Aspects of the present disclosure relate to wireless communications, and more particularly, to ensuring radio frequency (RF) exposure compliance among radios operating in a wireless communication device.
Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, broadcasts, etc. Modern wireless communication devices (such as cellular telephones) are generally mandated to meet radio frequency (RF) exposure limits set by certain governments and international standards and regulations. To ensure compliance with the standards, such devices currently undergo an extensive certification process prior to being shipped to market. To ensure that a wireless communication device complies with an RF exposure limit, techniques have been developed to enable the wireless communication device to assess RF exposure from the wireless communication device and adjust the transmission power of the wireless communication device accordingly to comply with the RF exposure limit.
The systems, methods, and devices of the disclosure each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this disclosure as expressed by the claims which follow, some features will now be discussed briefly. After considering this discussion, and particularly after reading the section entitled “Detailed Description,” one will understand how the features of this disclosure provide advantages that include maintaining radio frequency (RF) exposure compliance during and following transitions among RF exposure control schemes.
Certain aspects of the subject matter described in this disclosure can be implemented in a method for wireless communication performed by a wireless device. The method generally includes: when a first RF exposure control scheme of the wireless device is in an online state, controlling, via the first RF exposure control scheme, at least one of (i) one or more first radios associated with a first radio access technology (RAT) or (ii) one or more second radios associated with a second RAT, in compliance with an RF exposure limit and based on at least one of first RF exposure information associated with the one or more first radios or second RF exposure information associated with the one or more second radios; and when the first RF exposure control scheme is unavailable, controlling, via a second RF exposure control scheme, the one or more second radios associated with the second RAT in compliance with the RF exposure limit and based on third RF exposure information associated with the one or more second radios.
Certain aspects of the subject matter described in this disclosure can be implemented in an apparatus for wireless communication. The apparatus generally includes one or more memories collectively storing executable instructions and one or more processors coupled to the one or more memories. The one or more processors are collectively configured to execute the executable instructions to cause the apparatus to: control, via a first RF exposure control scheme of the apparatus when the first RF exposure control scheme is in an online state, at least one of (i) one or more first radios associated with a first RAT or (ii) one or more second radios associated with a second RAT, in compliance with an RF exposure limit and based on at least one of first RF exposure information associated with the one or more first radios or second RF exposure information associated with the one or more second radios; and control, via a second RF exposure control scheme when the first RF exposure control scheme is unavailable, the one or more second radios associated with the second RAT in compliance with the RF exposure limit and based on third RF exposure information associated with the one or more second radios.
Certain aspects of the subject matter described in this disclosure can be implemented in an apparatus for wireless communication. The apparatus generally includes: first means for controlling, when the first means for controlling is in an online state, at least one of (i) one or more first radios associated with a first RAT or (ii) one or more second radios associated with a second RAT, in compliance with an RF exposure limit and based on at least one of first RF exposure information associated with the one or more first radios or second RF exposure information associated with the one or more second radios; and second means for controlling, when the first means for controlling is unavailable, the one or more second radios associated with the second RAT in compliance with the RF exposure limit and based on third RF exposure information associated with the one or more second radios.
Certain aspects of the subject matter described in this disclosure can be implemented in a computer-readable medium for wireless communication performed by a wireless device. The computer-readable medium generally includes computer-executable instructions that, when executed by one or more processors, cause the one or more processors to: control, via a first RF exposure control scheme of the wireless device when the first RF exposure control scheme is in an online state, at least one of (i) one or more first radios associated with a first RAT or (ii) one or more second radios associated with a second RAT, in compliance with an RF exposure limit and based on at least one of first RF exposure information associated with the one or more first radios or second RF exposure information associated with the one or more second radios; and control, via a second RF exposure control scheme when the first RF exposure control scheme is unavailable, the one or more second radios associated with the second RAT in compliance with the RF exposure limit and based on third RF exposure information associated with the one or more second radios.
Other aspects provide: an apparatus operable, configured, or otherwise adapted to perform any one or more of the aforementioned methods and/or those described elsewhere herein; a non-transitory, computer-readable medium comprising instructions that, when executed by a processor of an apparatus, cause the apparatus to perform the aforementioned methods as well as those described elsewhere herein; a computer program product embodied on a computer-readable storage medium comprising code for performing the aforementioned methods as well as those described elsewhere herein; and/or an apparatus comprising means for performing the aforementioned methods as well as those described elsewhere herein. By way of example, an apparatus may comprise a processing system, a device with a processing system, or processing systems cooperating over one or more networks.
To the accomplishment of the foregoing and related ends, the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the appended drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed.
So that the manner in which the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to aspects, some of which are illustrated in the drawings. It is to be noted, however, that the appended drawings illustrate only certain typical aspects of this disclosure and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures. It is contemplated that elements disclosed in one aspect may be beneficially utilized on other aspects without specific recitation.
Certain aspects of the present disclosure provide apparatus, methods, processing systems, and computer-readable mediums for optimizing (or at least improving) communication performance of a multi-tech/multi-band wireless communication device while ensuring radio frequency (RF) compliance among radios of the device.
For example, a wireless communication device may include one or more radios (implemented on one or more chipsets) that support multiple radio access technologies (RATs), such as Fifth Generation (5G) New Radio (NR), Evolved Universal Terrestrial Radio Access (e.g., a Fourth Generation (4G) RAT), Universal Mobile Telecommunications System (UMTS) and/or code division multiple access (CDMA) (e.g., a Second Generation (2G)/Third Generation (3G) RAT), Institute of Electrical and Electronics Engineers (IEEE) 802.11 (e.g., WiFi), Bluetooth access technologies, non-terrestrial (e.g., satellite) communications, peer-to-peer (P2P) or device-to-device (D2D) communications, vehicle-to-everything (V2X) communications, and/or other communications. In an illustrative, non-limiting example, the wireless communication device may include a wireless wide area network (WWAN) radio (or chipset) that supports WWAN RAT(s) (e.g., 5G NR, Evolved Universal Terrestrial Radio Access (E-UTRA), UMTS, CDMA, etc.), a wireless local area network (WLAN) radio (or chipset) that supports WLAN RAT(s) (e.g., IEEE 802.11 or WiFi), a Bluetooth radio (or chipset) that supports Bluetooth access technologies, a radio (or chipset) that supports non-terrestrial communications (e.g., satellite communications), or a combination thereof. A chipset may include one or more types of radios.
Additionally, certain wireless communication devices may have multiple RF exposure control schemes, where each RF exposure control scheme may manage the RF exposure for one or more radios. However, one issue with wireless communication devices with multiple radios is that, when a wireless communication device transitions from radios that are controlled by different RF exposure control schemes, the RF exposure may be in non-compliance of an RF exposure limit for a short duration (e.g., less than a time window associated with a time-averaged RF exposure limit).
Accordingly, certain aspects of the present disclosure provide apparatus and methods for ensuring RF exposure compliance (e.g., total time-averaged RF exposure compliance) among radios (e.g., WWAN, WLAN, Bluetooth, etc.) in a wireless communication device. In certain aspects described below, a wireless communication device may use a primary RF exposure control scheme to manage RF exposure of a first set of radios (e.g., a WWAN radio and a WLAN/Bluetooth radio) in compliance with an RF exposure limit when the primary RF exposure control scheme is active, and may use a secondary RF exposure control scheme to manage RF exposure of a subset of the first set of radios (e.g., the WLAN/Bluetooth radio) when the primary RF exposure control scheme is offline (or inactive/unavailable).
Additionally, in certain aspects, the wireless communication device described herein may use an applications processor (or, in general, any storage or processor separate from the primary RF exposure control scheme) as an intermediate stage (i.e., an intermediary) between different radios, such as the WWAN radio and the WLAN/Bluetooth radio, to store RF exposure information for one or more of the radios. Such RF exposure information may include RF exposure reports/limits, on-off information of radios operating across the chipset(s) (including sleep/wakeup cycles), and other configuration parameters, as illustrative, non-limiting examples.
By using storage or a processor external to the primary RF exposure control scheme (e.g., the applications processor) as an intermediate stage to store RF exposure information for one or more radios (or chipsets), certain aspects of the present disclosure can enable the wireless communication device to maintain RF compliance when transitioning between RF exposure control schemes. For example, the external storage/processor can store the past RF exposure information from radios associated with the secondary RF exposure control scheme for a duration of time that the primary RF exposure control scheme was offline (or inactive/unavailable). When the primary RF exposure control scheme transitions from being unavailable (e.g., from an offline state) to an online state, the primary RF exposure control scheme may obtain the past RF exposure information from the external storage/processor and use the past RF exposure information to maintain RF compliance across the active radios with an RF exposure limit. For example, the primary RF exposure control scheme may provide exposure limits to each of the active radios for a future time interval, such that the RF compliance (e.g., total time-averaged exposure) is maintained across all radios.
Additionally, in certain aspects, the wireless communication device may control the transmission power level(s) of active radio(s) using various techniques described herein in order to maintain RF compliance across the radios.
For example, when the primary RF exposure control scheme is in the online state, the wireless communication device may control the transmission power level(s) of the active radios via the primary RF exposure control scheme. Such active radios can include radios from one or more chipsets, including one or more WWAN radios (or a WWAN chipset), one or more WLAN radios (or a WLAN chipset), and one or more Bluetooth radios (or a Bluetooth chipset), as illustrative, non-limiting examples. If certain active radios (e.g., the WLAN/Bluetooth radio) have not received a transmission power level target from the primary RF exposure control scheme for a predetermined period of time (e.g., 5 seconds or some other amount of time), then the wireless communication device may control the transmission power level(s) of these active radios based on a previously granted reserve level (from the primary RF exposure control scheme) for a predetermined duration and, after the predetermined duration, may control the transmission power level(s) of these active radios based on a preconfigured transition reserve level. The transition reserve level may be lower than the granted reserve level.
In some cases, the primary RF exposure control scheme may not receive RF exposure information from certain radios (e.g., the WLAN/Bluetooth radio), since different radios may go through different sleep cycles. In such cases, the primary RF exposure control scheme may assume that these radios have transmitted at an allocated RF exposure limit (instead of a zero RF exposure limit). That is, the primary RF exposure control scheme may treat missed reports from WLAN/Bluetooth radios as transmitted exposure history so that the RF exposure margin is not allocated to other radios (e.g., WWAN). In this manner, the wireless communication device can avoid the same RF exposure margin being used by two different radios, which can result in non-compliance with an RF exposure limit and/or radio link failures. In certain aspects, after the primary RF exposure control scheme receives actual RF exposure reports associated with these radios (e.g., from the applications processor), the primary RF exposure control scheme may replace the missed reports in the exposure history with the actual RF exposure reports to avoid operating at a lower performance (e.g., since the missed reports may assume the worst-case scenario of the entire exposure budget being utilized by the WLAN/Bluetooth radios).
When the primary RF exposure control scheme is unavailable (e.g., in the offline state), the wireless communication device may control the transmission power level(s) of the active radios based on the preconfigured transition reserve level for a single time window of the primary RF exposure control scheme, and, after the time window has elapsed, control the transmission power level(s) of the active radios via the secondary RF exposure control scheme. In this manner, certain aspects described herein may enable the wireless communication device to avoid temporal non-compliance with an RF exposure limit when transitioning between radios that are controlled by different RF exposure control schemes.
Note, in certain aspects described herein, certain types of radios, such as Bluetooth, may be controlled to operate at fixed transmission power levels in order to have consistent performance for applications (e.g., audio), compared to other types of radios, such as WWAN/WLAN radios.
The apparatus and methods for ensuring RF exposure compliance described herein may facilitate improved wireless communication performance, such as reduced latencies, increased data rates, improved signal qualities (e.g., at a cell's edge), and/or increased range of communications, for example, due to the transmit powers allowed for the various radios.
Further, one potential drawback with using an external storage/processor (e.g., the applications processor) as an intermediate stage among one or more modems/radios/chipsets is that waking up the external storage/processor can consume a significant amount of battery power. That is, external storage/processor wakeups may be significant battery consumption events as each wakeup may last for couple hundreds of milliseconds. Accordingly, it may be desirable to provide techniques for optimizing, or at least decreasing, the battery power consumption when using an external storage/processor to ensure RF compliance among radios in a wireless communication device.
As used herein, a radio may refer to a physical or logical transmission path associated with one or more frequency bands (carriers, channels, bandwidths, subdivisions thereof, etc.), transceivers, and/or RATs (e.g., wireless wide area network (WWAN) (such as CDMA, Long-Term Evolution (LTE), NR, etc.), wireless local area network (WLAN) (such as IEEE 802.11), short-range communications (such as Bluetooth), non-terrestrial communications, device-to-device (D2D) communications, vehicle-to-everything (V2X) communications, etc.) used for wireless communications. For example, for uplink carrier aggregation (or multi-connectivity) in WWAN communications, each of the active component carriers used for wireless communications may be treated as a separate radio. Similarly, multi-band transmissions for WLAN communications may be treated as separate radios for each band (e.g., 2.4 GHz, 5 GHZ, or 6 GHZ). As used herein, an RF exposure control scheme may refer to an RF exposure manager.
Note while certain aspects described herein may refer to radios operating across different chipsets, some aspects of the present disclosure may also be applied to other configurations in which two or more radios may be combined on the same chipset (e.g., WWAN/WLAN on the same chip) or various groupings of radios across chips. Similarly, while certain aspects described herein may refer to storage associated with an applications processor being used to store various RF exposure information, in general, any storage or processor that is external to the primary RF exposure control scheme (or more specifically, external to the integrated circuit configured to implement the primary RF exposure control scheme) may be used to store various RF exposure information described herein.
The following description provides examples of RF exposure compliance in communication systems, and is not limiting of the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as appropriate. For instance, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Also, features described with respect to some examples may be combined in some other examples. For example, an apparatus may be implemented or a method may be practiced using any number of the aspects set forth herein. In addition, the scope of the disclosure is intended to cover such an apparatus or method which is practiced using other structure, functionality, or structure and functionality in addition to, or other than, the various aspects of the disclosure set forth herein. It should be understood that any aspect of the disclosure disclosed herein may be embodied by one or more elements of a claim. The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any aspect described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects.
In general, any number of wireless networks may be deployed in a given geographic area. Each wireless network may support a particular RAT and may operate on one or more frequencies. A RAT may also be referred to as a radio technology, an air interface, etc. A frequency may also be referred to as a carrier, a subcarrier, a frequency channel, a tone, a subband, etc. Each frequency may support a single RAT in a given geographic area in order to avoid interference between wireless networks of different RATs, or may support multiple RATs.
The techniques described herein may be used for various wireless networks and radio technologies. While aspects may be described herein using terminology commonly associated with 3G, 4G, and/or new radio (e.g., 5G NR) wireless technologies, aspects of the present disclosure can be applied in other generation-based communication systems and/or to wireless technologies such as 802.11, 802.15, etc.
NR access may support various wireless communication services, such as enhanced mobile broadband (eMBB) targeting wide bandwidth (e.g., 80 MHz or beyond), millimeter wave (mmWave) targeting high carrier frequency (e.g., 24 GHz to 53 GHz or beyond), massive machine type communications MTC (mMTC) targeting non-backward compatible MTC techniques, and/or mission critical targeting ultra-reliable low-latency communications (URLLC). These services may include latency and reliability demands. These services may also have different transmission time intervals (TTIs) to meet respective quality of service (QOS) specifications. In addition, these services may co-exist in the same subframe.
The electromagnetic spectrum is often subdivided, based on frequency/wavelength, into various classes, bands, channels, etc. In 5G NR, two initial operating bands have been identified as frequency range designations FR1 (410 MHZ-7.125 GHz) and FR2 (24.25 GHz-52.6 GHz). The frequencies between FR1 and FR2 are often referred to as mid-band frequencies. Although a portion of FR1 is greater than 6 GHz, FR1 is often referred to (interchangeably) as a “Sub-6 GHz” band in various documents and articles. A similar nomenclature issue sometimes occurs with regard to FR2, which is often referred to (interchangeably) as a “millimeter wave” band in documents and articles, despite being different from the extremely high frequency (EHF) band (30 GHz-300 GHz) which is identified by the International Telecommunications Union (ITU) as a “millimeter wave” band.
With the above aspects in mind, unless specifically stated otherwise, it should be understood that the term “sub-6 GHz” or the like if used herein may broadly represent frequencies that may be less than 6 GHZ, may be within FR1, or may include mid-band frequencies. Further, unless specifically stated otherwise, it should be understood that the term “millimeter wave” or the like if used herein may broadly represent frequencies that may include mid-band frequencies, may be within FR2, or may be within the EHF band.
NR supports beamforming, and beam direction may be dynamically configured. Multiple-input, multiple-output (MIMO) transmissions with precoding may also be supported, as may multi-layer transmissions. Aggregation of multiple cells may be supported.
As shown in
The wireless communication network 100 may include a number of BSs 110a-110z (each also individually referred to herein as “BS 110” or collectively as “BSs 110”) and other network entities. A BS 110 may provide communication coverage for a particular geographic area, sometimes referred to as a “cell,” which may be stationary or may move according to the location of a mobile BS. In some examples, the BSs 110 may be interconnected to one another and/or to one or more other BSs or network nodes (not shown) in wireless communication network 100 through various types of backhaul interfaces (e.g., a direct physical connection, a wireless connection, a virtual network, or the like) using any suitable transport network. In the example shown in
The BSs 110 communicate with UEs 120a-120y (each also individually referred to herein as “UE 120” or collectively as “UEs 120”) in the wireless communication network 100. The UEs 120 (e.g., 120x, 120y, etc.) may be dispersed throughout the wireless communication network 100, and each UE 120 may be stationary or mobile. Wireless communication network 100 may also include relay stations (e.g., relay station 110r), also referred to as relays or the like, that receive a transmission of data and/or other information from an upstream station (e.g., a BS 110a or a UE 120r) and sends a transmission of the data and/or other information to a downstream station (e.g., a UE 120 or a BS 110), or that relays transmissions between UEs 120, to facilitate communication between devices.
A network controller 130 may be in communication with a set of BSs 110 and provide coordination and control for these BSs 110 (e.g., via a backhaul). In certain cases, the network controller 130 may include a centralized unit (CU) and/or a distributed unit (DU), for example, in a 5G NR system. In some aspects, the network controller 130 may be in communication with a core network 132 (e.g., a 5G Core Network (5GC)), which provides various network functions such as access and mobility management, session management, user plane function, policy control function, authentication server function, unified data management, application function, network exposure function, network repository function, network slice selection function, etc.
At the BS 110a, a transmit processor 220 may receive data from a data source 212 and control information from a controller/processor 240. The control information may be for the physical broadcast channel (PBCH), physical control format indicator channel (PCFICH), physical hybrid automatic repeat request (HARQ) indicator channel (PHICH), physical downlink control channel (PDCCH), group common PDCCH (GC PDCCH), etc. The data may be for the physical downlink shared channel (PDSCH), etc. A medium access control (MAC) control element is a MAC-layer communication structure that may be used for control command exchange between wireless nodes. The MAC control element (MAC-CE) may be carried in a shared channel such as a PDSCH, a physical uplink shared channel (PUSCH), or a physical sidelink shared channel (PSSCH).
The processor 220 may process (e.g., encode and symbol map) the data and control information to obtain data symbols and control symbols, respectively. The transmit processor 220 may also generate reference symbols, such as for the primary synchronization signal (PSS), secondary synchronization signal (SSS), PBCH demodulation reference signal (DMRS), and channel state information reference signal (CSI-RS). A transmit (TX) multiple-input multiple-output (MIMO) processor 230 may perform spatial processing (e.g., precoding) on the data symbols, the control symbols, and/or the reference symbols, if applicable, and may provide output symbol streams to the modulators (MODs) in transceivers 232a-232t. Each modulator in transceivers 232a-232t may process a respective output symbol stream (e.g., for orthogonal frequency division multiplexing (OFDM), etc.) to obtain an output sample stream. Each of the transceivers 232a-232t may further process (e.g., convert to analog, amplify, filter, and upconvert) the output sample stream to obtain a downlink signal. Downlink signals from the transceivers 232a-232t may be transmitted via the antennas 234a-234t, respectively.
At the UE 120a, the antennas 252a-252r may receive the downlink signals from the BS 110a and may provide received signals to the transceivers 254a-254r, respectively. The transceivers 254a-254r may condition (e.g., filter, amplify, downconvert, and digitize) a respective received signal to obtain input samples. Each demodulator (DEMOD) in the transceivers 232a-232t may further process the input samples (e.g., for OFDM, etc.) to obtain received symbols. A MIMO detector 256 may obtain received symbols from all the demodulators in transceivers 254a-254r, perform MIMO detection on the received symbols if applicable, and provide detected symbols. A receive processor 258 may process (e.g., demodulate, deinterleave, and decode) the detected symbols, provide decoded data for the UE 120a to a data sink 260, and provide decoded control information to a controller/processor 280.
On the uplink, at UE 120a, a transmit processor 264 may receive and process data (e.g., for the physical uplink shared channel (PUSCH)) from a data source 262 and control information (e.g., for the physical uplink control channel (PUCCH)) from the controller/processor 280. The transmit processor 264 may also generate reference symbols for a reference signal (e.g., for the sounding reference signal (SRS)). The symbols from the transmit processor 264 may be precoded by a TX MIMO processor 266 if applicable, further processed by the modulators (MODs) in transceivers 254a-254r (e.g., for SC-FDM, etc.), and transmitted to the BS 110a. At the BS 110a, the uplink signals from the UE 120a may be received by the antennas 234, processed by the demodulators in transceivers 232a-232t, detected by a MIMO detector 236 if applicable, and further processed by a receive processor 238 to obtain decoded data and control information sent by the UE 120a. The receive processor 238 may provide the decoded data to a data sink 239 and the decoded control information to the controller/processor 240.
The memories 242 and 282 may store data and program codes for BS 110a and UE 120a, respectively. A scheduler 244 may schedule UEs for data transmission on the downlink and/or uplink.
Antennas 252, processors 266, 258, 264, and/or controller/processor 280 of the UE 120a and/or antennas 234, processors 220, 230, 238, and/or controller/processor 240 of the BS 110a may be used to perform the various techniques and methods described herein. As shown in
While the UE 120a is described with respect to
NR may utilize orthogonal frequency division multiplexing (OFDM) with a cyclic prefix (CP) on the uplink and downlink. NR may support half-duplex operation using time division duplexing (TDD). OFDM and single-carrier frequency division multiplexing (SC-FDM) partition the system bandwidth into multiple orthogonal subcarriers, which are also commonly referred to as tones, bins, etc. Each subcarrier may be modulated with data. Modulation symbols may be sent in the frequency domain with OFDM and in the time domain with SC-FDM. The spacing between adjacent subcarriers may be fixed, and the total number of subcarriers may be dependent on the system bandwidth. The minimum resource allocation, called a resource block (RB), may be 12 consecutive subcarriers. The system bandwidth may also be partitioned into subbands. For example, a subband may cover multiple RBs. NR may support a base subcarrier spacing (SCS) of 15 kHz and other SCSs may be defined with respect to the base SCS (e.g., 30 kHz, 60 kHz, 120 kHz, 240 kHz, etc.).
Receiving in-phase (I) or quadrature (Q) baseband analog signals from a digital-to-analog converter (DAC) 310, the TX path 302 may include a baseband filter (BBF) 312, a mixer 314, a driver amplifier (DA) 316, and a power amplifier (PA) 318. The BBF 312, the mixer 314, and the DA 316 may be included in one or more radio frequency integrated circuits (RFICs). The PA 318 may be external to the RFIC(s) for some implementations.
The BBF 312 filters the baseband signals received from the DAC 310, and the mixer 314 mixes the filtered baseband signals with a transmit local oscillator (LO) signal to convert the baseband signal of interest to a different frequency (e.g., upconvert from baseband to a radio frequency). This frequency-conversion process produces the sum and difference frequencies between the LO frequency and the frequencies of the baseband signal of interest. The sum and difference frequencies are referred to as the “beat frequencies.” The beat frequencies are typically in the RF range, such that the signals output by the mixer 314 are typically RF signals, which may be amplified by the DA 316 and/or by the PA 318 before transmission by the antenna 306. While one mixer 314 is illustrated, several mixers may be used to upconvert the filtered baseband signals to one or more intermediate frequencies and to thereafter upconvert the intermediate frequency signals to a frequency for transmission.
The RX path 304 may include a low noise amplifier (LNA) 324, a mixer 326, and a baseband filter (BBF) 328. The LNA 324, the mixer 326, and the BBF 328 may be included in one or more RFICs, which may or may not be the same RFIC that includes the TX path components. RF signals received via the antenna 306 may be amplified by the LNA 324, and the mixer 326 mixes the amplified RF signals with a receive local oscillator (LO) signal to convert the RF signal of interest to a different baseband frequency (e.g., downconvert). The baseband signals output by the mixer 326 may be filtered by the BBF 328 before being converted by an analog-to-digital converter (ADC) 330 to digital I or Q signals for digital signal processing.
Some systems may employ frequency synthesizers with a voltage-controlled oscillator (VCO) to generate a stable, tunable LO with a particular tuning range. Thus, the transmit LO may be produced by a TX frequency synthesizer 320, which may be buffered or amplified by amplifier 322 before being mixed with the baseband signals in the mixer 314. Similarly, the receive LO may be produced by an RX frequency synthesizer 332, which may be buffered or amplified by amplifier 334 before being mixed with the RF signals in the mixer 326.
A controller 336 may direct the operation of the RF transceiver circuit 300, such as transmitting signals via the TX path 302 and/or receiving signals via the RX path 304. The controller 336 may be a processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device (PLD), discrete gate or transistor logic, discrete hardware components, or any combination thereof. The memory 338 may store data and program codes for operating the RF transceiver circuit 300. The controller 336 and/or memory 338 may include control logic. In certain cases, the controller 336 and/or memory 338 may determine a time-averaged RF exposure based on transmission power levels applied to the TX path 302 (e.g., certain levels of gain applied to the BBF 312, the DA 316, and/or the PA 318) and/or other TX paths (not shown) to set a transmission power level that complies with an RF exposure limit set by domestic/international regulations and/or international standards, as further described herein.
RF exposure may be expressed in terms of a specific absorption rate (SAR), which measures energy absorption by human tissue per unit mass and may have units of watts per kilogram (W/kg). RF exposure may also be expressed in terms of power density (PD), which measures energy absorption per unit area and may have units of milliwatts per square centimeter (mW/cm2). In certain cases, a maximum permissible exposure (MPE) limit in terms of PD may be imposed for wireless communication devices using transmission frequencies above 6 GHz. The MPE limit is a regulatory metric for exposure based on area, e.g., an energy density limit defined as a number, X, watts per square meter (W/m2) averaged over a defined area and time-averaged over a frequency-dependent time window in order to prevent a human exposure hazard represented by a tissue temperature change.
SAR may be used to assess RF exposure for transmission frequencies less than 6 GHz, which cover wireless communication technologies such as 2G/3G (e.g., CDMA), 4G (e.g., LTE), 5G (e.g., NR in 6 GHz bands), IEEE 802.11 (e.g., a/b/g/n/ac), etc. PD may be used to assess RF exposure for transmission frequencies higher than 6 GHz, which cover wireless communication technologies such as IEEE 802.11ad, 802.11ay, 5G in mmWave bands, etc. Note, frequency bands of 24 GHz to 71 GHz are sometimes referred to as a “millimeter wave” (“mmW” or “mmWave”). Thus, different metrics may be used to assess RF exposure for different wireless communication technologies.
A wireless communication device (e.g., UE 120) may simultaneously transmit signals using multiple wireless communication technologies. For example, the wireless communication device may simultaneously transmit signals using a first wireless communication technology operating at or below 6 GHZ (e.g., 3G, 4G, 5G, 802.11a/b/g/n/ac, etc.) and a second wireless communication technology operating above 6 GHz (e.g., mm Wave 5G in 24 to 60 GHz bands, IEEE 802.11ad or 802.11ay). In certain aspects, the wireless communication device may simultaneously transmit signals using the first wireless communication technology (e.g., 3G, 4G, 5G in sub-6 GHz bands, IEEE 802.11ac, etc.) in which RF exposure is measured in terms of SAR, and the second wireless communication technology (e.g., 5G in 24 to 60 GHz bands, IEEE 802.11ad, 802.11ay, etc.) in which RF exposure is measured in terms of PD. As used herein, sub-6 GHz bands may include frequency bands of 300 MHz to 6,000 MHz in some examples, and may include bands in the 6,000 MHz and/or 7,000 MHz range in some examples.
In certain cases, compliance with an RF exposure limit may be performed as a time-averaged RF exposure evaluation within a specified running time window (T) (e.g., 2 seconds for 60 GHz bands, 100 or 360 seconds for bands less than or equal to 6 GHZ, etc.) associated with the RF exposure limit. For example,
In certain cases, the transmit power may be maintained at the maximum time-averaged transmit power level (e.g., Plimit) allowed for RF exposure compliance that enables continuous transmission during the time window. For example,
In some aspects, the UE may transmit at a power that is higher than the average power level Plimit, but less than Pmax in the time-averaged mode illustrated in
In certain aspects, the UE may transmit at a power less than or equal to a fixed power limit (e.g., Plimit) without considering past exposure and/or past transmit powers in terms of a time-averaged RF exposure. For example, the UE may transmit at a power less than or equal to Plimit using a look-up table (comprising one or more values of Plimit depending on the RF exposure scenario). The look-up table may provide one or more values of Plimit depending on the transmit frequency, transmit antenna, radio configuration (single-radio or multi-radio) and/or RF exposure scenario (e.g., a device state index corresponding to head exposure, body or torso exposure, extremity or hand exposure, and/or hotspot exposure) encountered by the UE. Examples of RF exposure scenarios include cases where the UE is emitting RF signals proximate to human tissue, such as a user's head, hand, or body (e.g., torso), or where the UE is being used as a hotspot away from human tissue. Therefore, the RF exposure can be managed as a time-averaged RF exposure evaluation (e.g., illustrated in
While
A wireless communication device may support multiple radio access technologies, such as 5G NR, Evolved Universal Terrestrial Radio Access (e.g., 4G RAT), Universal Mobile Telecommunications System (UMTS) and/or code division multiple access (CDMA) (e.g., 2G/3G RAT), IEEE 802.11, Bluetooth, non-terrestrial communications, D2D communications, V2X communications, and/or other communications. In certain cases, the wireless device may have multiple RF exposure control schemes, where each RF exposure control scheme may manage the RF exposure compliance for one or more radios among the RATs. For example, one RF exposure control scheme may use a time-averaged RF exposure limit and RF exposure tracking over time to ensure RF exposure compliance, whereas another RF exposure control scheme may use fixed transmit power limits, which may depend on an exposure scenario, in a look-up table to ensure RF exposure compliance. In other examples, multiple time-averaged RF exposure schemes may be used. In some examples, two or more of the schemes operate independent of one another. When a wireless device transitions from using one RF exposure control scheme to using another RF exposure control scheme, the time-averaged RF exposure may be in non-compliance for a short duration (e.g., less than a time window associated with a time-averaged RF exposure limit) if the RF exposure control schemes are not in appropriate communication or if a central manager does not appropriately coordinate between the schemes, for example. In certain cases, the wireless device may allocate the full exposure margin to an RF exposure control scheme when only one RF exposure control scheme is active, and the wireless device may reduce the exposure margin when multiple RF exposure control schemes are active. During (and for a period after) transitions between active RF exposure control schemes, the RF exposure may not be compliance with an RF exposure limit. An RF exposure control scheme may refer to a particular scheme for complying with an RF exposure limit, for example, as depicted in
Referring to
The graph 502b depicts the RF exposure margins allocated for each of the RF exposure control schemes in the time windows (T). In this example, the first RF exposure control scheme may operate at up to 80% (0.8) (e.g., a first margin 512a, 512b) of the RF exposure limit when operating alone. The first RF exposure control scheme may not use time averaging, but instead the first RF exposure control scheme may transmit at a transmit power that is less than or equal to a fixed transmit power from a look-up table. The second RF exposure control scheme may use time averaging, and the second RF exposure control scheme may operate at 80% of the RF exposure limit (corresponding to Plimit), out of which 40% (e.g., a base reserve 514) is utilized for controlled exposure for the entire time window (e.g., corresponding to Preserve), and burst transmissions or other transmission traffic may utilize the remaining 40% (e.g., a second margin 516) to transmit up to Pmax, when operating alone, for example, as described herein with respect to
The graph 502c depicts the time-averaged normalized exposure 504 over time with respect to the reserves and margins allocated to the RF exposure control schemes as depicted in graph 502b. In this example, the time-averaged normalized exposure 504 exceeds the RF exposure limit 520 at segments 506a, 506b following transitions between the first and second RF exposure control schemes.
The RF exposure non-compliance could get much worse if both radios employ time-averaging RF exposure control schemes.
Referring to
To ensure RF exposure compliance for a transition between active RF exposure control schemes, the wireless device may allocate fixed exposure margins to each of the RF exposure control schemes in advance. For example, the wireless device may allocate a first portion of the total RF exposure margin to a first RF exposure control scheme (e.g., an RF exposure manager for one or more wireless wide area network (WWAN) RATs) and a second portion of the total RF exposure margin to a second RF exposure control scheme (e.g., an RF exposure manager for one or more IEEE 802.11 RATs). Such a scheme may not be efficient, for example, when only one RF exposure control scheme is operating at a time.
As another option, the wireless device may delay transmitting via the radio(s) of the new RF exposure control scheme for a certain duration, such as a time window corresponding to the time-averaged RF exposure limit of the previous RF exposure control scheme. For example, there may be a gap in transmission when transitioning from using one RF exposure control scheme to using another RF exposure control scheme. Another option may include transmitting at a level that is low enough such that compliance is achieved even if the previous scheme(s) had been transmitting at the maximum or using the highest possible burst. Such options, however, may result in an undesirable user experience due to the transmission gap or low transmission power.
As noted, certain wireless communication devices may have to ensure RF exposure compliance among multiple radios in the wireless communication device. In such wireless communication devices, a primary RF exposure control scheme (RFECS1) may be used to control multiple radios associated with multiple RATs (e.g., WWAN, WLAN, Bluetooth, and satellite) when the primary RF exposure control scheme is online, and a secondary RF exposure control scheme (RFECS2) may be used to control a subset of the multiple radios (e.g., WLAN/Bluetooth) when the primary RF exposure control scheme is offline or otherwise unavailable. However, as noted, transitioning between radios controlled by different RF exposure control schemes may result in temporal non-compliance with an RF exposure limit, such as a total time-averaged RF exposure limit.
Certain aspects of the present disclosure provide various techniques for ensuring RF exposure compliance among radios in a wireless communication device. In particular, certain aspects may enable the wireless communication device to use storage associated with an applications processor (within the wireless communication device) as an intermediate stage between different radios to store various RF exposure information (e.g., RF exposure reports/limits, on-off status of WLAN/Bluetooth radios, and other configuration parameters).
Consider an example architecture 700 illustrated in
Here, the primary RF exposure control scheme 702 and each of the active radio/radio-specific sub-algorithms (e.g., sub-6 GHZ WWAN, mmW WWAN, WLAN, Bluetooth, satellite, or a combination thereof) may exchange RF exposure information across a communication interface, such as a bus interface. For example, each of the active radios/radio-specific sub-algorithms may send RF exposure information, which includes the radio's RF exposure usage (e.g., transmitted transmission power and transmission power limit), for each time interval to the primary RF exposure control scheme 702. Similarly, the primary RF exposure control scheme 702 may send RF exposure information to each of the active radios/radio-specific sub-algorithms, based on the RF exposure information received from the active radio(s)/radio-specific sub-algorithm(s). In certain aspects, the RF exposure information that is sent to a given radio/radio-specific sub-algorithm each time interval may include an RF exposure limit for the radio for a future time interval, a granted reserve level (or control level) associated with the RF exposure limit for the radio, or a combination thereof.
As shown in
Additionally, the primary RF exposure control scheme 702 may interact with the “apps storage” to obtain stored RF exposure information from a subset of the radios/radio-specific sub-algorithms (e.g., WLAN, Bluetooth, or a combination thereof). For example, in
As shown in
Additionally, as shown in
Note that the architecture 700 depicted in
For a Bluetooth radio, when the primary RF exposure control scheme is online, the Bluetooth radio may operate at constant transmission power levels (as opposed to alternating between high transmission power levels and reserve levels), as illustrated by the dotted line 804. The Bluetooth radio may operate at a constant transmission power level to avoid fluctuations in the quality of certain applications (e.g., audio streaming). In certain aspects, the primary RF exposure control scheme may provide the Bluetooth radio with a fixed reserve level (or control level) that changes depending on the number of active radios. For example, when the Bluetooth radio is the standalone radio, then the primary RF exposure control scheme may allocate the Bluetooth radio a “reserve level A=100% of margin,” so that the Bluetooth radio gets a constant margin equal to 100% for each such time interval. In another example, when the Bluetooth radio and one additional radio (e.g., a WWAN radio or a WLAN radio) are active, the primary RF exposure control scheme may allocate the Bluetooth radio a “reserve level B<100% of margin” and allocate the other radio a configured global_reserve (for WWAN and WLAN). When the Bluetooth radio and two other radios are active (e.g., WWAN+WWAN+Bluetooth or WWAN+WLAN+Bluetooth), then the primary RF exposure control scheme may allocate the Bluetooth radio a “reserve level C<reserve level B,” and the other radios may split the configured global_reserve based on a split ratio parameter. Note, the Bluetooth reserve levels A, B, and C, the global_reserve parameter for WWAN/WLAN, and the associated split ratio parameters may be configurable by original equipment manufacturers (OEMs) for each antenna group in accordance with a standard.
When the primary RF exposure control scheme (RFECS1) transitions from an online state to an offline state (e.g., at t2 in
While the primary RF exposure control scheme (RFECS1) is unavailable (e.g., offline), if the WLAN radio/Bluetooth radio transitions from being unavailable (e.g., from the offline state) to the online state, then the WLAN radio/Bluetooth radio may (again) operate at its respective preconfigured transitional reserve level for the predetermined period (e.g., for one time window of the primary RF exposure control scheme). Note that, because the WLAN radio and Bluetooth radio can turn on/off independently, the WLAN radio and Bluetooth radio may operate based on independent times. Thus, while
When the primary RF exposure control scheme (RFECS1) transitions from being unavailable (e.g., from offline) to online (e.g., at t4 in
As noted above, there may be a misalignment in the sleep/wakeup cycles for different chipsets/radios (e.g., WWAN, WLAN, Bluetooth, etc.). Since the primary RF exposure control scheme (in the WWAN modem) and WLAN radio/Bluetooth radio may be in different chipsets, each radio may have different sleep/wakeup cycles. As a result, in certain instances, the RF exposure reporting from WLAN radio/Bluetooth radio to the primary RF exposure control scheme as well as the transmission of RF exposure information from the primary RF exposure control scheme to the WLAN radio/Bluetooth radio may not go through.
To address this, in certain aspects, when the primary RF exposure control scheme (RFECS1) sends RF exposure limit(s) to the WLAN radio/Bluetooth radio at each time interval (e.g., every 0.5 seconds), the primary RF exposure control scheme may also send a granted reserve level (or control level) associated with the RF exposure limit. In this manner, if the WLAN radio/Bluetooth radio does not receive an RF exposure limit from the primary RF exposure control scheme in a first predetermined amount of time (e.g., 0.5 seconds), the WLAN radio/Bluetooth radio may fall back to the granted reserve level for a second predetermined amount of time (e.g., 5 seconds). If the WLAN radio/Bluetooth radio does not receive an RF exposure limit after the second predetermined amount of time has elapsed, then the WLAN radio/Bluetooth radio may assume that the primary RF exposure control scheme has transitioned to the offline state. At this point in time, the WLAN radio/Bluetooth radio may go to a transition period and operate at a preconfigured reserve level for one time window of the primary RF exposure control scheme followed by operation at a transmission level set by a second RF exposure control scheme.
Additionally, as noted, the primary RF exposure control scheme may not receive RF exposure reports from the WLAN radio/Bluetooth radio every time interval (e.g., every 0.5 seconds or less) due to misalignment in sleep/wakeup cycles. In these cases, if the primary RF exposure control scheme does not acknowledge to the WLAN radio/Bluetooth radio that the primary RF exposure control scheme received the WLAN/Bluetooth exposure report every time interval (e.g., every 0.5 seconds or less), then the WLAN radio/Bluetooth radio may keep accumulating the reports (e.g., for a number of time intervals) and keep trying to send the reports to the primary RF exposure control scheme. For example, if the primary RF exposure control scheme has not acknowledged for 2 seconds, the WLAN radio/Bluetooth radio may keep accumulating the past 2 seconds of reports (e.g., the previous four intervals' worth of reports). When the primary RF exposure control scheme does acknowledge, the primary RF exposure control scheme may receive all 2 seconds' worth of the transmitted WLAN/Bluetooth exposure reports.
In another example, if the primary RF exposure control scheme has not acknowledged for more than the stipulated time of the granted reserve (e.g., 5 seconds), then the WLAN radio/Bluetooth radio may store the exposure report history for this amount of time (e.g., 5 seconds) in the “apps storage.” The WLAN radio/Bluetooth radio may then assume that the primary RF exposure control scheme has transitioned to offline state, transmit at the preconfigured transitional reserve level for the predetermined period (e.g., one time window of the primary RF exposure control scheme), and continue storing reports in the “apps storage” every time interval (e.g., 5 seconds) until a new RF exposure limit is received from the primary RF exposure control scheme.
Similarly, in certain aspects, the primary RF exposure control scheme may assume that the WLAN radio/Bluetooth radio has transmitted according to a previously sent RF exposure limit (e.g., 0.5 seconds of RF exposure limit+5 seconds of granted reserve level) for the duration of time the primary RF exposure control scheme did not receive any RF exposure report(s). For example, if the primary RF exposure control scheme did not receive reports for 2 seconds, then the primary RF exposure control scheme may assume that 0.5 seconds of exposure limit and 1.5 seconds of granted reserve level that was last acknowledged by the WLAN radio/Bluetooth radio have been used. Otherwise, in this example, if the primary RF exposure control scheme assumes a zero exposure usage for the WLAN radio/Bluetooth radio for the past 2 seconds, then the primary RF exposure control scheme may allocate the 2 seconds' worth of exposure margin to the active WWAN radio, resulting in a potential over-usage of RF exposure as both WWAN and WLAN/Bluetooth may be unknowingly using the same budget. In such a case, by the time the primary RF exposure control scheme does receive the 2 seconds' worth of exposure reports from the WLAN radio/Bluetooth radio, as well as the WWAN exposure report, the primary RF exposure control scheme may be in non-compliance of an RF exposure limit, which may result in a device crash and/or a drop of one or more radio links.
The operations 900 may optionally begin, at block 902, where, when a first RF exposure control scheme (e.g., primary RF exposure control scheme) of the wireless device is in an online state, the wireless device controls, via the first RF exposure control scheme, at least one of (i) one or more first radios associated with a first radio access technology (RAT) (e.g., a WWAN radio) or (ii) one or more second radios associated with a second RAT (e.g., a WLAN radio, a Bluetooth radio, or a combination thereof), in compliance with an RF exposure limit (e.g., total time-averaged RF exposure limit) and based on at least one of (a) first RF exposure information associated with the one or more first radios or (b) second RF exposure information associated with the one or more second radios. In certain aspects, the first RF exposure information may be obtained from the one or more first radios. The second RF exposure information may be obtained from the one or more second radios.
At block 904, when the first RF exposure control scheme is unavailable (e.g., in an offline state or a sleep cycle, such as a deep or frequent sleep cycle), the wireless device controls, via a second RF exposure control scheme (e.g., secondary RF exposure control scheme), the one or more second radios associated with the second RAT in compliance with the RF exposure limit and based on third RF exposure information associated with the one or more second radios. In certain aspects, the third RF exposure information may be obtained from a storage location associated with an applications processor in the wireless device (e.g., the storage 712, referred to herein as the “apps storage”).
In certain aspects, controlling, via the second RF exposure control scheme, the one or more second radios (in block 904) may include: (i) determining a first transmission power level for the one or more second radios that applies during a first time window, based on a first control level (e.g., preconfigured reserve level) for the one or more second radios; and (ii) determining a second transmission power level for the one or more second radios that applies for a second time window subsequent to the first time window, based on at least one of a second control level (e.g., a granted reserve level) or a first RF exposure limit (e.g., a granted RF exposure limit), for the one or more second radios that applies during the second time window. The first time window may be a preconfigured time window associated with the first RF exposure control scheme in the online state. The second time window may be associated with the second RF exposure control scheme. The first control level may be lower than the second control level.
In certain aspects, controlling, via the first RF exposure control scheme, at least one of the one or more first radios or the one or more second radios (in block 902) may include: (i) determining a first transmission power level for the one or more first radios that applies during a first time interval (e.g., WWAN independent time window), based on at least one of a first control level (e.g., a granted reserve level) or a first RF exposure limit (e.g., a granted RF exposure limit) for the one or more first radios; (ii) determining a second transmission power level for the one or more second radios that applies during a second time interval (e.g., a WLAN/Bluetooth independent time window), based on at least one of a second control level (e.g., a granted reserve level) or a second RF exposure limit (e.g., a granted RF exposure limit) for the one or more second radios; or (iii) a combination thereof. In certain aspects, the second transmission power level may be a constant transmission power level for the second time interval (e.g., in the case where the second radio is a Bluetooth radio).
In certain aspects, the operations 900 may further include, when the first RF exposure control scheme transitions from being unavailable (e.g., from the offline state) to the online state, the wireless device obtaining the second RF exposure information associated with the one or more second radios from a storage location associated with an applications processor in the wireless device (e.g., the storage 712, referred to herein as the “apps storage”). In this case, the second RF exposure information may correspond to a time interval in which the first RF exposure control scheme was unavailable (e.g., in the offline state).
In certain aspects, the operations 900 may further include, when the first RF exposure control scheme is in the online state and upon determining that a predetermined amount of time has elapsed since obtaining the second RF exposure information, the wireless device controlling the one or more second radios based on a transmission power limit previously determined for the one or more second radios.
In certain aspects, the operations 900 may further include determining an updated transmission power limit for the one or more second radios upon obtaining the second RF exposure information.
Certain aspects of the present disclosure provide apparatus, methods, processing systems, and computer-readable mediums for optimizing, or at least decreasing, battery power consumption while balancing transmission power with radio frequency (RF) exposure compliance among radios in a multi-tech/multi-band wireless communication device.
As noted above, in certain aspects, a wireless communication device may use an applications processor (and associated “apps storage”) within the wireless communication device as an intermediate stage (i.e., an intermediary) between the WWAN modem and the WLAN/Bluetooth modem, since WWAN/WLAN/Bluetooth have independent sleep/wakeup cycles. Using the applications processor as an intermediate stage may allow for: (i) storing on-off radio status of WLAN/Bluetooth radios and sending this information to the primary RF exposure control scheme, as well as the WLAN/Bluetooth radios (so that when the primary RF exposure control scheme is offline or otherwise unavailable, the WLAN/Bluetooth radios can operate at a higher transmission power level depending on whether the other Bluetooth/WLAN radio is on or off); (ii) storing missed WLAN/Bluetooth reports (due to misalignment in sleep cycles) sent to the primary RF exposure control scheme so that the primary RF exposure control scheme can fetch the reports periodically; (iii) storing WLAN/Bluetooth reports when the primary RF exposure control scheme is offline for extended periods (e.g., in airplane mode) so that the reports can be shared; (iv) relaying electronic file system (EFS) configuration parameters from the WWAN modem to the WLAN/Bluetooth radios; (v) indicating the device state index (DSI) (e.g., representing device next to head, next to body, in hotspot mode, etc.) to all radios (e.g., WWAN, WLAN, Bluetooth, satellite, etc.); (vi) relaying airplane mode status to WLAN/Bluetooth; and (vii) relaying country location from the WWAN modem to the WLAN/Bluetooth radios (so these radios can apply correct transmission power limits (e.g., Plimit) for time-averaged RF exposure based on a local regulator's RF exposure compliance regulations), as illustrative, non-limiting examples.
However, one issue with using the applications processor as an intermediate stage among radios is that waking up the applications processor can consume a significant amount of battery power. That is, applications processor wakeups may be significant battery consumption events as each wakeup may last for couple hundreds of milliseconds. Accordingly, it may be desirable to provide techniques for optimizing, or at least decreasing, the battery power consumption when using an applications processor to ensure RF compliance among radios in a wireless communication device.
Certain aspects described herein provide techniques for reducing the number of applications processor (or other intermediary) wakeups in order to save battery power. For example, in certain aspects, the techniques described herein can be used to avoid applications processor wakeups, bundle the wakeup with other messages, or a combination thereof, in order to optimize, or at least reduce, battery power consumption. For ease of description, it is to be understood that “applications processor” as used herein can also mean a suitable intermediate stage between different types of radios, of which the applications processor is one example. For example, functionality described herein with respect to an applications processor may alternatively or additionally be performed by another radio or processor.
In certain aspects, the wireless communication device may provide for opportunistic use of applications processor (or other intermediary) wakeups. Currently, for example, WWAN/WLAN/Bluetooth radios may operate with wakeup/sleep being independent of each other. As a result, different radios may wake up the applications processor at different time instances, resulting in inefficient consumption of battery power. Accordingly, to optimize (or at least reduce) the battery power consumption, in certain aspects, the applications processor can push out information preemptively rather than waiting for a request to be received from a radio. That is, one or more operations of the applications processor can be bundled.
In one reference example, instead of (i) the WLAN/Bluetooth radio sending missed exposure reports to the applications processor at a first time instance and (ii) the primary RF exposure control scheme waking up the applications processor at a subsequent second time instance to fetch those reports, the applications processor can push missed WLAN/Bluetooth reports to the primary RF exposure control scheme upon receiving these reports.
In another reference example, currently the WLAN/Bluetooth radio may wake up the applications processor at a first time instance to indicate that the WLAN/Bluetooth radio is transitioning to an offline state and to send its last RF exposure reports to the applications processor. At a subsequent second time instance, the primary RF exposure control scheme may wake up the applications processor to fetch the RF exposure reports. In certain aspects, instead of having the primary RF exposure control scheme wake up the applications processor, the applications processor can wake up the primary RF exposure control scheme to indicate the offline status of the WLAN/Bluetooth radio, as well as to send the reports the applications processor has in its memory (e.g., storage 712) up to that point in time. The applications processor may perform a similar operation when the applications processor receives any online status information of the WLAN/Bluetooth radio.
Note that while bundling operations of the applications processor may come at the cost of waking up other radios, the bundling of the applications processor's operations may still reduce battery power consumption since the applications processor may consume a significant amount of battery power compared to certain radios (e.g., the WWAN radio) of the wireless communication device.
In certain aspects, the wireless communication device may use a minimum reporting threshold to avoid frequently waking up the applications processor (or other intermediary). For example, when the WLAN/Bluetooth reports have an exposure value below a reporting threshold (e.g., 1% or some other value), then the WLAN/Bluetooth radio may refrain from sending these reports to the applications processor, as well as to the primary RF exposure control scheme to avoid frequent wakeups. In such aspects, the primary RF exposure control scheme may operate at “100%−WLAN.min.reporting.threshold−Bluetooth.min.reporting.threshold,” so that the wireless communication device is in compliance with an RF exposure limit when taking into account the discarded RF exposure reports from WLAN/Bluetooth. The minimum reporting threshold(s) may be configurable in the electronic file system (EFS), for example.
Currently, a radio may be defined to be in an “On” condition when there is any uplink activity, and a radio may be defined to be in an “Off” condition when there is a lack of uplink activity. However, because WLAN/Bluetooth radios have frequent pings (e.g., on the order of a couple of milliseconds every hundreds of milliseconds), this “On/Off” definition may result in frequent On/Off state changes and, in turn, result in the radio(s) waking up the applications processor (or other intermediary) and/or the primary RF exposure control scheme periodically.
In certain aspects described herein, a radio may be defined to be in an “On” condition based on a (first) RF exposure consumption level. In some aspects, the (first) RF exposure consumption level may include the past X-seconds-averaged exposure report>threshold_1 (e.g., 1% or some other value). For example, the radio may be considered to be in an “On” state when the past 0.8-seconds-averaged exposure report>1%. Note, the average period X and threshold_1 level may be configurable to optimize, or at least improve, the frequency of wakeups.
Similarly, a radio may be defined to be in an “Off” condition based on a (second) RF exposure consumption level. In some aspects, the (second) RF exposure consumption level may include the past Y-seconds-averaged exposure report<threshold_2 (e.g., 0.5% or some other value). For example, the radio may be considered to be in an “Off” state when the past 0.8-seconds-averaged exposure report<0.5%. Note, the average period Y and threshold_2 level may be configurable to optimize, or at least improve, the frequency of wakeups. For some aspects, the average period X and the average period Y may be the same (e.g., 0.8 seconds).
In certain aspects, the threshold_2 level may be less than the threshold_1 level to avoid frequent ping-ponging between On/Off conditions. In some examples, if the “On” threshold_1 level is the same as WLAN/Bluetooth.min.reporting.threshold, then when the WLAN/Bluetooth radio status is Off (e.g., exposure<threshold_2 level<threshold_1 level), the WLAN/Bluetooth radio may not send exposure reports to the applications processor and/or the primary RF exposure control scheme.
In certain aspects, to save battery power, the primary RF exposure control scheme may determine to delay waking up the applications processor (or other intermediary) for missed RF exposure reports for certain time intervals (e.g., missed 5 second reports) from the WLAN/Bluetooth radios if the total exposure consumption is low and has sufficient margin to satisfy the operation of the active radios. When the total exposure in the history (including missed reports) starts going up beyond a threshold (e.g., when half of the high power margin is already consumed), then the primary RF exposure control scheme can decide to wake up the applications processor to recover the missed reports from the WLAN/Bluetooth radio, to correct the primary RF exposure control scheme's exposure history with the true exposure reports from WLAN/Bluetooth radio, and to compute new exposure limits based on the true exposure history.
As an example, in standalone Bluetooth operation (since the Bluetooth reserve level A=100%), the primary RF exposure control scheme can operate assuming missed report(s)=100%, and may not wake up the applications processor to collect all missed reports, as there may not be a compliance concern. When another radio turns On, the primary RF exposure control scheme can query the applications processor to fetch true Bluetooth usage reports. Note that this technique for saving battery power may not be performed if the applications processor is always sending the reports immediately to the primary RF exposure control scheme according to one of the above-described techniques.
In certain aspects, to decrease battery power consumption, the primary RF exposure control scheme may determine to delay fetching missed WLAN/Bluetooth reports from the applications processor when the WWAN modem is in deep or frequent sleep cycles, such as when WWAN is in an out-of-service (OOS) condition and may go into an extended sleep cycle, or is otherwise unavailable.
For example, when WWAN is in OOS or other such deep/frequent sleep cycle states, the WWAN modem may enter into an extended sleep cycle (e.g., wake up for a few milliseconds every 1 minute) to conserve battery power. At this point, the primary RF exposure control scheme may stop sending exposure limit(s) to the WLAN/Bluetooth radio, causing the WLAN/Bluetooth radio to enter a transition operation. During this time, the primary RF exposure control scheme may not fetch missed reports from the applications processor (or other intermediary). When the primary RF exposure control scheme comes online (e.g., the WWAN modem latches onto the WWAN network), then the primary RF exposure control scheme can fetch all the past WLAN/Bluetooth exposure history stored in or for the applications processor in a single operation.
The operations 1000 may optionally begin, at block 1002, where the wireless device determines a set of configurations for saving battery power of the wireless device while operating a set of radios across a set of RATs in compliance with an RF exposure limit. Block 1002 may include one or more (or a combination of) sub-blocks 1006, 1008, 1010, 1012, and 1014. In other words, determining the set of configurations at block 1002 need not involve all the sub-blocks 1006, 1008, 1010, 1012, and 1014.
At sub-block 1006, the wireless device determines to push one or more messages with RF exposure information to the set of radios. At sub-block 1008, the wireless device configures a minimum RF reporting threshold for the set of radios. At sub-block 1010, the wireless device configures an “On/Off” status definition for the set of radios, based on an RF exposure level for the set of radios. At sub-block 1012, the wireless device determines to delay fetching missed RF exposure reports from the applications processor based on an RF exposure level. At sub-block 1014, the wireless device determines to delay fetching missed RF exposure reports from the applications processor based on an OOS condition of the primary RF exposure control scheme.
At block 1004, the wireless device operates the set of radios across the set of RATs using one or more of the set of configurations.
Returning to the operations 900 of
In some cases, the one or more second radios may send the third RF exposure information to the applications processor or other intermediary (or storage associated therewith). In response to receiving the third RF exposure information, the applications processor may provide the third RF exposure information to the first RF exposure control scheme. This may be done without waiting for the first RF exposure control scheme to request the third RF exposure information from the applications processor.
In some cases, the one or more second radios may send a notification to the applications processor or other intermediary (or storage associated therewith) that the one or more radios are changing state. In response to receiving the notification, the applications processor may wake up the first RF exposure control scheme and provide the third RF exposure information to the first RF exposure control scheme.
In certain aspects, the one or more second radios refrain from reporting exposure history to at least one of the applications processor (or other processor, storage, or intermediary) or the first RF exposure control scheme when exposure values in the exposure history are less than a threshold. In such cases, the second RF exposure information may be based on the threshold when the first RF exposure control scheme is in the online state, and/or the third RF exposure information may be based on the threshold when the first RF exposure control scheme is unavailable (e.g., in the offline state).
In certain aspects, the operations 900 further involve, when the first RF exposure control scheme is in the online state and upon determining a predetermined amount of time has elapsed since obtaining the second RF exposure information: (i) determining a total time-averaged exposure for the wireless device is below a threshold; and (ii) refraining, with the first RF exposure control scheme, from requesting the second RF exposure information from the applications processor or other intermediary (or storage associated therewith).
While the examples depicted in
The processing system 1102 includes a processor 1104 coupled to a computer-readable medium/memory 1112 via a bus 1106. In certain aspects, the computer-readable medium/memory 1112 is configured to store instructions (e.g., computer-executable code) that when executed by the processor 1104, cause the processor 1104 to perform the operations illustrated in
Various components of the communications device 1100 may provide means for performing the operations 900 described with respect to
Implementation examples are described in the following numbered clauses:
Clause 1: A method for wireless communication performed by a wireless device comprising: when a first radio frequency (RF) exposure control scheme of the wireless device is in an online state, controlling, via the first RF exposure control scheme, at least one of (i) one or more first radios associated with a first radio access technology (RAT) or (ii) one or more second radios associated with a second RAT, in compliance with an RF exposure limit and based on at least one of first RF exposure information associated with the one or more first radios or second RF exposure information associated with the one or more second radios; and when the first RF exposure control scheme is unavailable, controlling, via a second RF exposure control scheme, the one or more second radios associated with the second RAT in compliance with the RF exposure limit and based on third RF exposure information associated with the one or more second radios.
Clause 2: The method of Clause 1, wherein controlling, via the second RF exposure control scheme, the one or more second radios comprises: determining a first transmission power level for the one or more second radios that applies during a first time window, based on a first control level for the one or more second radios; and determining a second transmission power level for the one or more second radios that applies for a second time window subsequent to the first time window, based on at least one of a second control level or a first RF exposure limit, for the one or more second radios that applies during the second time window.
Clause 3: The method of Clause 2, wherein the first time window is a preconfigured time window associated with the first RF exposure control scheme in the online state.
Clause 4: The method of Clause 2 or 3, wherein the second time window is associated with the second RF exposure control scheme.
Clause 5: The method of any of Clauses 2 to 4, wherein the first control level is lower than the second control level.
Clause 6: The method of Clause 1, wherein controlling, via the first RF exposure control scheme, at least one of the one or more first radios or the one or more second radios comprises: determining a first transmission power level for the one or more first radios that applies during a first time interval, based on at least one of a first control level or a first RF exposure limit for the one or more first radios; determining a second transmission power level for the one or more second radios that applies during a second time interval, based on at least one of a second control level or a second RF exposure limit for the one or more second radios; or a combination thereof.
Clause 7: The method of Clause 6, wherein the second transmission power level is a constant transmission power level for the second time interval.
Clause 8: The method of any of Clauses 1 to 7, wherein: the first RF exposure information is obtained from the one or more first radios; the second RF exposure information is obtained from the one or more second radios; and the third RF exposure information is obtained from a storage location associated with an intermediary between different types of radios in the wireless device.
Clause 9: The method of Clause 8, wherein the intermediary between different types of radios comprises an applications processor in the wireless device and wherein the storage location is associated with the applications processor.
Clause 10: The method of Clause 8 or 9, wherein: the one or more second radios send the third RF exposure information to the intermediary; and in response to receiving the third RF exposure information, the intermediary provides the third RF exposure information to the first RF exposure control scheme without waiting for the first RF exposure control scheme to request the third RF exposure information from the intermediary.
Clause 11: The method of any of Clauses 8 to 10, wherein: the one or more second radios send a notification to the intermediary that the one or more first radios are changing state; and in response to receiving the notification, the intermediary wakes up the first RF exposure control scheme and provides the third RF exposure information to the first RF exposure control scheme.
Clause 12: The method of any of Clauses 8 to 11, wherein: the one or more second radios refrain from reporting exposure history to at least one of the intermediary or the first RF exposure control scheme when exposure values in the exposure history are less than a threshold; and at least one of: the second RF exposure information is based on the threshold when the first RF exposure control scheme is in the online state; or the third RF exposure information is based on the threshold when the first RF exposure control scheme is unavailable.
Clause 13: The method of any of Clauses 8 to 12, further comprising, when the first RF exposure control scheme is in the online state and upon determining a predetermined amount of time has elapsed since obtaining the second RF exposure information: determining a total time-averaged exposure for the wireless device is below a threshold; and refraining, with the first RF exposure control scheme, from requesting the second RF exposure information from the intermediary.
Clause 14: The method of any of Clauses 1 to 13, further comprising, when the first RF exposure control scheme transitions from being unavailable to the online state, obtaining the second RF exposure information associated with the one or more second radios from a storage location associated with an intermediary between different types of radios in the wireless device, the second RF exposure information corresponding to a time interval in which the first RF exposure control scheme was unavailable.
Clause 15: The method of Clause 14, wherein the first RAT is wireless wide area network (WWAN), wherein a WWAN modem is in an out-of-service condition during the time interval, and wherein the first RF exposure control scheme refrains from requesting the second RF exposure information during the time interval.
Clause 16: The method of any of Clauses 1 to 15, further comprising, when the first RF exposure control scheme is in the online state and upon determining that a predetermined amount of time has elapsed since obtaining the second RF exposure information, controlling the one or more second radios based on a transmission power limit previously determined for the one or more second radios.
Clause 17: The method of Clause 16, further comprising determining an updated transmission power limit for the one or more second radios upon obtaining the second RF exposure information.
Clause 18: An apparatus for wireless communication, comprising: one or more memories collectively storing executable instructions; and one or more processors coupled to the one or more memories, the one or more processors being collectively configured to execute the executable instructions to cause the apparatus to: control, via a first radio frequency (RF) exposure control scheme of the apparatus when the first RF exposure control scheme is in an online state, at least one of (i) one or more first radios associated with a first radio access technology (RAT) or (ii) one or more second radios associated with a second RAT, in compliance with an RF exposure limit and based on at least one of first RF exposure information associated with the one or more first radios or second RF exposure information associated with the one or more second radios; and control, via a second RF exposure control scheme when the first RF exposure control scheme is unavailable, the one or more second radios associated with the second RAT in compliance with the RF exposure limit and based on third RF exposure information associated with the one or more second radios.
Clause 19: The apparatus of Clause 18, wherein to control, via the second RF exposure control scheme, the one or more second radios, the one or more processors are collectively configured to execute the executable instructions to cause the apparatus to: determine a first transmission power level for the one or more second radios that applies during a first time window, based on a first control level for the one or more second radios; and determine a second transmission power level for the one or more second radios that applies for a second time window subsequent to the first time window, based on at least one of a second control level or a first RF exposure limit, for the one or more second radios that applies during the second time window.
Clause 20: The apparatus of Clause 18, further comprising an intermediary between different types of radios, wherein: the first RF exposure information is configured to be obtained from the one or more first radios; the second RF exposure information is configured to be obtained from the one or more second radios; and the third RF exposure information is configured to be obtained from a storage location associated with the intermediary.
Clause 21: The apparatus of any of Clauses 18 to 20, wherein the first RF exposure control scheme being unavailable comprises the first RF exposure control scheme being offline, out-of-service, or in a deep or frequent sleep cycle.
Clause 22: The method of any of Clauses 1 to 15, wherein the first RF exposure control scheme being unavailable comprises the first RF exposure control scheme being offline, out-of-service, or in a deep or frequent sleep cycle.
Clause 23: A processing system, comprising: one or more memories having executable instructions stored thereon; and one or more processors coupled to the one or more memories and configured to execute the executable instructions to cause the processing system to perform the operations of any of Clauses 1 through 15.
Clause 24: A system comprising means for performing the operations of any of Clauses 1 through 15.
Clause 25: A computer-readable medium having executable instructions stored thereon which, when executed by one or more processors, cause the one or more processors to perform the operations of any of Clauses 1 through 15.
The techniques described herein may be used for various wireless communication technologies, such as NR (e.g., 5G NR), 3GPP Long-Term Evolution (LTE), LTE-Advanced (LTE-A), code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal frequency division multiple access (OFDMA), single-carrier frequency division multiple access (SC-FDMA), time division synchronous code division multiple access (TD-SCDMA), and other networks. The terms “network” and “system” are often used interchangeably. A CDMA network may implement a radio technology such as Universal Terrestrial Radio Access (UTRA), cdma2000, etc. UTRA includes Wideband CDMA (WCDMA) and other variants of CDMA. cdma2000 covers IS-2000, IS-95, and IS-856 standards. A TDMA network may implement a radio technology such as Global System for Mobile Communications (GSM). An OFDMA network may implement a radio technology such as NR (e.g., 5G RA), Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDMA, etc. UTRA and E-UTRA are part of Universal Mobile Telecommunication System (UMTS). LTE and LTE-A are releases of UMTS that use E-UTRA. UTRA, E-UTRA, UMTS, LTE, LTE-A and GSM are described in documents from an organization named “3rd Generation Partnership Project” (3GPP). cdma2000 and UMB are described in documents from an organization named “3rd Generation Partnership Project 2” (3GPP2). NR is an emerging wireless communications technology under development.
In 3GPP, the term “cell” can refer to a coverage area of a Node B (NB) and/or a NB subsystem serving this coverage area, depending on the context in which the term is used. In NR systems, the term “cell” and BS, next generation NodeB (gNB or gNodeB), access point (AP), distributed unit (DU), carrier, or transmission reception point (TRP) may be used interchangeably. A BS may provide communication coverage for a macro cell, a pico cell, a femto cell, and/or other types of cells. A macro cell may cover a relatively large geographic area (e.g., several kilometers in radius) and may allow unrestricted access by UEs with service subscription. A pico cell may cover a relatively small geographic area and may allow unrestricted access by UEs with service subscription. A femto cell may cover a relatively small geographic area (e.g., a home) and may allow restricted access by UEs having an association with the femto cell (e.g., UEs in a closed subscriber group (CSG), UEs for users in the home, etc.). A BS for a macro cell may be referred to as a macro BS. A BS for a pico cell may be referred to as a pico BS. A BS for a femto cell may be referred to as a femto BS or a home BS.
A UE may also be referred to as a mobile station, a terminal, an access terminal, a subscriber unit, a station, a customer premises equipment (CPE), a cellular phone, a smart phone, a personal digital assistant (PDA), a wireless modem, a wireless communication device, a handheld device, a laptop computer, a cordless phone, a wireless local loop (WLL) station, a tablet computer, a camera, a gaming device, a netbook, a smartbook, an ultrabook, an appliance, a medical device or medical equipment, a biometric sensor/device, a wearable device such as a smart watch, smart clothing, smart glasses, a smart wrist band, smart jewelry (e.g., a smart ring, a smart bracelet, etc.), an entertainment device (e.g., a music device, a video device, a satellite radio, etc.), a vehicular component or sensor, a smart meter/sensor, industrial manufacturing equipment, a global positioning system device, or any other suitable device that is configured to communicate via a wireless or wired medium. Some UEs may be considered machine-type communication (MTC) devices or evolved MTC (eMTC) devices. MTC and eMTC UEs include, for example, robots, drones, remote devices, sensors, meters, monitors, location tags, etc., that may communicate with a BS, another device (e.g., remote device), or some other entity. A wireless node may provide, for example, connectivity for or to a network (e.g., a wide area network such as Internet or a cellular network) via a wired or wireless communication link. Some UEs may be considered Internet-of-Things (IoT) devices, which may be narrowband IoT (NB-IoT) devices.
In some examples, access to the air interface may be scheduled. A scheduling entity (e.g., a BS) allocates resources for communication among some or all devices and equipment within its service area or cell. The scheduling entity may be responsible for scheduling, assigning, reconfiguring, and releasing resources for one or more subordinate entities. That is, for scheduled communication, subordinate entities utilize resources allocated by the scheduling entity. Base stations are not the only entities that may function as a scheduling entity. In some examples, a UE may function as a scheduling entity and may schedule resources for one or more subordinate entities (e.g., one or more other UEs), and the other UEs may utilize the resources scheduled by the UE for wireless communication. In some examples, a UE may function as a scheduling entity in a peer-to-peer (P2P) network, and/or in a mesh network. In a mesh network example, UEs may communicate directly with one another in addition to communicating with a scheduling entity.
The methods disclosed herein comprise one or more steps or actions for achieving the methods. The method steps and/or actions may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is specified, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims.
As used herein, a phrase referring to “at least one of” a list of items refers to any combination of those items, including single members. As an example, “at least one of: a, b, or c” is intended to cover a, b, c, a-b, a-c, b-c, and a-b-c, as well as any combination with multiples of the same element (e.g., a-a, a-a-a, a-a-b, a-a-c, a-b-b, a-c-c, b-b, b-b-b, b-b-c, c-c, and c-c-c or any other ordering of a, b, and c).
As used herein, the term “determining” encompasses a wide variety of actions. For example, “determining” may include calculating, computing, processing, deriving, generating, investigating, looking up (e.g., looking up in a table, a database or another data structure), ascertaining, and the like. Also, “determining” may include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory), and the like. Also, “determining” may include resolving, selecting, choosing, establishing, and the like.
The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language of the claims, wherein reference to an element in the singular is not intended to mean “one and only one” unless specifically so stated, but rather “one or more.” Unless specifically stated otherwise, the term “some” refers to one or more. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim element is to be construed under the provisions of 35 U.S.C. § 112 (f) unless the element is expressly recited using the phrase “means for” or, in the case of a method claim, the element is recited using the phrase “step for.”
The various operations of methods described above may be performed by any suitable means capable of performing the corresponding functions. The means may include various hardware and/or software component(s) and/or module(s), including, but not limited to a circuit, an application specific integrated circuit (ASIC), or processor. Generally, where there are operations illustrated in figures, those operations may have corresponding counterpart means-plus-function components with similar numbering.
The various illustrative logical blocks, modules and circuits described in connection with the present disclosure may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device (PLD), discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any commercially available processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
If implemented in hardware, an example hardware configuration may comprise a processing system in a wireless node. The processing system may be implemented with a bus architecture. The bus may include any number of interconnecting buses and bridges depending on the specific application of the processing system and the overall design constraints. The bus may link together various circuits including a processor, machine-readable media, and a bus interface. The bus interface may be used to connect a network adapter, among other things, to the processing system via the bus. The network adapter may be used to implement the signal processing functions of the physical (PHY) layer. In the case of a UE (see
If implemented in software, the functions may be stored or transmitted over as one or more instructions or code on a computer-readable medium. Software shall be construed broadly to mean instructions, data, or any combination thereof, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. Computer-readable media include both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. The processor may be responsible for managing the bus and general processing, including the execution of software modules stored on the machine-readable storage media. A computer-readable storage medium may be coupled to a processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. By way of example, the machine-readable media may include a transmission line, a carrier wave modulated by data, and/or a computer-readable storage medium with instructions stored thereon separate from the wireless node, all of which may be accessed by the processor through the bus interface. Alternatively, or in addition, the machine-readable media, or any portion thereof, may be integrated into the processor, such as the case may be with cache and/or general register files. Examples of machine-readable storage media may include, by way of example, RAM (Random Access Memory), flash memory, ROM (Read-Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), registers, magnetic disks, optical disks, hard drives, or any other suitable storage medium, or any combination thereof. The machine-readable media may be embodied in a computer program product.
A software module may comprise a single instruction, or many instructions, and may be distributed over several different code segments, among different programs, and across multiple storage media. The computer-readable media may comprise a number of software modules. The software modules include instructions that, when executed by an apparatus such as a processor, cause the processing system to perform various functions. The software modules may include a transmission module and a receiving module. Each software module may reside in a single storage device or be distributed across multiple storage devices. By way of example, a software module may be loaded into RAM from a hard drive when a triggering event occurs. During execution of the software module, the processor may load some of the instructions into cache to increase access speed. One or more cache lines may then be loaded into a general register file for execution by the processor. When referring to the functionality of a software module below, it will be understood that such functionality is implemented by the processor when executing instructions from that software module.
Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared (IR), radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, include compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk, and Blu-ray® disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Thus, in some aspects computer-readable media may comprise non-transitory computer-readable media (e.g., tangible media). In addition, for other aspects computer-readable media may comprise transitory computer-readable media (e.g., a signal). Combinations of the above should also be included within the scope of computer-readable media.
Thus, certain aspects may comprise a computer program product for performing the operations presented herein. For example, such a computer program product may comprise a computer-readable medium having instructions stored (and/or encoded) thereon, the instructions being executable by one or more processors to perform the operations described herein, for example, instructions for performing the operations described herein and illustrated in
Further, it should be appreciated that modules and/or other appropriate means for performing the methods and techniques described herein can be downloaded and/or otherwise obtained by a user terminal and/or base station as applicable. For example, such a device can be coupled to a server to facilitate the transfer of means for performing the methods described herein. Alternatively, various methods described herein can be provided via storage means (e.g., RAM, ROM, or a physical storage medium such as a compact disc (CD) or floppy disk, etc.), such that a user terminal and/or base station can obtain the various methods upon coupling or providing the storage means to the device. Moreover, any other suitable technique for providing the methods and techniques described herein to a device can be utilized.
It is to be understood that the claims are not limited to the precise configuration and components illustrated above. Various modifications, changes, and variations may be made in the arrangement, operation, and details of the methods and apparatus described above without departing from the scope of the claims.
The present application claims the benefit of priority to U.S. Provisional Patent Application No. 63/528,898, filed Jul. 25, 2023, and to U.S. Provisional Patent Application No. 63/528,904, filed Jul. 25, 2023, both of which are hereby incorporated by reference herein in their entireties for all applicable purposes.
Number | Date | Country | |
---|---|---|---|
63528898 | Jul 2023 | US | |
63528904 | Jul 2023 | US |