This nonprovisional application is a U.S. National Stage Filing under 35 U.S.C. § 371 of International Patent Application Serial No. PCT/SE2019/050250 filed Mar. 20, 2019 and entitled “Method and Control Device for Mitigating Interference” which is hereby incorporated by reference in its entirety.
The proposed technology presented herein relates to a control device and methods for mitigating interference in a network node.
Interference is an annoying issue in most networks, since it disrupts or modifies a signal. In the presence of non-linear behavior, received uplink (UL) signals can be contaminated with interference resulting from the interaction of the downlink signals due to the non-linear behavior. The distortion signal causing the contamination will impact the uplink signal quality. The non-linear behavior can be caused by the non-linear components and passive components that exhibit non-linear behavior which may be for example a power amplifier, a diode or a low noise receiver. The non-linear behavior can be caused by passive components that exhibit non-linear behavior. Interference caused by strong downlink (DL) signals mixing with passive components is called passive intermodulation (PIM) interference. Since PIM is a critical limitation for performance it has motivated several PIM suppression solutions. Most of the existing solutions assume that the receiver has full knowledge of the PIM signal seen and cancels them at the receiver.
While existing solutions have proposed approaches that trade-off “performance” i.e. cancelling number of PIM terms and non-linear products versus “computation complexity” i.e. multiplications, additions etc—most of them deal with interference or PIM where the disturbing DL signals are known. Suppressing interference or PIM when the DL signals are unknown is a complicated problem, since intermodulation spread transmit signals from multiple bands.
The nature of PIM observed at the receiver depends on PIM sources, number of non-linear terms, varying site configurations, multi-antennas and multi-carrier/band combinations. It is reasonable to assume that there will always be an unknown element of interference that needs to be accounted for in the uplink.
Hence, there is a need for an improved method to be able to efficiently handle interference when the downlink signal is unknown.
It is an object to provide procedures to handle interference in a resource-efficient manner. This and other objects are met by embodiments of the proposed technology. There are, proposed herein, various embodiments which address one or more of the issues disclosed herein.
According to a first aspect, there is provided a method for mitigating interference in a network node. The method is performed by a control device. The method comprises receiving radio signals comprising at least one desired signal and interference. The method comprises estimating a characteristic of the interference, wherein the estimation comprises calculating correlation statistics of power levels of frequency sub-bands comprising the interference with frequency sub-bands comprising the received radio signals. The method comprises determining an interference suppression matrix to suppress the interference in the frequency sub-bands of the received radio signals based on the estimated characteristic of the interference, wherein the interference suppression matrix is further determined based on information from inter-band interference observed across distinct sub-bands of the received radio signals. The method comprises applying the interference suppression matrix on the received radio signals to mitigate the interference from the received radio signals.
According to a second aspect, there is provided a control device for mitigating interference in a network node. The control device is configured to receive radio signals comprising at least one desired signal and interference. The control device is configured to estimate a characteristic of the interference, wherein the estimation comprises calculating correlation statistics of power levels of frequency sub-bands comprising the interference with frequency sub-bands comprising the received radio signals. The control device is further configured to determine an interference suppression matrix to suppress the interference in the frequency sub-bands of the received radio signals based on the estimated characteristic of the interference, wherein the interference suppression matrix is further determined based on information from inter-band interference observed across distinct sub-bands of the received radio signals. The control device is further configured to apply the interference suppression matrix on the received radio signals to mitigate the interference from the received radio signals.
According to a third aspect, there is provided a control device for mitigating interference in a network node. The control device comprises processing circuitry. The processing circuitry is configured to cause the control device to estimate a characteristic of the interference, wherein the estimation comprises calculating correlation statistics of power levels of frequency sub-bands comprising the interference with frequency sub-bands comprising the received radio signals. The processing circuitry is configured to cause the control device to determine an interference suppression matrix to suppress the interference in the frequency sub-bands of the received radio signals based on the estimated characteristic of the interference, wherein the interference suppression matrix is further determined based on information from inter-band interference observed across distinct sub-bands of the received radio signals. The processing circuitry is configured to cause the control device to apply the interference suppression matrix on the received radio signals to mitigate the interference from the received radio signals.
According to a fourth aspect, there is provided a computer program product comprising a non-transitory computer readable medium storing instructions which when executed by a computer, cause the computer to perform the method according to the first aspect.
According to a fifth aspect there is presented a computer comprising instructions which, when executed by a computer, cause the computer to perform the method according to the first aspect. The computer readable storage medium could be a non-transitory computer readable storage medium.
According to a sixth aspect there is presented a non-transitory computer-readable storage medium storing instruction which, when executed by a computer, cause the computer to perform the method according to the first aspect.
Advantageously the proposed technology offers the possibility to provide an optimal matrix to maximize signal to interference plus noise ratio (SINR) and improving the overall capacity. Further this also provides an algorithm that minimize the means square error, MMSE, between the actual and estimated received radio signal. Moreover, it also does not need the interference to be synchronized with the desired uplink signal.
Other objectives features and advantages of the enclosed embodiments will be apparent from the following detailed disclosure, from the attached dependent claims as well as from the drawings.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to “a/an/the element, apparatus, component, means, module, step, etc.” are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, module, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
The embodiments, together with further objects and advantages thereof, may best be understood by making reference to the following description taken together with the accompanying drawings, in which
The inventive concept will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the inventive concept are shown. This inventive concept may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art.
Throughout the drawings, the same reference designations are used for similar or corresponding elements. Any step or feature illustrated by dashed lines should be regarded as optional.
The communications network 100 comprises a control node 200 (control device) configured to control a radio base station 140 that provides network access to at least one terminal device 160 in a radio access network 110, thus enabling the terminal device 160 to communicate over a wireless link 150. The radio access network 110 is operatively connected to a core network 120. The core network 120 is in turn operatively connected to a service network 130, such as the Internet. The terminal device 160 is thereby enabled to, via the network node, access services of, and exchange data with, the service network 130.
Some examples of radio base stations 140 are radio access network nodes, radio base stations, base transceiver stations, Node Bs, evolved Node Bs (e Node Bs), g Node Bs, access points, access nodes, transmission and reception points, and backhaul nodes. Some examples of terminal devices 160 are wireless devices, mobile stations, mobile phones, handsets, wireless local loop phones, user equipment (UE), smartphones, laptop computers, tablet computers, network equipped sensors, network equipped vehicles, and so-called Internet of Things devices.
LTE and NR use orthogonal frequency-division multiplexing (OFDM) in both downlink, i.e. from a network node, g Node B, e Node B, or base station, to a user equipment (UE), and in uplink, i.e. from UE to g Node B, where both discrete Fourier transform spread OFDM (DFT-spread OFDM) and OFDM are supported. OFDM uses frequency carriers of certain width and in such frequency carriers, it can dynamically use certain sub-carriers.
The control node 200 might comprise, be collocated with, integrated with, or be in operational communications with, the radio base stations 140. The control node may herein also be called a control device.
With reference to an embodiment shown in
At least some of the embodiments disclosed herein relate to mechanisms for ensuring that interference can be mitigated. The embodiments disclosed herein in particular relate to mechanisms for calculating and applying a matrix to suppress the interference. In order to obtain such mechanisms, there is provided a control device 200 for mitigating the interference, a method performed by the control device 200, a computer program product comprising code, for example in the form of a computer program, that when run on a control device 200, causes the control device 200 to perform the method. This interference may herein be PIM.
S102: The control device 200 obtains or receives radio signals comprising at least one desired signal and interference. This desired signal may be an uplink signal.
S104: The control device 200 estimates a characteristic of the interference, wherein the estimation comprises calculating correlation statistics of power levels of frequency sub-bands comprising the interference with frequency sub-bands comprising the received radio signals.
S106: The control device 200 determines an interference suppression matrix to suppress the interference in the frequency sub-bands of the received radio signals based on the estimated characteristic of the interference, wherein the interference suppression matrix is further determined based on information from inter-band interference observed across distinct sub-bands of the received radio signals. By “distinct sub-bands” is hereby meant individual sub-bands such that the interference is observed over individual sub-bands.
S108: The control device 200 applies the interference suppression matrix on the received radio signals to mitigate the interference from the received radio signals.
Advantageously, this technique provides an efficient way of suppressing unknown interference and PIM without having knowledge of the transmitted signals (as DL signals that may cause the PIM interference). The technique is also agnostic to the serving base station. This may therefore be called a blind solution.
By the term interference is hereby meant interference appearing from intermodulation products as well as intercell interference, multi-user interference, intentional jammers, interference from one unknown source radiating signals in same frequencies but also from several unknown source/reflections, and it may include one or several interfering signals as for example PIM signals. The interference may also stem from systems such as broadcast systems, other communications systems or by faulty equipment not fulfilling the spectral mask. In this disclosure, the interference will be described with examples of passive intermodulation, PIM interference.
Embodiments relating to further details of mitigating this interference in a network node performed by the control device 200 will now be disclosed.
In the following, some aspects of the system setup will be presented. The uplink signals (UL) are not expected to occupy the entire UL bandwidth and the network node knows the physical resource blocks (PRBs) or sub-bands scheduled by the UL to communicate with the radio base station. Moreover, the downlink signals can have arbitrary load.
In the disclosed system, we denote the time domain signals received across the entire band using an N×1 vector z(t). This signal z(t) N×1 vector comprises of unknown uplink desired radio signal r(t) (occupying specific set of PRBs or sub-bands that are known at eNB), unknown wideband PIM/residual interferer p(t) and noise n(t).
z(t)=r(t)+p(t)+n(t)
Note that the unknown UL desired signal r(t) is here considered to occupy only a part of the overall frequency band at a given time. The objective herein is to estimate and suppress the unknown PIM signal p(t) along the PRB's or sub-bands that contain the uplink desired signal r(t).
In short, according to embodiments, for the disclosed system an interference suppression matrix is presented operating on the received radio signals z(t) to estimate and suppress/subtract the PIM or interference signal p(t) from the uplink signal. This interference suppression matrix may be a PIM suppression matrix. Here, the PIM suppression matrix takes different snapshots of the PIM corrupted received signal and predicts the PIM contributions along the desired sub-band of operation. It may for example be a PIM suppression matrix that takes different snapshots of the PIM corrupted received signal and predicts the PIM contributions along the desired sub-band of operation. The criterion for such optimization techniques can be to either a) improve the overall signal to interference ratio (or the signal to intermodulation ratio or the signal to PIM ratio) or b) to reduce the overall mean squared error (MMSE) between the undesired interference (which may be PIM) and its estimate. The first a) may be seen as a matched interference or PIM suppressor operating on z(t) and the second b) may be a MMSE interference or PIM suppressor.
More specifically in detail, when designing the suppression matrix in this system, first a training part is needed. Now a non-limiting example for a sub-band 1 and sub-band 2 will be described. It is appreciated that for more sub-bands this may be simplified as sub-band x and sub-band x complement. Herein throughout this disclosure PIM will be described as an example of interference.
Let p1(t) and p2(t) denote PIM contributions along the sub-band 1 and sub-band 2 respectively at a given time t of the overall PIM signal p(t): p(t) p1(t)+p2(t). See
Fz(t)=F1(r(t)+p1(t))+F2p2(t)z[f]={r[f]+p1[f]}+p2[f]
where F=[F1; F2] is an N×N Fourier transform matrix containing columns of N-point Fourier transform sub-matrices F1: M×N matrix denoting sub-band 1 and F2: K×N matrix containing remaining columns of Fourier transform. r(t) is the unknown uplink radio signal.
To be able to understand the interference, there is a need to characterize the interference by an estimation. Some embodiments will now be disclosed how this is performed.
According to an embodiment, the estimation may comprise correlating the received radio signals across the entire frequency band with frequency shifted versions of itself to get the spectral representation of the received radio signals. This is performed by determining a covariance matrix. Thus, the estimation may be performed by computing the covariance between the received radio signals across the entire frequency sub-band. In other words, each desired signal may be correlated with frequency shifted versions of the desired signal and each interference may be correlated with frequency shifted versions of the interference to provide a spectral representation of the received radio signals.
According to another embodiment, the estimation may further comprise correlating the interference from each of the distinct sub-bands with each of the received radio signals across the entire band to get the spectral representation of the interference. Thus, by correlating interference in each sub-band with each of the desired signal and the interference across the entire band, the spectral representation of the interference may be provided. Therefore, the estimation of the characteristics of the interference depends on the spectral representation from both the interference and the received radio signals.
Note that the UL desired signals are independent of the interference (or the PIM signals). When cross-correlating the PIM signals from a distinct sub-band 2 with the overall received radio signals across the entire band it will provide the spectral relationship of PIM present in sub-band 2. This representation is computed as the cross-correlation matrix
Rzp[x]=Ε{z[f]pxH[f]} which is an N×K matrix
where px[f] is the interference or PIM, z[f] denote the frequency-domain signals received across the entire band, x are 1, 2, 3, . . . n sub-bands, and Ε denotes the mathematical expectation.
For sub-band 2 the cross-correlation matrix then is
Rzp[2]=Ε{z[f]p2H[f]}
The spectral relationship of interference (or PIM) and the desired UL signals along distinct sub-bands is specified by the N×N covariance matrix Rzz=Ε{z[f]zH[f]} Thus, this equation represents the relationship of frequency shifted versions of the received radio signals.
It is appreciated that, the term “received radio signals” may herein include the interference and the desired UL signals. The term “statistics” may herein refer to statistical information of received radio signals.
Note that this operation may be performed in the background during the reception phase, and we do not need dedicated training resources to obtain the spectral signature of PIM.
Thus, it is quite clear that here PIM interfere and disturb the communication in the desired uplink signal. This disturbance is mitigated by the embodiments disclosed herein.
According to an embodiment, the inter-band or inter-carrier (sub-carrier) interference may be estimated from the loss in orthogonality of the received radio signals. This is especially valid for scenarios, where the interference is asynchronous to the desired uplink signal. Thus, in the case of preserving the orthogonality of the received radio signals, the covariance matrix obtained from the received radio signals in the time domain would be a circular matrix and in the frequency domain it would be a diagonal or a block-diagonal (for a multi-antenna case). Due to inter-carrier interference, the covariance is not necessarily orthogonal due to that the uplink signal being corrupted by interference (PIM). In other words, as we take the received radio signals and estimate covariance and cross-correlation, then the frequency domain matrix will not be diagonal.
The term “orthogonal” may herein refer to that sub-carrier signals are orthogonal to each other.
Moreover, after estimating the characteristics, the next step is to minimize a cost function and calculate the suppressor matrix. Embodiments of how to compute this suppression matrix will now be disclosed.
According to an embodiment, the determination of the interference suppression matrix may be performed by minimizing a mean square error, MMSE between the received radio signals and the estimation of the interference.
In the non-limiting example of sub-band 1 and 2, based on the observations of z[f] of phase 1, which in turn processes PIM related to sub-band x, where x=2, minimizing the cost function is specified by the MMSE criterion of PIM:
where W is an N×K PIM suppression matrix and p is interference, Fx is a Fourier transform of a K×N matrix for arbitrary sub-bands x={1, 2, 3, . . . }. W=Rzz−1Rzp[x] where Rzz is an N×N matrix and Rzp[x] is an N×K matrix, with N sub-carriers divided into K sub-carriers.
When computing the partial derivative of the above expression with respect to W and equating it to zero it leads to the optimal W minimizing the mean squared error W2=Rzz−1Rzp[2]. The optimal W2=Rzz−1Rzp[2] follows Wiener-Hopf Criterion.
Here, the PIM of transmit signals p(t) is uncorrelated with the UL received signal from UEs, r(t) i.e. Ε{r(t)
The distortion due to PIM is inherently non-linear and the operation can be interpreted as spreading exponentials of signals in the frequency domain. This would destroy the orthogonality of the OFDM waveform. If orthogonality had been preserved, we would have observed that Rzz is a diagonal matrix and Rzp[2] contains a K×K diagonal sub-matrix.
Note that we use the correlation between distinct PRBs or sub-bands of Rzp[2] in order to predict and cancel the PIM signal p2[f]. However, the effectiveness of such an approach is that for a specific sub-band 2, we have K dimensions in p2[f] available to suppress M dimensions of r(t) from M dimensions of p1(t). Thus, even in a noiseless scenario with perfect estimation of W=Rzz−1Rzp[2], we can at best cancel the PIM if and only if 2M<K.
Here, we have experienced that we can only suppress the most dominant PIM or interference terms and the rest would be considered as noise. Due to cyclo-stationarity of the signal, the power spectral density (PSD) of the PIM signal p2[f] for snapshot 1 is related to PSD of the PIM signal snapshot p2[f] for another snapshot/phase 2.
According to another embodiment, the determination of the interference suppression matrix may be performed by determining a least means square, LMS, algorithm of the difference between the received radio signals and the estimation of the interference.
While the MMSE is based on known statistics of the PIM signal, the LMS algorithm continuously updates the N×K PIM suppression matrix W based on the estimated statistics. For the LMS algorithm at OFDM symbol number m the PIM suppression matrix weights are updated as:
W[m+1]=W[m]+μzm[f]êmH[f]
Where êm [f]=pm[f]−(zH[m]W[m])T. Note that the above terms correspond to instantaneous estimates and do not include mathematical expectation.
According to an embodiment, the interference may comprise passive intermodulation, PIM.
Using this suppression matrix has the advantage that higher order PIM signals are suppressed, thus improving the overall SINR and capacity.
During multiple phases, the correlation statistics are computed/updated in each case and the PIM suppression matrix W1, W2, . . . Wx. is estimated or updated for each sub-band x=1, 2, 3 . . . , n Updating the correlation statistics may be done during idle/guard intervals, since we do not care about the uplink received signals during the estimation phase.
In a non-limiting example, the desired UL signal to be received is present in sub-band 2 (with M sub-carriers) and corrupted by PIM p2(t):
z(t)={r(t)+p2(t)}+p1(t).
Then, a PIM suppressor may be used i.e. N×M matrix W2=Rzz−1Rzp[2] operating on z(t) or z[f] to predict and cancel PIM and compute an estimate of the uplink received signal {circumflex over (r)}(t) as
{circumflex over (r)}(t)=[z(t)−F2HW2HFz(t)]={[I−F2HW2HF]}z(t)
The overall operation may be implemented in the baseband in either of these two stages—as shown in the block diagrams of
Such as {circumflex over (r)}(t)=[I−F2HW2HF]z(t)=P⊥z(t)
Thus,
According to an example, during training phase 1 (with desired UL signal occupying sub-band 1), we obtain the second order spectral characteristics of the PIM present in sub-band 2. Since this operation gives a partial representation of the PIM signal, we refer to this operation as obtaining a snapshot of the PIM signal (interference signal). We repeat the same operation for estimation in phase 2 and get another snapshot of the PIM signal. After such multiple estimation phases, we can get the statistical relationship of the entire PIM (interference) signal. In a multi-antenna context, computing PIM (interference) snapshots can be extended to distinct antennas operating on sub-band signals to get the wideband PIM spectral characteristics.
Further, in some aspects, the suppression matrix 804, 904, 911 may operate on sub-bands of the received radio signals from a single antenna or multiple antennas to obtain the estimate of the desired signal. According to embodiments, this will now be described with reference to
According to an embodiment, the interference suppression matrix may be operating on distinct frequency sub-bands of the received radio signals from a specified antenna to obtain a low-resolution estimate of the desired signal.
Thus, in a single antenna system, the interference (or PIM) in frequency sub-bands comprising the desired user (UL) signals are suppressed as shown in
According to embodiments, the interference suppression matrix may be jointly operating on all frequency bands of the received radio signals from multiple antennas to obtain a high-resolution estimate of the desired signal.
In
As an alternative, consider variant 2, 1000, of multi-antenna interference suppressor shown in
It will be appreciated that the term frequency sub-bands may be mentioned as just combination of sub-carriers or combination of physical resource blocks (PRBs). It will also be appreciated that even though
Advantageously, the proposed technology exploits multiple wideband signals observed in a multi-antenna context and with increased degrees of freedom available now, leading to improved interference suppression. The performance improvement is comparable to improvements we obtain as we transition from single to multi-antenna/MIMO communications such as improved capacity and better interference suppression. Moreover, with the proposed technology, interference or PIM do not need be synchronized to the desired UL signal and the DL signal do not need to be known when mitigating interference. Therefore, this is an efficient suppression technique to be used solely or as a complement to previously known suppression techniques.
The control device 200 may be provided as a standalone device or as a part of at least one further device. For example, the control device 200 may be provided in a node of a radio access network or in a node of a core network. Alternatively, functionality of the control device 200 may be distributed between at least two devices, or nodes. These at least two nodes, or devices, may either be part of the same network part (such as the radio access network or the core network) or may be spread between at least two such network parts. In general terms, instructions that are required to be performed in real time may be performed in a device, or node, operatively closer to the cell than instructions that are not required to be performed in real time. In this respect, at least part of the control device 200 may reside in the radio access network, such as in the radio access network node, for cases when embodiments as disclosed herein are performed in real time. Thus, a first portion of the instructions performed by the control device 200 may be executed in a first device, and a second portion of the instructions performed by the control device 200 may be executed in a second device; the herein disclosed embodiments are not limited to any particular number of devices on which the instructions performed by the control device 200 may be executed. Hence, the methods according to the herein disclosed embodiments are suitable to be performed by a control device 200 residing in a cloud computational environment. Therefore, although a single processing circuitry 210 is illustrated in
In the example of
The inventive concept has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the inventive concept, as defined by the appended patent claims.
At least some of the following abbreviations are used in this disclosure.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SE2019/050250 | 3/20/2019 | WO |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2020/190185 | 9/24/2020 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6061568 | Dent | May 2000 | A |
6118805 | Bergstrom | Sep 2000 | A |
9825794 | Nguyen | Nov 2017 | B2 |
20030053524 | Dent | Mar 2003 | A1 |
20070161361 | Vaisanen | Jul 2007 | A1 |
20150257165 | Gale et al. | Sep 2015 | A1 |
20170353929 | Tacconi et al. | Dec 2017 | A1 |
20180248576 | Coe et al. | Aug 2018 | A1 |
Number | Date | Country |
---|---|---|
107453782 | Dec 2017 | CN |
2 926 480 | Jun 2014 | EP |
2017 157461 | Sep 2017 | WO |
Entry |
---|
PCT International Search Report issued for International application No. PCT/SE2019/050250—dated Jan. 7, 2020. |
PCT Written Opinion of the International Searching Authority issued for International application No. PCT/SE2019/050250—dated Jan. 7, 2020. |
Number | Date | Country | |
---|---|---|---|
20220158673 A1 | May 2022 | US |