The present disclosure relates to wireless signal transmissions and more specifically co-existence of multiple systems having transmissions that overlap in the frequency band.
A detailed description of systems and methods consistent with embodiments of the present disclosure is provided below. While several embodiments are described, it should be understood that the disclosure is not limited to any one embodiment, but instead encompasses numerous alternatives, modifications, and equivalents. In addition, while numerous specific details are set forth in the following description in order to provide a thorough understanding of the embodiments disclosed herein, some embodiments can be practiced without some or all of these details. Moreover, for the purpose of clarity, certain technical material that is known in the related art has not been described in detail in order to avoid unnecessarily obscuring the disclosure.
Techniques, apparatus and methods are disclosed that enable co-existence muting gaps to be included in an LTE protocol over unlicensed spectrum to enable a more efficient sharing with other wireless technologies, including wireless local area networks (WLANs) and WLAN protocols (e.g., IEEE 802.11 protocols, Wi-Fi™ by the Wi-Fi Alliance, etc.). For example, an LTE protocol can be altered to include muting gaps that align with a WLAN beacon. In another example, a WLAN access point (AP) can create an information element (IE) that describes muting gaps available to WLAN stations (STAs) such that STAs can remain in a low power state until a muting gap is available. In yet another example, a cell tower and WLAN can be configured such that WLAN beacons occur when the cell tower is not transmitting during selected portions of LTE frames.
Unlicensed spectrum can be configured to be used with long term evolution advanced (LTE-A) by the third generation partnership project (3GPP). Use of the LTE protocol in unlicensed spectrum can be called LTE in Unlicensed (LTE-U). LTE-U can extend the LTE platform into unlicensed deployments, enabling operators and vendors to leverage existing or planned investments in long term evolution/evolved packet core (LTE/EPC) hardware in the radio and core network, especially if LTE-U is used as a supplemental downlink or a component carrier (CC) in an LTE Carrier Aggregation (CA) configuration. Use of LTE in unlicensed band can include consideration of co-existence of LTE with other incumbent technologies. Due to multiple LTE operators using the same unlicensed spectrum, self-coexistence among different LTE operators in the same band can also be a consideration.
It should be recognized that LTE in an unlicensed band (LTE-U) is also referred to as Licensed Assisted Access (LAA) using LTE herein. Where LTE-U is mentioned, LAA can also be considered.
The design of LTE-U can be dependent on the spectrum under consideration. The channel characteristics, such as path loss, frequency selectivity etc., can be dependent on the carrier frequency. In addition, the incumbent technologies in the considered spectrum can affect the interference profile of the LTE-U network deployed in the unlicensed band and an interference profile of the incumbent network. One potential unlicensed spectrum that can be considered for LTE-U is the 5 GHz spectrum (e.g., 5725-5850 MHz band currently used by IEEE 802.11a, n and ac wireless local area networks (WLANs)).
Efficient co-existence among LTE-U and WLAN can be obtained in several different ways, including: (1) modifying the existing LTE-A specifications, and by keeping the WLAN specifications unchanged; (2) modifying the existing WLAN specifications, and by keeping the LTE-A standard unchanged; (3) modifying both LTE-A and/or WLAN specifications (i.e., a combination of (1) and (2)); and (4) without any modifications in both LTE-A and WLAN specifications, but instead changing operating parameters, network configurations/reconfigurations and scheduling.
LTE-U can be deployed in a frequency spectrum which has not been used previously for LTE deployment. In some embodiments, existing LTE receivers may not work in the new spectrum (i.e., the medium). LTE-U may not be backward compatible with the existing LTE-A standard.
In some embodiments, co-existence between LTE-U and WLAN can be achieved using a time division duplex mechanism. In the LTE protocol, a tower and UE refrain from transmission on certain time durations. This time duration where LTE refrains from transmission is known as a co-existence muting gap or muting gap. Many WLAN infrastructures access the medium using carrier sense multiple access with collision avoidance (CSMA/CA)-based approach that performs medium sensing. WLAN devices can detect the idle medium during these co-existence muting gaps and then use it for transmission.
In an embodiment, a UE can use a muting gap to achieve additional power savings. During a muting gap, a UE does not receive or send LTE-U transmissions during the duration of the muting gap. The UE can safely turn off its transmitter and/or receiver to achieve additional power savings.
In another embodiment, eNB and UE behavior can be modified during time outside of muting gaps available for LTE-U transmissions (i.e., unmuted time). For example, an eNB and UEs can use listen before talk mechanisms during the unmuted time. In the unmuted time, if no eNB or UE transmission is active, then unused time can also be used by WLAN STAs to transmit. Both eNB and UE can have active receivers during the unmuted time. In other embodiments, an eNB and UEs do not use listen before talk mechanisms during the unmuted time.
In some embodiments, co-existence between LTE-U and WLAN can take advantage of a beacon interval. For example, an AP (access point) or a STA (station) may perform Clear Channel Assessment (CCA) for transmission onto the wireless medium during the LTE transmission duration. In an infrastructure network, generally, APs are connected to a power source, and therefore, performing the additional CCA probably does not cause any complications. However, for mobile STAs, coming out of a power-save mode to perform additional CCA may more quickly drain the battery life of the devices.
In an existing 802.11 power saving mode, a STA can alternate between awake state and doze state. A STA in doze state turns off the radio components and, therefore, refrains from CCA. The AP is always on and can buffer any incoming traffic intended for the STA in doze state. In some embodiments, the AP periodically transmits a beacon signal containing traffic indication map (TIM) information element (IE). Each bit in the partial virtual bitmap in TIM IE represents the association ID (AID) of a STA. The AP sets the corresponding bit for a STA in TIM IE, if it has buffered traffic for the STA. A STA is aware of the beacon interval (also known as target beacon transmit time (TBTT)) and periodically wakes up from doze state to receive the beacon signal. If the STA identifies the existence of buffered packets, it sends a Power Saving (PS)-poll frame to AP to request the delivery of the buffered packets. After finishing the reception of the buffered packet, the STA can go back to doze state.
Co-existence with the LTE-U and battery life of the STAs can be improved by aligning the beacon interval (TBTT) of the AP with the co-existence muting gap of an implementation of LTE-U. A STA operating in power save mode can be in doze state during LTE transmission; however, it can wake up at the start of the co-existence muting gap of LTE-U to receive the beacon signal. If the STA has any buffered packet, it can stay awake to receive the packet. Otherwise the STA can go back to doze state.
In some embodiments, a deployment scenario for LTE-U is as a secondary carrier, where a user equipment (UE) is connected to a primary carrier on licensed band. CRS, PBCH, SIB-1 transmission, etc. are not required for LTE-U carrier. However, PSS/SSS or other similar discovery signal can be required. If such overhead free carrier is used for LTE-U, then alignment of WLAN beacon with LTE is easier. Any subframe in a frame can be used as a co-existence muting gap subframe (or co-existence muting subframes) to accommodate WLAN communication. In addition, co-existence muting can be performed at different granularity levels (e.g., Frame level muting, Subframe level muting, Slot level muting, Symbol level muting or any of the above combination).
WLAN specifications can be modified to include an additional information element (IE) to indicate the timing of an LTE-U transmission. The IE can be added in the WLAN beacon signals as shown in
(3) Modifying Both LTE-A and/or WLAN Specifications
A combination of modifying LTE-A specifications and WLAN specifications can be adopted for further system optimization. For example, an LTE-U deployment co-existence muting gap can be introduced as mentioned previously in (1). At the same time, a different energy detection (ED) threshold value can be employed in WLAN deployment for better detection and interference management with LTE-U transmission.
Distributed coordination function (DCF) operations can be altered to reduce a wake time of STAs. A co-existence muting gap behavior can be introduced into selected LTE-A subframe(s) by proper network configuration and scheduling. By aligning a TBTT interval of a WLAN AP with a co-existence muting gap, more DCF operations can be achieved than without the behavior. In some embodiments, the evolved node Bs (eNBs or eNodeBs) can possess WLAN listening capability. This listening allows the eNB to determine the TBTT interval and make a scheduling decision. This alignment can be transparent to using the LTE-A standard with LTE-U.
The above described attributes can be used in the following examples as illustrated in the figures. It should be noted that attributes described above and below can be selectively used, combined or discarded, depending on the embodiment and needs of a system, a designer, an architect and/or an administrator.
In some embodiments, a muting gap can be used to reduce degraded communications and provide for co-existence between LTE-U and WLAN technologies. A muting gap can be introduced into a first protocol (e.g., LTE-U) to allow incumbent protocol(s) (e.g. WLAN) to transmit information without competition from the first protocol. Muting gaps, can thus, provide time periods when the first protocol is silent and a medium (e.g. frequency spectrum) is available for incumbent protocols or other protocols. In a set of embodiments, the LTE-A protocol is enhanced with co-existence behavior for use in LTE-U. For example, the LTE-A protocol can be enhanced to include a muting gap after a frame, during selected subframes or during selected symbols.
Use of a muting gap can be further enhanced. In some embodiments, a muting gap can be aligned with a WLAN beacon interval. For example, cell tower 104 recognizes a WLAN beacon and times a muting gap to occur during the WLAN beacon timing. Cell tower 104 can also recognize an IE within the WLAN beacon that includes a TIM to a STA to aid in the power saving of the STA. Cell tower 104 can use the TIM to determine an additional muting gap to allow transmission between access point 106 and STA.
In other embodiments, the WLAN protocol is enhanced with co-existence behavior. Access point 106 functionality can be enhanced to recognize LTE-U communications and operate in a co-operative state with LTE-U devices. In one embodiment, access point 106 can create an IE within a WLAN beacon that identifies a muting gap pattern or series of muting gaps. A STA can therefore transition into a low power state during LTE-U transmission times and transition to an active power state during muting gap times. In another embodiment, an ED threshold can be modified so that an unrecognized LTE-U signal can be treated at a same ED threshold as a recognized WLAN signal. This change in thresholding can prevent a WLAN STA from transmitting during an LTE-U signal and corrupting the signal, as WLAN and LTE-U signals can receive a same ED threshold.
In yet other embodiments, both the LTE-U protocol and the WLAN protocol can be enhanced with co-existence behavior. For example, cell tower 104 can determine a WLAN beacon interval of access point 106. Cell tower 104 can then adjust LTE-U communications to include a muting gap during the WLAN beacon periods. WLAN access point 106 can include an IE identifying a pattern or series of muting gaps by cell tower 104, allowing STAs to stay in a low power state until a muting gap is available.
In some embodiments, LTE-U and WLAN configurations can be altered to enable better co-existence behavior without adding additional functionality. For example, cell tower 104 can be configured to provide subframe or symbol level muting gaps. Cell tower 104 and/or access point 106 can be adjusted so that the muting gaps coincide with WLAN beacon transmissions by access point 106.
The LTE specification can be enhanced to provide muting gaps for WLAN transmissions.
Slot 208 at a carrier is resource block 210, which includes seven symbols at 12 orthogonal frequency-division multiplexing (OFDM) subcarriers. Resource element 212 is one OFDM subcarrier for the duration of one OFDM symbol. Resource block 210 can include 84 resource elements 212 when using a normal cyclic prefix (CP). OFDM spacing between individual subcarriers in LTE can be 15 kHz. A guard period of a CP can be used in the time domain to help prevent multipath inter-symbol interference (ISI) between subcarriers. The CP can be a guard period before each OFDM symbol in each subcarrier to prevent ISI (such as due to multipath).
The LTE protocol described above can be enhanced to provide muting gaps as shown in
For example,
Subframes selected for muting can be statically selected or dynamically selected. In one embodiment, a number and/or location of subframes can be indicated by higher layer signaling. For example, subframe muting can be 1 muted subframe for every 10 subframes or even 1 muted subframe for every 100 subframes. Other lesser, greater or in between combinations are also possible.
During frames outside of muted subframes (also known as unmuted subframes), eNB and/or UEs can transmit signals. However, this does not necessarily indicate that LTE will not use any listen-before-talk (LBT) mechanisms in this regions. For example, two embodiments can include: (1) LTE will not use LBT mechanisms and will transmit whether or not transmission of other RATs are in process; or (2) LTE uses a LBT mechanism before transmitting. With regard to embodiment (1), and in some embodiments, an eNB uses a higher transmission power which can be detected over smaller WLAN transmissions.
For example with regard to embodiment (2), during muting gaps LTE-U devices (e.g., eNB, UE) do not transmit and do not expect to receive any transmission. An LTE system can gain additional benefits of power saving by shutting down transmitters and/or receivers during muting gaps. During the unmuted times, an eNB performs LBT and/or channel reservation mechanism to reserve the channel. Once the channel is reserved/access, eNB and UE can transmit and receive data using the unlicensed band. A UE scans the channel during the unmuted portion of the frame structure, regardless of whether eNB is transmitting or not.
In another example,
In yet another example,
It should be recognized that these examples can be modified and/or combined. In some embodiments, the selection of timing for a muting gap can be static or dynamic for muting gap selection (including subframe, frame or symbol level gaps). With a static muting gap, the muting gap pattern can repeat. In a dynamic muting gap, muting gaps can be adjusted (e.g., larger, smaller, more frequent, less frequent, etc.) depending on traffic. The traffic can be measured in terms of LTE-U traffic and/or WLAN traffic.
In one embodiment, a muting gap can be aligned with a beacon period used in WLAN protocols. In one example, when WLAN AP uses a beacon period of 102.4 ms, LTE-U can choose to use n (an integer) consecutive subframes on frame #0, 10, 20, 30 starting at subframe #1, 3, 5, 8, etc. as co-existence muting gap subframes 402. In this example, n is an integer whose value can depend on the traffic load of the WLAN and LTE network. In another example, the muting can start from a second slot in a subframe or from an l-th symbol position in a subframe to have better alignment with the beacons. In
For the examples of subframe level muting, an example of a design can include a small cell on/off mechanism. The design can support fast on/off switching for certain target subframes in order to achieve better performance by reducing the interference (e.g., between LTE/WLAN or LTE/LTE).
In one embodiment the new design in case of symbol level muting may include re-use of existing TDD special subframes, whereas the UpPTS and GP portion of the special subframe can be regarded as muting gaps and DwPTS portion of the special subframe can be used for LTE transmission.
Additional design mechanisms can include DM-RS, CSI-RS, and TBS size determination of a special subframe. For example, if a symbol level co-existence muting gap with 11 or 12 muting symbols are used, the DM-RS pattern shown in
For example, for antenna ports p=7, p=8 or p=7, 8, K, v+6, in a physical resource block with frequency-domain index nPR B assigned for the corresponding physical downlink shared channel (PDSCH) transmission, a part of the reference signal sequence r(m) shall be mapped to complex-valued modulation symbols ak,l(p) in a subframe according to normal cyclic prefix:
a
k,l
(p)
=w
p(l′)·r(3·l′·nRBmax,DL+3·nPRB+m′)
In the example, the sequence is given by Table 1.
Replacing antenna port numbers 7-10 by 107-110 in the above equations and tables provides an illustration of the resource elements used for demodulation reference signals associated with enhanced physical downlink control channel (EPDCCH) for a normal cyclic prefix.
In one embodiment, the WLAN carrier sense mechanism can be a component of the 802.11 CSMA/CA protocol and is composed of two different functions, Clear Channel Assessment (CCA) and the Network Allocation Vector (NAV). CCA is a physical carrier sense mechanism which listens to the received energy on the radio interface, while NAV is a virtual carrier sense mechanism used by WLAN stations to reserve the medium for mandatory frames which follow the current frame. CCA can be composed of two related functions, carrier sense (CS) and energy detection (ED). CS refers to an ability of a receiver to detect and decode an incoming WLAN signal preamble. CCA is reported as busy when another WLAN signal preamble is detected, and is held as busy for the length of the received frame as indicated in the frame physical layer convergence protocol (PLCP) length field. Typically, any incoming WLAN frame, whose PLCP header can be decoded, can cause CCA to report the medium as busy for the time noted from the header for the frame transmission to complete. ED refers to an ability of the receiver to detect non-WLAN energy present on the current channel based on a noise floor, ambient energy, interference sources, and unidentifiable WLAN transmissions that can no longer be decoded (e.g., have been corrupted). Unlike CS, which can determine the length of time the medium will be busy with the current frame, an ED process may sample the medium every slot time to determine if the WLAN energy still exists. In addition, ED uses a predefined threshold which determines if the reported energy level is adequate to report the medium as busy or idle. This is typically referred to as the ED threshold level or CCA sensitivity level. For 802.11 a/g/n, a typical value of ED threshold can be −82 dBm for 20 MHz channel spacing if the start of a valid WLAN preamble is detected. However, if the preamble is missed or is not present (e.g., transmission from other RATs, LTE-U transmission etc.) the ED threshold can be −62 dBm for 20 MHz channel spacing. Therefore, for non-WLAN signals, ED threshold is 20 dB higher than the corresponding WLAN signal ED threshold. This can cause asymmetry in collision detection of WLAN-to-WLAN signal vs. WLAN-to-LTE signal. Several options can be considered to address this issue.
In the case of LTE-U and WLAN co-existence, the ED threshold value for non-WLAN signal can be set to a different (lower) value, than the existing settings. With a lower threshold value, the WLAN devices will be able to detect more LTE-U transmissions. The improvement in detection of LTE-U transmission by the WLAN devices, will lead to less packet collusion between LTE-U and WLAN transmissions, thereby improving co-existence.
In another embodiment, WLAN devices may use a LTE specific ED threshold values to detect LTE-U transmission. LTE-U transmission may include control signaling transmission (when a backward compatible LTE carrier is used) even in the absence of LTE-U data transmission. The periodic transmission of LTE-U control signaling in the first 1 or 2 symbols of an LTE subframe in the absence of LTE-U data transmission is different from the interference generated by other transmissions co-existing with WLAN systems. This interference can be handled differently with respect to the WLAN system sensitivity based on an ED threshold. In addition to typical, infrastructure-based communication for both LTE-U and WLAN systems, it is noted that co-existing device-to-device communications such as based on WLAN Direct for WLAN systems and LTE D2D for LTE-U systems may include device-dependent settings of the ED threshold. In this way, a WLAN Access Point can have different ED threshold settings compared to a WLAN client which may operate in the infrastructure mode or the WLAN Direct mode.
In
In the embodiment shown, first byte 604 of the IE identifies the type of element. The element can use one of the reserved IDs from the range 143-173, or 175-220, or 222-255. Second byte 606 indicates the length of information 608 in the bytes that follow. Because the type and length come first, a legacy WLAN receiver can skip over the element if it does not recognize or understand the type number.
A concept of non-TIM (traffic indication map) power saving can also be considered for enabling WLAN transmissions (including 802.11 a, g, n, etc.) to align with muting gaps. In such power saving mode, AP and STA negotiate a predefined interval when the STA can wake up. In this way the STA does not have to wake up during beacon interval and can be in sleep mode when not active. The wake time for different STA can be spread out so that channel-access attempt of multiple STAs does not collide. The AP can buffer any downlink traffic for the APs during the sleep mode and deliver during the wake-up time. The STAs are allowed to transmit uplink only during this predefined wake-up time. A target wake time (TWT) IE is exchanged by association request and association response frame that contains the information regarding the wake-up interval. By introducing such non-TIM-based power saving mode in various WLAN standards, efficient co-existence between LTE-U and WLAN can be achieved. The AP can set the TWT of STAs in such a way that aligns with the muting gaps of LTE-U transmission.
As described above, efficient co-existence between LTE-A and WLAN can be achieved by modifying the existing specifications. However, if such modifications are not desirable, then changing the network configuration parameters and utilizing scheduling can aid in more efficient co-existence.
In some embodiments by introducing a co-existence muting gap like behavior to selected LTE-A subframes through proper network configuration and scheduling, LTE-U and WLAN co-existence behavior can be improved
In LTE-A not every subframe in a frame can be used as co-existence muting gaps. Certain signals and information are transmitted on a periodic basis.
As a result, subframes 1, 2, 3, 6, 7, and 8 can be configured as MBSFN subframe for FDD. This allows subframes 1, 2, 3, 6, 7 and 8 with MBSFN configurations to be used as co-existence muting gap subframes for FDD, as long as LTE refrains from transmission in these subframes. This can be achieved by proper scheduling.
As a result, subframes 3, 7, 8, 9 with MBSFN configurations can be used as co-existence muting gap subframes. In addition, for TDD, uplink subframes 2 and GP portion of the special subframes can also be considered for co-existence muting gap subframe.
In another embodiment, the co-existence can be further improved by aligning the TBTT interval of the WLAN AP with such co-existence muting gap like behavior as described above. In some embodiments, the eNBs possess WLAN listening capability. The capability can be used for making scheduling decisions, which does not rely on modifications in LTE-A specifications. Such modification can be transparent to the LTE-A standard.
A process can be used to align TBTT and co-existence muting gaps. In one embodiment, a WLAN configuration can be modified to change TBTT configuration to align with the periodic co-existence muting gaps of an LTE eNB. In another embodiment, using an LTE configuration can be modified to configure co-existence muting gap periods to align with a TBTT transmission interval 1006.
In some embodiments, a TBTT value is provided using the 16-bit-long beacon interval field in the beacon signal. The beacon interval field represents number of TUs (time units) (1 TU=1024 us) in TBTT 1006. A typical value of beacon TBTT 1006 is generally set to 102.4 ms.
By selecting a value of TBTT 1006 that closely aligns with the beginning of the muting LTE subframe, power savings for STAs can be achieved. As for an example, a value of beacon interval field is set to 10, which corresponds to a TBTT value of 10.24 ms. In some cases, a granularity of LTE subframe is 1 ms, whereas the granularity of TU in WLAN is 1.024 ms. In these cases, a complete alignment may not be possible. However, as shown in the figure, a TBTT value of 10.24 ms aligns with the LTE muting subframes.
In
In other embodiments, LTE-U can choose to mute subframes which align with a TBTT interval so that a beacon can be transmitted as closely as possible to TBTT. In Table 2, an example of such muting configuration is shown with a TBTT value of 102.4 ms is used. It is also possible to combine the prior embodiments. In such an embodiment, a more efficient co-existence can be achieved through an optimized TBTT value, which is chosen depending on the network load.
For example, a MBSFN subframe configuration in LTE is transmitted using MBSFN-SubframeConfig Information Element on SIB-2 message. The SIB-2 message can be transmitted at every 8, 16, 32, 64, . . . , 256, 512 frame intervals. Therefore, the MBSFN subframe configuration can be updated in every eight frames. Alternatively, LTE can set the number of MBSFN subframe in a frame fixed to the maximum six subframes and then use eNB scheduling to refrain from transmission on the subframes aligned with the TBTT.
When a co-existence muting gap subframe pattern is applied to an LTE-U operation, in addition to changing the TBTT configuration to align with the periodic co-existence muting gap transmission, a WLAN STA can appropriately adjust its operation to make sure that its transmission(s) is (are) completed within the duration of the co-existence muting gap subframes. This can include adjustments to fragmentation/defragmentation operation (which does not necessarily imply the modification of the fragmentation threshold values but does not exclude it) and/or adjustments to the Block Acknowledgement scheme, and/or adjustments to the Modulation and Coding Scheme (MCS) for transmitting a packet or a fragment of a packet in order to guarantee completion of a transmission within the co-existence muting gap subframes. It is noted that said adjustments do not necessarily imply modification of the corresponding protocol itself.
Embodiments and implementations of the systems and methods described herein may include various operations, which may be embodied in machine-executable instructions to be executed by a computer system. A computer system may include one or more general-purpose or special-purpose computers (or other electronic devices). The computer system may include hardware components that include specific logic for performing the operations or may include a combination of hardware, software, and/or firmware.
Computer systems and the computers in a computer system may be connected via a network. Suitable networks for configuration and/or use as described herein include one or more local area networks, wide area networks, metropolitan area networks, and/or Internet or IP networks, such as the World Wide Web, a private Internet, a secure Internet, a value-added network, a virtual private network, an extranet, an intranet, or even stand-alone machines which communicate with other machines by physical transport of media. In particular, a suitable network may be formed from parts or entireties of two or more other networks, including networks using disparate hardware and network communication technologies.
One suitable network includes a server and one or more clients; other suitable networks may contain other combinations of servers, clients, and/or peer-to-peer nodes, and a given computer system may function both as a client and as a server. Each network includes at least two computers or computer systems, such as the server and/or clients. A computer system may include a workstation, laptop computer, disconnectable mobile computer, server, mainframe, cluster, so-called “network computer” or “thin client,” tablet, smart phone, personal digital assistant or other hand-held computing device, “smart” consumer electronics device or appliance, medical device, or a combination thereof.
Suitable networks may include communications or networking software, such as the software available from Novell®, Microsoft®, and other vendors, and may operate using TCP/IP, SPX, IPX, and other protocols over twisted pair, coaxial, or optical fiber cables, telephone lines, radio waves, satellites, microwave relays, modulated AC power lines, physical media transfer, and/or other data transmission “wires” known to those of skill in the art. The network may encompass smaller networks and/or be connectable to other networks through a gateway or similar mechanism.
The following examples pertain to further embodiments.
Example 1 is a cell tower that includes a configured to transmit information to user equipment (UE) using a long term evolution (LTE) protocol within an unlicensed band of frequencies shared with a wireless local area network (WLAN). The cell tower also includes a scheduler configured to prepare a muting gap that mutes the LTE protocol to allow WLAN systems using the WLAN to transmit during the muting gap. The cell tower further includes a backhaul link configured to provide LTE network connectivity to the UE.
In Example 2, the scheduler in Example 1 can optionally be configured for a static schedule of muting gaps.
In Example 3, the static schedule in Example 2 can optionally be based at least in part on LTE protocol frames.
In Example 4, the static schedule in Example 2 can optionally be based at least in part on target beacon transmission time (TBTT) interval of the WLAN.
In Example 5, the scheduler in Examples 1-4 can optionally be configured for a dynamic scheduling of muting gaps.
In Example 6, the muting gap in Examples 1-5 can optionally include be selected from frame level muting, subframe level muting, slot level muting or symbol level muting.
Example 7 is a wireless access point (AP) for sharing a frequency spectrum with other devices that includes a network controller. The network controller can be configured to determine transmission timing of a third generation partnership project (3GPP) compatible protocol that includes at least one inactive period. The network controller can also be configured to create an information element describing the at least one inactive period. The network controller can be further configured to provide the information element using a non-3GPP compatible protocol to inform non-3GPP compatible devices of the at least one inactive period.
In Example 8, the network controller of Example 7 can optionally be configured to negotiate a target wake time (TWT) with a mobile device from the set of mobile devices that coincides with the at least one inactive period. The network controller can also be configured to, when receiving information for the mobile device, buffer the information until the TWT. The network controller can be further configured to transmit the buffered information for the mobile device after the TWT.
In Example 9, the network controller of Examples 7-8 can optionally include receiving a communication from a 3GPP compatible network that describes the at least one inactive period.
In Example 10, the network controller of Examples 7-9 can optionally be configured to cause a change in an energy detection (ED) threshold of a mobile device from the set of mobile devices during clear channel assessment (CCA) based at least in part on the information element.
In Example 11, the information element of Examples 7-10 is optionally a wireless local area network (WLAN) information element.
In Example 12, the information element of Examples 7-11 optionally describes a repeating pattern of inactive periods available for non-3GPP compatible protocol transmissions.
In Example 13, the information element of Examples 7-12 optionally describes a start time and duration of a set of upcoming inactive periods.
In Example 14, the third generation partnership project (3GPP) compatible protocol of Examples 7-13 can optionally be licensed assisted access using long term evolution (LAA).
Example 15 is a method of protocol co-existence that includes selecting a time duration that is available for muting in a cellular protocol of a first radio access technology (RAT) using a band of frequencies. The method can also include stopping transmission during the muting to make available the band of frequencies for use by a second RAT, which causes a muting gap.
In Example 16, the method of Example 15 can optionally include selecting a set of symbols, slots, subframes or frames for muting.
In Example 17, the method of Examples 15-16 can optionally include a configuration where the muting gap is not aligned with a beacon interval.
In Example 18, the method of Examples 15-16 can optionally include a configuration where the muting gap is aligned with a beacon interval.
In Example 19, the method of Examples 15-18 can optionally include selecting a second time duration that is available for a second muting in the cellular protocol using the band of frequencies. The method can further include stopping transmission during the second muting to make available the band of frequencies for use by the second RAT, which causes a second muting gap. The method can also include at least one of the muting gap and the second muting gap being aligned with a beacon interval.
In Example 20, the method of Examples 15-19 can optionally include configuring a change in an energy detection (ED) threshold of devices using the second RAT during clear channel assessment (CCA).
Example 21 is a method of protocol co-existence that includes determining a beacon interval of a first wireless network using a first protocol using a band of frequencies. The method also includes selecting a set of subframes in a cellular protocol using the band of frequencies that are available for muting during the beacon interval. The method further includes stopping transmission during the cellular protocol to make available the band of frequencies for use with the first protocol, the stopping causing a muting gap.
In Example 22, the method of Example 21 can optionally include configuring one or more subframes as a multicast-broadcast single-frequency network (MBSFN) subframe and refraining from transmission during at least a part of the MBSFN subframe.
In Example 23, the method of Examples 21-22 can optionally include selecting subframe 1, 2, 3, 6, 7, or 8 or a combination thereof for the muting gap in frequency division duplex (FDD) frames.
In Example 24, the method of Examples 21-23 can optionally include selecting subframe 3, 7, 8, or 9 or a combination thereof for the muting gap in time division duplex (TDD) frames.
In Example 25, the method of Examples 21-24 can optionally include selecting a special subframe of a time division duplex (TDD) frame and providing the muting gap during a guard period of the special subframe.
In Example 26, the method of Examples 21-25 can optionally include configuring a change in an energy detection (ED) threshold of devices using the first protocol during clear channel assessment (CCA).
In Example 27, the method of Examples 21-26 can optionally include configuring the beacon interval to match a consistent subframe containing the muting gap within long term evolution (LTE) protocol frames.
In Example 28, the method in Examples 21-27 can optionally include one or more of the following options: configuring one or more subframes as a multicast-broadcast single-frequency network (MBSFN) subframe and refraining from transmission during at least a part of the MBSFN subframe; selecting subframe 1, 2, 3, 6, 7, or 8 or a combination thereof for the muting gap in frequency division duplex (FDD) frames; selecting subframe 3, 7, 8, or 9 or a combination thereof for the muting gap in time division duplex (TDD) frames; or selecting a special subframe of a time division duplex (TDD) frame and providing the muting gap during a guard period of the special subframe.
In Example 29, the method in Examples 21-28 can optionally include one or more of the following options: configuring a change in an energy detection (ED) threshold of devices using the first protocol during clear channel assessment (CCA); or configuring the beacon interval to match a consistent subframe containing the muting gap within long term evolution (LTE) protocol frames.
Example 30 is an apparatus comprising means to perform a method as claimed in any of Examples 21-29.
Example 31 is a machine readable storage including machine-readable instructions that when executed implement a method or realize an apparatus as claimed in any of Examples 21-29.
Example 32 is a method of protocol co-existence including using a listen before transmit mechanism to detect whether a medium is busy. The method also includes determining a portion of a transmission of a 3GPP protocol to use as a muting gap. When the medium is detected as not busy, the method further includes sending the transmission to a set of UEs using the 3GPP protocol and stopping the 3GPP protocol transmission for a time period that coincides with the muting gap.
In Example 33, the method of Examples 32 can optionally include determining a portion of a transmission further comprises selecting a frame, subframe, slot or symbol to use as a muting gap.
In Example 34, the method of Examples 32-33 can optionally include sending muting gap information to at least one of the set of UEs to enable the UE to transition to a lower power state during the muting gap.
In Example 35, the method of Examples 32-34 can optionally include scanning the medium to determine traffic behavior of devices using a second protocol.
Various techniques, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, magnetic or optical cards, solid-state memory devices, a nontransitory computer-readable storage medium, or any other machine-readable storage medium wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the various techniques. In the case of program code execution on programmable computers, the computing device may include a processor, a storage medium readable by the processor (including volatile and nonvolatile memory and/or storage elements), at least one input device, and at least one output device. The volatile and nonvolatile memory and/or storage elements may be a RAM, an EPROM, a flash drive, an optical drive, a magnetic hard drive, or other medium for storing electronic data. One or more programs that may implement or utilize the various techniques described herein may use an application programming interface (API), reusable controls, and the like. Such programs may be implemented in a high-level procedural or an object-oriented programming language to communicate with a computer system. However, the program(s) may be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language, and combined with hardware implementations.
Each computer system includes one or more processors and/or memory; computer systems may also include various input devices and/or output devices. The processor may include a general purpose device, such as an Intel®, AMD®, or other “off-the-shelf” microprocessor. The processor may include a special purpose processing device, such as ASIC, SoC, SiP, FPGA, PAL, PLA, FPLA, PLD, or other customized or programmable device. The memory may include static RAM, dynamic RAM, flash memory, one or more flip-flops, ROM, CD-ROM, DVD, disk, tape, or magnetic, optical, or other computer storage medium. The input device(s) may include a keyboard, mouse, touch screen, light pen, tablet, microphone, sensor, or other hardware with accompanying firmware and/or software. The output device(s) may include a monitor or other display, printer, speech or text synthesizer, switch, signal line, or other hardware with accompanying firmware and/or software.
It should be understood that many of the functional units described in this specification may be implemented as one or more components, which is a term used to more particularly emphasize their implementation independence. For example, a component may be implemented as a hardware circuit comprising custom very large scale integration (VLSI) circuits or gate arrays, or off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A component may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like.
Components may also be implemented in software for execution by various types of processors. An identified component of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions, which may, for instance, be organized as an object, a procedure, or a function. Nevertheless, the executables of an identified component need not be physically located together, but may comprise disparate instructions stored in different locations that, when joined logically together, comprise the component and achieve the stated purpose for the component.
Indeed, a component of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within components, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network. The components may be passive or active, including agents operable to perform desired functions.
Several aspects of the embodiments described will be illustrated as software modules or components. As used herein, a software module or component may include any type of computer instruction or computer-executable code located within a memory device. A software module may, for instance, include one or more physical or logical blocks of computer instructions, which may be organized as a routine, program, object, component, data structure, etc., that perform one or more tasks or implement particular data types. It is appreciated that a software module may be implemented in hardware and/or firmware instead of or in addition to software. One or more of the functional modules described herein may be separated into sub-modules and/or combined into a single or smaller number of modules.
In certain embodiments, a particular software module may include disparate instructions stored in different locations of a memory device, different memory devices, or different computers, which together implement the described functionality of the module. Indeed, a module may include a single instruction or many instructions, and may be distributed over several different code segments, among different programs, and across several memory devices. Some embodiments may be practiced in a distributed computing environment where tasks are performed by a remote processing device linked through a communications network. In a distributed computing environment, software modules may be located in local and/or remote memory storage devices. In addition, data being tied or rendered together in a database record may be resident in the same memory device, or across several memory devices, and may be linked together in fields of a record in a database across a network.
Reference throughout this specification to “an example” means that a particular feature, structure, or characteristic described in connection with the example is included in at least one embodiment of the present invention. Thus, appearances of the phrase “in an example” in various places throughout this specification are not necessarily all referring to the same embodiment.
As used herein, a plurality of items, structural elements, compositional elements, and/or materials may be presented in a common list for convenience. However, these lists should be construed as though each member of the list is individually identified as a separate and unique member. Thus, no individual member of such list should be construed as a de facto equivalent of any other member of the same list solely based on its presentation in a common group without indications to the contrary. In addition, various embodiments and examples of the present invention may be referred to herein along with alternatives for the various components thereof. It is understood that such embodiments, examples, and alternatives are not to be construed as de facto equivalents of one another, but are to be considered as separate and autonomous representations of the present invention.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided, such as examples of materials, frequencies, sizes, lengths, widths, shapes, etc., to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, materials, etc. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
Although the foregoing has been described in some detail for purposes of clarity, it will be apparent that certain changes and modifications may be made without departing from the principles thereof. It should be noted that there are many alternative ways of implementing both the processes and apparatuses described herein. Accordingly, the present embodiments are to be considered illustrative and not restrictive, and the invention is not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims.
Those having skill in the art will appreciate that many changes may be made to the details of the above-described embodiments without departing from the underlying principles of the invention. The scope of the present invention should, therefore, be determined only by the following claims.
This application claims the benefit under 35 U.S.C. §119(e) of U.S. Provisional Application No. 61/924,194 filed Jan. 6, 2014, which is incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
61924194 | Jan 2014 | US |