The present disclosure relates generally to wireless communications, and in particular embodiments, to systems and methods for estimating locations of signal shadowing obstructions and signal reflectors in a wireless communications network
In wireless communication networks such as cellular networks, obstructions such as buildings and natural geographic features may reflect, scatter, or shadow signals propagating between transmitters and receivers in the network. These obstructions may be considered to be passive in the sense that the signals neither originate from nor terminate at these obstructions. In current cellular networks that implement beamforming to direct beams and configure transmission parameters, a lack of knowledge of the location and extent of obstructions makes beamforming an essentially blind process that can only react when weak transmissions or complete transmission failures occur.
Transmission beamforming is currently implemented as an analog beam-steering process where beams of fixed beam width are steered through the environment by adjustment of antenna phases at the transmitting antennas. Beam-steering is essentially a time-sharing process where the transmitter dwells at each angular segment for a time period to transmit to user equipment (UE) within the segment before moving on to the next segment. When a beam is obstructed, the signal-to-noise ratio (SNR) for received signals generally drops significantly, resulting in increased bit error rates (BER). The transmitter may compensate after the BER increase occurs by increasing the transmitted power, however this only addresses the problem after the fact. As a result, data packets may be dropped or delayed, a problem that is currently remedied by imposing a feedback overhead on the network to cause the transmitted power to be reactively increased.
Cellular networks often operate in regions that have numerous obstructions that contribute toward a highly multipath transmission environment. The obstructions not only reflect the propagating signals between transmitters and receivers, but can also attenuate or completely block the signals. The RF signal attenuation due to obstructions can be greater than path loss effects due to the propagation distance of the signal.
To increase spectral efficiency and have better control on interference patterns in the transmission environment, the cell size in cellular networks has been reduced. Additionally, for highly mobile UEs, it is necessary to hand off communications between base stations more frequently to ensure that the UEs connectivity is not interrupted. The handoff process is typically managed at network equipment remote from the transmitter, which causes additional delays and burdens the network because the UEs are supposed to remain unaware of the detachment/re-attachment processes.
Although both being caused by interaction of electromagnetic waves with atoms and molecules, shadowing and reflection are two independent propagation phenomena that deteriorate the quality of communication in wireless communication systems. Shadowing impacts communications through intermittent power budget loss due to communication links being attenuated by large and small obstructions. Reflection impacts communications by causing multipath interference between signals propagating over more than one path between transmitter and receiver.
Locations of some shadowing and reflecting obstructions may be established by employing sensing techniques such as satellite images, video image scanning, infrared imaging, RADAR, LIDAR, etc. However, implementation of these techniques would be costly and also un-scalable. Additionally, simply determining physical locations of obstructions may not provide the information necessary for communication at cellular radio frequencies. Obstructions will vary considerably depending on their composition, such as the amount of steel reinforcing in a concrete building vs. a wood building, for example. The signal transmission effects of obstructions on microwave and mmWave communications might be difficult to determine based on only the physical location of the obstructions established by light, ultrasound, terahertz waves, etc. used in the above sensing techniques.
In accordance with one disclosed aspect there is provided a method for estimating locations of signal shadowing obstructions in a wireless communication network. The method involves at a network equipment, receiving from User Equipments (UEs), an identification of neighboring UEs from which the UEs have received a reference signal via a non-line-of-sight (NLoS) sidelink transmission. The method also involves estimating locations of signal shadowing obstructions based on location information of UEs associated with the NLoS sidelink transmissions, and configuring communications between the network equipment and at least one UE based on an estimated location of at least one signal shadowing obstruction.
The method may involve receiving from a UE an indication that a reference signal transmitted by the network equipment to the UE was received via a NLoS propagation path, and estimating locations of signal shadowing obstructions may involve estimating locations of signal shadowing obstructions based on a location of the network equipment and the location information of the UE.
The method may involve determining that a reference signal transmitted by the UE to the network equipment was received via a NLoS propagation path and estimating locations of signal shadowing obstructions may involve estimating locations of signal shadowing obstructions based on a location of the network equipment and the location information of the UE.
Configuring communications between the network equipment and the at least one UE may involve increasing a transmission power for a transmission based on the estimated location of the at least one signal shadowing obstruction.
Configuring communications between the network equipment and the at least one UE may involve selecting a robust modulation and coding scheme (MCS) for a transmission affected by the at least one signal shadowing obstruction.
Configuring communications between the network equipment and the at least one UE may involve selectively avoiding directing a transmission beam in a direction of a signal shadowing obstruction.
Configuring communications between the network equipment and the at least one UE may involve providing an estimated location of the least one signal shadowing obstruction to a base station disposed to communicate with the at least one UE, the base station being operable to configure communications with the at least one UE.
Configuring communications may involve for a UE that is shadowed by a signal shadowing obstruction, causing handoff of the shadowed UE from the base station to another base station.
Configuring communications may involve causing the base station to configure transmissions to another UE that is not shadowed by the signal shadowing obstruction to use generally the same non-orthogonal spectrum being used by another base station for transmissions to the shadowed UE.
The method may involve generating location information for at least some of the identified UEs by generating range estimates for uplink or downlink transmissions between the network equipment and at least some of the UEs.
The method may involve generating location information for at least some of the identified UEs by receiving range estimates for line-of-sight (LoS) sidelink transmissions between pairs of UEs.
The method may involve generating location information for at least some of the identified UEs by receiving Global Positioning System (GPS) information identifying locations of at least some of the UEs.
The method may involve generating location information for at least some of the identified UEs by using known location information associated with the network equipment or UEs.
Estimating locations of signal shadowing obstructions may involve centering a shadowing contribution associated with a NLoS sidelink transmission mid-way between the respective locations of the UEs associated with the NLoS sidelink transmission, orienting the shadowing contribution in a direction extending between respective locations of the UEs, estimating an extent of the shadowing contribution based on an estimated path loss for the transmission, and combining shadowing contributions for NLoS sidelink transmissions to generate a shadowing map representing spatial locations of signal shadowing obstructions.
The method may involve updating the shadowing map in response to receiving identifications of neighboring UEs and more recently received identifications of neighboring UEs may be assigned a greater weight than previously received identifications of neighboring UEs.
Combining shadowing contributions may involve combining shadowing contributions using a kernel density estimation to generate a probability density function of shadowing locations.
Combining shadowing contributions may involve combining shadowing contributions using one of a Gaussian kernel and a break-wall kernel.
The method may involve initiating an update to the shadowing map in response to receiving a notification from a base station of a transmission failure between the base station and UEs in communication with the network via the base station.
Receiving the identification of neighboring UEs may involve receiving an anonymized identifier included in the reference signal received by the UE from the neighboring UE.
At least one of the UEs associated with identified NLoS sidelink transmissions may have a location that changes with time and estimating locations of signal shadowing obstructions may involve estimating locations of signal shadowing obstructions based on successive location information for the at least one UE.
In accordance with another disclosed aspect there is provided network equipment for a wireless communication network including a base station including a transmitter and a receiver, a processor in communication with the base station, and a processor-readable memory in communication with the processor and storing processor-executable instructions which, when executed by the processor, cause the processor to perform a method. The method involves receiving by the receiver of the base station from User Equipments (UEs), an identification of neighboring UEs from which the UEs have received a reference signal via a non-line-of-sight (NLoS) sidelink transmission, causing the processor to estimate locations of signal shadowing obstructions based on location information of UEs associated with the NLoS sidelink transmissions, and configuring communications between the base station and at least one UE based on an estimated location of at least one signal shadowing obstruction.
In accordance with another disclosed aspect there is provided a method for estimating locations of signal reflectors in a wireless communication network. The method involves at network equipment, receiving from User Equipments (UEs) in communication with the network, sidelink transmission information including range estimates indicative of a range associated with a reference signal received from a neighboring UE via the sidelink transmission over an indirect propagation path, a received power associated with each received reference signal, and an identification of the neighboring UE. The method also involves estimating locations of signal reflectors based on location information for UEs associated with the sidelink transmissions, the received range estimates, and the received power, The method further involves configuring communications between the network equipment and at least one UE based on an estimated location of at least one signal reflector.
The method may involve receiving from a UE range estimates for reference signals received at the UE over an indirect propagation path from the base station, a received power for each received reference signal, and estimating locations of signal reflectors may further involve estimating locations of signal reflectors based on location information of the UE, a location of the base station, the received range estimates, and the received powers.
The method may involve receiving reference signals transmitted by a UE at the base station and generating range estimates for reference signals received at the base station over indirect propagation paths from the UE, a received power for each reference signal received over indirect propagation paths, and estimating locations of signal reflectors may further involve estimating locations of signal reflectors based on the location of the base station, a location information of the UE, the received range estimates, and the received powers.
Causing the base station to configure transmissions may involve at least one of directing a transmission beam toward a signal reflector to cause the beam to be redirected by the signal reflector to a UE experiencing weak reception of transmitted signals, in response to a determination that one or more UEs are located in an area subject to interference from a transmission beam directed toward a receiving UE, directing the beam toward a signal reflector to cause the beam to be redirected by the signal reflector to the receiving UE, and in response to a determination that a transmission to a UE via a strong line-of-sight (LoS) transmission beam is causing a reduction in the number of data streams that can be spatially multiplexed over the transmission beam, directing at least one additional transmission beam toward a signal reflector to cause the at least one additional transmission beam to be redirected by the signal reflector to the receiving UE and multiplexing the transmission over the direct beam and the at least one additional transmission beam.
The method may involve generating location information for at least some of the identified UEs by one or more of generating range estimates for uplink or downlink transmissions between the network equipment and at least some of the UEs, receiving range estimates for line-of-sight (LoS) sidelink transmissions between UEs, receiving Global Positioning System (GPS) information identifying locations of at least some of the UEs, and using known location information associated with the base station or UEs.
Determining locations of signal reflectors may involve generating a connectivity graph having nodes corresponding to network equipment in the network and nodes corresponding to UEs for which location information is available, for each indirect reference signal transmission in the connectivity graph, establishing a locus representing a probable location of the reflector, and combining the loci for the indirect reference signal transmissions in the connectivity graph to generate a reflector map representing locations of reflecting obstructions in the wireless communication network.
The method may involve updating the reflector map in response to receiving sidelink transmission information, more recently received sidelink transmission information being assigned a greater weight than previously received sidelink transmission information.
Combining the loci may involve using a kernel density estimation to generate a probability density function of reflector locations.
The method may involve initiating an update to the reflector map in response to receiving a notification from the network equipment of a transmission failure between the network equipment and UEs.
At least one of the UEs may have a location that changes with time and estimating locations of signal reflectors may involve estimating locations of signal reflectors based on successively received sidelink transmission information for the UEs associated with the sidelink transmissions.
The method may involve selecting most significant reflector locations from the reflector map for transmissions between the base station and UE nodes in the connectivity graph, using the locations of the base station and UE as inputs to a neural network and training the neural network to output the most significant reflector locations, and using the trained neural network to generate a beam direction for an indirect transmission between the base station and one of the UEs in the network.
In accordance with another disclosed aspect there is provided network equipment for a wireless communication network, including a base station including a transmitter and a receiver, a processor in communication with the base station, and a processor-readable memory in communication with the processor and storing processor-executable instructions which, when executed by the processor, cause the processor to perform a method. The method involves receiving at the receiver of the base station from User Equipments (UEs) in communication with the network, sidelink transmission information including range estimates indicative of a range associated with a reference signal received from a neighboring UE via the sidelink transmission over an indirect propagation path, a received power associated with each received reference signal, and an identification of the neighboring UE. The method also involves causing the processor to estimate locations of signal reflectors based on location information for UEs associated with the sidelink transmissions, the received range estimates, and the received powers. The method further involves configuring communications between the base station and at least one UE based on an estimated location of at least one signal reflector.
Other aspects and features will become apparent to those ordinarily skilled in the art upon review of the following description of specific disclosed embodiments in conjunction with the accompanying figures.
Embodiments of the disclosure will now be described with reference to the attached drawings in which:
In this example, the communication system 100 includes a wireless communications network 102 including electronic devices (ED) 110-114 and radio access networks (RANs) 120, 122. The system 100 also includes a core network 130, a public switched telephone network (PSTN) 132, the Internet 134, and other networks 136. Although certain numbers of these components or elements are shown in
The EDs 110-114 are configured to operate, communicate, or both, in the system 100. For example, the EDs 110-114 are configured to transmit, receive, or both via wireless communication channels. Each ED 110-114 represents any suitable end user device for wireless operation and may include such devices (or may be referred to) as a user equipment/device (UE), wireless transmit/receive unit (WTRU), mobile station, mobile subscriber unit, cellular telephone, station (STA), machine type communication device (MTC), personal digital assistant (PDA), smartphone, laptop, computer, touchpad, wireless sensor, or consumer electronics device.
In
The EDs 110-114 and base stations 140-142 are examples of communication equipment that can be configured to implement some or all of the functionality and/or embodiments described herein. In the embodiment shown in
The base stations 140-142 communicate with one or more of the EDs 110-114 over one or more air interfaces 150 and 152 using wireless communication links e.g. RF, μWave, IR, etc. The air interfaces 150 and 152 may utilize any suitable radio access technology. For example, the system 100 may implement one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), or single-carrier FDMA (SC-FDMA) in the air interfaces 150 and 152. In some embodiments the EDs 110-114 include EDs that are able to communicate directly with each other via sidelinks 154 and 156.
A base station 140-142 may implement Universal Mobile Telecommunication System (UMTS) Terrestrial Radio Access (UTRA) to establish an air interface 150 using wideband CDMA (WCDMA). In doing so, the base station 140-142 may implement protocols such as HSPA, HSPA+ optionally including HSDPA, HSUPA or both. Alternatively, a base station 140-142 may establish an air interface 150 with Evolved UTMS Terrestrial Radio Access (E-UTRA) using LTE, LTE-A, and/or LTE-B. It is contemplated that the system 100 may use multiple channel access functionality, including such schemes as described above. Other radio technologies for implementing air interfaces include IEEE 802.11, 802.15, 802.16, CDMA2000, CDMA2000 1X, CDMA2000 EV-DO, IS-2000, IS-95, IS-856, GSM, EDGE, and GERAN. Of course, other multiple access schemes and wireless protocols may be utilized.
The RANs 120 and 122 are in communication with the core network 130 to provide the EDs 110-114 with various services such as voice, data, and other services. Understandably, the RANs 120 and 122 and/or the core network 130 may be in direct or indirect communication with one or more other RANs (not shown), which may or may not be directly served by core network 130, and may or may not employ the same radio access technology as RAN 120, RAN 122 or both. The core network 130 may also serve as a gateway access between (i) the RANs 120 and 122 or EDs 110-114 or both, and (ii) other networks (such as the PSTN 132, the Internet 134, and the other networks 136). In addition, some or all of the EDs 110-114 may include functionality for communicating with different wireless networks over different wireless links using different wireless technologies and/or protocols. PSTN 132 may include circuit switched telephone networks for providing plain old telephone service (POTS). Internet 134 may include a network of computers and subnets (intranets) or both, and incorporate protocols, such as IP, TCP, UDP. EDs 110-114 may be multimode devices capable of operation according to multiple radio access technologies, and incorporate multiple transceivers necessary to support such.
The RANs 120, 122, base stations 140, 142, and the core network 130 together may be referred to as “network equipment”. The network equipment elements may be physically distributed within a coverage area. The core network 130 generally includes computer processor hardware that interfaces between the PSTN 132, Internet 134, and other networks 136 and the RANs 120, 122 to provide services to the EDs 110-114.
As shown in
The ED 160 also includes at least one transceiver 164. The transceiver 164 is configured to modulate data or other content for transmission by at least one antenna or Network Interface Controller (NIC) 166. The transceiver 164 is also configured to demodulate data or other content received by the at least one antenna 166. Each transceiver 164 includes any suitable structure for generating signals for wireless or wired transmission and/or processing signals received wirelessly or by wire at the antenna 166. Each antenna 166 includes any suitable structure for transmitting and/or receiving wireless or wired signals 172. One or multiple transceivers 164 could be used in the ED 160. One or multiple antennas 166 could be used in the ED 160. Although shown as a single functional unit, a transceiver 164 could also be implemented using at least one transmitter and at least one separate receiver.
The ED 160 further includes one or more input/output devices 168 or interfaces (such as a wired interface to the internet 134 in
In addition, the ED 160 includes at least one memory 170. The memory 170 stores instructions and data used, generated, or collected by the ED 160. For example, the memory 170 could store software instructions or modules configured to implement some or all of the functionality and/or embodiments described herein and that are executed by the processing unit(s) 162. Each memory 170 includes any suitable volatile and/or non-volatile storage and retrieval device(s). Any suitable type of memory may be used, such as random access memory (RAM), read only memory (ROM), hard disk, optical disc, subscriber identity module (SIM) card, memory stick, secure digital (SD) memory card, and the like.
As shown in
Each transmitter 184 includes any suitable structure for generating signals for wireless or wired transmission to one or more EDs or other devices. Each receiver 186 includes any suitable structure for processing signals received wirelessly or by wire from one or more EDs or other devices. Although shown as separate components, at least one transmitter 184 and at least one receiver 186 could be combined into a transceiver. Each antenna 188 includes any suitable structure for transmitting and/or receiving wireless or wired signals 172. Although a common antenna 188 is shown here as being coupled to both the transmitter 184 and the receiver 186, one or more antennas 188 could be coupled to the transmitter(s) 184, and one or more separate antennas 188 could be coupled to the receiver(s) 186. Each memory 190 includes any suitable volatile and/or non-volatile storage and retrieval device(s) such as those described above in connection to the ED 160 in
Each input/output device 192 permits interaction with a user or other devices in the network. Each input/output device 192 includes any suitable structure for providing information to or receiving/providing information from a user, including network interface communications.
It should be appreciated that one or more steps of the embodiment methods provided herein may be performed by corresponding units or modules, according to
A physical layout of a portion of a wireless communications network in accordance with a shadow map generation embodiment is shown schematically at 200 in
A line-of-sight (LoS) propagation path 220 is associated with transmissions between the base station 204 and the UE 210. Another LoS propagation path 222 exists between the base station 204 and the UE 212, and a LoS propagation path 224 exists between the base station 206 and the UE 212. A LoS sidelink propagation path 226 also exists between the UE 212 and the UE 210. A sidelink connection, transmission, or communication link, is associated with a direct transmission between two UEs that is not routed through one of the base stations 202-208.
A building 240 is located between the base station 208 and the UE 214, and a resulting propagation path 228 is thus a non-line-of-sight (NLoS) path. The building 240 acts as a signal shadowing obstruction that attenuates signals propagating through the building. Another shadowing obstruction 242 is located between the base station 204 and the UE 210 such that a NLoS propagation path 230 exists between this base station and the UE. A sidelink propagation path 232 passes through a shadowing obstruction 244 located between the UE 212 and UE 214. The UE 216 has a NLoS sdelink connection 234 with the UE 210 and a LoS connection 236 with the base station 204. Although only a few UEs are shown in
The obstructions 240, 242, and 244 cause received signal power attenuation and/or fluctuation for a direct propagation path between transmitters and receivers. In the embodiment shown, the obstructions 238, 240, and 242 are represented as buildings, but in other embodiments obstructions may be a natural feature such as a hill. Although the buildings 238, 240 would have a fixed location within a geographical coordinate system 250, in other embodiments signal shadowing obstructions may be mobile, such as a large truck or train.
Referring to
Block 302 directs the network equipment of the wireless communications network 200 to receive, from UEs in the network, an identification of neighboring UEs from which the UE receives a reference signal via a non-line-of-sight (NLoS) sidelink transmission. The reference signal may be similar to reference signals commonly transmitted between base stations and UEs, which facilitate calculation of UE ranges, channel coefficients, etc. In this embodiment, the reference signal transmitted by a neighboring UE includes an identification of the UE transmitting the signal, such as an IMSI (International mobile subscriber identity) or other unique identifier associated with the UE. The UE identifier may be anonymized for security reasons to prevent the receiving UE from being able to determine identifiers of neighboring UEs. In one embodiment, data ambiguation may be used to anonymize the identifier.
Referring back to
Block 304 of the process 300 then directs the network equipment to estimate locations of signal shadowing obstructions. The locations of signal shadowing obstruction are based on UE location estimates 306 for the pair of UEs identified at block 302 as having the NLoS sidelink connection. In wireless communication networks, UE location estimates 306 are generated and maintained in a network equipment database for UEs in communication with the network. The UE location estimates may be generated based on a variety of different data sets, including uplink or downlink transmissions between the base station and UEs, receiving Global Positioning System (GPS) information from some of the UEs, and/or using other known location information. For a base station or a UE having a fixed location, an accurate ground truth location may be established, which acts as an anchor location in the wireless communications network 200.
Referring back to
Block 308 then directs the network equipment to cause the base stations 202-206 to configure communications with UEs based on the estimated locations of the signal shadowing obstructions. In one embodiment, the blocks 302, 304 and 308 may be executed repeatedly to determine locations of signal shadowing obstruction contributions based on the NLoS sidelink connections between multiple pairs of neighboring UEs within the wireless communication network 200. These identified signal shadowing contributions may be combined to generate a shadowing map representing spatial locations of signal shadowing obstructions within the geographical coordinate system 250. The shadowing map may be provided to the base stations 202-206 to facilitate proactively configuring communication parameters to reduce the frequency of transmission failures.
As an example, the base station 204 in
In other embodiments, a base station 400 may be operably configured to selectively avoid directing a transmission beam in a direction of a signal shadowing obstruction 402 as shown in
In another embodiment shown in
As disclosed above, for a dense network of UEs there will be a large number of potential NLoS sidelink connections between UEs that may be leveraged to determine shadowing locations. Additionally, the base stations 202-208 would generally also receive reference signals from the UEs 210-216 as part of uplink transmissions from the UEs to the base stations. The base stations 202-208 on receiving the reference signals may make a determination that the reference signal transmitted was received via a NLoS propagation path. Similarly, for downlink transmissions between the base stations 202-208 and the UEs 210-216, a UE may make a determination that a reference signal transmitted by a base station was received via a NLoS propagation path. The identifications of NLoS downlink and uplink transmissions may advantageously be combined with the identification of NLoS sidelink transmissions between neighboring UEs for generating the shadowing map. One advantage of including uplink and downlink transmissions is that the location of the base stations 202-208 may be accurately established. Anchor locations when used in the generation of shadowing locations may improve the spatial accuracy of the resulting shadowing map.
Block 302 of the process 300 requires an identification of NLoS communications between neighboring UEs 210-216 and optionally NLoS uplink and downlink communications between the UEs and the base stations 202-208. A method for distinguishing between LoS links and NLoS links is disclosed in Applicant's commonly owned U.S. patent application Ser. No. 16/675,597, filed on Nov. 6, 2019 and entitled “CONNECTIVITY-BASED POSITIONING DETERMINATION IN WIRELESS COMMUNICATION NETWORKS”, which is incorporated herein by reference in its entirety. In the disclosed method, LoS link identification based on label generation and neural network training is used to configure a LoS identification model by (i) generating LoS/NLoS labels based on two different geometric discrepancy analyses and (ii) training a neural network to generalize to unseen locations within the geographical coordinate system 250. The trained LoS identification model is then transferred to UEs, which are configured to infer the LoS/NLoS status of their sidelink communications with neighboring UEs. In the U.S. Ser. No. 16/675,597 application, an identification of LoS communications is transmitted to network equipment, where it can be used for the purpose of more accurately estimating the locations of UEs within the network. In this disclosure, an identification of NLoS communications is transmitted to network equipment (i.e. communications that are determined not to be via LoS propagation paths). In other embodiments, alternative methods of identifying communications as being via LoS or NLoS propagation paths may be implemented to make the NLoS determination at the UEs 210-216 and the base stations 202-208.
Referring to
Referring to
The UEs and base stations may be represented as a set of nodes v in a network graph with connections between the nodes v being depicted at 510. The LoS/NLoS prediction module 502 executes the blocks 302-308 shown in
NLoS-UEv={v′: fw*(xv,v′)≈1∧v′∈UEv}
NLoS-BSv={v′: fw*(xv,v′)≈1∧v′∈BSv}
NLoSv={v′: fw*(xv,v′)≈1∧v′∈v} 1
where NLoS-UEv represents a set of identifications of nodes v having NLoS sidelink connections with UEs v′, NLoS-BSv represents a set of identifications of nodes v having NLoS downlink connections with base stations v′, and NLoSv is the union of the sets NLoS-UEv and NLoS-BSv.
The LoS/NLos prediction module 502 in this embodiment also generates LoS identifications for the uplink, downlink, and sidelink connections, and transmits signaling identifying these connections back to the network equipment. In this embodiment, the network equipment includes a localization system 504, which receives the LoS identifications from the LoS/NLoS prediction module 502 and uses these identifications for establishing UE location estimates 306, as detailed in the U.S. Ser. No. 16/675,597 application. In other embodiments the UE location estimates may be otherwise generated without the use of LoS sidelink connection information.
The network equipment portion of the system 500 also includes a shadowing map generator 506, which receives the UE location estimates 306 from the localization system 504. The shadowing map generator 506 also receives the sets of NLoS identifications in equation 1 and combines the UE location estimates 306 and the NLoS identifications. The set of nodes LoSv is thus provided to the localization system 504 to estimate locations zv of the nodes v, which in turn is provided to the shadowing map generator 506. It is not necessary to establish location estimates for all of the UE nodes in the network 200. The shadowing map generator 506 uses this information to generate a labelled graph G″=(V″, E″) is formed with the following vertices:
V″={(v,zv): v∈V∧z
and the following edge set:
E″={(v,v′): v,v′∈V″∧(v′∈NLoSv∨v∈NLoSv′)} 3
with V″ being the vertex set including all UEs with each node v being labelled with its location estimate zv. The graph V″ is depicted at 514 in
To generate the shadowing map, the shadowing map generator 506 applies kernel density estimation (KDE) to the graph G″ by updating the following shadowing map function:
where (z; μv,v′l, Σv,v′l) is a kernel density function that is centered at a location μv,v′l∈2 for each (v,v′) link edge in the graph and where Σv,v′l∈2×2 is the covariance matrix for that link. Equation 4 also includes a time-dependent factor αl∈[0,1], which together with the time-span term T implements a discounting factor. When periodically updating the shadowing map in response to receiving ongoing identifications of neighboring UEs, the time-dependent factor αl causes more recently received identifications of neighboring UEs to be assigned a greater weight than previously received identifications of neighboring UEs. The discounting factor αl ensures that the model remains agile and adaptive in a wireless communications network 200 where shadowing obstructions may themselves be mobile.
Each edge or NLoS link in the graph G″ thus includes the estimated locations zv of the nodes at its two ends. The location μv,v′l and covariance matrix Σv,v′l for each link may be defined as follows:
The signal shadowing obstruction associated with the NLoS communication link between nodes (v,v′) is thus assumed to be centered at a location μv,v′l halfway between the two nodes v. The signal shadowing obstruction is further assumed to be physically spread out along a vector uv=zv−zv′ aligned with a direct path between the nodes. The obstruction is further assumed to have an extent or span defined by the null-space vector vv=null(uv), which is orthogonal to the direct path. Examples of these vectors uv and vv are shown in
where Rv,v′=|zv−zv′| is the distance between the transmitting and receive nodes. The communication parameters pvt, gv′, and pv′r are commonly available within the wireless communications network 200 as these parameters are monitored by UEs and base stations and may be routinely collected by the network equipment. In other embodiments, measures of shadow fading other than equation 7 may be used. The estimated shadow fading coefficient σv,v′ is then used in equation 6 to determine the covariance matrix Σv,v′l. The covariance matrix is in turn used in equation 4 to generate probable locations 518 for the signal shadowing obstruction within the geographical coordinate system 250.
The choice of kernel function (z; μv,v′l, Σv,v′l) in equation 4 may be made based on the level of detail desired for the shadowing map. In one embodiment a Gaussian kernel may be defined as follows:
The wings of the above Gaussian kernel extend from −∞ to ∞ and the kernel has smooth transitions, leading to a shadowing map function (z, t) that is generally free of spurious fluctuations and sudden jumps. For this kernel, smaller shadowing obstructions may be buried under the wings of larger obstructions. In an alternative embodiment, a more local kernel such as a break-wall kernel may be used and provides the ability to reveal smaller obstructions at the expense of a possibly more jittery spectrum:
Provided that obstructions within the network environment have sharp physical edges, the break-wall kernel in equation 9 may provide a more accurate representation of shadowing obstructions.
Referring to
Each communication link between the set of nodes v in the wireless communications network 200 thus provides a shadowing contribution which are combined using the function (z, t) in equation 4 to generate an overall map of signal shadowing locations. Combining shadowing contributions in a network having a large number of UEs and thus a large number of identified NLoS communication links results in a more representative shadowing map.
In general, the accuracy of shadowing map may also depend on factors other than the concentration of NLoS communication links identified for each obstruction. Inaccuracies caused by the LoS/NLoS prediction module 502 may cause a LoS link to be inferred as a NLoS link or vice versa. Inaccuracies in the UE location estimates 306 may cause the location of nodes to be displaced from their actual locations, thus also displacing the center location μv,v′l assumed for the shadowing obstruction. The probability of misdetection would generally have a negligible effect of creating a small bias in the resulting signal shadowing map.
Referring to
In this embodiment where LoS sidelink information is used for generating UE location estimates, if either the SL-PRS 702 and/or PRS 704 is determined to be via a LoS propagation path, the UE2 transmits signaling 710 including respective identifications for the UE1 and/or gNB to the location system (LS). The UE2 would also need to determine range estimate information for the reference signals 702 and 704. The range estimates are transmitted to the LS via the gNB to enable the use of the LoS sidelink information in generating the UE location estimates. In other embodiments where the UE location estimates are otherwise determined, the signaling 710 may be omitted.
The LS implements the localization system 504 shown in
Additional signaling not depicted in
The gNB implements ongoing channel estimation and continually monitors for beam failure and/or increased bit error rates (BER) for transmissions. In one embodiment the gNB implements a beam failure monitoring function 714, which monitors unsuccessful attempts to adapt the modulation and coding scheme (MCS) or the incidence of high BER for transmissions by the gNB. An increasing level of transmission failures may indicate that the signal shadowing map has become outdated. When these beam failures reach a threshold, the beam failure monitoring function 714 may produce a signal 716 that initiates an update of the shadowing map by the SMG. The shadowing map generator 506 responds to receiving the signal 716 from the gNB of such transmission failures by generating updated shadowing map data 712, which is provided to the gNB and other gNBs in the wireless communications network 200.
A physical layout of a portion of a wireless communications network in accordance with reflection map generation embodiment is shown schematically at 800 in
Referring to
Block 902 directs the network equipment of the wireless communications network 800 to receive, from UEs in the network 200, sidelink transmission information including range estimates indicative of a range associated with a reference signal received from a neighboring UE via the sidelink transmission over indirect propagation paths. For example, in
Block 906 of the process 900 then directs the network equipment to estimate locations of signal reflectors within a geographical coordinate system 850. The network equipment uses the UE location estimates 306 for the UEs 810-814, the received range estimates, and the received power to generate signal reflector location estimates.
Block 908 then directs the network equipment to cause the base station 802 to configure communications with UEs based on the estimated locations of the signal shadowing obstructions. In one embodiment the blocks 902-908 may be executed continuously to determine locations of signal reflector contributions within the wireless communications network 800. These identified signal reflector contributions may be combined to generate a reflector map representing spatial locations of signal reflectors within the geographical coordinate system 850. The reflector map may be provided to the base stations 202-208 to facilitate proactively configuring communication parameters to reduce the frequency of transmission failures.
The reflector map for the wireless communications network 800 may be used to significantly increase a capacity of the network by facilitating proactive beamforming. If the network equipment has knowledge of locations of reflectors that can act to reflect and re-direct transmission beams, the base station can be directed to select a particular beam that points in the direction of a reflector in order to increase signal to noise ratio and reduce interference. As shown in
In another example shown in
Referring to
As in the case of the shadowing embodiment disclosed above, for a dense network of UEs there will be a large number of potential sidelink connections between UEs that may be leveraged to determine reflector locations. Additionally, the base station 802 would generally also receive reference signals from the UEs in the network as part of uplink transmissions from the UEs to the base stations. The base station 802, on receiving the reference signals, may make a determination that the reference signal transmitted was received via an indirect propagation path as described above. Similarly, for downlink transmissions between the base station 802 and the UEs 810-814, a UE may make a determination that a reference signal transmitted by a base station was received via an indirect propagation path. The range estimates for indirect uplink and downlink propagation paths may advantageously be combined with the identification of indirect sidelink transmissions between neighboring UEs for generating the reflector map. One advantage of including uplink and downlink transmissions is that the location of the base station 802 provides an anchor location, which may improve the spatial accuracy of the resulting shadowing map.
Referring to
In practice, there may be more indirect propagation paths than the number of propagation paths Nmp detected by the UE due to limited resolvability of the UE receiver, shadowing, the noise floor, etc. In this disclosed embodiment, indirect propagation paths that involve multiple signal reflectors, and thus more than one signal reflection, are removed from consideration by applying a minimum power threshold γ. Accordingly, only single-reflection indirect propagation paths are considered, which reduces complexity. Indirect signal propagation paths (τ3, τ4 . . . ) that involve multiple reflections will generally be weaker than signals that only undergo a single reflection (τ2). The channel estimation function 1102 thus generates a propagation distance subset Tv,v′Indirect and corresponding power subset Pv,v′Indirect defined by:
Tv,v′Indirect={τjv,v′: j=2 . . . Nmp∧PS(τjv,v′)≥γ} 10
Pv,v′Indirect={PS(τjv,v′)≥γ: j=2 . . . Nmp}, 11
where PS(τjv,v′) is the magnitude of the delay spectrum which may be determined from a power delay profile (PDP) on a channel between the UE v and UE v′, the correlator, or any other super-resolution pseudospectrum. The power threshold γ is selected such that the set of distances τ∈Tv,v′Indirect are constrained to distances traversed by N′mp for single-reflection propagation paths between the UEs. The propagation distance and power sets Tv,v′Indirect and Pv,v′Indirect are transmitted by UEs in the wireless communications network 800 via the base station (802 in
The system 1100 also includes the LoS/NLoS prediction module 502, which implements the LoS/NLoS prediction model generated and trained by the network equipment for determining whether communication links with other UEs or base stations are via LoS or NLoS propagation paths. As in the case of the shadowing map generation system 500 shown in
Referring back to
By making an assumption that the UEs are in the same 2D plane, the problem can be simplified such that the reflector contribution corresponding to each τ∈Tv,v′Indirect is located on an ellipse of focal length d at which the foci of the UE 812 and UE 810 are located. Mathematically, this can be written as:
τn
where (z1, z2) is the locus of nmp th reflector, zv′=(z1v′, z2v′), and zv=(z1v, z2v) are the locations of communicating nodes v and v′ respectively. The locations may be taken from the UE location estimates 306 generated by the localization system 504. Alternatively, in some cases locations may be available as ground-truth locations for nodes such as a base station. Practically, even where a ground-truth location (z°1, z°2) is available, equation 12 is not satisfied due to several reasons:
i. Estimations of the distances τn
ii. If the nodes v and v′ are mobile users, their locations zv and/or zv′ are also contaminated with two independent estimation noises of some limited variances due to the fact that zv and zv′ are estimated from unknown direct path distances; and
iii. Nodes v and v′ are not perfectly time synchronized because they are driven by clock signals having differing bias and skew.
The imperfections (i) and (ii) can be taken into account in equation 12 by introducing an additive noise term as follows:
{circumflex over (τ)}n
where nn
where pn
Because the clock generators of the UEs and base stations are not generally synchronized, there will be clock skew and bias between nodes in the wireless communications network 800. The clock skew and bias cause an unknown circular shift in the power delay profile (PDP) for a channel between nodes v and v′. It may be assumed that each node in the network has an independent clock generator, which means that the PDP for links between nodes in the network would be subjected to an independent time shift. The assumption that the shifts are independent might not be made in cases where the network implements a clock synchronization protocol.
Referring to
i. Estimate an unbiased location estimate zv using a Time Difference Of Arrival (TDoA) technique based on known anchor locations: (zv′, τ1v,v′), v′∈BSv, where BSv is the set of base stations in the network with range measurements to node v. This step relies on time-synchronization between base stations, which is available in currently implemented cellular networks;
ii. Estimate synchronization errors using: {circumflex over (δ)}v,v′=τ1v,v′−∥zv−zv′∥2, v′∈BSv;
iii. Average the synchronization error:
and
iv. Form an indirect path delay set: Tv,v′Indirect={τjv,v′−{circumflex over (δ)}v: j=2 . . . Nmp∧PS(τjv,v′)≥γ}.
With the above formulation, a likelihood of the locus of the reflector corresponding to {circumflex over (τ)}n
Equation 15 is the likelihood of the locus of the reflector corresponding to {circumflex over (τ)}n
The PDF (z) represents the prior knowledge about the location of the reflector to be incorporated into the model. When no such prior knowledge is available, a uniform prior that has maximum entropy may be selected, which yields:
The propagation distance and power sets Tv,v′Indrirect and Pv,v′Indirect received from the UE channel estimation function 1102 may be used to generate a labelled connectivity graph G=(V,E) having labelled range measurements for each edge including sidelink communication links between neighboring UEs an uplink/downlink connection links between UEs and base stations. Denoting by the set of all nodes (UEs and bases stations) in the network 800, and by v⊂ the set of nodes that (i) are connected to UE v (ii) for which propagation distance and power sets Tv,v′Indirect and Pv,v′Indirect have been received from the UE v at the reflector map generator 1104, the connectivity graph G is defined as:
V=E={(v,v′): v,v′∈V∧(v∈v′∨v′∈v)}. 18
Adding location estimates 304 determined by the localization system 504, the connectivity graph in equation 18 is converted to labelled graph G″=(V″, E″, L″) defined by:
V″={(v,zv): v∈V∧z
E″={(v,v′): v,v′∈V″∧(v′∈v∨v∈v′)}
L″={(Tv,v′Indirect, Pv,v′Indirect): (v,v′)∈E″} 19
In equation 19, V″, E″ and L″ are respectively the vertex, edge, and label sets of the graph G″ and the operator z
The reflector map generator 1104 implements a kernel density estimation (KDE) algorithm on the graph G″ to generate the reflection map by updating the following metric:
where (z|{circumflex over (τ)}n
Referring to
Referring to
The UE1 transmits a sidelink positioning reference signal 1402 including the anonymized identifier (SL-PRS) of the UE1 to the UE2. The gNB also transmits a positioning reference signal (PRS) 1404, which is received at the UE2. Each of the signals 1402 and 1404 are processed by the LoS/NLos prediction module 502, and if determined to be received via a LoS propagation path, the UE2 transmits signaling 1406 including respective identifications for the UE1 and/or gNB to the LS for generating UE location estimates. The UE2 also determines range estimate information for the reference signals 1402 and 1404 for transmission to the RMG. The LS receives the LoS identifications and range estimates and generates UE location estimates 306 as described earlier herein. In other embodiments where the UE location estimates are otherwise determined, the signaling 1406 may be omitted.
The channel estimation function 1102 on the UE2 further processes the SL-PRS and PRS signals 1402 and 1404 to generate signaling 1408 including propagation distance and power sets Tv,v′Indirect and Pv,v′Indirect as described above. Because the reflection map construction algorithm works by associating indirect propagation path delays with estimated UE locations for nodes (v,v′) associated with the link, the signaling 1408 is accompanied with anonymized IDs of the neighboring UEs to enable determination of the locations of the nodes, as described above in connection with the shadowing map generation.
The RMG generates reflector map data 1410 as described above and transmits the data to the gNB and other gNBs in the network for use in configuring communications with UEs. In this embodiment, the gNB implements the beam failure monitoring function 714 as described above in connection with the shadowing map generation embodiment. Beam failures for signal transmissions within the gNB cell cause the beam failure monitoring function 714 to produce a signal 1412 that causes the RMG to update the reflector map.
Referring to
One or more base stations and a plurality of UEs transmit and receive reference signals during routine communications. As disclosed above, the LoS/NLoS prediction module 502 is implemented on each base station and UE node. The LoS/NLoS prediction module 502 processes reference signals received at the node and is configured for operation by receiving LOS/NLOS prediction parameters 322. The parameters 322 are generated by a training module 1502, which is implemented on the network equipment. The training module 1502 receives labeled LoS training data generated by a LoS label generation module 1504, which processes uplink, downlink and sidelink communications. The parameters 322 may be continuously generated by the LoS label generation module 1504 and training module 1502, and are periodically communicated to base stations and UEs to update the LoS/NLoS prediction module 502 for current network conditions. The LoS/NLoS prediction module 502 thus processes reference signals received at each base station and UE and identifies the received signals as having been received via either a LoS or an NLoS propagation path.
A direct propagation path identification module 1506 estimates the range parameters of the direct propagation path. The selected direct path range estimates are then fed by to the localization system 504. The localization system 504 estimates the UE locations in a collaborative (parallel) or non-collaborative (sequential) manner. The generation of accurate and unbiased UE location estimates by the localization system 504 is effective in reducing spatial location errors. Spatial location errors would propagate through the pipeline 1500 and manifest in the shadowing and reflection data produced. Reducing the incidence of UE location estimates being determined based at least in part on indirect NLoS communications reduces location bias in the reflector map.
The shadowing map generator 506 generates the shadowing map based on NLoS identifications and location estimates provided by the localization system 504, as described above in detail. The shadowing map generator 506 produces shadowing map data, which is provided to the communication subsystems of the base stations for use in configuring communications with UEs.
In parallel with the direct propagation path identification module 1506, an indirect propagation path identification module 1508 estimates range parameters for 2nd or subsequent indirect path distances between nodes. The indirect path range estimates are fed to the reflector map generator 1104. As disclosed above, in some embodiments only indirect propagation paths that undergo a single reflection may be selected and range estimates for multiple reflection paths may be discarded by the module 1508.
As described in more detail above, the reflector map generator 1104 receives the location estimates from the localization system 504 and the indirect range estimates from the module 1508 and generates the reflector map including locations of signal reflectors. The reflector map on its own does not provide information as to which signal reflectors could be of use in communications between base stations and UEs.
In this embodiment the pipeline 1500 further includes a beam prediction generator module 1510, which is implemented to facilitate location aware beam steering by the base station. Once the locations of significant reflectors in the wireless communications network 800 are known, a base station may be configured to make use of these known reflectors to make beam selection and beam steering decisions for uplink and downlink communications with a particular UE.
The beam prediction generator module 1510 operates on the reflector map data 1410 that includes locations zv,v′refl∈2 of possible reflectors that could be used by a base station station v to redirect a transmission beam to a UE v′. The beam predictor 1510 also receives location estimates zv, zv′∈2 for the base station station v and the UE v′. The base station v has a determined location zv=(z1v, z2v) and the UE v′ an estimated location zv′=(z1v′, z2v′).
Referring to
A set of labelled training data zv,v′refl are generated for locations zv, zv′ using the reflector map (z, t) of equation 20 by:
i. Multiplying every posterior (z|{circumflex over (τ)}n
ii. Determining a most probable reflector location for the reflectors associated with the uplink and downlink for the uplink and downlink communications.
The above steps i and ii may be merged in the following expression:
where v,v′,n
Where the operator
finds duplet [zv,v′,n
The reflector location labels Zv,v′refl.∈2 are then paired with the locations zv, zv′∈2 of the link (v,v′) to generate a training set ={((zv,zv′),zv,v′refl.)}v,v′. In this embodiment only the most significant reflector location zv,v′,n
The above features and/or others disclosed herein may be provided, in any of various combinations, set out in the examples below.
According to an example 1, a method for estimating locations of signal reflectors in a wireless communication network involves: at network equipment, receiving from User Equipments (UEs) in communication with the network, sidelink transmission information including: range estimates indicative of a range associated with a reference signal received from a neighboring UE via the sidelink transmission over an indirect propagation path; a received power associated with each received reference signal; and an identification of the neighboring UE; estimating locations of signal reflectors based on location information for UEs associated with the sidelink transmissions, the received range estimates, and the received power; and configuring communications between the network equipment and at least one UE based on an estimated location of at least one signal reflector.
According to an example 2, the method of example 1 may further involve receiving from a UE: range estimates for reference signals received at the UE over an indirect propagation path from the base station; a received power for each received reference signal; and estimating locations of signal reflectors further involves estimating locations of signal reflectors based on location information of the UE, a location of the base station, the received range estimates, and the received powers.
According to an example 3, the method of example 1 may further involve receiving reference signals transmitted by a UE at the base station and generating: range estimates for reference signals received at the base station over indirect propagation paths from the UE; a received power for each reference signal received over indirect propagation paths; and estimating locations of signal reflectors further involves estimating locations of signal reflectors based on the location of the base station, a location information of the UE, the received range estimates, and the received powers.
According to an example 4, in any of the above examples, causing the base station to configure transmissions may involve at least one of: directing a transmission beam toward a signal reflector to cause the beam to be redirected by the signal reflector to a UE experiencing weak reception of transmitted signals; in response to a determination that one or more UEs are located in an area subject to interference from a transmission beam directed toward a receiving UE, directing the beam toward a signal reflector to cause the beam to be redirected by the signal reflector to the receiving UE; and in response to a determination that a transmission to a UE via a strong line-of-sight (LoS) transmission beam is causing a reduction in the number of data streams that can be spatially multiplexed over the transmission beam, directing at least one additional transmission beam toward a signal reflector to cause the at least one additional transmission beam to be redirected by the signal reflector to the receiving UE, and further multiplexing the transmission over the direct beam and the at least one additional transmission beam.
According to an example 5, in any of the above examples, the method may further involve generating location information for at least some of the identified UEs by one or more of: generating range estimates for uplink or downlink transmissions between the network equipment and at least some of the UEs; receiving range estimates for line-of-sight (LoS) sidelink transmissions between UEs; receiving Global Positioning System (GPS) information identifying locations of at least some of the UEs; and using known location information associated with the base station or UEs.
According to an example 6, in any of the above examples, determining locations of signal reflectors may involve: generating a connectivity graph having nodes corresponding to network equipment in the network and nodes corresponding to UEs for which location information is available; for each indirect reference signal transmission in the connectivity graph, establishing a locus representing a probable location of the reflector; and combining the loci for the indirect reference signal transmissions in the connectivity graph to generate a reflector map representing locations of reflecting obstructions in the wireless communication network.
According to an example 7, the method of example 6 may further involve updating the reflector map in response to receiving sidelink transmission information, more recently received sidelink transmission information being assigned a greater weight than previously received sidelink transmission information.
According to an example 8, in the method of example 6, combining the loci may involve using a kernel density estimation to generate a probability density function of reflector locations.
According to an example 11, the method of example 6 may further involve initiating an update to the reflector map in response to receiving a notification from the network equipment of a transmission failure between the network equipment and UEs.
According to an example 12, in any of the above examples, at least one of the UEs may have a location that changes with time and estimating locations of signal reflectors involves estimating locations of signal reflectors based on successively received sidelink transmission information for the UEs associated with the sidelink transmissions.
According to an example 13, the method of example 6 may further involve: selecting most significant reflector locations from the reflector map for transmissions between the base station and UE nodes in the connectivity graph; using the locations of the base station and UE as inputs to a neural network and training the neural network to output the most significant reflector locations; and using the trained neural network to generate a beam direction for an indirect transmission between the base station and one of the UEs in the network.
According to an example 14, network equipment for a wireless communication network includes: a base station including a transmitter and a receiver; a processor in communication with the base station; and a processor-readable memory in communication with the processor and storing processor-executable instructions which, when executed by the processor, cause the processor to perform a method involving: receiving at the receiver of the base station from User Equipments (UEs) in communication with the network, sidelink transmission information including: range estimates indicative of a range associated with a reference signal received from a neighboring UE via the sidelink transmission over an indirect propagation path; a received power associated with each received reference signal; and an identification of the neighboring UE.
The example further involves causing the processor to estimate locations of signal reflectors based on location information for UEs associated with the sidelink transmissions, the received range estimates, and the received powers; and configuring communications between the base station and at least one UE based on an estimated location of at least one signal reflector.
The LoS/NLoS prediction module 502 and localization system 504 shown in
Although geometric-based approaches to UE positioning determination may be simple and cost-effective, such approaches tend to work well in a LoS scenario and when certain assumptions on signal, noise, channel, and array models are satisfied. However, NLoS scenarios are more common and realistic in wireless communication networks.
As noted above, efforts on addressing the issue of NLoS include LoS identification and LoS mitigation. There may be a limited number of BSs that can communicate with a UE at any time, and therefore LoS identification might leave too few BSs as positioning anchors to localize UE position. For example, in order to localize a UE in three dimensional (3D) space using triangulation, at least four BSs are needed. This can be a problem especially in cellular systems for urban areas where the probability of NLoS is normally higher than the probability for LoS. Although NLoS error subtraction according to LoS mitigation may make all links usable for positioning determination, LoS mitigation is a much harder problem to tackle than LoS identification.
Given the complexity of the LoS mitigation problem, LoS identification may still be an attractive option for positioning determination. Although techniques based on using only LoS links for positioning determination are often referred to as LoS identification techniques, it should be noted that LoS identification according to embodiments disclosed herein may involve identifying LoS links, identifying NLoS links, and/or otherwise distinguishing LoS links and NLoS links from each other. Regardless of the type(s) of links that are actually identified, determining which links are NLoS links and removing them from positioning determination is an important step in improving the accuracy of positioning or localization systems based on LoS identification. For example, if no prior positioning or localization statistics about NLoS links are known, then an optimum positioning algorithm is one that determines which links are NLoS links and eliminates them from the positioning determination process. This is because the Cramer-Rao Lower Bound (CRLB) does not depend on NLoS links. In essence, LoS identification is a much simpler problem than LoS mitigation, but reliable LoS identification remains a challenge.
On the cusp of transformation to 5G, sidelink (SL) communication is becoming a fundamental driver of change, in particular with rising interest in such applications as UE cooperation and vehicle-to-everything (V2X) communications, for example. SL communication refers to the ability of close-by UEs to communicate or cooperate with each other directly, rather than through network communications. An SL is therefore an example of a direct wireless communication link between UEs. Such exploitation of spatial diversity beyond what is possible through Multiple Input Multiple Output (MIMO), for example, is expected to have enormous potential and enhance communication network capacity.
SL communication is also potentially beneficial for positioning, and may be useful in addressing some of the long-standing challenges facing the field of positioning, such as accurate and reliable NLoS elimination, anchor insufficiency, etc. For example, shadowing is the main phenomenon that causes NLoS, but decorrelates within the order of meters. With reference to
As such, shadowing can potentially be detected if UEs can be become “positioning proxies” for each other. Perhaps even more important is the fact that the probability of LoS in SL communications is expected to be higher than in uplink (UL) or downlink (DL) communications, because UE cooperation through SL communications is expected to be allowed only within limited geographical areas to conserve UE power and keep SL interference patterns in a communication network under control.
Some embodiments disclosed herein relate to building or training a model that predicts the presence of NLoS links using Machine Learning (ML), and illustratively Neural Networks (NNs). UL, DL, and SL communications and measurements are used in some embodiments in collecting data for building or training such a model. The present disclosure encompasses embodiments in which existing communication network infrastructure, rather than an expensive and non-autonomous expert system, is exploited to generate training datasets at a much larger scale and possibly in an uninterrupted manner instead of relying on availability of potentially less noisy but much smaller datasets obtainable from expert systems.
Distinguishing between LoS links and NLoS links has conventionally been done through a hypothesis testing framework. This involves forming a likelihood ratio ∧(x) of a statistic x of the received signal and deciding in favor of one of the two hypothesis 0 (LoS) and 1(NLoS):
where xLoS and xNLoS are the Probability Distribution Functions (PDFs) or likelihoods of LoS and NLoS, respectively. If distributions of x under LoS and NLoS are sufficiently distinct, then the above Likelihood Ratio Test (LRT) can help make a LoS/N LoS decision. Establishing this ratio requires knowledge of the PDFs and threshold γ, which depends on extensive prior knowledge that is typically collected through offline surveying. Ideally, γ=(1)/(0), where (r) is the ground-truth probability that r happens. However, this is not known exactly, and therefore experimentation is used to find a best estimate. In an environment where LoS/N LoS happen with the same frequency, γ=1.
In order to obtain labelled data for ML training, expert systems in an ultra-wideband (UWB) radio system or a high-resolution imaging system are to be used. However, one issue with such approaches for labelled data collection, which is also referred to as fingerprinting, is that these types of systems are expensive to operate. Generated labelled data are also not completely error-free. In addition, there is a potential scalability issue, especially in the context of using an expert system in wireless networks where the environment undergoes frequent changes that necessitate intermittent collection of training data from the new environment in order to pursue retraining. Just one labelled data set for an area of 100 m by 100 m with 1 m by 1 m resolution, for example, requires collection of 10,000 distinct fingerprints. Clearly this presents a scalability challenge for higher resolutions, larger areas, and/or retraining in expert system-based implementations.
When environment changes are ignored and an ML or Artificial Intelligence (AI) model is trained on a stale data set and utilized to predict NLoS bias at a location whose channel conditions have changed, significant prediction error can be introduced. This issue is known as concept/feature drift, and the resultant prediction error can manifest itself in the form of false alarms or misdetection, for example.
One possible approach to help mitigate or remedy drift and associated prediction error would be to morph or integrate an exploration subsystem, which is involved in label collection and training, into an exploitation subsystem, which utilizes a trained model. For example, one such approach may rely on “crowdsourcing” abilities of communication networks to collect a large amount of data during normal communications. This in effect leverages the distributed and mobile nature of UEs in order to collect large datasets for training. Existing infrastructure, rather than expensive and non-autonomous expert systems, can then be used to generate data for training but at a much larger scale and in an uninterrupted manner instead of relying on availability of smaller amounts of labelled data from expert systems.
Overall, existing ML solutions for LoS identification suffer from several shortcomings, including reliance on the availability of an expert system, high associated cost, being labor-intensive, and not being robust to feature and concept drift as the wireless communication environment is constantly changing.
The present disclosure relates in part to a model for predicting the presence of LoS/NLoS links based on range estimates that were collected or otherwise determined from UL, DL, and SL communications, in a cost-effective and adaptive manner. Other information, such as angle estimations based on UL communications, may also be used in building or training such a model.
In some embodiments, training data for developing a model includes a collection of tuples {(x, w)l}l, where x is a feature of lth link that is spatially unique but can be replicated temporally, and w indicates whether the lth link is NLoS, LoS, or unknown. For example, in one embodiment, w∈{−1,0,1} indicates whether the link is NLoS (w=1), LoS (w=−1), or its status is unknown or indecisive (w=0).
Current approaches for collecting labels or training data are exhaustive processes as discussed above. An expert system is needed to survey the environment by collecting data x from each BS, and to then determine whether the link that is observed to that BS is or is not an NLoS link so that labels w can be generated and (x, w) can be formed before moving to a new location to repeat this process. Obtaining labels that are free from error is a laborious and costly task. When a link is obstructed, inspection based on received signal power is not in itself a reliable indication for the presence or absence of LoS. Instead, a specialized system such as a UWB system with high resolvability that has a multi-GHz sampling rate is needed to be able to detect whether there is a direct-path component of a signal that has a stronger indirect-path component. Even an expert system that is often used for training data collection introduces some error into the labeling process, due to such conditions as lack of synchronization, blockage, etc. Completely pure labels cannot be achieved in practice through streamlined processes.
In accordance with teachings in the present disclosure, labels for building or training a model are generated using the same devices that communicate in network, such as UEs and BSs. Although this may introduce some error into the labeling process, a dataset may be continuously updated without requiring an offline exploration or surveying stage, to collect data for training or otherwise building a model, that is separate from a prediction or exploitation stage to use the model for prediction.
In a communication network that supports UL, DL, and SL communications, Reference Signals (RSs) that are normally used for establishing and/or maintaining communication links can also be used to estimate ranges between network elements. See
The example wireless communication network 1800 includes BSs 1802, 1804, each shown by way of example as a gNodeB (gNB), and UEs 1810, 1812, 1814, 1816, 1818, 1820. The operating environment of the UEs includes obstacles in the form of reflectors 1830, 1832, 1834 and shadowing obstacles 1840, 1842, 1844. Unobstructed LoS links are shown as solid lines, and different dashed line types are used in
Communications may take place over any or all of the links shown in
With denoting the set of all nodes (UEs and BSs) in the network, and v⊂ denoting the set of nodes that (i) are connected to a UE v and (ii) were subject to range measurements with v, the connectivity graph G is defined by vertex set V and edge set E as given by
V=E={(v,v′): v,v′∈V∧(v∈v′∨v′∈v)} 24
In order to establish G at network equipment, each UE relays signaling that is indicative of the following set to that network equipment in some embodiments
TvSL={(xv,v′, {circumflex over (τ)}v,v′,idv′): v′∈UEv}, v∈V 25
where UEv⊂v is the set of UEs that (i) are connected with UE v and (ii) were subject to range estimates to UE v, {circumflex over (τ)}v,v′ is the SL range estimate between UEs v and v′, and xv,v′ is a processed version of SL channel data, also referred to herein as a channel tensor, that is obtained by transforming raw channel data hv,v′ into a form that is free from or at least has reduced spurious fluctuations that inhibit learning, such as random synchronization errors and Small Scale Phase (SSP) for example. A cross-covariance tensor is one example of xv,v′.
Similarly, with BSv∈v denoting the set of BSs that (i) are connected with UE v and (ii) were subject to DL range measurements with UE v, in some embodiments signaling that is indicative of the following is also relayed by the UE to network equipment that is to establish the connectivity graph
TvDL={(xv,v′, τ̆v,v′): v′∈BSv}, v∈V 26
where τ̆v,v′ is the DL range estimate between BS v′ and UE v and xv,v′ is a channel tensor as described above.
A full connectivity graph may also take into account TvUL, the information set inferred by each BS as a result of UL ranging. Each BS, like each UE, may transmit signaling that is indicative of this set to a network component that generates the connectivity graph, if the connectivity graph is not generated by the BS itself.
Given sets TvSL, TvDL, TvUL, ∀v∈V, a full-connectivity graph can be established and NLoS/LoS labels for the tensors xv,v′ can be generated as disclosed by way of example in further detail elsewhere herein. These labels and tensors are subsequently used in training, which is also disclosed herein by way of example.
When there is no range estimate on a particular SL/UL/DL or the range estimate for a link is stale, in some embodiments the corresponding edge in the connectivity graph is removed or updated with a new range estimate. Range estimate expiration relates to environment changes, due to UE mobility for example, as a result of which distances between UEs and other elements in a communication network vary in time. Without any blockage or shadowing in a communication network, all links are LoS links. In this case, any closed connectivity path, such as a “triangle” or more generally a loop, “cycle”, or “circle” r, denoted by Cirr=(Vr, Er), in the full-connectivity graph has the property that
where τ is the general notation for true range in UL/DL/SL and Vr, Er are the vertices and edges of rth sub-graph circle Cirr on the full-connectivity graph. In the present disclosure, closed connectivity paths are referred to generally as “circles” simply for ease of reference. It should be appreciated, however, that a closed connectivity path or loop is not necessarily circular in shape, and may instead be triangular or more generally polygonal.
In general terms, equation 27 specifies that the range for any edge in a closed connectivity path should be smaller than the sum of ranges for the other edges in that same closed connectivity path. In the simple case that |Er|0=3, equation 27 is the triangle inequality. In reality, some links may be NLoS links as shown in
To potentially improve the chance of detecting NLoS, an exhaustive search through a full-connectivity graph G may be performed, to find a minimum distance circle between every two nodes v,v′
where circ is the set of circles in the graph and r*v,v′ is an index of a circle that achieves the minimum sum delay d*e based on ranges or range estimates associated with the edges that form a circle including v,v′. Equation 28 in effect represents searching through the connectivity graph to find all the circles that connect every two nodes, obtaining the sum of delays on each circle, and finding the minimum sum of delays over all those circles. The following criterion can then be evaluated
This criterion is based on an expectation that any link having a range estimate that is greater than the entire delay of the minimum distance circle is likely an NLoS path. An equality condition, in which {circumflex over (τ)}v,v′=d*v,v′ may be treated in the same manner as a range estimate that is above the threshold or in the same manner as a range estimate that is below the threshold. For example, the equality condition may be treated in the same manner as a range estimate that is above the threshold to potentially increase the number of training samples for which a definitive label can be generated. In other embodiments, because the equality condition is less definitive of an NLoS condition than an inequality {circumflex over (τ)}v,v′>d*v,v′ in equation 29, it may be preferable to treat the equality condition in the same manner as a range estimate that is below the threshold to decrease the probability of misdetection of NLoS.
Equations 28 and 29 are checked ∀(v,v′)∈E. Note that equation 28 excludes inter-BS edges due to the way E was defined above. Inter-BS links need not necessarily be excluded in all embodiments. For example, a communication network could potentially include one or more movable BSs such as drone BSs, and the techniques disclosed herein could be applied to inter-BS links that include at least one movable BS.
If all UEs in a communication network can communicate with each other and with all BSs, then there are Ncirc circles in the set circ which is given by
where NBS and NUE denote, respectively, the number of BSs in set BS and the number of UEs in set UE, and
denotes an “a choose b” operation. The term k is constrained to being greater than three in determining Ncirc because a circle or closed path between any two network elements or nodes v,v′ includes those two network elements or nodes and at least one more network element or node.
The set circ contains numerous possibilities, examples of which are illustrated in
In practice, the connectivity graph is much sparser because: (i) only close-by UEs may communicate with each other, (ii) even close-by UEs might not need to establish a SL, and (iii) range estimates on SLs might not be available or may become unreliable or stale.
If 1 is satisfied in (1-7) for an edge (v,v′), then in some embodiments wv,v′ is set to 1; otherwise, if 0,1 is satisfied, then in some embodiments wv,v′ is set to 0 to provide an unknown or “indecisive” clue that 0,1 does not imply LoS or NLoS. It should be noted that these values, and others herein, are solely for the purpose of illustration. Other values may be used in other embodiments to indicate LoS, NLoS, or an indecisive result or unknown LoS/NLoS state.
In some embodiments, training for LoS identification with these choices of labels is done through an NN with a three-state output, whereby labels for the third state are obtained through another type of discrepancy check described elsewhere herein. Alternatively, a regression problem may be formed through different choices of labels. In the case of regression problem formulation, considering a link for which equation 27 or (1-7) is not violated, a probability of NLoS is assigned to that link in some embodiments using information from received signal power p, or correlation magnitude if a correlator is used to detect range
The logic behind equation 31 is quite intuitive. The larger the power of the eth link, the lower its probability of NLoS, and hence the smaller the value wv,v′. Nonetheless, it should be kept in mind that the validity of equation 31 hinges on an assumption that all transmit powers and Automatic Gain Control (AGC) gains are equalized on all the vertices of a connectivity graph. It should also be noted that equation 31 applies to embodiments in which higher values of wv,v′ indicate higher probability of NLoS, which need not necessarily be the case in all embodiments. An analogous approach may be developed based on equation 31 for lower values of wv,v′ indicating higher probability of NLoS, for example.
In constructing or compiling a training set, a training sample (xv,v′(t), wv,v′(t)) is formed for ∀(v,v′)∈E at time t, to be added to the training set =∪(t){(xv,v′(t),wv,v′(t))}. Note that construction of a training set in some embodiments is an ongoing process that is carried out through a crowdsourcing process that is transparent to UEs. This means that all UEs contribute to evolving the training data without their communications being disrupted. Therefore, no separate, offline surveying step using an expert system (UWB radio, ultrasonic, RADAR, LIDAR, etc.) is needed, in contrast to previous fingerprinting methods.
These label generation techniques exploit spatial diversity. Angular diversity may also or instead be used in other embodiments.
A spatial diversity approach may accurately generate labels for some but not necessarily all links in a communication network. For example, there may be situations in which NLoS exists on one or more edges of the minimum distance path or circle between two nodes or vertices but the condition for the NLoS hypothesis 1 in (1-7) is not satisfied. Although the number of unlabeled links could potentially be reduced by applying equation 27 to each minimum distance circle in a connectivity graph, this would not address the fact that the spatial diversity approaches above do not generate any clues about LoS links, for hypothesis 0. A NN trained with such labels, without LoS labels, would be expected to result in a predictor with higher misdetection rate (PMD) but lower false alarm rate (PFA), defined as
PMD=(0|Link is NLoS)
PFA=(1|Link is LoS) 32
These two quantities are directly related two important measures of performance in machine learning, known as recall and precision. A better balance between PMD and PFA is often desired, but achieving a better balance involves generating LoS clues and labels as well. According to another aspect of the present disclosure, AoA is estimated at BSs and the law of cosines is used to generate LoS clues and labels.
One reason to concentrate on angular diversity and AoA measurement or estimation at BSs only, and using UL communications, is to abide by the following important practical constraint: AoA is measured or estimated relative to broadside of a receiver's antenna or antenna array, which is the reference of the antenna's or array's Local Coordinate System (LCS). Although a local angle can be converted to a Global Coordinate System (GCS) if the direction of true North is known, for mobile UEs where orientation is constantly changing, tracking the time-varying offset between antenna or array broadside and true North is possible but can be highly erroneous and processing-intensive. For example, tracking such offset is theoretically possible through readings obtained from 3D gyroscopes inside Inertial Measurement Units (IMUs) at UEs to identify angular shift, along with magnetometer readings to identify the direction of true North, but the level of error in such readings from off-the-shelf IMUs embedded within UEs may be too high to track UE antenna offset with sufficient accuracy for angular diversity techniques as disclosed herein. Aside from this practical aspect, accurate AoA measurement in a multipath environment depends on availability of antenna arrays with a large aperture, and accordingly a large number of physical antenna elements, which is often not feasible at UEs. Therefore, UL AoA estimation or measurement at BSs is primarily considered herein. Angular diversity techniques may also or instead be applied at UEs in other embodiments in which this is feasible.
The UE2-BS and UE1-UE2 links are LoS, whereas the UE1-BS link is NLoS, as shown at the left in
The law of cosines defines a mathematical relationship between sides and angles of the triangle ABC in the middle diagram in
where θ is the angle between the two sides of a triangle. In the connectivity graph shown in the middle diagram in
When ranges and AoAs are measured with infinite precision,
From a practical perspective, NLoS causes a much wider discrepancy gap |
Alternatively, if
NLoS biases on two independent links are independent random variables, and therefore having equally biased NLoS links is highly improbable. This serves as the basis for the following hypothesis testing criteria
Although these criteria are based on an assumption that SLs are LoS links, this is an assumption that can often be satisfied with confidence at least because SL communications are between close-by UEs. To potentially increase confidence that the LoS assumption on SL is satisfied, in some embodiments only SLs whose received power is above a confidence threshold are added to a connectivity graph.
To generate labels, in some embodiments a connectivity graph is used to locate all triangular connectivity paths that are found between UEs and BSs, but potentially excluding inter-BS triangles if BSs have fixed locations. There are two different types of triangular connectivity paths that may be found in a connectivity graph, as shown by way of example in
To potentially improve confidence on the SL in type (b) being truly LoS, the connectivity graph may be pruned by removing edges corresponding to SLs for which received power falls below a threshold p0. This is a graph with a set of edges given by
E′={E: pv,v′>p0, v∈UEv′∧v′∈UEv} 35
where E is given by equation 24 above. With such pruning, only close-by connections participate in establishing triangular connectivity paths, which increases the chance of LoS on SL.
To reduce ambiguity that may remain from NLoS labelling due to “indecisive” spatial diversity labels, such as wv,v′=0 in an example above, it is possible to apply the following logic: If a UL/DL edge (v,v′)∈E′ has already been labelled as an NLoS link, with wv,v′=1 in an example above, then it is excluded from further consideration. Otherwise, the hypothesis testing using equation 34 is conducted on (v,v′). It should be appreciated, however, that spatial diversity techniques and angular diversity techniques are not dependent upon each other. Although both techniques are based on closed connectivity paths, these techniques could be applied independently of each other and not necessarily in combination.
The same edge in a connectivity graph may be a side to many triangles, and with the evaluation of equation 34 being a threshold-dependent decision, one edge could be identified both LoS and NLoS based on equation 34. With nv,v′1, denoting the number of times an edge (v,v′) was identified LoS and nv,v′2 denoting the number of times it was inconclusive, where nv,v′=nv,v′1+nv,v′1 is the number of connectivity graph triangles of which v,v′ is a side, then the following voting is carried out based on nv,v′1 and nv,v′2 in some embodiments
where wv,v′=−1 denotes LoS and wv,v′=0 reflects the indecisive nature of that link. Training an NN with such labelled data, however, may still yield a model that can predict labels for channels with indecisive labels in training data. Equation 36 represents one embodiment, and in another embodiment the equality condition nv,v′1=nv,v′2 is assigned to wv,v′=0.
Various embodiments that involve range and/or angle measurement or estimation are described above and elsewhere herein. Range measurement or estimation between UEs need not necessarily be restricted only to Radio Frequency (RF) measurement. Other ranging techniques may also or instead be exploited in order to measure or estimate range, such as ultrasound systems, radar-based ranging, laser distance estimation, and vision/camera processing for example. As long as range estimates between UEs are available, LoS/NLoS labels can be created for training or otherwise developing a model. Similar comments apply to range estimation or measurement between UEs and BSs, and to angle estimation or measurement.
Some embodiments take spatio-temporal information into account. In mobile cellular networks, connectivity changes over time. For generation or collection of labelled data based on connectivity as disclosed herein, it may be preferable for edges to be regularly added to or eliminated from the full connectivity graph. See
The example wireless communication network shown at 2200 in
Range estimates in UL/DL/SL between the BS 2202, the stationary UE1 and the mobile UE2 are shown in the network block diagram at 2200, simplified connectivity graphs at times t1, t2, t3 are shown at the upper right in
As illustrated in
Tracking the displacement of UEs is possible through such devices as inertial sensors in IMUS, or odometers in wheel-based systems if a UE is or is associated with a vehicle, for example. Some IMUs are built from micro electro-mechanical sensors that measure the change in capacitance in order to record a terminal's line acceleration and angular velocity in three orthogonal directions, for example. For the purposes of connectivity, we are interested in knowing displacement, and only 3D accelerations of a UE v, which can be expressed as a vector av(t)=(axv(t),ayv(t),azv(t)), ∀v∈UE, can be used to derive displacement
where CEM denotes electromagnetic wave propagation speed.
A connectivity graph that is obtained or maintained in this way, to retain edges after a UE has moved, may be more dense or much less sparse than a purely spatial connectivity graph, thereby potentially offering more information to tighten bounds of constraints such as equation 28. Higher density of a connectivity graph that exploits spatio-temporal information is readily apparent from a comparison of any of the three individual spatial connectivity graphs at the top right in
Such higher density in a connectivity graph may increase the likelihood of generating more accurate NLoS/LoS training labels, and/or being able to generate decisive or definitive labels for more links. The Δτv(t,t+Δt) displacements may be transmitted by a UE to a BS, a positioning server, and/or another component that maintains a connectivity graph by all UEs, periodically and/or when a UE is moved a certain distance. These displacements can be deemed as virtual range estimates as if the information collected from one UE at multiple different locations at different times had been collected from multiple UEs at those locations in one snapshot, and can be used to make the connectivity graph more connected, denser, or less sparse.
It should be noted that displacement-based updates and retention of edges in a connectivity graph may supplement but not entirely replace other connectivity graph updating. For example, acceleration estimates are noisy and inaccurate because
av(t)=āv(t)+nv(t) 38
where āv(t) is the ground truth acceleration of a UE and nv(t) is an additive noise term. This being the case, the double-integration of noise in equation 37 causes the estimated displacements to continuously drift away from actual displacement. Therefore, UEs might also send a “displacement flag” or other indication to a positioning server or other component that maintains a connectivity graph, to signal that sufficient movement has been made since the last update to warrant updated SL range estimates rather than additional displacement-based updates from the UE. A UE could instead just stop sending displacement information and revert to determining and sending a range estimate after a certain number of displacement updates have been sent, a certain amount of time has elapsed since the most recent range estimate, and/or after the UE has been moved by more than a certain distance. These conditions are also examples of conditions that may trigger sending of a displacement flag by a UE. It should also be appreciated that sending a displacement flag and/or otherwise initiating a new range estimate may be performed by one or more other components in a communication network, and not only by a UE.
Turning now to training, in some embodiments an NN is trained, by a positioning server in some embodiments, with a training set ={(xl,wl)}l, which may be continuously incremented. The training set may contain data in UL/DL to/from different BSs and SL among different UEs. This means that a single NN may be trained, rather than having several NNs. If the goal were to predict LoS/NLoS only in UL and DL, then it is possible to have one NN per BS. However, in order to also predict LoS/NLoS on SL, the problem of developing an NN for each UE becomes computationally challenging.
With three-state labels, for NLoS, LoS, and indecisive or unknown as discussed at least above, the problem of LoS identification can be cast as a classification problem. In order to make the classification problem possible, in some embodiments labels are converted to a “one-hot” or a single binary “1” value encoded representation as follows
w=1→[1,0,0]
w=0→[0,1,0]
w=−1→[0,0,1] 39
This is an example only, and other encoding or labeling may be applied in other embodiments.
Considering the example NN in
A training sample (xv,v′(t),wv,v′(t)) is generated for every edge (v,v′)∈E of a connectivity graph to build a training set ={(xv,v′(t),wv,v′(t))v,v′,t} across space and time, and labels are encoded according to one-hot encoding in some embodiments, such as for training the example NN in
The data in the training set are provided to an NN whose loss function is a binary cross-entropy in some embodiments
where fwM1(xl)[p] is pth output of the NN, and W denotes the weight tensors, not to be confused with labels wl, of the FCNN at all layers that are to be learned through the following minimization in some embodiments
Note that for equation 40 to be well-defined, outputs fwM1(xl)[p]∈[0,1], ∀l,p, a constraint that is satisfied if a softmax activation is applied to the output layer, for example.
Once the model is trained, it can be used to infer whether a link is LoS or NLoS. In some embodiments, this involves observing a new channel in UL,DL, or SL to obtain h, applying the same preprocessing as done for training data to get x, and then finding
where fw*M1(x) [1≤j≤3] denotes jth output of the 3-states NN, 1 is the NLoS hypothesis on the link with channel tensor x, 0 is the LoS hypothesis on the link with channel tensor x, and NaN is a symbol denoting an indecisive state on the link with channel tensor x.
Whereas training is expected to be carried out by network-side strong AI engines with large processing units connected to unlimited power sources as opposed to battery-driven UEs, performing inference can be done by UEs. This may be especially practical in embodiments in which cellular chipsets come with a separate AI unit that can perform inference quickly and efficiently, as is now often the case.
UE-based inference might also be preferred when SL measurements are involved. If UEs are to use NLoS/LoS predictions but do not themselves run the model, then they will have to send live measurements TvSL{(xv,v′,{circumflex over (τ)}v,v′,idv′): v′∈UEv}, v∈V, or at least signaling indicative of observed channel data, to another component of a communication network so that the model is run to predict whether a link (v,v′) is a LoS link or an NLoS link: wv,v′=fw*M2(xv,v′). The channel tensors xv,v′ that are used in some embodiments, for example, can be of very high dimension. It can therefore be quite resource intensive for SL inference to be performed at BSs or other network components.
Although TvSL are also sent in UL in some embodiments to establish a connectivity graph and generate training data, it should be noted that training and retraining are expected to happen much less frequently than inference. Therefore, a more practical solution, in terms of communication resource usage, may be to transfer the model to UEs once training or retraining is completed. A model for a geographical area that is covered by several BSs, for example, can be broadcast to all UEs for the first time after initial training, instead of being unicast. For subsequent retraining, weights in an NN may be initialized to the most recent optimal configuration, and the NN can then be retrained in substantially the same way as initial training but with a new or updated training set. When retraining is complete, an update such as only the weights that have changed by a certain amount, along with the locations of those weights in the model, may be distributed to UEs.
A model may be defined at least in part in a large database of weights, which may be hundreds of Megabytes to several tens of Gigabytes depending on the capacity of the model. Due to changes in environment caused by such factors as mobility and/or phase-in/phase-out of obstacles such as signal scatterers and reflectors, periodic retraining may be preferred in wireless applications. Although a model may be broadcast or otherwise transferred to UEs in some embodiments to enable UEs to perform inference, it may be impractical to transfer the entire model to each UE every time the model is retrained.
Fortunately, the operating environment in a wireless communication network does not typically change so abruptly as to require full retraining. In some embodiments, a model is retrained with only limited batches of online retraining data. For example, retraining data may be collected only from certain coverage areas that are known or expected to have changed, or only retraining data that is expected to modify some but not all of the NN weights in the model may be collected. Even full retraining using data collected from an entire coverage area is unlikely to change every weight in a model. As such, a positioning server or other network equipment can send to UEs only those weights that changed, or changed significantly by more than a threshold amount, with the positions of those particular weights in the NN model as noted at least above. This can significantly reduce the burden of communicating a large NN model to every UE every time the model is retrained.
Thus, in some embodiments, a full trained model is distributed to UEs only once, and thereafter only changes are distributed to the UEs after retraining.
With the model known at the UE v, the UE can run input data, such as channel data xv,v′ that it observed in DL and SL, through the model to predict whether each of the DL and SL links to which it is connected is LoS or NLoS, and form the following sets in an embodiment
LoS-UEv={v′:fw*(xv,v′)≈−1∧v′∈UEv}
LoS-BSv={v′:fw*(xv,v′)≈−1∧v′∈BSv}
LoSv={v′:fw*(xv,v′)≈−1∧v′∈v} 43
According to equation 43, LoS-UEv and LoS-UEv are, respectively, the set of all UEs and the set of all BSs, on the full-connectivity graph G, that have an LoS path to v, and LoSv=LoS-UEv∪LoS-BSv. In some embodiments, signaling indicative of the set LoSv is then forwarded by all UEs to a network component that maintains a connectivity graph, so that the connectivity graph can be pruned to only retain edges that are associated with LoS links and therefore are not associated with NLoS. This pruned graph can be denoted GLoS=(VLoS,ELoS). The same result could be achieved by determining sets that do not include elements of LoS-UEv and LoS-BSv and sending signaling that is indicative of such sets. In other words, inference may identify LoS or NLoS/unknown sets, and pruning could be based on indications of LoS or indications of NLoS/unknown.
Several different embodiments are envisioned to integrate aspects of the present disclosure into network architecture, depending on whether inference is to be performed by UEs, and/or at a network side such as by a Location Management Function. It is expected, however, that training using network resources will generally be preferred, given that training can be an extremely resource-intensive process that is not particularly suited to UEs with more limited power, computation resources, and memory.
A positioning server is an example of network equipment by which features disclosed herein may be provided in some embodiments, and includes at least a transmitter and receiver to support communications with other devices such as BSs and/or UEs, and a processor and/or other components configured to support positioning determination. A positioning server is also an example implementation of a Location Management Function (LMF).
A primary goal of LoS identification is to identify NLoS links and exclude them from position estimation. Therefore, an important consideration is how LoS SL range measurements between a UE v and another UE v′∈LoS-UEv can be used for positioning determination, with the UE locations zv=(z1v,z2v,z3v) and zv′=(z1v′,z2v′,z3v′) both being unknown. Another application of the proposed LoS identification method is in exploiting the knowledge as to whether a link is NLoS in order to improve robustness of that link for future communications. For instance, if the UE on the transmitting side of an SL knows with high probability that its link to the receiving side is an NLoS link, then it may adjust its Modulation and Coding Scheme (MCS) and/or transmit power, for example, to reduce the likelihood that communications will undergo severe degradation, that retransmission will be necessary, etc.
In some embodiments, collaborative localization is used for UE position determination, based on range estimates performed in UL, DL, and SL along with the known locations of anchors. This is different from current positioning approaches in cellular systems where the network localizes each UE through solving a separate optimization problem. Instead, with SL information available, there will be one entangled position estimation problem for many UEs at the same time. This is considered in further detail below with reference to
The example wireless communication network 2400 includes BSs 2402, 2404, 2406, 2408 and UEs 2410, 2412, 2414, and the operating environment of the UEs includes obstacles 2430, 2432, 2434.
Locations of UEs may be considered sensitive information, and therefore in some embodiments joint position estimation for UEs is not performed at UEs but rather at a positioning server or other network equipment so that confidentiality of location information is maintained.
In the most general case, the Maximum Likelihood (ML) formulation of the positioning problem is given by
where T samples from each snapshot of the network are collected within a stationarity region in some embodiments in order to smooth the estimation. Assuming the measurement model induces Gaussian noise with similar variance, equation 44 reduces to a Minimum Mean Squared Error (MMSE) problem
This is a non-convex optimization problem that is commonly encountered in the positioning domain. There are also other approaches to solve this problem, through a message passing algorithm for example.
Various embodiments are described in detail above, primarily in the context of how elements in a communication network operate and interact.
In the signal flow diagram 2500, two UEs including UE1 and UE2, a gNB, an LMF, and an AI engine are involved in a training phase 2510. The gNB, the LMF, and the AI engine are network-side components, and may be implemented together in network equipment or separately. Although only two UEs and only one gNB are shown in
Reference signaling from UE1, shown by way of example as SL Positioning Reference Signal (PRS) signaling, is transmitted to UE2 at 2512. Based on this reference signaling, at 2514 UE2 estimates SL range and channel data, and calculates a channel tensor in the example shown. UE2 also transmits signaling to the LMF at 2516. The signaling includes or is otherwise indicative of the SL channel tensor, the SL range estimate, and an identifier id1 of UE1. UE2 also receives DL-PRS reference signaling from the gNB as shown at 2518, estimates range and channel data and calculates a channel sensor for the DL from the gNB at 2520, and transmits, to the LMF at 2522, signaling that includes or is otherwise indicative of the DL channel tensor and the DL range estimate, and in some embodiments an identifier (not shown) of the gNB. The transmission at 2522 is labeled as “UL/DL” in the drawing, which would be the case in embodiments with UL/DL channel reciprocity. DL channel tensors and range estimates for a UE-BS pair may or may not apply to UL between the same UE-BS pair.
It should also be noted that UE1 and/or the gNB may similarly receive reference signaling, estimate or calculate range, channel data, and channel tensors for one or more links, and transmit signaling to the LMF. This is not shown in
At 2524, 2526,
Connectivity graph generation and label generation by the LMF, based on received signaling, is shown at 2528. A training data set that includes or is otherwise indicative of channel tensors and generated labels is signaled to the AI engine by the LMF, and is used in training an NN-based model at 2530. NN weights are signaled to the LMF at 2532. In the embodiment shown, the NN weights, or at least changed weights in the case of retraining, are also signaled to UE2 at 2534, and may be broadcast to all UEs. It should be noted that not all embodiments involve inferencing at UEs and therefore NN weights need not necessarily be signaled to a UE in all embodiments.
In an operations phase or stage 2540 in the example shown, inferencing is performed at UE2. UE2 receives SL-PRS signaling 2542 from UE1, and performs SL NLoS prediction at 2544 based on the received signaling. Although not explicitly shown at 2544 to avoid further congestion in the drawing, UE2 may estimate channel data based on the reference signaling received at 2542 and calculate a channel tensor for input to an NN based on the channel data. Similarly, DL NLoS prediction may be performed by UE2 at 2548 based on PRS signaling 2546 received from the gNB.
The signaling at 2550 enables pruning of a connectivity graph by the LMF, as shown at 2556. Positioning determination or location estimation as shown at 2558 is not necessarily dependent upon graph pruning at 2556 in all embodiments.
Retraining may be initiated in response to any of various conditions, and two examples of signaling that may initiate retraining are shown at 2552, 2554. A displacement flag, as indicated above, may be signaled by a UE that has been providing displacement updates. The displacement flag 2552 in
Signaling of a new or updated batch of training data at 2554 may also or instead trigger retraining. PRS signaling may be communicated between UEs and BSs during normal operations associated with establishing and/or maintaining links, and accordingly training data collection and label generation may be ongoing, so that a new or updated training data set is available whenever retraining is to be performed. Retraining may be requested or initiated by any of the components illustrated in
Retraining may proceed in much the same manner as shown at 2510 in
Other variations in
There are also various options for the signaling shown in
When an NN model is to be transferred to UEs, this may be done by broadcast. To broadcast the model, which is expected to happen infrequently, UEs need to be able to determine the communication resources over which they can recover the model. Given the fact that NN models are expected to include millions of parameters, model transfer to transmit an entire model, or even a part of a model, might not be done through PDCCH due to the limitations of resources. One possible option is to use format1 at DCI to inform UEs as to the resources, such as Resource Blocks (RBs), during which symbols will carry weights of a model so that each UE can recover the model. In one embodiment, once the model is available at UEs, inference is performed at the UEs. To the extent that inferred LoS status information is to be signaled to one or more network components such as the LMF as shown at 2550, Uplink Control Information (UCI) may be used to declare to the network component(s) the resources, such as RBs and symbols, of a UE carry that information.
Various embodiments are described in detail above. Disclosed features may be implemented in any of various ways and/or in any of various subsets or combinations, as described by way of example below.
The example method 2600 includes receiving, at 2602, signaling that is associated with a direct wireless communication link between the first UE and a second UE. In an embodiment, signaling that is associated with a direct wireless communication link may be or include SL-PRS signaling, as shown by way of example at 2512 in
The network equipment to which the signaling is transmitted at 2604 may be, for example, a base station or other network equipment that is configured to build or maintain a connectivity graph or is otherwise involved in training or developing a prediction model as disclosed herein. The network equipment may implement an LMF as shown in
The signaling that is transmitted at 2604 may include or otherwise be indicative of other information. For example, in some embodiments such signaling is further indicative of channel data estimated based on the received signaling. The channel data may be or include, for example, a transformed version of raw channel data that is estimated based on the received signaling. Chanel tensors referenced herein represent an example of such transformed raw channel data. An identifier as shown at 2516 in
Other operations may be performed in some embodiments. An example is shown at 2606, which involves transmitting to the network equipment signaling that is indicative of displacement of the first UE subsequent to transmitting the signaling indicative of an estimate of range at 2604. This is shown by way of example as IMU-based displacements at 2524, 2526 in
These operations in
Some embodiments also or instead involve receiving signaling that is associated with a downlink communication link between the first UE and a network component in the wireless communication network. The network component from which such signaling is received may be, but need not necessarily be, the network equipment to which the signaling is transmitted at 2604. For example, as shown in
As shown by way of example at 2522 in
In some embodiments, at 2608 a UE obtains a prediction model for prediction of LoS status of communication links, and prediction or inference is performed at a UE. Although a UE may itself train or otherwise develop a prediction model, it is expected that a prediction model will be developed at a network side. A UE may, for example, receive at 2608 signaling that is indicative of a prediction model. The prediction model is based in part on the estimate of range that is indicated in the signaling transmitted at 2604 as disclosed elsewhere herein, and the signaling may be received from the network equipment to which the signaling is transmitted at 2604.
It should be noted that 2606 and 2608 are intentionally not connected in
For prediction or inference based on the prediction model, at 2610 a UE receives signaling associated with a communication link. The signaling may be or include a channel tensor for example. Based on the signaling received at 2610, a prediction LoS status of the communication link is obtained from the prediction model. At 2612, signaling that includes or is otherwise indicative of the prediction is transmitted. The prediction signaling may be transmitted from a UE to an LMF for pruning, for example.
The prediction-related operations in
Other embodiments may include additional, fewer, and/or different operations, performed in a similar or different order.
With reference to
Turning to the gNB in
An AI engine as shown in
Thus, these and/or other operations illustrated in
The signaling received at 2702 may also be indicative of other information, such as channel data that is estimated for the direct wireless communication link and/or an identifier, as disclosed elsewhere herein. The signaling received at 2710 may also or instead be indicative of channel data such as a channel tensor, for a communication link for which a prediction is to be made using the prediction model.
A method may include other operations. An example is shown at 2704, and involves receiving signaling that is indicative of displacement of the UE subsequent to determination by the first UE of the estimate of range for which signaling is received at 2702. As described elsewhere herein, such a displacement estimate may be used in training or otherwise obtaining a prediction model.
Although the present invention has been described with reference to specific features and embodiments thereof, it is evident that various modifications and combinations can be made thereto without departing from the invention. The specification and drawings are, accordingly, to be regarded simply as an illustration of the invention as defined by the appended claims, and are contemplated to cover any and all modifications, variations, combinations or equivalents that fall within the scope of the present invention.
The present application is a continuation of U.S. patent application Ser. No. 16/695,909, filed Nov. 26, 2019, the contents of which are hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
6728226 | Naito | Apr 2004 | B1 |
7574221 | Guvenc et al. | Aug 2009 | B2 |
7577445 | Guvenc et al. | Aug 2009 | B2 |
7577446 | Guvenc et al. | Aug 2009 | B2 |
9363645 | Lavery | Jun 2016 | B2 |
9801148 | Yu et al. | Oct 2017 | B2 |
10091709 | Yang et al. | Oct 2018 | B2 |
10091754 | Miller et al. | Oct 2018 | B2 |
10098014 | Shimizu et al. | Oct 2018 | B1 |
10257647 | Kordybach et al. | Apr 2019 | B2 |
10284316 | Zhihua et al. | May 2019 | B2 |
10333638 | Zhihua et al. | Jun 2019 | B2 |
10469619 | Shimizu et al. | Nov 2019 | B2 |
10506545 | Choi | Dec 2019 | B2 |
10536924 | Hwang | Jan 2020 | B2 |
10624023 | Kahtava et al. | Apr 2020 | B2 |
10932221 | Grossmann et al. | Feb 2021 | B2 |
11075929 | Li et al. | Jul 2021 | B1 |
11239941 | Nguyen | Feb 2022 | B2 |
11329780 | Soriaga | May 2022 | B2 |
11350293 | Tadayon | May 2022 | B2 |
20050281363 | Qi et al. | Dec 2005 | A1 |
20080032708 | Guvenc et al. | Feb 2008 | A1 |
20080032709 | Guvenc et al. | Feb 2008 | A1 |
20080032710 | Guvenc et al. | Feb 2008 | A1 |
20110077013 | Cho et al. | Mar 2011 | A1 |
20120075987 | Yoneyama et al. | Mar 2012 | A1 |
20130310044 | Rakos et al. | Nov 2013 | A1 |
20150111597 | Lavery | Apr 2015 | A1 |
20150327193 | Yu et al. | Nov 2015 | A1 |
20150338522 | Miller et al. | Nov 2015 | A1 |
20150341886 | Miller et al. | Nov 2015 | A1 |
20150382318 | Kim | Dec 2015 | A1 |
20160037466 | Yang et al. | Feb 2016 | A1 |
20160134402 | Park et al. | May 2016 | A1 |
20160295366 | Priyanto et al. | Oct 2016 | A1 |
20170108579 | Irvine et al. | Apr 2017 | A1 |
20170289953 | Chae | Oct 2017 | A1 |
20170338901 | Zhihua et al. | Nov 2017 | A1 |
20170366244 | Lee et al. | Dec 2017 | A1 |
20170367067 | Hwang | Dec 2017 | A1 |
20180035255 | Kordybach et al. | Feb 2018 | A1 |
20180234913 | Kahtava et al. | Aug 2018 | A1 |
20180278349 | Zhihua et al. | Sep 2018 | A1 |
20190094196 | Park et al. | Mar 2019 | A1 |
20190181920 | Rofougaran et al. | Jun 2019 | A1 |
20190223140 | Grossman et al. | Jul 2019 | A1 |
20190238658 | Shimizu et al. | Aug 2019 | A1 |
20190369201 | Akkarakaran et al. | Dec 2019 | A1 |
20190372688 | Sadiq et al. | Dec 2019 | A1 |
20200068044 | Shimizu et al. | Feb 2020 | A1 |
20200228272 | Soriaga | Jul 2020 | A1 |
20200229010 | Soriaga et al. | Jul 2020 | A1 |
20200235848 | Nguyen | Jul 2020 | A1 |
20200249339 | Li et al. | Aug 2020 | A1 |
20200317339 | Ju et al. | Oct 2020 | A1 |
20200393532 | Chae et al. | Dec 2020 | A1 |
20210041522 | Manolakos et al. | Feb 2021 | A1 |
20210136527 | Tadayon et al. | May 2021 | A1 |
20210160712 | Tadayon et al. | May 2021 | A1 |
20220236396 | Choi | Jul 2022 | A1 |
20220272551 | Tadayon | Aug 2022 | A1 |
20220312153 | Manolakos | Sep 2022 | A1 |
20230034336 | Shin | Feb 2023 | A1 |
20230266425 | Sandgren | Aug 2023 | A1 |
20230276402 | Wu | Aug 2023 | A1 |
20230300568 | Zhao | Sep 2023 | A1 |
20230314547 | Alawieh | Oct 2023 | A1 |
Number | Date | Country |
---|---|---|
103379576 | Oct 2013 | CN |
103379576 | Oct 2013 | CN |
104242996 | Dec 2014 | CN |
108418645 | Aug 2018 | CN |
108446547 | Aug 2018 | CN |
108418645 | Nov 2020 | CN |
113287344 | Aug 2021 | CN |
116710795 | Sep 2023 | CN |
3354069 | Aug 2018 | EP |
3707943 | Sep 2020 | EP |
3707943 | Nov 2020 | EP |
3354069 | Dec 2020 | EP |
20170141471 | Dec 2017 | KR |
20210114947 | Sep 2021 | KR |
202034716 | Sep 2020 | TW |
2017050869 | Mar 2017 | WO |
2019084946 | May 2019 | WO |
2019160340 | Aug 2019 | WO |
WO-2019160340 | Aug 2019 | WO |
2019232456 | Dec 2019 | WO |
WO-2019232456 | Dec 2019 | WO |
WO-2020150172 | Jul 2020 | WO |
2021030685 | Feb 2021 | WO |
WO-2021089003 | May 2021 | WO |
WO-2021253018 | Dec 2021 | WO |
WO-2022033695 | Feb 2022 | WO |
WO-2022133416 | Jun 2022 | WO |
WO-2022164506 | Aug 2022 | WO |
Entry |
---|
Huawei et al., V2X sidelink channel model, 3GPP TSG RAN WG1 Meeting #93, Busan, Korea, May 21 May 25, 2018, R1-1807672, 29 pages. |
J. Borras, P. Hatrack and N. Mandayam, “Decision Theoretic Framework for NLOS Identification,” IEEE VTC 1998, May 1998, pp. 1583-1587. |
C. Wu, Z. Yang, Z. Zhou, K. Qian, Y. Liu and M. Liu, “PhaseU: Real-time LOS Identification with WiFi,” 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, 2015, pp. 2038-2046. |
I. Guvenc, C. Chong, F. Watanabe and H. Inamura, “NLOS Identification and Weighted Least-Squares Localization for UWB Systems Using Multipath Channel Statistics,” EURASIP Journal on Advances in Signal Processing, vol. 2008, 2008, pp. 1-14. |
H. Wymeersch, S. Marano, W. Gifford and M. Win, “Machine Learning Approach to Ranging Error Mitigation for UWB Localization,” IEEE Transactions on Communications, vol. 60, No. 6, 2012, pp. 1719-1728. |
S. Marano, W. M. Gifford, H. Wymeersch and M. Win, “NLOS Identification and Mitigation for Localization Based on UWB Experimental Data,” IEEE Journal on Selected Areas in Communications, vol. 28, No. 7, 2010, pp. 1026-1035. |
I. Guvenc, C. Chong, and F. Watanabe, “NLOS Identification and Mitigation for UWB Localization Systems, ” 2007 IEEE Wireless Communications and Networking Conference, Kowloon, China, Mar. 11-15, 2007, pp. 1573-1578. |
J. Wilson, and N. Patwari, Radio Tomographic Imaging with Wireless Networks, IEEE Transactions on Mobile Computing, vol. 9, No. 5, May 2010, pp. 621-632. |
J. Wilson, and N. Patwari, “See-Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks”, IEEE Transactions on Mobile Computing, vol. 10, No. 5, May 2011, pp. 612-621. |
Francois et al, A correlated shadowing model for urban wireless networks, Apr. 2015, IEEE INFOCOM 2015—IEEE Conference on Computer Communications, Kowloon, Hong Kong (Hong Kong), DOI: 10.1109/INFOCOM.2015.7218450 (Year: 2015). |
Number | Date | Country | |
---|---|---|---|
20220272551 A1 | Aug 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16695909 | Nov 2019 | US |
Child | 17736272 | US |