The present disclosure relates to the field of wireless communications system, in particular to a processing method and a processing device.
In a Time Division Duplexing (TDD) network, there is a unique interference characteristic, i.e., atmospheric ducting interference. As a typical remote base station interference, the atmospheric ducting interference will seriously affect the performance of the TDD network. In addition, a huge number of base stations, e.g., all base stations in a city, are affected by the atmospheric ducting interference for a long time period, e.g., several weeks or even several months.
As shown in
In a Fourth-Generation (4G) era, the TDD remote base station interference is mainly prevented through a personalized scheme provided by each operator. In a Fifth-Generation (5G) era, a unified TDD network is used globally, so there is an urgent need to prevent the remote interference.
An object of the present disclosure is to provide a processing method and a processing device.
In a first aspect, the present disclosure provides in some embodiments a processing method, including determining, by a first device, a base station set identity and/or a configuration of a Remote Interference Management-Reference Signal (RIM-RS) resource. The first device is an aggressor base station or a victim base station.
In a second aspect, the present disclosure provides in some embodiments a processing method, including: detecting, by a Distributed Unit (DU) of a first base station, a remote interference; and when the DU of the first base station detects the remote interference, determining whether to transmit an RIM-RS.
In a third aspect, the present disclosure provides in some embodiments a processing method, including: receiving, by a Centralized Unit (CU) of a first base station, remote base station interference information from a second base station, and transmitting, by the CU of the first base station, the remote base station interference information to one or more DUs of the first base station; or receiving, by the DU of the first base station, the remote base station interference information from the second base station.
In a fourth aspect, the present disclosure provides in some embodiments a processing method, including: receiving, by a first base station, a CU of the first base station or a DU of the first base station, remote base station interference information from a second base station; and determining whether to continue to transmit an RIM-RS in accordance with the remote base station interference information.
In a fifth aspect, the present disclosure provides in some embodiments a processing method, including detecting, by a DU of a second base station, an RIM-RS from a first base station.
In a sixth aspect, the present disclosure provides in some embodiments a processing method, including: determining, by a second base station, a CU of the second base station or a DU of the second base station, a fallback pattern; and performing fallback processing in accordance with the determined fallback pattern.
In a seventh aspect, the present disclosure provides in some embodiments a processing method, including transmitting, by a CU of a second base station, remote base station interference information to a first base station.
In an eighth aspect, the present disclosure provides in some embodiments a first device, including a DU and a CU. The DU or CU of the first device is configured to determine a base station set identity and/or a configuration of an RIM-RS resource. The first device is an aggressor base station or a victim base station.
In a ninth aspect, the present disclosure provides in some embodiments a first base station, including a DU and a CU. The DU of the first base station is configured to detect a remote interference, and when the remote interference is detected, determine whether to transmit an RIM-RS.
In a tenth aspect, the present disclosure provides in some embodiments a first base station, including a DU and a CU. The CU of the first base station is configured to receive remote base station interference information from a second base station and transmit the remote base station interference information to one or more DUs of the first base station, or the DU of the first base station is configured to receive the remote base station interference information from the second base station.
In an eleventh aspect, the present disclosure provides in some embodiments a first base station, including a DU and a CU. The CU or DU of the first base station is configured to receive remote base station interference information from a second base station, and the DU of the first base station is further configured to determine whether to continue to transmit an RIM-RS in accordance with the remote base station interference information.
In a twelfth aspect, the present disclosure provides in some embodiments a second base station, including a DU and a CU. The DU of the second base station is configured to detect an RIM-RS from a first base station.
In a thirteenth aspect, the present disclosure provides in some embodiments a second base station, including a DU and a CU. The CU or DU of the second base station is configured to determine a fallback pattern, and the DU of the second base station is further configured to perform fallback processing in accordance with the determined fallback pattern.
In a fourth aspect, the present disclosure provides in some embodiments a second base station, including a DU and a CU. The CU of the second base station is configured to transmit remote base station interference information to a first base station.
In a fifteenth aspect, the present disclosure provides in some embodiments a first base station, including a processor, a memory, and a program stored in the memory and executed by the processor. The program is executed by the processor so as to implement the steps of the above-mentioned processing methods.
In a sixteenth aspect, the present disclosure provides in some embodiments a second base station, including a processor, a memory, and a program stored in the memory and executed by the processor. The program is executed by the processor so as to implement the steps of the above-mentioned processing methods.
In order to make the objects, the technical solutions and the advantages of the present disclosure more apparent, the present disclosure will be described hereinafter in a clear and complete manner in conjunction with the drawings and embodiments.
Such words as “first” and “second” involved in the specification and the appended claims are merely used to differentiate different objects rather than to represent any specific order. It should be appreciated that, the data used in this way may be replaced with each other, so as to implement the embodiments in an order other than that shown in the drawings or described in the specification.
The technology described in the context shall not be limited to a 5G system and any subsequently evolved communications system.
The technology described in the context shall not be limited to a Long Term Evolution (LTE)/LTE-Advanced (LTE-A) system, and it is also applied to various wireless communications systems, e.g., Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Single-Carrier Frequency-Division Multiple Access (SC-FDMA), or any other system.
The terms “system” and “network” may be replaced with each other. The CDMA system may be used to implement such radio technologies as CDMA2000 and Universal Terrestrial Radio Access (UTRA). The UTRA may include Wideband Code Division Multiple Access (WCDMA) and the other CDMA variants. The TDMA system may be used to implement such a radio technology as Global System for Mobile Communication (GSM). The OFDMA system may be used to implement such radio technologies as Ultra Mobile Broadband (UMB), Evolved-UTRA (E-UTRA), IEEE 802.11 (Wireless Fidelity (Wi-Fi)), IEEE 802.16 (WiMAX), IEEE 802.20, and Flash-OFDM. The UTRA and the E-UTRA are parts of a Universal Mobile Telecommunications System (UMTS). The LTE and a more advanced LTE (e.g., LTE-A) are new UMTS versions using the E-UTRA. The UTRA, E-UTRA, UMTS, LTE, LTE-A and GSM have been described in documents from the 3rd Generation Partnership Project (3GPP). The technology described in the context may be applied to the above-mentioned systems and radio technologies, or applied to the other systems and radio technologies.
Step 301: transmitting a first RS to an aggressor base station when a victim base station detects a remote interference.
Step 302: detecting, by the aggressor base station, whether the first RS is received, where the first RS is used to indicate that the victim base station is subjected to the remote interference.
Step 303: performing, by the aggressor base station, interference fallback processing using a remote base station interference function mitigation plan when the aggressor base station receives the first RS.
Step 304: repairing, by the aggressor base station, an original configuration, and stopping the detection of the RS.
Step 305: transmitting, by the aggressor base station, a second RS to the victim base station.
Step 306: starting, by the victim base station, to detect the second RS.
Step 307: stopping, by the victim base station, the transmission of the first RS.
Step 401: when the victim base station detects the remote interference, transmitting, by the victim base station, an RS to the aggressor base station, where the RS is used to indicate that the victim base station is subjected to the remote interference.
Step 402: detecting, by the aggressor base station, whether the RS is received.
Step 403: notifying, by the aggressor base station, the victim base station that the RS is received via a backhaul network when the aggressor base station receives the RS.
Step 404: performing, by the aggressor base station, interference fallback processing using the remote base station interference function mitigation plan.
Step 405: repairing, by the aggressor base station, the original configuration, and stopping the detection of the RS.
Step 406: stopping, by the victim base station, the transmission of the RS.
Step 407: notifying, by the aggressor base station, the victim base station that the RS disappears.
In the processing methods in
In order to perform the RIM under the CU-DU architecture, as shown in
In some embodiments of the present disclosure, the configuration of the RIM-RS resource is associated with the base station set ID.
In some embodiments of the present disclosure, one or more base stations form a set, and each set corresponds to one base station set ID. The base station set ID is used to differentiate identification information about different sets, and the base station set ID is a set identity (set ID). It should be appreciated that, one or more DUs of a same base station, or DUs of different base stations, form a set.
In some embodiments of the present disclosure, the configuration of the RIM-RS resource is used to indicate a configuration of a resource desired for transmitting an RIM-RS, e.g., a configuration of a time-domain resource and/or a frequency-domain resource desired for transmitting the RIM-RS. It should be appreciated that, types of the configuration of the RIM-RS resource will not be particularly defined herein.
The base station set ID and/or the configuration of the RIM-RS resource are determined in the following three modes.
First Mode
1) The base station set ID and/or the configuration of the RIM-RS resource are preset by a DU of the first device.
2) The DU of the first device receives the base station set ID and/or the configuration of the RIM-RS resource from the other device, and the other device is an Operation Administration and Maintenance (OAM) entity.
Second Mode
1) The base station set ID and/or the configuration of the RIM-RS resource are preset by a CU of the first device.
2) The CU of the first device receives the base station set ID and/or the configuration of the RIM-RS resource from the other device, and transmits the base station set ID and/or the configuration of the RIM-RS resource to one or more DUs connected to the CU.
A same base station set ID and a same RIM-RS, or different base station set IDs and different RIM-RSs, are configured for different DUs connected to the CU of the first device.
Third Mode
When the remote base station interference occurs, the CU of the first device determines the base station set ID and/or the configuration of the RIM-RS resource in accordance with information about the remote base station interference.
Further, when the remote base station interference occurs, the DU of the first device transmits the information about the detected remote base station interference to the CU of the first device. The determining, by the CU of the first device, the base station set ID and/or the configuration of the RIM-RS resource in accordance with information about the remote base station interference specifically includes: when the remote base station interference occurs, receiving, by the CU of the first device, the information about the remote base station interference from the DU of the first device; enabling, by the CU of the first device, one or more DUs to form a set in accordance with the information about the remote base station interference; and transmitting, by the CU of the first device, the base station set ID and/or the configuration of the RIM-RS resource corresponding to the set to the one or more DUs connected to the CU.
According to the processing method in the embodiments of the present disclosure, it is able for the aggressor base station or the victim base station to determine the base station set ID and/or the configuration of the RIM-RS resource under the CU-DU architecture, thereby to manage the remote base station interference under the CU-DU architecture.
As shown in
When the DU of the victim base station detects the remote interference, whether each DU transmits the RIM-RS will be described hereinafter in the following modes.
First Mode
When the DU of the victim base station detects the remote interference, the DU of the victim base station determines whether to transmit the RIM-RS. It should be appreciated that, when a plurality of DUs connected to a CU of the victim base station detect the remote interference, each DU independently determines whether to transmit the RIM-RS, without any necessity to negotiate with the CU and the other DUs of the victim base station.
Second Mode
When the DU of the victim base station detects the remote interference, the CU of the victim base station determines whether to transmit the RIM-RS. Step 702 specifically includes: when the DU of the victim base station detects the remote interference, transmitting, by the DU of the victim base station, information indicating that the DU is subjected to the remote interference to the CU of the victim base station; receiving, by the DU of the victim base station, first information from the CU of the victim base station, the first information being used to indicate whether the DU of the victim base station transmits the RIM-RS; and determining, by the DU of the victim base station, whether to transmit the RIM-RS in accordance with the first information.
In some embodiments of the present disclosure, the CU of the victim base station receives the information indicating that the DU is subjected to the remote interference from the DU of the victim base station, and transmits the first information to the DU of the victim base station in accordance with the information.
According to the processing method in the embodiments of the present disclosure, it is able for the DU of the victim base station to transmit the RIM-RS when the remote interference is detected, thereby to manage the remote interference under the CU-DU architecture.
As shown in
Step 801: receiving, by a CU of the victim base station, remote base station interference information from the aggressor base station, and transmitting, by the CU of the victim base station, the remote base station interference information to one or more DUs of the victim base station.
In some embodiments of the present disclosure, the CU of the victim base station receives the remote base station interference information from the aggressor base station through a backhaul network.
Step 802: receiving, by the DU of the victim base station, the remote base station interference information from the aggressor base station.
In some embodiments of the present disclosure, the DU of the aggressor base station receives the remote base station interference information from the aggressor base station through an air interface.
In some embodiments of the present disclosure, the remote base station interference information includes one or more of: second information indicating that the aggressor base station detects an RIM-RS from the victim base station; third information indicating that the remote base station interference disappears, the RIM-RS from the victim base station disappears or the aggressor base station fails to detect the RIM-RS from the victim base station; information indicating that the aggressor base station performs interference fallback; and identification information corresponding to the aggressor base station.
In some embodiments of the present disclosure, the identification information includes one or more of a base station set ID, a base station ID and a cell identifier.
The base station ID is identification information for differentiating different base stations, and the base station ID may be a gNB identity (gNB ID). The cell identifier is identification information for differentiating different cells, and the cell identifier may be a cell identity (cell ID).
According to the processing method in the embodiments of the present disclosure, it is able for the CU or DU of the victim base station to receive the remote base station interference information from the aggressor base station, thereby to manage the remote base station interference under the CU-DU architecture.
As shown in
In some embodiments of the present disclosure, Step 902 specifically includes the following modes.
First Mode
The DU of the victim base station determines whether to continue to transmit the RIM-RS in accordance with the remote base station interference information. It should be appreciated that, each DU of the victim base station individually determines whether to continue to transmit the RIM-RS.
Second Mode
The CU of the victim base station determines fourth information in accordance with the remote base station interference information, and the fourth information is used to indicate whether to transmit the RIM-RS by the DU of the victim base station. Then, the CU of the victim base station transmits the fourth information to the DU of the victim base station, and the DU of the victim base station determines whether to continue to transmit the RIM-RS in accordance with the fourth information.
According to the processing method in the embodiments of the present disclosure, it is able for the DU of the victim base station to determine whether to continue to transmit the RIM-RS after the victim base station receives the remote base station interference information, thereby to manage the remote base station interference under the CU-DU architecture.
As shown in
In some embodiments of the present disclosure, a time when the aggressor base station starts to detect the RIM-RS from the victim base station is triggered in the following modes.
First Mode
The DU of the aggressor base station determines whether to detect the RIM-RS from the victim base station, and if the DU of the aggressor base station determines to detect the RIM-RS from the victim base station, the DU of the aggressor base station detects the RIM-RS from the victim base station.
Second Mode
The DU of the aggressor base station determines whether an indicator or configuration is received from a network device, and the indicator or configuration is used to indicate whether the DU of the aggressor base station detects the RIM-RS from the victim base station. When the DU of the aggressor base station receives the indicator or configuration, the DU of the aggressor base station detects the RIM-RS from the victim base station. The network device is an OAM.
Third Mode
The DU of the aggressor base station determines whether to receive an indicator or configuration from a CU of the aggressor base station, and when the DU of the aggressor base station receives the indicator or configuration, the DU of the aggressor base station detects the RIM-RS from the victim base station.
In some embodiments of the present disclosure, the indicator or configuration from the CU of the aggressor base station is determined by the CU of the aggressor base station or the other device, and the other device is an OAM. When the indicator or configuration from the CU of the aggressor base station is determined by the CU of the aggressor base station, the CU of the aggressor base station directly transmits the indicator or configuration to one or more DUs of the aggressor base station. When the indicator or configuration from the CU of the aggressor base station is determined by the other device, the other device transmits the indicator or configuration to the one or more DUs of the aggressor base station through the CU of the aggressor base station. It should be appreciated that, the other device notifies the CU of the aggressor base station, and the CU of the aggressor base station selects to trigger one or more DUs of the aggressor base station to detect the RIM-RS from the victim base station.
According to the processing method in the embodiments of the present disclosure, it is able for the DU of the aggressor base station to detect the RIM-RS, thereby to manage the remote base station interference under the CU-DU architecture.
As shown in
Step 1101: determining, by the aggressor base station, a CU of the aggressor base station or a DU of the aggressor base station, a fallback pattern.
In some embodiments of the present disclosure, the fallback pattern is determined in the following modes.
First Mode
The DU of the aggressor base station determines whether it is necessary to perform the fallback processing, and if the DU of the aggressor base station determines to perform the fallback processing, the DU of the aggressor base station determines the fallback pattern. It should be appreciated that, each DU connected to the CU of the aggressor base station individually determines the fallback pattern and performs the fallback processing.
Second Mode
The CU of the aggressor base station receives a fifth message and/or an interference measurement result from the DU of the aggressor base station, and the fifth message is used to indicate that an RIM-RS is received. Then, the CU of the aggressor base station transmits sixth information to the DU of the aggressor base station in accordance with the fifth message and/or the interference measurement result, and the sixth information is used to indicate whether to perform the fallback processing and/or the fallback pattern.
Step 1102: performing the fallback processing in accordance with the determined fallback pattern.
In some embodiments of the present disclosure, the fallback processing is specifically performed in the following modes.
First Mode
When the DU of the aggressor base station determines that it is necessary to perform the fallback processing, the DU of the aggressor base station performs the fallback processing in accordance with the determined fallback pattern.
Second Mode
The DU of the aggressor base station receives the sixth information from the CU of the aggressor base station, and performs the fallback processing in accordance with the sixth information.
According to the processing method in the embodiments of the present disclosure, it is able for the aggressor base station to perform the fallback processing under the CU-DU architecture, thereby to manage the remote base station interference under the CU-DU architecture.
As shown in
In some embodiments of the present disclosure, the remote base station interference information includes one or more of: second information indicating that the aggressor base station detects an RIM-RS from the victim base station; third information indicating that the remote base station interference disappears, the RIM-RS from the victim base station disappears or the aggressor base station fails to detect the RIM-RS from the victim base station; information indicating that the aggressor base station performs interference fallback; and identification information corresponding to the aggressor base station.
The identification information includes one or more of a base station set ID, a base station ID and a cell identifier. For example, the identification information is one or more of Set ID, gNB ID and cell ID.
In some embodiments of the present disclosure, the CU of the aggressor base station transmits the remote base station interference information to the victim base station in the following modes.
First Mode
The CU of the aggressor base station receives the remote base station interference information from the DU of the aggressor base station, and transmits the remote base station interference information to the victim base station. The transmitting, by the CU of the aggressor base station, the remote base station interference information to the victim base station refers to that, the CU does not process the remote base station interference information transmitted by the DU, and transmits all information to the victim base station, where the all information includes the remote base station interference information detected by the DU of the aggressor base station, information about the cell ID and information about the set ID.
Second Mode
The CU of the aggressor base station merges the remote base station interference information from a plurality of DUs of the aggressor base station, and transmits the merged remote base station interference information to the victim base station. The transmitting, by the CU of the aggressor base station, the merged remote base station interference information to the victim base station refers to that, the aggressor base station does not need to transmit all information from the DU to the victim base station, e.g., the remote base station interference information detected by the DU of the aggressor base station, information about the cell ID and information about the set ID, merges information about the same victim base station set from the DU, and only transmits a victim base station set ID and the remote base station interference information, thereby saving signaling overhead. Specifically, for example, a cell of the DU of the aggressor base station detects the remote base station interference information corresponding to the same victim base station set ID, and transmits it to the CU of the aggressor base station, and the CU of the aggressor base station only transmits information including the remote base station interference information and the victim base station set ID.
In some embodiments of the present disclosure, the remote base station interference information is specifically transmitted in the following modes.
First Mode
The CU of the aggressor base station transmits the remote base station interference information to the victim base station through a network element. For example, the CU of the aggressor base station transmits the remote base station interference information to the victim base station directly via an interface between the base stations, or transmits the remote base station interference information to another network element and then the network element transmits the remote base station interference information to the victim base station.
The aggressor base station or the CU of the aggressor base station determines identification information about the victim base station, and transmits the remote base station interference information to the victim base station corresponding to the identification information. The identification information about the victim base station is a base station ID or a cell identifier. For example, the aggressor base station obtains a Tracking Area Identity (TAI), a gNB ID or a cell ID in accordance with a set ID received through the RIM-RS, and transmits information to the victim base station with the gNB ID or the cell ID as a target address.
To be specific, the aggressor base station or the CU of the aggressor base station transmits the remote base station interference information to the victim base station corresponding to the identification information with the identification information about the victim base station as the target address. It should be appreciated that, the CU of the aggressor base station directly transmits the remote base station interference information to the victim base station corresponding to the identification information with the identification information about the victim base station as the target address.
Alternatively, the aggressor base station or the CU of the aggressor base station transmits the remote base station interference information to a core network, and the core network transmits the remote base station interference information to the victim base station corresponding to the identification information with the identification information about the victim base station as the target address.
Second Mode
The aggressor base station or the CU of the aggressor base station transmits the remote base station interference information to the victim base station through the core network. For example, the CU of the aggressor base station at first transmits information about the set ID received through the RIM-RS and information to be transmitted to the victim base station to the core network. Then, the core network merges the information from a plurality of aggressor base stations, obtains the gNB ID or cell ID in accordance with the information about the set ID, and transmits the merged information to the victim base station.
Further, the aggressor base station or the CU of the aggressor base station determines a set ID of the victim base stations, and transmits the set ID and the remote base station interference information to the core network. Then, the core network determines a target victim base station in accordance with the set ID of the victim base stations and transmits the remote base station interference information to the target victim base station, or the core network process the remote base station interference information from a plurality of aggressor base stations and transmits the processed remote base station interference information to the target victim base station.
It should be appreciated that, upon the receipt of the set ID of the victim base stations and the remote base station interference information, the core network determines the target victim base station in accordance with the set ID of the victim base stations, and directly transmits the remote base station interference information to the target victim base station. Alternatively, the core network merges the remote base station interference information from a plurality of aggressor base stations, and transmits the merged remote base station interference information to the target victim base station.
It should be appreciated that, the core network includes one or more network elements. Related information is capable of being forwarded between the network elements, and the related information is forwarded to the first base station through the network element related to the first base station.
It should be appreciated that, the target victim base station includes one or more victim base stations corresponding to the set ID.
According to the processing method in the embodiments of the present disclosure, it is able for the CU of the aggressor base station to transmit the remote base station interference information to the victim base station, thereby to manage the remote base station interference under the CU-DU architecture.
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments a first device. A principle for solving the problem by the first device is similar to that of the processing method mentioned hereinabove, so the implementation of the first device may refer to that of the processing method, which will thus not be particularly defined herein.
As shown in
In a possible embodiment of the present disclosure, the configuration of the RIM-RS resource is associated with the base station set ID.
In a possible embodiment of the present disclosure, the base station set ID and/or the configuration of the RIM-RS resource are preset by the DU of the first device.
In a possible embodiment of the present disclosure, the DU 1301 of the first device is further configured to receive the base station set ID and/or the configuration of the RIM-RS resource from the other device.
In a possible embodiment of the present disclosure, the other device is an OAM.
In a possible embodiment of the present disclosure, a same base station set ID and a same RIM-RS resource, or different base station set IDs and different RIM-RS resources, are configured for different DUs connected to the CU of the first device.
In a possible embodiment of the present disclosure, the base station set ID and/or the configuration of the RIM-RS resource are preset by the CU of the first device.
In a possible embodiment of the present disclosure, the CU 1302 of the first device is further configured to receive the base station set ID and/or the configuration of the RIM-RS resource from the other device, and transmit the base station set ID and/or the configuration of the RIM-RS resource to one or more DUs connected to the CU.
In a possible embodiment of the present disclosure, the CU 1302 of the first device is further configured to, when a remote base station interference occurs, determine the base station set ID and/or the configuration of the RIM-RS resource in accordance with information about the remote base station interference.
In a possible embodiment of the present disclosure, the CU 1302 of the first device is further configured to, when the remote base station interference occurs, receive the information about the remote base station interference from the DU of the first device, enable one or more DUs to form a set in accordance with the information about the remote base station interference, and transmits the base station set ID corresponding to the set and/or the configuration of the RIM-RS resource to the one or more DUs connected to the CU.
The first device in the embodiments of the present disclosure is capable of implementing the method in
According to the first device in the embodiments of the present disclosure, it is able for an aggressor base station or a victim base station to determine the base station set ID and/or the configuration of the RIM-RS resource under the CU-DU architecture, thereby to enable the first device to manage the remote base station interference under the CU-DU architecture.
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments a victim base station. A principle for solving the problem by the victim base station is similar to that of the processing method mentioned hereinabove, so the implementation of the victim base station may refer to that of the processing method, which will thus not be particularly defined herein.
As shown in
In a possible embodiment of the present disclosure, the DU 1401 of the victim base station is further configured to, when the remote interference is detected, determine whether to transmit the RIM-RS.
In a possible embodiment of the present disclosure, the DU 1401 of the victim base station is further configured to: when the remote interference is detected, transmit information indicating that the DU is subjected to the remote base station interference to the CU of the victim base station; receive first information from the CU of the victim base station, the first information being used to indicate whether to transmit the RIM-RS by the DU of the victim base station; and determine whether to transmit the RIM-RS in accordance with the first information.
The victim base station in the embodiments of the present disclosure is capable of implementing the method in
According to the victim base station in the embodiments of the present disclosure, it is able for the DU of the victim base station to transmit the RIM-RS when the remote interference is detected, thereby to enable the victim base station to manage the remote base station interference under the CU-DU architecture.
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments a victim base station. A principle for solving the problem by the victim base station is similar to that of the processing method mentioned hereinabove, so the implementation of the victim base station may refer to that of the processing method, which will thus not be particularly defined herein.
As shown in
In a possible embodiment of the present disclosure, the remote base station interference information includes one or more of: second information indicating that the aggressor base station detects an RIM-RS from the victim base station; third information indicating that the remote base station interference disappears, the RIM-RS from the victim base station disappears or the aggressor base station fails to detect the RIM-RS from the victim base station; information indicating that the aggressor base station performs interference fallback; and identification information corresponding to the aggressor base station.
In a possible embodiment of the present disclosure, the identification information includes one or more of a base station set ID, a base station ID and a cell ID.
The victim base station in the embodiments of the present disclosure is capable of implementing the method in
According to the victim base station in the embodiments of the present disclosure, it is able for the CU or DU of the victim base station to receive the remote base station interference information from the aggressor base station, thereby to enable the victim base station to manage the remote base station interference under the CU-DU architecture.
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments a victim base station. A principle for solving the problem by the victim base station is similar to that of the processing method mentioned hereinabove, so the implementation of the victim base station may refer to that of the processing method, which will thus not be particularly defined herein.
As shown in
In a possible embodiment of the present disclosure, the DU 1401 of the victim base station is further configured to determine whether to continue to transmit an RIM-RS in accordance with the remote base station interference information.
In a possible embodiment of the present disclosure, the CU 1402 of the victim base station is further configured to: determine fourth information in accordance with the remote base station interference information, the fourth information being used to indicate whether to transmit the RIM-RS by the DU of the victim base station; and transmit the fourth information to the DU of the victim base station. The DU 1401 of the victim base station is further configured to determine whether to continue to transmit the RIM-RS in accordance with the fourth information.
The victim base station in the embodiments of the present disclosure is capable of implementing the method in
According to the victim base station in the embodiments of the present disclosure, it is able for the DU of the victim base station to determine whether to continue to transmit the RIM-RS after the victim base station receives the remote base station interference information, thereby to enable the victim base station to manage the remote base station interference under the CU-DU architecture.
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments an aggressor base station. A principle for solving the problem by the aggressor base station is similar to that of the processing method mentioned hereinabove, so the implementation of the aggressor base station may refer to that of the processing method, which will thus not be particularly defined herein.
As shown in
In a possible embodiment of the present disclosure, the DU 1501 of the aggressor base station is further configured to determine whether to detect the RIM-RS from the victim base station, and detect the RIM-RS from the victim base station if the DU 1501 of the aggressor base station determines to detect the RIM-RS from the victim base station.
In a possible embodiment of the present disclosure, the DU 1501 of the aggressor base station is further configured to: determine whether an indicator or configuration is received from a network device, the indicator or configuration being used to indicate whether to detect the RIM-RS from the victim base station by the DU of the aggressor base station; and when the indicator or configuration is received, detect the RIM-RS from the victim base station.
In a possible embodiment of the present disclosure, the network device is an OAM.
In a possible embodiment of the present disclosure, the DU 1501 of the aggressor base station is further configured to: determine whether to receive an indicator or configuration from the CU of the aggressor base station; and when the indicator or configuration is received, detect the RIM-RS from the victim base station.
The aggressor base station in the embodiments of the present disclosure is capable of implementing the method in
According to the aggressor base station in the embodiments of the present disclosure, it is able for the DU of the aggressor base station to detect the RIM-RS, thereby to enable the aggressor base station to manage the remote base station interference under the CU-DU architecture.
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments an aggressor base station. A principle for solving the problem by the aggressor base station is similar to that of the processing method mentioned hereinabove, so the implementation of the aggressor base station may refer to that of the processing method, which will thus not be particularly defined herein.
As shown in
In a possible embodiment of the present disclosure, the DU 1501 of the aggressor base station is further configured to: determine whether it is necessary to perform fallback processing; when it is necessary to perform the fallback processing, determine a fallback pattern; and perform the fallback processing in accordance with the determined fallback pattern.
In a possible embodiment of the present disclosure, the CU 1502 of the aggressor base station is further configured to: receive a first message and/or an interference measurement result from the DU of the aggressor base station, where the fifth message is used to indicate that the RIM-RS is received from the victim base station; and transmit sixth information to the DU of the aggressor base station in accordance with the fifth message and/or the interference measurement result, where the sixth information is used to indicate whether to perform the fallback processing and/or the fallback pattern.
In a possible embodiment of the present disclosure, the DU 1501 of the aggressor base station is further configured to receive the sixth information from the CU of the aggressor base station, and perform the fallback processing in accordance with the sixth information.
The aggressor base station in the embodiments of the present disclosure is capable of implementing the method in
According to the aggressor base station in the embodiments of the present disclosure, it is able for the aggressor base station to perform the fallback processing under the CU-DU architecture, thereby to enable the aggressor base station to manage the remote base station interference under the CU-DU architecture.
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments an aggressor base station. A principle for solving the problem by the aggressor base station is similar to that of the processing method mentioned hereinabove, so the implementation of the aggressor base station may refer to that of the processing method, which will thus not be particularly defined herein.
Referring to
In a possible embodiment of the present disclosure, the remote base station interference information includes one or more of: second information indicating that the aggressor base station detects an RIM-RS from the victim base station; third information indicating that the remote base station interference disappears, the RIM-RS from the victim base station disappears or the aggressor base station fails to detect the RIM-RS from the victim base station; information indicating that the aggressor base station performs interference fallback; and identification information corresponding to the aggressor base station.
In a possible embodiment of the present disclosure, the identification information includes one or more of a base station set ID, a base station ID and a cell ID.
In a possible embodiment of the present disclosure, the CU 1502 of the aggressor base station is further configured to determine identification information about the victim base station, and transmit the remote base station interference information to the victim base station corresponding to the identification information.
In a possible embodiment of the present disclosure, the CU 1502 of the aggressor base station is further configured to: transmit the remote base station interference information to the victim base station corresponding to the identification information with the identification information about the victim base station as a target address; or transmit the remote base station interference information to a core network, so that the core network transmits the remote base station interference information to the victim base station corresponding to the identification information with the identification information about the victim base station as the target address.
In a possible embodiment of the present disclosure, the CU 1502 of the aggressor base station is further configured to: receive the remote base station interference information from the DU of the aggressor base station; and transmit the remote base station interference information to the victim base station.
In a possible embodiment of the present disclosure, the CU 1502 of the aggressor base station is further configured to: merge the remote base station interference information from a plurality of DUs of the aggressor base station; and transmit the merged remote base station interference information to the victim base station.
In a possible embodiment of the present disclosure, the CU 1502 of the aggressor base station is further configured to transmit the remote base station interference information to the victim base station through a network element.
In a possible embodiment of the present disclosure, the CU 1502 of the aggressor base station is further configured to transmit the remote base station interference information to the victim base station through a core network.
In a possible embodiment of the present disclosure, the CU 1502 of the aggressor base station is further configured to: determine a set ID of victim base stations; and transmit the set ID of the victim base stations and the remote base station interference information to the core network, so that the core network determines a target victim base station in accordance with the set ID of the victim base stations and transmits the remote base station interference information to the target victim base station, or processes the remote base station interference information from a plurality of aggressor base stations and transmits the processed remote base station interference information to the target victim base station. The aggressor base station in the embodiments of the present disclosure is capable of implementing the method in
According to the aggressor base station in the embodiments of the present disclosure, it is able for the CU of the aggressor base station to transmit the remote base station interference information to the victim base station, thereby to enable the first device to manage the remote base station interference under the CU-DU architecture.
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments a first device. A principle for solving the problem by the first device is similar to that of the processing method mentioned hereinabove, so the implementation of the first device may refer to that of the processing method, which will thus not be particularly defined herein.
As shown in
In some embodiments of the present disclosure, the victim base station 1600 further includes a program stored in the memory 1603 and executed by the processor 1601. The program is executed by the processor 1601 so as to implement the steps of the above-mentioned methods.
In
In order to manage the remote base station interference under the CU-DU architecture, the present disclosure further provides in some embodiments a victim base station. A principle for solving the problem by the victim base station is similar to that of the processing method mentioned hereinabove, so the implementation of the victim base station may refer to that of the processing method, which will thus not be particularly defined herein.
As shown in
In some embodiments of the present disclosure, the victim base station 1700 further includes a program stored in the memory 1703 and executed by the processor 1701. The program is executed by the processor 1701 so as to implement the steps of the above-mentioned methods.
In
The steps of the methods or algorithm described in conjunction with the contents mentioned hereinabove may be implemented through hardware, or implemented by a processor executing instructions. The instructions may consist of corresponding modules stored in a Random Access Memory (RAM), a flash memory, a Read-Only Memory (ROM), an Electrically Programmable ROM (EPROM), an Erasable EPROM (EEPROM), a register, a hard disk, a mobile hard disk, a read-only optic disk, or any other known storage medium. Illustratively, the storage medium may be connected to the processor, so that the processor is capable of reading information from the storage medium and writing information into the storage medium. Of course, the storage medium may be a component of the processor. The processor and the storage medium may be located in an Application Specific Integrated Circuit (ASIC). In addition, the ASIC may be located in an interface device of a core network. Of course, the processor and the storage medium may be located in the interface device of the core network as discrete assemblies.
It should be appreciated that, the functions described in one or more embodiments of the present disclosure may be achieved through hardware, software, firmware or a combination thereof. When the functions are achieved through software, these functions may be stored in the computer-readable medium or transmitted as one or more instructions or codes on the computer-readable medium. The computer-readable medium may include a computer-readable storage medium and a communication medium. The communication medium may include any medium capable of transmitting a computer program from one place to another place. The storage medium may include any available medium capable of being accessed by a general-purpose or dedicated computer.
It should be appreciated that, the embodiments of the present disclosure may be implemented by hardware, software, firmware, middleware, microcode or a combination thereof. For the hardware implementation, the processor may include one or more of an ASIC, a digital signal processor (Digital Signal Processor, DSP), a DSP device (DSPD), a programmable logic device (Programmable Logic Device, PLD), a Field-Programmable Gate Array (FPGA), a general-purpose processor, a controller, a microcontroller, a microprocessor, any other electronic unit capable of achieving the functions in the present disclosure, or a combination thereof.
Hence, the purposes of the present disclosure may also be implemented by one program or a set of programs running on any computing device, e.g., a known general-purpose computer, or implemented merely by a program product including programs codes capable of implementing the method or device. In other words, this program product and a storage medium storing therein the program product also constitute a part of the present disclosure. Obviously, the storage medium may be any known storage medium or a storage medium that may occur in future. It should be further appreciated that, according to the device and the method in the embodiments of the present disclosure, the members and/or steps may be subdivided and/or recombined, which shall also be deemed as equivalents of the present disclosure. In addition, the steps for executing the above-mentioned processings may be performed in a chronological order. Of course, some steps may also be performed in parallel, or independently of each other.
The objects, the technical solutions and the beneficial effects of the present disclosure have been described hereinabove in details. It should be appreciated that, the above description may be for illustrative purposes only, but shall not be used to limit the scope of the present disclosure. Any modifications, equivalents or improvements shall also fall within the scope of the present disclosure.
It should be appreciated that, the present disclosure may be provided as a method, a system or a computer program product, so the present disclosure may be in the form of full hardware embodiments, full software embodiments, or combinations thereof. In addition, the present disclosure may be in the form of a computer program product implemented on one or more computer-readable storage mediums (including but not limited to disk memory, compact disc-read only memory (Compact Disc-Read Only Memory, CD-ROM) and optical memory) including computer-readable program codes.
The present disclosure has been described with reference to the flow charts and/or block diagrams of the method, device (system) and computer program product according to the embodiments of the present disclosure. It should be understood that computer program instructions may be used to implement each of the work flows and/or blocks in the flow charts and/or the block diagrams, and the combination of the work flows and/or blocks in the flow charts and/or the block diagrams. These computer program instructions may be provided to a processor of a common computer, a dedicated computer, an embedded processor or any other programmable data processing devices to create a machine, so that instructions capable of being executed by the processor of the computer or the other programmable data processing devices may create a device to achieve the functions assigned in one or more work flows in the flow chart and/or one or more blocks in the block diagram.
These computer program instructions may also be stored in a computer readable storage that may guide the computer or the other programmable data process devices to function in a certain way, so that the instructions stored in the computer readable storage may create a product including an instruction unit which achieves the functions assigned in one or more flows in the flow chart and/or one or more blocks in the block diagram.
These computer program instructions may also be loaded in the computer or the other programmable data process devices, so that a series of operation steps are executed on the computer or the other programmable devices to create processes achieved by the computer. Therefore, the instructions executed in the computer or the other programmable devices provide the steps for achieving the function assigned in one or more flows in the flow chart and/or one or more blocks in the block diagram.
The above embodiments are for illustrative purposes only, but the present disclosure is not limited thereto. Obviously, a person skilled in the art may make further modifications and improvements without departing from the spirit of the present disclosure, and these modifications and improvements shall also fall within the scope of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
201910244355.8 | Mar 2019 | CN | national |
This application is a U.S. national phase application of a PCT Application No. PCT/CN2020/081731 filed on Mar. 27, 2020, which claims a priority of the Chinese patent application No. 201910244355.8 filed on Mar. 28, 2019, the disclosures of which are incorporated herein by reference in their entireties.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2020/081731 | 3/27/2020 | WO | 00 |