310K) can be employed by OSI generation component 284 for both slow OSI and fast OSI. An interference level extracted with such a method, as described below, is termed herein tail interference. Monitoring tail values can be well suited to guarantee minimum performace and/or preserve communications over control channels, which typically avoid repeated requests from a receiver (e.g., hybrid automated repeat request (HARQ)), and thus can be more susceptible to packet corruption, and information loss, if a sharp rise in the level of interference in the sector takes place during transmission. Regarding slow OSI, OSI generation component 284 can generate a distribution of per-frame averages for recent frames in a superframe, e.g., 340J-340K and a corresponding CDF, and then extract a tail interference value ITAIL(S) that corresponds to a specific percentile, e.g., 90%; issuing an OSI indication in case ITAIL(S) is above ITH 320. For fast OSI, OSI generation component 284 can issue an OSI indication when a value ITAIL(F) is above a threshold, e.g. I(TH) 320, where ITAIL(F) corresponds to a specific interference value associated with a high percentile of the CDF of a distribution of interference levels for a set of frequency resources (for example, values 4201-420M). A processor (e.g., processor 288) can compute the averages, as well as other computations relevant to the procedure, and results can be stored in a memory (e.g. memory 292). Moreover, a processor (e.g., processor 288) can facilitate conducting measurement of interference levels in the time-frequency domain; measured data can be stored in a memory (e.g. memory 292).
(3) Alternatively, or in addition, OSI generation component 284 can employ a hybrid-approach based on (1) and (2): An average interference metric with a threshold ITH, and a tail interference metric with a threshold I(TAIL)TH are concurrently implemented for either slow OSI or fast OSI. An excessive OSI indication corresponding to either slow or fast OSI is issued by OSI generation component 284 when average and tail interference levels surpass, respectively, ITH and I(TAIL)TH. It should be appreciated that these thresholds are established for slow OSI or fast OSI, depending on the OSI indication that OSI component generation 284 is generating. A processor (e.g., processor 288) can compute the averages, as well as other computations relevant to the procedure. Data and results can be stored in a memory (e.g., memory 292). Moreover, a processor (e.g., processor 288) can facilitate conducting measurement of interference levels in the time-frequency domain; data can be stored in a memory (e.g. memory 292).
(4) OSI generation component 284 can determine an effective interference metric and contrast it with ITH in order to generate an indication of excess OSI. Employing an effective metric can take advantage of the system diversity, e.g., if a metric adopts a large value for a specific resource (e.g., a set of subcarriers) and another instance of the same metric at a different resource (e.g., another set of carriers) adopts a small value, computing an effective interference metric incorporates such diversity. It is noted that while effective metrics such as average metrics can smooth out such diversity fluctuations, other effective metrics can enhance extreme values in the diversity profile. Another effective metric, is the one based on the notion of system capacity. In such a case, diverse values of an interference metric, computed over a set of time-frequency resources, can be transformed to capacity values. The computed capacity values can be averaged, and an effective interference metric extracted from the average. Functions of an interference level other that a capacity function can be employed when computing the effective metric. An example of such another function is the signal-to-interference ratio.
Similar to (1) and (2), a determination of an effective interference metric relies on measured values of interference levels on a set of time-frequency resources (e.g., frames 3101-310K, subcarriers 4101-410M It should be appreciated that the measured values can correspond to measurements on each time-frequency resource (e.g., a single frame, a single carrier), or to measurements that probe an average condition of a subset of time-frequency resources, such as a tile (e.g., 16 subcarriers in a frame time-span). Generation of an effective metric then employs a function (ƒ) of an interference level (I). As mentioned supra, such a function can be a capacity or a signal-to-interference ratio. Function ƒ is evaluated for each interference level in a plurality of measured interference levels, and the average (A) of the results is generated. It is noted that when considering an average as an effective metric (see above) the function ƒ is the identity, e.g., ƒ(I)=I. The effective interference metric is extracted by evaluating the inverse function of ƒ(I) with A as an argument value, e.g.,ƒ1(A). It should be appreciated that if all measured values are identical, e.g., INF corresponding to a scenario where there are no fluctuations in the interference level when probing disparate time-frequency resources, the effective interference metric correspond to said INF.
A processor (e.g., processor 288) can compute the averages, as well as other computations relevant to the procedure such as computing capacities and deriving effective values. Data and results can be stored in a memory (e.g. memory 292). Moreover, a processor (e.g., processor 288) can facilitate conducting measurement of interference levels in the time-frequency domain; data can be stored in a memory (e.g. memory 292).
The subject effective metric approach can be illustrated adopting signal-to-noise (SNR) ratio as the interference metric. For instance, if multiple resources are available for communication (e.g. subcarriers, modulation and coding schemes, transmit and receive antennas at access point and access node, . . . ), OSI generation component 284 can compute multiple values of SNR. Thus, multiple options are available to define an effective SNR and generate an effective interference metric: (a) average SNR, (b) ratio of average signal (S) over average interference/noise I), and (c) an effective SNR computed with some notion of capacity (e.g., Shannon's capacity, for single-input-single-output (SISO) systems, or Telatar-Foschini capacity in multiple-input-multiple-output systems (MIMO)). The programmatic implementation of (c) consists of taking each SNR computed value, converting each value to a capacity measure, averaging the computed capacities, and generating an effective SNR through the inverse capacity function. OSI generation component 284 can perform the latter acts. Option (c) takes advantage of the diversity by capturing in the average those values of SNR that are sensitive to a communication resource, and those SNR values that are independent of or insensitive to said resource. Alternatively, if an access point (e.g., AP 280) can measure interference (I) values without access to corresponding signal values (S) values, a nominal SNOM value can be established (e.g., received over a reverse link or read from storage such as memory 292) and by measuring interference on different resources, SNR values can be defined and effective SNR values can be computed. Conversely, if S values can be accessed without access to I values, a nominal INOM value can be determined (e.g., received over a reverse link or read from storage such as memory 292) and effective SNR values generated by measuring S, defining SNR values employing the nominal I value, and transforming to capacity. OSI generation component 284 can perform the latter acts related to effective SNR generation.
It should be appreciated that substantially any metric can be employed to compute an effective threshold. Interference metrics can be associated with other performance metrics such as signal-to-interference ratio, signal-to-interference-and-noise ratio. Such performance metrics can also lead to a value of interference that can be utilized by OSI generation component 284 to determine whether issuing an excessive OSI is warranted. It should also be appreciated that each of approaches/procedures (1)-(4) can be more suitable for specific concepts. Approach (1), which relies in determination of average interference metrics can be suitable for systems in which an access terminal (e.g., access terminal 220) receives a generic resource assignment without prior knowledge or expectation of the assignment details (e.g., bandwidth, modulation scheme). In such a case, as discussed above, average values can address possible variations in assignments and therefore be a suitable choice. Approaches (2) and (3), which monitor the tail of distributions of measured interference levels, can be adequate to maintain integrity of control channel communication. Effective interference approach (4) can be more suitable for large resource assignments in which, for example, a large number of subcarriers is allocated to an access terminal (e.g., access terminal 220). In such scenario, a mobile station can likely observe several realizations of channel conditions at different resources and, thus, can benefit from an effective determination of the interference level.
As discussed above in connection with
Upon the conveying of an initial resource assignment for a traffic channel transmission over a forward link (for example, FL 265) to an access terminal (e.g., AT 220) by a serving access point (e.g., AP 250), a reference level of the assigned resource (e.g., RREF 506 in
In an aspect, an access terminal (e.g., AT 220) may maintain only one Δ value, which is adjusted based on both a slow (or regular) OSI indication 512 and a fast OSI indication 509.
Before proceeding to describe algorithms suitable for offset adjustment, it is noted that in order to prevent the fast OSI Δ adjustments (e.g., values ΔF(1)-ΔF(P)) from interfering with the regular delta-based resource management (e.g., power control operation and interference mitigation), access terminal (e.g., AT 220) can limit the range of fast offset values from above to the slow OSI Δ value (e.g. ΔS). In cases where signal distortions caused by transmission over a physical channel result in loss of orthogonality, and hence intra-sector interference, a resource management (e.g., power control algorithm) can also incorporate requirements on the dynamic range of the received signal, and limit the minimum (ΔMIN, 524 in
Regarding offset adjustment, e.g. determining whether or not to perform an adjustment—increase, decrease or preserve an offset value—and/or the magnitude of an adjustment, e.g. dΔ 518, an access terminal (e.g., AT 220) can employ two approaches: (i) probabilistic and (ii) deterministic. Either type of approach can be used for each offset value (e.g., ΔS 553 and ΔF(1)-ΔF(P) 5561-556P) that is retained in the access terminal. In case (i), assuming for simplicity, and not by way of limitation, that a single offset is retained (
In case of deterministic approach (ii), an access terminal (e.g., 220) can utilize an algorithm determined by a weight function w=w(I(SLOW), I(FAST), rCQI) that sets the magnitude of a specific discrete (step) value dΔ 518 for upward or downward offset adjustment. It should be appreciated that such value can be determined by a processor (e.g., processor 228 ) in the access terminal. As in approach (i), values of offsets and OSI indications can be stored in a memory (e.g., memory 232 or 262) for record keeping and analysis of system behavior.
It is noted that while Δ generation component 224 can employ deterministic approach (i) for adjusting slow OSI and fast OSI offsets, probabilistic approach (ii) can be avoided for fast OSI offset adjustment. In an aspect, when a fast OSI indication is received it can be desirable to deterministically adjust the communication resources in order to reduce interference in neighboring sectors. In a bursty situation, a stochastic adjustment of the resources level can lead to an increase of the interference inflicted by a bursty access terminal. An access terminal (e.g., AT 220) that receives an excessive OSI indication can utilize substantially the same algorithm with substantially the same set of parameters for both slow OSI and fast OSI Δ adjustments. Alternatively, or in addition, an access terminal can use different algorithms and/or different sets of parameters to adjust different Δ values (ΔS 553, ΔF(1)-ΔF(P) 5561-556P). As an example, parameters that may need to be different for slow and fast delta adjustments are up and down step sizes (e.g. dΔ 518), and different decision thresholds (e.g., ITH 320).
In another aspect, Δ generation component 224 can employ values of slow OSI offsets as upper bounds to fast OSI offsets, which are used to generate adjustment to the offsets retained in an access terminal (e.g., AT 220) that receives an indication of excessive OSI. In yet another aspect, an access terminal can employ a fast OSI indication to adjust offset values. However, a serving access point (e.g., AP 250) can implement an algorithm to drive the fast OSI Δ value towards a slow OSI Δ value since a fast OSI offset value is generated only when a bursty terminal is present in the system, yet retained in an access terminal, as discussed above. It should be noted that retaining a fast OSI value over an extended period of time, in which bursty transmissions are absent, can disadvantageously affect the determination of long OSI offsets. This is illustrated in
Once offset adjustments have been performed, via Δ generation component 224, an access terminal can communicate the values of the updated offsets (e.g., Δ′ 521 in
In view of the example systems shown and described above, methodologies that may be implemented in accordance with the disclosed subject matter, will be better appreciated with reference to the flow charts of
The modulation symbols for all data streams are then provided to a TX MIMO processor 920, which may further process the modulation symbols (e.g. OFDM). TX MIMO processor 920 then provides NT modulation symbol streams to NT transceiver (TMTR/RCVR) 922A through 922T. In certain embodiments, TX MIMO processor 920 applies beamforming weights (or preceding) to the symbols of the data streams and to the antenna from which the symbol is being transmitted. Each transceiver 922 receives and processes a respective symbol stream to provide one or more analog signals, and further conditions (e.g., amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission over the MIMO channel. NT modulated signals from transceivers 922A through 922T are then transmitted from NT antennas 9241 through 924T, respectively. At receiver system 950, the transmitted modulated signals are received by NR antennas 9521 through 952R and the received signal from each antenna 952 is provided to a respective transceiver (RCVR/TMTR) 954A through 954R. Each transceiver 9541-954R conditions (e.g., filters, amplifies, and downconverts) a respective received signal, digitizes the conditioned signal to provide samples, and further processes the samples to provide a corresponding “received” symbol stream.
An RX data processor 960 then receives and processes the NR received symbol streams from NR transceivers 9541-954R based on a particular receiver processing technique to provide NT “detected” symbol streams. The RX data processor 960 then demodulates, deinterleaves, and decodes each detected symbol stream to recover the traffic data for the data stream. The processing by RX data processor 960 is complementary to that performed by TX MIMO processor 920 and TX data processor 914 at transmitter system 910. A processor 970 periodically determines which pre-coding matrix to use, such a matrix can be stored in memory 972. Processor 970 formulates a reverse link message comprising a matrix index portion and a rank value portion. Memory 972 may store instructions that when executed by processor 970 result in formulating the reverse link message. The reverse link message may comprise various types of information regarding the communication link or the received data stream, or a combination thereof. As an example, such information can comprise an adjusted communication resource, an offset for adjusting a scheduled resource, and information for decoding a data packet format. The reverse link message is then processed by a TX data processor 938, which also receives traffic data for a number of data streams from a data source 936, modulated by a modulator 980, conditioned by transceiver 954A through 954R, and transmitted back to transmitter system 910.
At transmitter system 910, the modulated signals from receiver system 950 are received by antennas 9241-924T, conditioned by transceivers 922A-922T, demodulated by a demodulator 940, and processed by a RX data processor 942 to extract the reserve link message transmitted by the receiver system 950. Processor 930 then determines which pre-coding matrix to use for determining the beamforming weights and processes the extracted message.
Single-user MIMO mode of operation corresponds to the case in which a single receiver system 950 communicates with transmitter system 910, as illustrated in
In one aspect, transmitted/received symbols with OFDM, at tone ω, can be modeled by:
y(ω)=H(ω)c(ω)+n(ω). (1)
Here, y(ω) is the received data stream and is a NR×1 vector, H(ω) is the channel response NR×NT matrix at tone ω (e.g., the Fourier transform of the time-dependent channel response matrix h), c(ω) is an NT×1 output symbol vector, and n(ω) is an NR×1 noise vector (e.g., additive white Gaussian noise). Precoding can convert a NV×1 layer vector to NT×1 precoding output vector. NV is the actual number of data streams (layers) transmitted by transmitter 910, and NV can be scheduled at the discretion of the transmitter (e.g., access point 250) based at least in part on channel conditions and the rank reported by the terminal. It should be appreciated that c(ω) is the result of at least one multiplexing scheme, and at least one pre-coding (or beamforming) scheme applied by the transmitter. Additionally, c(ω) is convoluted with a power gain matrix, which determines the amount of power transmitter 910 allocates to transmit each data stream NV. It should be appreciated that such a power gain matrix can be a resource that is assigned to access terminal 220, and it can be managed through adjustment of offsets as described herein. In view of the FL/RL reciprocity of the wireless channel, it should be appreciated that a transmission from MIMO receiver 950 can also be modeled in the fashion of Eq. (1), including substantially the same elements. In addition, receiver 950 can also apply pre-coding schemes prior to transmitting data in the reverse link.
In system 900 (
In one aspect, transmitted/received symbols with OFDM, at tone ω and for user k, can be modeled by:
yk(ω)=Hk(ω)ck(ω)+Hk(ω)Σ′cm(ω)+nk(ω). (2)
Here, symbols have the same meaning as in Eq. (1). It should be appreciated that due to multi-user diversity, other-user interference in the signal received by user k is modeled with the second term in the left-hand side of Eq. (2). The prime (′) symbol indicates that transmitted symbol vector Ck is excluded from the summation. The terms in the series represent reception by user k (through its channel response Hk) of symbols transmitted by a transmitter (e.g., access point 250) to the other users in the cell.
Additionally, access point 1202 can comprise a receiver 1210 that receives information from receive antenna 1206. In one example, the receiver 1210 can be operatively associated with a demodulator (Demod) 1212, or substantially any other electronic appliance, that demodulates received information. Demodulated symbols can then be analyzed by a processor 1214. Processor 1214 can be coupled to memory 1216, which can store information related to code clusters, access terminal assignments, lookup tables related thereto, unique scrambling sequences, and/or other suitable types of information. Access point 1202 can also include a modulator 1218 that can multiplex a signal for transmission by a transmitter 1220 through transmit antenna 1208 to one or more access terminals 1204.
Next, systems that can enable aspects of the disclosed subjected matter are described in connection with
System 1300 can also include a memory 1340 that retains instructions for executing functions associated with electrical components 1315 and 1325, as well as measured and computed data that may be generated during executing such functions. While shown as being external to memory 1340, it is to be understood that one or more of electronic components 1315, 1325, and 1335 can exist within memory 1340.
Moreover, example system 1400 can also include a memory 1460 that retains instructions for executing functions associated with electrical components 1415, 1425, 1435, 1445, and 1455, as well as measured and computed data that may be generated during executing such functions. While shown as being external to memory 1460, it is to be understood that one or more of electronic components 1415, 1425, 1435, 1445, and 1455 can exist within memory 1460.
It is to be understood that the embodiments described herein can be implemented by hardware, software, firmware, middleware, microcode, or any combination thereof. When the systems and/or methods are implemented in software, firmware, middleware or microcode, program code or code segments, they can be stored in a machine-readable medium, such as a storage component. A code segment can represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment can be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. can be passed, forwarded, or transmitted using any suitable means including memory sharing, message passing, token passing, network transmission, etc.
For a software implementation, the techniques described herein can be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes can be stored in memory units and executed by processors. The memory unit can be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means as is known in the art.
As it is employed herein, the word “processor” can refer to a classical architecture or a quantum computer. Classical architecture comprises, but is not limited to comprising, single-core processors; single-processors with software multithread execution capability; multi-core processors; multi-core processors with software multithread execution capability; multi-core processors with hardware multithread technology; parallel platforms; and parallel platforms with distributed shared memory. Additionally, a processor can refer to an integrated circuit, an application specific integrated circuit (ASIC), a programmable logic controller (PLC), a complex programmable logic device (CPLD), or a field programmable gate array (FPGA). Quantum computer architecture may be based on qubits embodied in gated or self-assembled quantum dots, nuclear magnetic resonance platforms, superconducting Josephson junctions, etc. Processors can exploit nano-scale architectures such as, but not limited to, molecular and quantum-dot based transistors, switches and gates, in order to optimize space usage or enhance performance of user equipment.
Furthermore, in the subject specification, the term “memory” refers to data stores, algorithm stores, and other information stores such as, but not limited to, image store, digital music and video store, charts and databases. It will be appreciated that the memory components described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of illustration, and not limitation, nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). Additionally, the disclosed memory components of systems and/or methods herein are intended to comprise, without being limited to, these and any other suitable types of memory.
Further yet, as used in this disclosure, the term “electronic appliance” refers to an electronic entity that serves a specific purpose; examples of such purpose include, but are not limited to including, transmitting and receiving digital signals; transmitting and receiving radio-frequency electromagnetic radiation; processing digital signals, e.g. multiplexing/demultiplexing, modulating, and splitting/concatenating digital bits; executing logic via processors as described supra that are part of the appliance or external to the electronic appliance; storing information in a memory as described supra that can be part of the electronic appliance or external to the electronic appliance; communicating with computers, either in a network or stand alone; executing code that causes the electronic appliance to perform specific acts; and the like.
What has been described above includes examples of one or more aspects. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned aspects, but one of ordinary skill in the art may recognize that many further combinations and permutations of various aspects are possible. Accordingly, the described aspects are intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
This application claims the benefit of U.S. provisional application Ser. No. 60/843,291, filed on Sep. 8, 2006, and entitled “A METHOD AND APPARATUS FOR FAST OTHER SECTOR INTERFERENCE (OSI) ADJUSTMENT.” The entirety of this application is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
3577080 | Cannalte | May 1971 | A |
4225976 | Osborne et al. | Sep 1980 | A |
4539684 | Kloker | Sep 1985 | A |
4638479 | Alexis | Jan 1987 | A |
4901307 | Gilhousen et al. | Feb 1990 | A |
4908827 | Gates | Mar 1990 | A |
5103459 | Gilhousen et al. | Apr 1992 | A |
5267262 | Wheatley, III et al. | Nov 1993 | A |
5301364 | Arens et al. | Apr 1994 | A |
5396516 | Padovani et al. | Mar 1995 | A |
5406613 | Peponidess et al. | Apr 1995 | A |
5448600 | Lucas | Sep 1995 | A |
5469471 | Wheatley, III et al. | Nov 1995 | A |
5548812 | Padovani et al. | Aug 1996 | A |
5559790 | Yano et al. | Sep 1996 | A |
5574984 | Reedd et al. | Nov 1996 | A |
5606727 | Ueda | Feb 1997 | A |
5722063 | Peterzelll et al. | Feb 1998 | A |
5734646 | I et al. | Mar 1998 | A |
5754533 | Bender et al. | May 1998 | A |
5774785 | Karlssonn et al. | Jun 1998 | A |
5784363 | Engstromm et al. | Jul 1998 | A |
5815507 | Vinggaardd et al. | Sep 1998 | A |
5839056 | Hakkinen | Nov 1998 | A |
5859383 | Davison et al. | Jan 1999 | A |
5933768 | Skoldd et al. | Aug 1999 | A |
5956642 | Larssonn et al. | Sep 1999 | A |
5961588 | Cooper et al. | Oct 1999 | A |
5995488 | Kalkunte et al. | Nov 1999 | A |
5996103 | Jahanghir | Nov 1999 | A |
5996110 | Kosmach | Nov 1999 | A |
6006073 | Glaunerr et al. | Dec 1999 | A |
6012160 | Dentt et al. | Jan 2000 | A |
6038220 | Kangg et al. | Mar 2000 | A |
6044072 | Ueda | Mar 2000 | A |
6047189 | Yunn et al. | Apr 2000 | A |
6061339 | Nieczyporowicz et al. | May 2000 | A |
6075974 | Saintss et al. | Jun 2000 | A |
6101179 | Soliman | Aug 2000 | A |
6112325 | Burshtein | Aug 2000 | A |
6144841 | Feeneyy et al. | Nov 2000 | A |
6154659 | Jalalii et al. | Nov 2000 | A |
6173187 | Salonaho et al. | Jan 2001 | B1 |
6173188 | Kim | Jan 2001 | B1 |
6175587 | Madhow et al. | Jan 2001 | B1 |
6175588 | Visotsky et al. | Jan 2001 | B1 |
6181738 | Chhedaa et al. | Jan 2001 | B1 |
6188678 | Prescottt et al. | Feb 2001 | B1 |
6192249 | Padovani | Feb 2001 | B1 |
6208699 | Chenn et al. | Mar 2001 | B1 |
6212364 | Park | Apr 2001 | B1 |
6216006 | Scholefield et al. | Apr 2001 | B1 |
6226529 | Bruno et al. | May 2001 | B1 |
6233222 | Wallentin | May 2001 | B1 |
6397070 | Black | May 2002 | B1 |
6405043 | Jensen et al. | Jun 2002 | B1 |
6446236 | McEwenn et al. | Sep 2002 | B1 |
6449463 | Schifff et al. | Sep 2002 | B1 |
6519705 | Leungg et al. | Feb 2003 | B1 |
6532563 | Nobelen | Mar 2003 | B2 |
6539065 | Furukawa | Mar 2003 | B1 |
6553231 | Karlsson et al. | Apr 2003 | B1 |
6560744 | Burshtein | May 2003 | B1 |
6560774 | Gordonn et al. | May 2003 | B1 |
6574211 | Padovanii et al. | Jun 2003 | B2 |
6597705 | Rezaiifarr et al. | Jul 2003 | B1 |
6597923 | Vanghii et al. | Jul 2003 | B1 |
6597932 | Tiann et al. | Jul 2003 | B2 |
6603746 | Larijanii et al. | Aug 2003 | B1 |
6611507 | Hottinenn et al. | Aug 2003 | B1 |
6621454 | Reudink et al. | Sep 2003 | B1 |
6628956 | Barkk et al. | Sep 2003 | B2 |
6643520 | Parkk et al. | Nov 2003 | B1 |
6697634 | Hayashii et al. | Feb 2004 | B1 |
6711150 | Vanghii et al. | Mar 2004 | B1 |
6711515 | Lehtinen et al. | Mar 2004 | B1 |
6717976 | Shenn et al. | Apr 2004 | B1 |
6721373 | Frenkell et al. | Apr 2004 | B1 |
6744743 | Waltonn et al. | Jun 2004 | B2 |
6745045 | Terry et al. | Jun 2004 | B2 |
6751444 | Meiyappann et al. | Jun 2004 | B1 |
6763244 | Chen et al. | Jul 2004 | B2 |
6801515 | Ishikawa et al. | Oct 2004 | B1 |
6801759 | Saifuddinn et al. | Oct 2004 | B1 |
6807164 | Almgrenn et al. | Oct 2004 | B1 |
6895245 | Wallentinn et al. | May 2005 | B2 |
6950669 | Simonssonn et al. | Sep 2005 | B2 |
6952591 | Budkaa et al. | Oct 2005 | B2 |
6968201 | Gandhii et al. | Nov 2005 | B1 |
6977912 | Porter et al. | Dec 2005 | B1 |
7012912 | Naguib et al. | Mar 2006 | B2 |
7054275 | Kim et al. | May 2006 | B2 |
7058421 | Ngai et al. | Jun 2006 | B2 |
7072315 | Liuu et al. | Jul 2006 | B1 |
7103316 | Hall | Sep 2006 | B1 |
7145935 | Won et al. | Dec 2006 | B2 |
7158450 | Wadaa et al. | Jan 2007 | B2 |
7158504 | Kadabaa et al. | Jan 2007 | B2 |
7181170 | Love et al. | Feb 2007 | B2 |
7184381 | Ohkuboo et al. | Feb 2007 | B2 |
7197692 | Sutivong et al. | Mar 2007 | B2 |
7215653 | Kimm et al. | May 2007 | B2 |
7224993 | Meyerss et al. | May 2007 | B2 |
7254158 | Agrawall et al. | Aug 2007 | B2 |
7269152 | Vukovic et al. | Sep 2007 | B2 |
7302276 | Bernhardssonn et al. | Nov 2007 | B2 |
7310526 | Sang et al. | Dec 2007 | B2 |
7324785 | Hansen et al. | Jan 2008 | B2 |
7349667 | Magee et al. | Mar 2008 | B2 |
7359727 | Tsien et al. | Apr 2008 | B2 |
7359838 | Marro et al. | Apr 2008 | B2 |
7400887 | Azman et al. | Jul 2008 | B2 |
7418241 | Bao et al. | Aug 2008 | B2 |
7420939 | Laroiaa et al. | Sep 2008 | B2 |
7477920 | Scheinertt et al. | Jan 2009 | B2 |
7536626 | Sutivong et al. | May 2009 | B2 |
7594151 | Sutivong et al. | Sep 2009 | B2 |
7623490 | Khandekar et al. | Nov 2009 | B2 |
7639943 | Kalajan | Dec 2009 | B1 |
7808895 | Nalawadi et al. | Oct 2010 | B2 |
7962826 | Sutivong et al. | Jun 2011 | B2 |
7965789 | Khandekar et al. | Jun 2011 | B2 |
8095166 | Sampath et al. | Jan 2012 | B2 |
8116800 | Gorokhov et al. | Feb 2012 | B2 |
8150448 | Farnsworth et al. | Apr 2012 | B2 |
8159928 | Gorokhov et al. | Apr 2012 | B2 |
8442572 | Borran et al. | May 2013 | B2 |
8452316 | Sutivong et al. | May 2013 | B2 |
8516314 | Sutivong et al. | Aug 2013 | B2 |
8543152 | Sutivong et al. | Sep 2013 | B2 |
20010040880 | Chen et al. | Nov 2001 | A1 |
20010053695 | Wallentin | Dec 2001 | A1 |
20010055968 | Yoshida et al. | Dec 2001 | A1 |
20020018446 | Huh et al. | Feb 2002 | A1 |
20020077138 | Bark et al. | Jun 2002 | A1 |
20020077985 | Kobata et al. | Jun 2002 | A1 |
20020102984 | Furuskar et al. | Aug 2002 | A1 |
20020141349 | Kim et al. | Oct 2002 | A1 |
20020145968 | Zhang et al. | Oct 2002 | A1 |
20020167907 | Sarkar et al. | Nov 2002 | A1 |
20020187801 | Vanghi | Dec 2002 | A1 |
20030012425 | Suzuki et al. | Jan 2003 | A1 |
20030013451 | Walton | Jan 2003 | A1 |
20030016770 | Trans et al. | Jan 2003 | A1 |
20030069014 | Raffel et al. | Apr 2003 | A1 |
20030081538 | Walton et al. | May 2003 | A1 |
20030086371 | Walton et al. | May 2003 | A1 |
20030109274 | Budka et al. | Jun 2003 | A1 |
20030123425 | Walton et al. | Jul 2003 | A1 |
20030128705 | Yi et al. | Jul 2003 | A1 |
20030185159 | Seo et al. | Oct 2003 | A1 |
20030185285 | Talwar | Oct 2003 | A1 |
20040038699 | Toono | Feb 2004 | A1 |
20040062192 | Liu et al. | Apr 2004 | A1 |
20040077370 | Dick et al. | Apr 2004 | A1 |
20040081121 | Xu | Apr 2004 | A1 |
20040095880 | Laroia et al. | May 2004 | A1 |
20040109432 | Laroia et al. | Jun 2004 | A1 |
20040151109 | Batra et al. | Aug 2004 | A1 |
20040166886 | Laroia et al. | Aug 2004 | A1 |
20040166887 | Laroia et al. | Aug 2004 | A1 |
20040166900 | Qiu et al. | Aug 2004 | A1 |
20040203455 | Bao et al. | Oct 2004 | A1 |
20040229615 | Agrawal | Nov 2004 | A1 |
20040229639 | Meyers et al. | Nov 2004 | A1 |
20050002324 | Sutivong et al. | Jan 2005 | A1 |
20050013283 | Yoon et al. | Jan 2005 | A1 |
20050026624 | Gandhi et al. | Feb 2005 | A1 |
20050037796 | Tsai et al. | Feb 2005 | A1 |
20050096061 | Ji et al. | May 2005 | A1 |
20050128970 | Tsien et al. | Jun 2005 | A1 |
20050135457 | Molisch et al. | Jun 2005 | A1 |
20050143118 | Bernhardsson et al. | Jun 2005 | A1 |
20050153690 | Marinier et al. | Jul 2005 | A1 |
20050176455 | Krishnan et al. | Aug 2005 | A1 |
20050192042 | Au et al. | Sep 2005 | A1 |
20050276248 | Butala et al. | Dec 2005 | A1 |
20050283715 | Sutivong et al. | Dec 2005 | A1 |
20060009226 | Vicharelli et al. | Jan 2006 | A1 |
20060019496 | Onishi et al. | Jan 2006 | A1 |
20060019694 | Sutivong et al. | Jan 2006 | A1 |
20060025158 | Leblanc et al. | Feb 2006 | A1 |
20060034173 | Teague et al. | Feb 2006 | A1 |
20060083161 | Laroia et al. | Apr 2006 | A1 |
20060089154 | Laroia et al. | Apr 2006 | A1 |
20060105796 | Malladi et al. | May 2006 | A1 |
20060135080 | Khandekarr et al. | Jun 2006 | A1 |
20060135169 | Sampath et al. | Jun 2006 | A1 |
20060164993 | Teague et al. | Jul 2006 | A1 |
20060165650 | Pavone et al. | Jul 2006 | A1 |
20060171326 | Durand et al. | Aug 2006 | A1 |
20060187885 | Roy et al. | Aug 2006 | A1 |
20060189344 | Umesh et al. | Aug 2006 | A1 |
20060209721 | Mese et al. | Sep 2006 | A1 |
20060211441 | Mesee et al. | Sep 2006 | A1 |
20060234752 | Mese et al. | Oct 2006 | A1 |
20060262868 | Leshem | Nov 2006 | A1 |
20060285503 | Mese et al. | Dec 2006 | A1 |
20070030827 | Rui et al. | Feb 2007 | A1 |
20070081491 | Kim et al. | Apr 2007 | A1 |
20070150799 | Sutivong et al. | Jun 2007 | A1 |
20070161385 | Anderson | Jul 2007 | A1 |
20070249363 | Amalfitano et al. | Oct 2007 | A1 |
20070258525 | Jacobsenn et al. | Nov 2007 | A1 |
20070270100 | Agrawal et al. | Nov 2007 | A1 |
20070274257 | Bae et al. | Nov 2007 | A1 |
20070280170 | Kawasakii et al. | Dec 2007 | A1 |
20070286105 | Kimm et al. | Dec 2007 | A1 |
20070286128 | Bae et al. | Dec 2007 | A1 |
20080014980 | Yanoo et al. | Jan 2008 | A1 |
20080031380 | Takabayashii et al. | Feb 2008 | A1 |
20080037439 | Cave et al. | Feb 2008 | A1 |
20080039129 | Li et al. | Feb 2008 | A1 |
20080043880 | Matsushitaa et al. | Feb 2008 | A1 |
20080045260 | Muharemovic et al. | Feb 2008 | A1 |
20080056181 | Imamuraa et al. | Mar 2008 | A1 |
20080062956 | Kuroda et al. | Mar 2008 | A1 |
20080117849 | Borran et al. | May 2008 | A1 |
20080161033 | Borran et al. | Jul 2008 | A1 |
20080165675 | Yang et al. | Jul 2008 | A1 |
20080166976 | Rao | Jul 2008 | A1 |
20080214121 | Sutivong et al. | Sep 2008 | A1 |
20080242337 | Sampath et al. | Oct 2008 | A1 |
20080267067 | Salazar et al. | Oct 2008 | A1 |
20080291856 | Li et al. | Nov 2008 | A1 |
20090023466 | Sutivong et al. | Jan 2009 | A1 |
20090082052 | Bhushan et al. | Mar 2009 | A1 |
20090109939 | Bhushan et al. | Apr 2009 | A1 |
20090117931 | Shin et al. | May 2009 | A1 |
20100027451 | Khandekar et al. | Feb 2010 | A1 |
20100061243 | Yi et al. | Mar 2010 | A1 |
20110105111 | Plestid et al. | May 2011 | A1 |
20110282999 | Teague et al. | Nov 2011 | A1 |
20110296279 | Sutivong et al. | Dec 2011 | A1 |
20120083302 | Borran et al. | Apr 2012 | A1 |
20120270582 | Mese et al. | Oct 2012 | A1 |
20130107740 | Mese et al. | May 2013 | A1 |
20130237262 | Borran et al. | Sep 2013 | A1 |
Number | Date | Country |
---|---|---|
2340201 | Jan 2001 | CA |
2635291 | Oct 2007 | CA |
199500144 | Dec 1995 | CL |
199701119 | Mar 1998 | CL |
199800442 | Nov 1998 | CL |
L41883 | Aug 2003 | CL |
33582005 | Dec 2006 | CL |
04992006 | Feb 2007 | CL |
05752006 | Feb 2007 | CL |
1190848 | Aug 1998 | CN |
1250342 | Apr 2000 | CN |
0668662 | Aug 1995 | EP |
0673125 | Sep 1995 | EP |
0715423 | Jun 1996 | EP |
0767548 | Apr 1997 | EP |
0889663 | Jan 1999 | EP |
0955736 | Nov 1999 | EP |
1315310 | May 2003 | EP |
1320276 | Jun 2003 | EP |
1515475 | Mar 2005 | EP |
2378858 | Feb 2003 | GB |
2000040999 | Feb 2000 | JP |
2000502218 | Feb 2000 | JP |
2000504529 | Apr 2000 | JP |
2001044926 | Feb 2001 | JP |
2001274748 | Oct 2001 | JP |
2001285193 | Oct 2001 | JP |
2001519618 | Oct 2001 | JP |
2001358649 | Dec 2001 | JP |
2002026747 | Jan 2002 | JP |
2002501353 | Jan 2002 | JP |
2002506334 | Feb 2002 | JP |
2002077985 | Mar 2002 | JP |
2003032218 | Jan 2003 | JP |
2003505973 | Feb 2003 | JP |
2003510950 | Mar 2003 | JP |
2003318818 | Nov 2003 | JP |
2004502323 | Jan 2004 | JP |
2004503126 | Jan 2004 | JP |
2004064142 | Feb 2004 | JP |
2004080340 | Mar 2004 | JP |
2004104293 | Apr 2004 | JP |
2004214914 | Jul 2004 | JP |
2004253899 | Sep 2004 | JP |
2004260467 | Sep 2004 | JP |
2004533188 | Oct 2004 | JP |
2005501444 | Jan 2005 | JP |
2005502218 | Jan 2005 | JP |
2005505954 | Feb 2005 | JP |
2005065182 | Mar 2005 | JP |
2005348433 | Dec 2005 | JP |
2005537691 | Dec 2005 | JP |
2005538650 | Dec 2005 | JP |
2007518361 | Jul 2007 | JP |
2008503925 | Feb 2008 | JP |
2008526136 | Jul 2008 | JP |
2008533924 | Aug 2008 | JP |
2010200474 | Sep 2010 | JP |
100262027 | Jul 2000 | KR |
200228664 | Apr 2002 | KR |
20030004985 | Jan 2003 | KR |
200324442 | Mar 2003 | KR |
200427165 | Apr 2004 | KR |
20040088982 | Oct 2004 | KR |
2001531 | Oct 1993 | RU |
2120183 | Oct 1998 | RU |
2163053 | Feb 2001 | RU |
2198465 | Feb 2003 | RU |
2214680 | Oct 2003 | RU |
2214690 | Oct 2003 | RU |
2277762 | Jun 2006 | RU |
2005138862 | Jun 2006 | RU |
462155 | Nov 2001 | TW |
508910 | Nov 2002 | TW |
546927 | Aug 2003 | TW |
584996 | Apr 2004 | TW |
WO9427381 | Nov 1994 | WO |
WO9824198 | Jun 1998 | WO |
WO9830057 | Jul 1998 | WO |
WO9918689 | Apr 1999 | WO |
WO9935865 | Jul 1999 | WO |
WO9945736 | Sep 1999 | WO |
WO0014900 | Mar 2000 | WO |
WO0055976 | Sep 2000 | WO |
WO0108325 | Feb 2001 | WO |
WO0117158 | Mar 2001 | WO |
WO0120808 | Mar 2001 | WO |
0124402 | Apr 2001 | WO |
WO0178291 | Oct 2001 | WO |
WO0182504 | Nov 2001 | WO |
WO0232179 | Apr 2002 | WO |
WO0239609 | May 2002 | WO |
WO0249305 | Jun 2002 | WO |
WO02091597 | Nov 2002 | WO |
WO03034645 | Apr 2003 | WO |
WO03085878 | Oct 2003 | WO |
WO2004025869 | Mar 2004 | WO |
WO2004025986 | Mar 2004 | WO |
WO2004032548 | Apr 2004 | WO |
WO2004042954 | May 2004 | WO |
WO2004059874 | Jul 2004 | WO |
2004077871 | Sep 2004 | WO |
WO2004104530 | Dec 2004 | WO |
WO2004105294 | Dec 2004 | WO |
WO2005034545 | Apr 2005 | WO |
2006007318 | Jan 2006 | WO |
WO2006007318 | Jan 2006 | WO |
WO2006012376 | Feb 2006 | WO |
WO2007014037 | Feb 2007 | WO |
2007050846 | May 2007 | WO |
2007112141 | Oct 2007 | WO |
WO2007146891 | Dec 2007 | WO |
WO2008030823 | Mar 2008 | WO |
Entry |
---|
International Search Report—PCT/US2007/077660, International Searching Authority—European Patent Office—Jan. 2, 2008. |
Written Opinion—PCT/US2007/077660, International Searching Authority—European Patent Office—Jan. 2, 2008. |
Hosein, Patrick, Interference management of OFDMA uplinks. IEEE 2007, pp. 2435-2439. |
Damnjanovic and Vanghi, “IS-2000 Enhanced Closed Loop Power Control for Turbo Coding,” IEEE 54th Vehicular Technology Proceedings, Oct. 7-11, 2001, pp. 23142318, XP-010562383. |
Elmusrati, et al., “Multi-Objective Distributed Power Control Algorithm,” Vehicular Technology Conference Proceedings VTC 2002 Fall IEEE 56th, vol. 2, pp. 812-816. |
Nevdyaev, L.M., “Telecommunication Technologies,” Moscow, Business and Communications, 2002, p. 140. |
TIA/EIA/IS-95 “Mobile Station-Base Station Compatibility Standard for Dual-Mode Wideband Spread Spectrum Cellular System” Jul. 1993. |
Tomcik, T.: “QTDD Performance Report 2”, IEEE C802.20-05/88, IEEE 802.20 Working Group on Mobile Broadband Wireless Access, http://ieee802.org/20/, pp. 1-56, XP002386798 (Nov. 15, 2005). |
Group on Mobile Broadband Wireless Acess, http://ieee802.org/20/, pp. 1-56, XP002386798 (Nov. 15, 2005). |
Tanaka et al., Fast initial acquisition of transmitter power for the reverse link DS/CDMA cellular systems, May 1998, IEEE Vehicular Technology Conference, p. 2436-2440. |
Bowie, Song, et al., “Iterative Joint Channel Estimation and Signal Detection in MIMO OFDM Systems,” Institute of Image Communication and Information Processing, Shanghai Jiao Tong University Shanghai, China, 2005, pp. 39-43. |
Roberto Padovani, “The Application of Spread Spectrum to PCS has Become A Reality Reverse Link Performance of IS-95 Based Cellular Systems,” IEEE Personal Communication, US, IEEE Communications Society. vol. 1, No. 3, Jul. 1, 1994, pp. 28-34. |
Shao, L. et al.; “Downlink multicell MIMO-OFDM: An architecture for next generation wireless networks,” in Proc. IEEE Wireless Commun. and Networking Conf. (WCNC), vol. 2, Santa Clara, USA, Mar. 2005, pp. 1120-1125. |
U.S. Appl. No. 60/516,557, “Layered Frequency Hopping for OFDMA”, filed on Oct. 30, 2003 by Ji, et al., 6 pages. |
European Search Report—EP08008762—Search Authority—Munich—Jun. 22, 2011. |
Taiwan Search Report—TW096133592—TIPO—Feb. 25, 2012. |
European Search Report—EP12161453—Search Authority—The Hague—Apr. 24,2012. |
Qualcomm Incorporated: QFDD Technology Overview Presentation, IEEE 802.20 Working Group on Mobile Broadband Wireless Access, C802.20-05-59, Nov. 2005, XP002518168, Retrieved from Internet: URL:http://grouper.ieee.org/groups/802/20/Contributions.html, pp. 45-47, Oct. 28, 2005. |
Tomcik, Jim: “QFDD and QTDD: Technology Overview”, IEEE 802.20 Working Group on Mobile Broadband Wireless Access, XP002480491, Oct. 28, 2005, pp. 1, 61-106, Retrieved from Internet: URL: http://grouper.iee.org/groups/802/20/Contributions.html. |
C30-20060327-023, “QUALCOMM Proposal for 3GPP2 Air Interface Evolution Phase 2”, Dallas, TX, Mar. 2006. |
China Unicom et al., “Joint Proposal for 3GPP2 Physical Layer for FDD Spectra”, C30-20060731-040R4—HKLLMNQRSUZ—PP2Phase2—FDD—Proposal -1,3GPP2, Jul. 31, 2006. |
Qualcomm Incorporated: “Qualcomm Proposal for 3GPP2 Physical Layer”, C30-20060522-035 QC—Proposal—v1.0, 3GPP2, May 22, 2006. |
Qualcomm Incorporated: “Qualcomm Proposal for 3GPP2 Physical Layer for FDD Spectra”, C30-20060626-028—QCOM—UHDR-One—FDD Proposal—v1.0, 3GPP2, Jun. 26, 2006. |
Number | Date | Country | |
---|---|---|---|
20080117833 A1 | May 2008 | US |
Number | Date | Country | |
---|---|---|---|
60843291 | Sep 2006 | US |