At least one of the present embodiments generally relates to a method and a device for allocating a portion of radio frequency resource to a first device, more particularly in the case where said radio frequency resource is shared between said first device and at least one second device.
In wireless communications coexistence problems occur when different systems operate by sharing the same communication resources, notably frequency resources. Indeed, some frequency bands, especially unlicensed frequency bands, may be overcrowded because of the deployment of multiple devices.
In the past few years, communications systems such as those operating in accordance with different radio access technologies (RAT) such as IEEE 802.11 (Wi-Fi) and Bluetooth have been increasingly deployed in the ISM unlicensed 2.4 GHz band (acronym of “Industrial, Scientific, and Medical”). The ISM band is a portion of the radio spectrum originally reserved internationally for industrial, scientific and medical (ISM) purposes other than telecommunications, e.g. microwave ovens, garage door openers, baby monitors. Despite the intent of the original allocations, in recent years the fastest-growing use of these bands has been for short-range, low power wireless communications systems. As more and more devices use the ISM band, the spectrum becomes more crowded, which in turns degrade the quality of service in this band.
The shared frequency range of the two IEEE 802.11 (Wi-Fi) and Bluetooth standards inevitably results in transmission interference and data corruption as the two protocols operate with transmission frequencies that overlap at various times during routine transmission of information. The resulting frequency overlap degrades the network performance and transmission rates in both families of devices due to a lack of ability of wireless devices which use differing protocols to coordinate their data transmissions. This problem is exacerbated as the number of wireless devices within the network increases and is further affected by the proximity in which the wireless devices are placed with respect to one another.
The same type of problems occur in the unlicensed ITS 5.9 Ghz band (acronym of “Intelligent Transport System”). Indeed, communications systems such as those operating in accordance with IEEE 802.11p, IEEE 802.11ac, C-V2X (acronym of “Cellular Vehicle to Everything”), CBTC (acronym of “Communications-Based Train Control”) standards have been increasingly deployed in the ITS band.
The coexistence between devices and radio access technologies (RAT) could be handled in a number of different ways using, for example, an opportunistic random access or some collision avoidance schemes.
Opportunistic random access technologies provide a way to efficiently allocate network resources, in particular, when the number of devices sharing the same radio resource is large. Classically, a device that is willing to transmit data listens to the communication medium and begins to transmit data when it detects an available transmission window. Collision risks are limited by applying a random waiting time before effectively initiating transmission. It however does not avoid that several devices may select the same radio resource, i.e. the same frequencies, at the same time for transmitting data. Opportunistic random access technologies thus provide a good spectrum use at the cost of a performance loss, i.e. a high collision rate.
Collision avoidance techniques are thus used to avoid resource contention. These techniques attempt to eliminate situations in which multiple devices access the same radio resource at the same time. They ensure that any device in a network can transmit data without colliding with other traffic on the network.
Collision management mainly appears in networks with carrier sense multiple access (CSMA). Devices that are willing to transmit data have to listen to the channel for some time to determine whether other devices are using the shared radio resource. A device can start transmission only if a channel is sensed to be idle, otherwise, transmissions are deferred. Two main approaches have been developed in CSMA: collision detection and collision avoidance. With collision detection, transmitters creating a collision stop transmitting and defer their transmission for a random time. Collision are thus not avoided and iterations of transmissions often occur. Collision avoidance is another approach that prevents multiple devices from transmitting at the same time on the same frequency resource, by implementing a dedicated protocol based on an exchange of RTS (acronym of “Request To Send”) and CTS (acronym of “Clear To Send”) messages. However, such protocol implies overhead, which degrades transmission performance.
Collision avoidance techniques thus provide a good performance, i.e. low collision rate, at the cost of a poor spectrum use.
It is thus desirable to share radio resources between devices using the same radio frequency resource, e.g. the same frequency band or channel, while maintaining both good performance and good use of the spectrum.
According to a general aspect of at least one embodiment, a method for allocating a radio frequency resource to a first device connected to a first radio access network is presented. The radio frequency resource is shared between said first device and at least one second device connected to a second radio access network. The method comprises the following steps executed by the first device:
The method detailed herein may be deployed wherever there is coexistence in the same frequency resource, e.g. band or channel, of different devices using same RAT or different RAT.
By accepting a given collision rate defined by at least one threshold value related to the second device, the method makes it possible to better use the spectrum while maintaining good performance in terms of number of correct received packets divided by number of sent packets.
According to a specific characteristic, said information representative of a usage of said radio frequency resource by said second device comprises a frequency resource allocation pattern and a value of a time interval for collision rate estimation (e.g. frame length).
According to a specific embodiment, determining a value representative of an estimated collision rate as experienced by the second device for at least one frequency resource allocation of the first device being defined by another frequency resource allocation pattern comprises mapping said frequency resource allocation pattern and said another frequency resource allocation pattern in order to obtain overlaps in frequency resource allocation during a time interval (e.g. T) and determining the value by dividing the obtained overlaps by the overall time of usage of said radio frequency resource by said second device during said time interval, wherein said time interval (T) is defined from said time interval related to collision rate estimation (e.g. from frame length).
According to a specific embodiment, said information representative of a usage of said radio frequency resource by said second device is obtained by the first device from said second device through application layer or physical layer, by sensing or from preconfigured data.
According to a specific embodiment, determining a value representative of an estimated collision rate as experienced by the second device for at least one frequency resource allocation to the first device is determined from a database of preconfigured frequency resource allocation pattern, wherein said database associates with each possible combination of frequency resource allocation patterns an estimated collision rate for the first device and an estimated collision rate for the second device.
According to a specific embodiment, obtaining a threshold value of a collision rate acceptable for the second device comprises:
According to a specific embodiment, selecting said one threshold value among said first and second threshold values comprises:
According to a specific embodiment, selecting said one threshold value among said first and second threshold values comprises:
According to a specific embodiment, selecting said one threshold value among said first and second threshold values:
According to a specific embodiment, said at least a first threshold value and a second threshold value of an acceptable collision rate for the second device are obtained by said first device from the network, from said second device through application or physical layer or from preconfigured data.
According to a specific embodiment, the method further comprising receiving new threshold values of a collision rate acceptable for the second device, said new threshold values being determined from the actual collision rate experienced by the second device because of the first device.
According to a specific embodiment, the method further comprises receiving new threshold values of a collision rate acceptable for the second device, said new threshold values being determined from the actual collision rate experienced by the second device because of the first device and at least a third device.
According to a specific characteristic, the first and the second radio access networks implement different radio access technologies.
According to a general aspect of at least one embodiment, a device connected to a first radio access network is presented. This said device shares a radio frequency resource with at least one second device connected to a second radio access network. The device comprises:
One or more embodiments also provide a computer program product including program code instructions for performing at least part of any of the methods described above. One or more of the present embodiments also provide a computer readable storage medium having stored thereon instructions for performing at least part of any of the methods described above.
The characteristics of the invention will emerge more clearly from a reading of the following description of at least one example of embodiment, said description being produced with reference to the accompanying drawings.
In one embodiment, RAN1 and RAN2 are identical and use one and the same radio access technology. As an example, the device D1 is located in a train, RAN1 is compliant with CBTC, the device D2 is located in another train and RAN2 is also compliant with CBTC.
In another embodiment, RAN1 and RAN2 are different and use different radio access technologies. As an example, the device D1 is located in a train, RAN1 is compliant with CBTC, the device D2 is located in a vehicle such as a car and RAN2 is compliant with C-V2X. Vis versa, the device D1 is located in a vehicle such as a car, RAN1 is compliant with C-V2X, the device D2 is located in a train and RAN2 is compliant with CBTC. The train and the car are not communication terminals per se. However, they may comprise such communication terminals D1 and D2. More generally, the devices D1 and D2 may be located in vehicles with Wi-Fi connections capabilities (i.e. conforming to IEEE 802.11), smartphones (i.e. conforming to IEEE 802.11ac), vehicles with 4G/5G capabilities (i.e. conforming to C-V2X), train (conforming to CBTC), etc.
In
The time intervals dT1 and dT2 related to D1 and D2 respectively, are generally defined as follows: dTi=Pi*Ki, where i is an index identifying the device (e.g. i=0 or 1), Pi is length of the frame of Di and Ki is an arbitrary integer number selected independently by each device (e.g. K1=K2=4 as depicted on
While deteiniinistic patterns are illustrated in
P1 and P2 are the periods of the RA patterns RA1 and RA2 respectively, i.e. the lengths of the frames. t0 is a time offset between RA1 and RA2. The overlap of the two periodic step functions F1(t) and F2(t) results in beating with a beat period P0 equal to the least common multiple (LCM) of P1 and P2. As illustrated in
Each periodic step function may be written as follows:
where Pi is the period of the corresponding periodic step function Fi(t), si is a time interval during which the radio frequency resource is used by the corresponding device Di, and t0 is the time offset between F2(t) and F1(t).
In one embodiment, the collision rate for each device and an arbitrary selected time interval T can be estimated as:
C
i(T, t0)=∫0TG(t)dt/∫0TFi(t)dt, (3)
where i=1,2 for D1 and D2, respectively, and G(t) is an overlap function defined, for instance, as
If F1(t) and F2(t) are periodic functions, then the overlap function G(t) is also periodic with a period P0 equal to the least common multiple (LCM) of the periods of F1(t) and F2(t). In one embodiment, it may thus be beneficial to select a time interval T equal to the period of the overlap function P0, namely:
T=P0=LCM(P1, P2), (5)
In one embodiment, the value T=P0 is used to calculate an asymptotic value of the collision rate based solely on the frame lengths P1 and P2.
Thanks to the periodicity of the overlap function, such a definition of T makes the collision rate function Ci invariant with respect to the time offset t0. Moreover, the value of Ci calculated for T=P0, may be considered as an asymptotic value for an arbitrary selected time interval T, provided T is much greater than P0.
On
At step S200, the first device D1 obtains information representative of a usage of said radio frequency resource by the second device; i.e. the device D2 in
In one embodiment, the information representative of a usage of said radio frequency resource by the second device D2 comprise a frequency resource allocation pattern (RA pattern) and a time interval (e.g. dT2 or P2) related to the definition of the collision rate. The information representative of a usage of the radio frequency resource by the second device D2 may be obtained by the first device D1 directly from the second device D2 through application or physical layers, by sensing or from preconfigured data defined, e.g. in factory, for example in a standard document. In one embodiment (related to a distributed use case), these preconfigured data may be extracted from the corresponding standards associated with D2 and stored in a memory of D1. Alternatively, it can be stored on a MEC device accessible through RAN1.
At step S210, the first device D1 obtains one threshold value Th of a collision rate acceptable for the second device D2. Said otherwise, if a collision rate is below the threshold value Th, it is considered as an acceptable collision rate while if it is above, it is considered as a non-acceptable collision rate. A threshold value Th is thus associated with an acceptable collision rate and is attributed to each device according to its minimum requirements in terms of interference level, e.g. SIR, to ensure a sufficient proportion of correct received packets that is determined by its own radio configuration such as its modulation and coding scheme, its waveform, its frequency allocation, etc. The threshold value Th may be obtained by the first device D1 directly from the second device D2 through their application layers. In a variant, when the devices D1 and D2 use identical radio access technology, the threshold value Th may be obtained by the first device D1 from the second device D2 through their physical layers. Indeed, in this latter case, D1 and D2 may exchange preliminary data to agree on their thresholds for the next data to come because they have common specifications at the physical layer. In another variant, the threshold value Th may be obtained by the first device D1 from the network e.g., a base station for trains or for vehicles if they are covered by any . In yet another variant, the threshold value Th may be obtained by the first device D1 from preconfigured data defined, e.g. in factory, for example in a standard document. In one embodiment (related to a distributed use case), these preconfigured data may be extracted from the corresponding standards associated with D2 and stored in a memory of D1. Alternatively, it can be stored on a MEC device accessible through RAN1.
At step S212, the first device D1 determines a value C2nm representative of an estimated collision rate as experienced by the second device D2 for at least one frequency resource allocation RA1 of the first device D1, where n and m identify the frequency resource allocation of D1 and D2 respectively. The value C2nm is determined notably from the obtained information representative of the usage of the radio frequency resource by the second device D2. The at least one frequency resource allocation RA1 of the first device may be one frequency resource allocation selected in a list of predefined frequency resource allocations. In an embodiment, the frequency resource allocation RA1 is defined by a RA pattern such as the deterministic pattern associated with a periodic traffic comprising a sequence of identical frames as depicted in
At step S214, the value C2nm is compared to the threshold value Th. In the case where C2nm<Th, the method continues at step S216. Otherwise the method continues at step S212. Another frequency resource allocation, different from RA1, e.g. a different pattern, may thus be tested for the first device D1.
In a variant, the first device D1 determines a value C2nm representative of an estimated collision rate from a database of preconfigured RA patterns as depicted in
The database also provides the estimated collision rate C2nm as experienced by D2 for a selected combination of two RA patterns identified by indices n and m. Such a database can be provided to at least one of the devices, e.g. the first device D1, to facilitate its frequency resource allocation. Indeed, using the database may reduce the computation time for determining a RA pattern satisfying a given threshold value Th. Indeed, the first device D1 may directly select an appropriate RA pattern from the database that satisfies the threshold value Th.
At step S216, the frequency resource allocation RA1 is used for the first device D1.
The method according to this second embodiment comprises the steps S200 to S216. In this second embodiment, the step S210 comprises several steps as depicted in
In a step S202, the first device D1 obtains at least two threshold values of a collision rate acceptable for the second device D2, each of the at least two threshold values being associated with a specific spatial zone as illustrated by
In a step S204, the first device D1 obtains information representative of its own geolocation or information making it possible to determine its relative distance to D2. The obtained information is used for determining to which spatial zone the first device D1 belongs. In a variant wherein several overlapping spatial zones are defined, the first device D1 may also obtain geolocation data of the second device D2 to select an appropriate threshold value. In a step S206, the first device D1 selects one threshold value Th among the at least two threshold values obtained responsive to the information obtained at the step S204. With respect to
The distance may be calculated directly, based on geolocation data, or estimated by sensing. The signal level may be used to estimate the relative position and/or distance between the devices, using some additional information associated with the communication and obtained at the step S204 (e.g. about the propagation channel and direction of the interference signal arrival). In a first approximation, a classical link budget estimation based on the Friis formula may be used to calculate the attenuation of the signal level between two devices at a given distance R. It can be applied by D1 to estimate a distance to D2 based on the received signal (I21). Indeed, the Friis formula is defined as follows:
where Dt and Dr are the antenna directivities along the line of sight (with respect to an isotropic radiator) of the transmitting (D2) and receiving (D1) antennas, respectively, λ is the wavelength, R is the distance between the antennas, parameter a takes into account the factors affecting the radio channel properties, such as attenuation in the medium, antenna alignment, polarization, multipath, etc. Here, we further assume that R>>λ, such that both antennas are in the far field of each other, and the bandwidth is narrow enough that a single value for the wavelength λ can be assumed. This formula thus makes it possible to calculate the power that is received by one antenna from another when transmitted from a distance R, and consequently the distance R can be estimated from received power in a reverse manner.
This embodiment based on the spatial zones works in the cases where the second device D2 is present and is not present. Indeed, the first device D1 may take a decision about frequency resource allocation to anticipate a future arrival of D2, e.g. defined by a time schedule or obtained from the network. For instance, a vehicle (acting as device D1) may thus anticipate a future need of a train (acting as device D2) for RR at the time of its arrival.
The method according to this third embodiment comprises the steps S200 to S216. In this third embodiment, the step S210 comprises several steps as depicted in
In a step S202, the first device D1 obtains at least two threshold values of a collision rate acceptable for the second device D2, each of the at least two threshold values being associated with a specific level of interference signal as illustrated in
The threshold values may be defined as a function of the interference signal levels as sensed by the first device D1 (i.e. I21). In this embodiment, the threshold values for D2 may be defined as follows:
If I21_min(j)<I21<I21_max(j), then Threshold value is equal to T(j), where j is a number identifying a range of interference signal level.
The values of I21_min(j) and I21_max(j) are defined by D2 taking into account the worst scenario for the propagation channel conditions and D1 physical layer (i.e. directivity, pattern, max transmitted power, etc.). Indeed, when defining the thresholds D2 has limited or no information about D1 and thus has to consider a worst case (i.e. a case leading to a maximum level of interference signal).
In this embodiment, the first device D1 does not require to know its position nor its distance to D2. This information is already included in the definition of threshold values through the values of I21_min(j) and I21_max(j) defined by D2. Because of the reciprocity, the propagation channel conditions are the same in both directions. This makes it possible for D2 to predict a possible level of interference signal from D1 (i.e. I12) and to define threshold values accordingly.
In the step S204, the first device D1 obtains the level of interference signal I21. In one embodiment, the level of interference signal I21 is obtained by measurements possibly using some signal processing.
In the step S206, the first device D1 selects one threshold value Th among the at least two threshold values obtained at the step S202 responsive to the information obtained at the step S204.
The methods described above may comprise a feedback from the second device D2 to the first device D1 and/or to other devices using the same RR.
In one embodiment, the feedback mechanism can be used by D2 to notify D1 about the actual impact experienced by D2 due to D1. This makes it possible for D1 to adapt its use of the shared radio frequency resource accordingly. The feedback information provided by D2 to D1 may comprise new threshold values and/or new time interval dT2. Thus in one particular embodiment, the first device D1 receives new threshold values, said new threshold values being determined from the actual collision rate experienced by the second device because of the first device.
In another embodiment, the feedback mechanism can be used to anticipate a multi-device scenario. In particular, it may allow D2 to adapt its threshold value(s) in the case where the same RR is used by more than 2 devices. In one embodiment, a 3rd device D3 uses the same RR as D1 and D2. The threshold value(s) Th associated with D2 may be determined in order to guarantee that the cumulative impact of D1 and D3 on D2 (i.e. I12+I32) meets the minimum requirements of D2.
The above methods may be used with devices D1 and D2 having an equal-right use of RR or with a device D1 (respectively D2) being a primary device and the device D2 (respectively D1) being a secondary device. In an extreme case, the threshold value(s) associated with the primary device may tend to a value corresponding to a case where the primary device is allowed to select any RA, regardless to the collision rate experienced by the secondary device. For example, to give advantage in RR use for a primary device, its threshold value for the collision rate may be set equal zero. After obtaining such a threshold value, the secondary device is obliged either to determine a RA that guarantees a collision-free use of the same RR or to avoid using this RR.
According to the example of hardware architecture shown in
The processor 101 is capable of executing instructions loaded into the RAM 102 from the ROM 103, from an external memory (such as an SD card), from a storage medium (such as the HDD), or from a communication network (such as RANI or another communication network). When the device D1 is powered up, the processor 101 is capable of reading instructions from the RAM 102 and executing them. These instructions form a computer program causing the implementation, by the processor 101, of the method described in relation to
The methods described in relation to
Number | Date | Country | Kind |
---|---|---|---|
20168689.6 | Apr 2020 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2021/011558 | 3/12/2021 | WO |