TECHNIQUES FOR PASSIVE INTERMODULATION AVOIDANCE

Information

  • Patent Application
  • 20250184910
  • Publication Number
    20250184910
  • Date Filed
    March 07, 2022
    3 years ago
  • Date Published
    June 05, 2025
    4 days ago
Abstract
Mechanisms for passive intermodulation (PIM) avoidance. A method is performed by a controller. The method includes determining, based on presence of uplink PIM, to which fractions of transmission resources within a transmission slot a transmission power reduction factor is to be applied. The fraction of transmission resources is, in a logarithmic domain and according to a feedback control loop, determined as a function of a comparison between a measured improvement of the uplink PIM when having applied the transmission power reduction factor in a most recent transmission slot and a reference value for the improvement of the uplink PIM. The measured improvement of the uplink PIM is given by, in each transmission slot, probing a radio channel over which the uplink PIM is received. The method includes applying the transmission power reduction factor to the determined fraction of transmission resources within the transmission slot during transmission of a signal.
Description
TECHNICAL FIELD

Embodiments presented herein relate to a method, a controller, a computer program, and a computer program product for passive intermodulation (PIM) avoidance.


BACKGROUND

In general terms, PIM is caused by passive objects, such as filters, duplexers, connectors, antennas and so forth, exhibiting nonlinear behavior in the vicinity of radio signals. PIM can cause an interference signal to be generated that can couple into a receiver and degrade the receiver's sensitivity.


Depending on the location of the component that generates the PIM, the PIM is categorized as either internal or external. For example, PIM generated by the filters of the transmission (TX) radio chains in the antenna system at the cell site, loose cable connections, dirty connectors, poor performance duplexers, and aged antennas, is called internal PIM whereas PIM generated by a metal fence on the roof top of a building, a metal roof, or even a drainpipe, in vicinity of the cell site is called external PIM. External PIM thus refers to the case where the PIM occurs after the signals have left the transmitter antenna with the resultant intermodulation reflecting back into the receiver. PIM might cause the transmission power of the cell site to be backed off in order to avoid PIM to affect the receiver (RX) radio chains in the antenna system of the cell site, thus compromising the network performance. For example, a 1-dB drop in uplink sensitivity caused by PIM might reduce coverage by as much as 11% in a macro network. Further, PIM is a super-linear effect, meaning that the PIM power can increase as a power of the downlink transmit power. For example, for third-order PIM every decibel (dB) of transmit power increase could result in 3 dB of PIM power increase in the uplink.


To explain how PIM is generated at a high level, consider FIG. 1. FIG. 1 at (a) illustrates a communications network 100 where embodiments presented herein can be applied. The communications network 100 comprises an access network node 110, such as a radio access network node, radio base station, base transceiver station, node B (NB), evolved node B (eNB), gNB, access point, integrated access and access node, etc. configured to provide network access to user equipment 120a, 120b in carriers 120a, 120b. A PIM source 130 is located in the vicinity of the antenna system of the access network node 110. FIG. 1 at (b) shows a representation of the power spectral density (PSD) as a function of frequency. In the example of FIG. 1, downlink transmission in two frequency bands with carrier frequencies f1 and f2 mix nonlinearly in the PIM source 130. This results in new interference signals with a variety of center frequencies. Only one of these signals is shown in the power spectral density, centered at the frequency fPIM=2f1−f2. In this case, it is for illustrative purposes assumed that the linear combination 2f1−f2 happens to be located within the uplink band of the access network node 110, manifesting itself as additional uplink interference. The uplink radio channel for the access network node 110 is marked at reference numeral 140, and the uplink frequency band for the access network node 110 is marked at reference numeral 150. The interference typically has a wider bandwidth than the downlink signals that caused this uplink PIM. This wider bandwidth is an effect of the nonlinear mixing.


PIM generation can be modeled starting with one or more signals transmitted in the downlink that impinge on a PIM source as follows. First, let ykγ(t) be the received uplink PIM signal corresponding to the k:th downlink channel:








y
k
γ

(
t
)

=


(


h
k
γ

*

x
k


)




(
t
)






Here γ denotes the PIM source, hkγ the k:th downlink channel to the PIM source, xk the transmitted signal and * denotes convolution. The nonlinear interference generation is modeled as a static nonlinear function;









x
y

(
t
)

=

f

(

γ
,


y
1
γ

(
t
)

,


,


y
K
γ

(
t
)


)


,




Here xγ(t) is the uplink PIM signal, and f(γ, y1γ(t), . . . , ykγ(t)) is the nonlinear function. The received PIM signal can thus be expressed as:








y
γ

(
t
)

=


(


h
γ

*

x
γ


)




(
t
)

.






Here hγ is here the uplink channel from the PIM source. An expansion of the nonlinear function can now be performed using multi-dimensional polynomials, as motivated by the Stone-Weirstrass theorem. Stochastic signal modeling gives the following Volterra series representation of the PIM signal after some computations:








y
γ

(
t
)

=



n


(










H
n

(


τ
1
1

,


,

τ
k
m

,


,

τ
K

n
K



)






k
=
1

K






m
=
1


n
K






x
k

(

t
-

τ
k
m


)


d


τ
k
m








)










H
n

(


τ
1
1

,


,

τ
k
m

,


,

τ
K

n
K



)

=






(




k
=
1

K






m
=
1


n
K




f
γ
n




h
γ

(
τ
)




h
k
γ

(


τ
k
m

-
τ

)




)


d

τ

d


γ
.








Here τkm denote the delay parameters of the Volterra series expansion. An evaluation of special cases of the above model verifies the frequency shift and spreading of signals outlined for FIG. 1 above. The details are omitted here. Note that the superscript (·)n is the non-linear order of the PIM source.


Three techniques to mitigate the impact of PIM, namely uplink PIM cancellation, downlink PIM avoidance by beamformed transmission, and general power reducing PIM avoidance, will be briefly summarized next.


PIM cancellation algorithms are designed to estimate parts of the complete PIM channel from downlink transmission to uplink reception. Given the estimated signal, a predicted signal can be computed and subtracted from the received signal. In case the predicted signal is an accurate model of the received uplink PIM, a substantial reduction in the uplink PIM can be obtained. One common drawback of all PIM cancellation algorithms is the computational complexity. This computational complexity is much higher than that of conventional channel estimation since non-linear basis functions must be created. PIM cancellation also requires measurement of both downlink transmission and uplink PIM.


PIM avoidance by beamformed transmission aims at avoiding beams of an advanced antenna system used for transmission to be pointed in the direction of the PIM source. This might require estimation of the location of the PIM source, which might not be knowns in advance. Therefore, techniques have been proposed to estimate a subspace of the beam space generated by the antenna array system where the PIM source is located. Generation of beams in this subspace is then avoided for downlink transmissions. This technique is only applicable for advanced antenna systems, and thus for (radio) access network nodes equipped with large antenna arrays. Further, this technique limits the number of possible directions in which beams can be used for downlink transmission.


PIM avoidance in general is applicable to any type of access network node. Once the frequency bands in which downlink transmissions are used that causes the uplink PIM are identified, the uplink PIM can be reduced by at least periodically avoiding transmission in these identified frequency bands. PIM avoidance can thereby reduce the uplink PIM depending on how much of the frequency bands can be muted. For network deployments a set of restrictions is defined on how much muting in downlink transmissions is allowed, as an upper limit on how much downlink throughput and capacity can be sacrificed. The implication is that the muting might be implemented sporadically and non-continuously, essentially adding more variations to the uplink signal to interference and noise ratio (SINR). Variations in the SINR must be considered carefully when used in uplink link adaptation, since the uplink PIM is mixed with the interference from other user equipment 120a, 120b.


Hence, there is still a need for improved PIM mitigation techniques.


SUMMARY

An object of embodiments herein is to provide techniques for efficient PIM avoidance that does not suffer from the issues noted above, or where the above noted issues at least have been mitigated or reduced.


According to a first aspect there is presented a method for PIM avoidance. The method is performed by a controller. The method comprises determining, based on presence of uplink PIM, to which fractions of transmission resources within a transmission slot a transmission power reduction factor is to be applied. The fraction of transmission resources is, in a logarithmic domain and according to a feedback control loop, determined as a function of a comparison between a measured improvement of the uplink PIM when having applied the transmission power reduction factor in a most recent transmission slot and a reference value for the improvement of the uplink PIM. The measured improvement of the uplink PIM is given by, in each transmission slot, probing a radio channel over which the uplink PIM is received. The method comprises applying the transmission power reduction factor to the determined fraction of transmission resources within the transmission slot during transmission of a signal.


According to a second aspect there is presented a controller for PIM avoidance. The controller comprises processing circuitry. The processing circuitry is configured to cause the controller to determine, based on presence of uplink PIM, to which fractions of transmission resources within a transmission slot a transmission power reduction factor is to be applied. The fraction of transmission resources is, in a logarithmic domain and according to a feedback control loop, determined as a function of a comparison between a measured improvement of the uplink PIM when having applied the transmission power reduction factor in a most recent transmission slot and a reference value for the improvement of the uplink PIM. The measured improvement of the uplink PIM is given by, in each transmission slot, probing a radio channel over which the uplink PIM is received. The processing circuitry is configured to cause the controller to apply the transmission power reduction factor to the determined fraction of transmission resources within the transmission slot during transmission of a signal.


According to a third aspect there is presented a controller for PIM avoidance. The controller comprises a determine module configured to determine, based on presence of uplink PIM, to which fractions of transmission resources within a transmission slot a transmission power reduction factor is to be applied. The fraction of transmission resources is, in a logarithmic domain and according to a feedback control loop, determined as a function of a comparison between a measured improvement of the uplink PIM when having applied the transmission power reduction factor in a most recent transmission slot and a reference value for the improvement of the uplink PIM. The measured improvement of the uplink PIM is given by, in each transmission slot, probing a radio channel over which the uplink PIM is received. The controller comprises an apply module configured to apply the transmission power reduction factor to the determined fraction of transmission resources within the transmission slot during transmission of a signal.


According to a fourth aspect there is presented a computer program for PIM avoidance, the computer program comprising computer program code which, when run on a controller, causes the controller to perform a method according to the first aspect.


According to a fifth aspect there is presented a computer program product comprising a computer program according to the fourth aspect and a computer readable storage medium on which the computer program is stored. The computer readable storage medium could be a non-transitory computer readable storage medium.


Advantageously, these aspects provide efficient PIM avoidance that does not suffer from the issues noted above.


Advantageously, these aspects enable the minimum necessary fraction of transmission resources to be determined to which the transmission power reduction factor is to be applied. This minimized throughput losses in the downlink whilst maximizing the throughput in the uplink.


Advantageously, by repeatedly performing the probing, changes over time can be identified and the determination of fraction of transmission resources can be adapted accordingly.


Advantageously, these aspects enable globally stable feedback control, for repeated determination of which fraction of transmission resources to which the transmission power reduction factor is to be applied.


Advantageously, these aspects are applicable for all available downlink frequency bands, as well as for a selected fraction of all available downlink frequency bands, for a group of user equipment, as well as for a single user equipment.


Advantageously, the feedback control loop can be integrated with uplink link adaptation, since the control objective is to hold the PIM power interference with respect to the other interference at a small and constant level.


Other objectives, features and advantages of the enclosed embodiments will be apparent from the following detailed disclosure, from the attached dependent claims as well as from the drawings.


Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to “a/an/the element, apparatus, component, means, module, step, etc.” are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, module, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.





BRIEF DESCRIPTION OF THE DRAWINGS

The inventive concept is now described, by way of example, with reference to the accompanying drawings, in which:



FIG. 1 is a schematic diagram illustrating a communications network according to embodiments;



FIG. 2 is a block diagram of an access network node and a PIM source according to an embodiment;



FIG. 3 is a flowchart of methods according to embodiments;



FIG. 4 is a block diagram of a controller implementing a control loop according to an embodiment;



FIG. 5 schematically illustrates a quantization function according to an embodiment;



FIG. 6 is a signalling diagram of a method according to an embodiment;



FIG. 7 is a block diagram of a controller implementing a control loop according to an embodiment;



FIG. 8 is a block diagram for which the Circle and Popov stability criteria hold;



FIG. 9 is a block diagram of a controller implementing a control loop according to an embodiment;



FIGS. 10-17 shows simulation results according to embodiments;



FIG. 18 is a schematic diagram showing functional units of a controller according to an embodiment;



FIG. 19 is a schematic diagram showing functional modules of a controller according to an embodiment; and



FIG. 20 shows one example of a computer program product comprising computer readable storage medium according to an embodiment.





DETAILED DESCRIPTION

The inventive concept will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the inventive concept are shown. This inventive concept may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art. Like numbers refer to like elements throughout the description. Any step or feature illustrated by dashed lines should be regarded as optional.


As noted above, there is still a need for improved PIM mitigation techniques.


In this respect, as also noted above, PIM cancellation is associated with a very high computational complexity and requires measurements on multiple downlink and uplink transmissions with high sampling rate. PIM avoidance by beamformed transmission is limited to access network nodes equipped with advanced antenna systems. Traditional PIM avoidance techniques based on muting downlink transmissions may cause significant downlink throughput reductions.


At least some of the herein disclosed embodiments aim at addressing shortcomings of traditional PIM avoidance techniques by considering possible effects of the uplink when performing the PIM avoidance.


The embodiments disclosed herein in particular relate to mechanisms for PIM avoidance. In order to obtain such mechanisms there is provided a controller 1700, a method performed by the controller 1700, a computer program product comprising code, for example in the form of a computer program, that when run on a controller 1700, causes the controller 1700 to perform the method.



FIG. 2 is a block diagram of a system 200 comprising an access network node 110 and a PIM source 130. In turn, the access network node 110 comprises a controller 1700. The access network node 110 has a transmitter part 210 and a receiver part 220. In turn, the transmitter part 210 comprises a downlink baseband part 230 and the receiver part 220 comprises an uplink baseband part 240. The controller 1700 is partly implemented in the transmitter part 210 and partly in the receiver part 220. In the transmitter part 210 the controller 1700 comprises a feedback control block 250 and in the receiver part 220 the controller 1700 comprises a probing block 260.



FIG. 3 is a flowchart illustrating embodiments of methods for PIM avoidance. The methods are performed by the controller 1700. The methods are advantageously provided as computer programs 1920.


S102: The controller 1700 determines, based on presence of uplink PIM, to which fractions of transmission resources within a transmission slot a transmission power reduction factor is to be applied.


The fraction of transmission resources is, in a logarithmic domain and according to a feedback control loop 400, 900, determined as a function of a comparison between a measured improvement of the uplink PIM when having applied the transmission power reduction factor in a most recent transmission slot and a reference value for the improvement of the uplink PIM. The fraction of transmission resources might be determined by the feedback control block 250.


The measured improvement of the uplink PIM is given by, in each transmission slot, probing a radio channel over which the uplink PIM is received. The probing might be implemented in the probing block 260.


S104: The controller 1700 applies the transmission power reduction factor to the determined fraction of transmission resources within the transmission slot during transmission of a signal.


Embodiments relating to further details of PIM avoidance as performed by the controller 1700 will now be disclosed.


It is appreciated that there could be different types of control loops. In some embodiments, the feedback control loop is either an integral (I) feedback control loop or a proportional integral (PI) feedback control loop. In some examples, the controller is therefore referred to as either an I controller or a PI controller.


It is appreciated that there could be different types of transmission resources to which the transmission power reduction factor is applied. In some non-limiting examples, the transmission resources are physical resource blocks (PRBs).


It is appreciated that there could be different time intervals at which the probing is performed. In some non-limiting examples, the probing is performed between once every 10th to once every 1000th transmission slot, preferably between once every 25th to every 400th transmission slot, more preferably between once every 50th to once every 150th transmission slot, even more preferably between once every 75th to once every 125th transmission slot.


It is appreciated that there could be different ways in which the transmission power reduction factor is applied to, and thus affects, the determined fraction of transmission resources within the transmission slot. In some non-limiting examples, applying the transmission power reduction factor comprises any, or any combination, of: muting the transmission resources to which the transmission power reduction factor is applied, reducing transmission power of the transmission resources to which the transmission power reduction factor is applied, limiting downlink load in at least one carrier to a fixed limit, minimizing downlink load in at least one carrier to a fixed limit, limiting the downlink load from a certain side of downlink carriers when considered in the frequency domain.


Reference is next made to FIG. 4 in which is shown a block diagram of a feedback control loop 400 as implemented by the controller according to embodiments disclosed herein. The feedback control loop 400 is executed in the logarithmic domain. For ease of description, the notation used in the feedback control loop 400 is given mainly in the frequency domain where s is the Laplace transform variable. The different symbols have meanings as defined in Table 1.









TABLE 1







List of symbols and their meaning








Symbol
Meaning





custom-character
reference value for the UL PIM improvement, in dB


custom-character
measured UL PIM improvement, in dB


e−smpTTI
reporting delay, where mp is an integer that represents



the delay factor in terms of number of TTIs (implemented



in the delay module 470)


TTI
transmission time interval


ē(s)
control error



K
P

proportional gain of the proportional integrating controller



(implemented in the controller module 410)



T
I

integration time of the proportional integrating controller



(implemented in the controller module 410)


ū(s)
control signal



P
blanked

fractionally muted power, in dB


e−smcTTI
control delay, where mc is an integer that represents



the delay factor in terms of number of TTIs



(implemented in the delay module 430)


n
(highest) PIM order (implemented in the PIM generation



module 440)


20log(|hp|)
PIM channel power, in dB


custom-character
interference plus noise power, originating from other user



equipment and receiver noise



τ

filtering time, in seconds (as in filtering modules 450, 460)









For ease of description, in the remaining of this disclosure, application of the transmission power reduction factor to the determined fraction of transmission resources will be exemplified by muting a fraction of PRBs. In this respect, selective and dynamic muting of a fraction of the PRBs means that PRBs only in the needed fraction of the frequency band, to achieve a certain PIM level, are muted. Traditionally, all PRBs in the frequency band, or the frequency band corresponding to certain user(s) are muted. The fractional muting (implemented in the logarithmic muting module 420) might be implemented in the scheduler, that then only schedules the blocks of PRBs that are not marked as muted. The scheduling typically schedules blocks of PRBs and can be described by FIG. 5. In FIG. 5 is at 500 shown n└ū┘Q1,1 as a function of ū. Here, n└ū┘Q1,1 expresses in the logarithmic domain the PIM effect of the number of PRB blocks to, per transmission slot, be muted. The quantization function using n└ū┘Q1,1 (implemented in the logarithmic muting module 420) can be expressed as:







n





u
_





Q
_


1
,
1




=

{



0




if



u
_





u
_

max







10

n


log

(


Q
PRB



floor



(


(



u
_

1

+

Q
PRB


)

/

Q
PRB


)

/

N
PRB


)






if



u
_


<


u
_

1







10

n

log


(


Q
PRB



floor



(


(


u
_

+

Q
PRB


)

/

Q
PRB


)

/

N
PRB


)




else








Here, QPRB is the number of PRBs per scheduled block and NPRB is the number of schedulable PRBs. Using this quantization function, it follows that:







P
blank

=


10


log

(





"\[LeftBracketingBar]"


h
p



"\[RightBracketingBar]"


2




(


P
max



10





u
_





Q
_


1
,
1



10



)

n


)


=


20


log

(



"\[LeftBracketingBar]"


h
p



"\[RightBracketingBar]"


)


+

10

n


log

(

P
max

)


+

n





u
_





Q
_


1
,
1










This explains the factor n (implemented in the PIM generation module 440) in the block diagram of FIG. 4. The bracket └·┘ denotes the integer floor function (implemented in the logarithmic muting module 420).


Since n└ū┘Q1,1 (implemented in the logarithmic muting module 420) defines the fraction of transmission resources to which the transmission power reduction factor is to be applied, in some embodiments, the fraction of transmission resources further is thus determined as a function of control parameters of the feedback control loop. For example, the uplink PIM has an order n, and the control parameters depend on the order n of the uplink PIM.


In some aspects, probing (implemented in the filtering module 460) is used to measure the effect of applying the transmission power reduction factor. In some embodiments, the probing is performed to measure the effect of applying the transmission power reduction factor, with an objective to not apply the transmission power reduction factor to more transmission resources than needed for the uplink PIM to maintain close to the reference value. Further, in some embodiments, probing the radio channel comprises comparing uplink interference, including the uplink PIM, resulting from not applying the transmission power reduction factor to any of the transmission resources within the transmission slot and uplink interference, including the uplink PIM, resulting from continuously applying the transmission power reduction factor to all the transmission resources within the transmission slot. The block diagram of FIG. 4 illustrates such probing implemented in two filtering modules 450 and 460, one applied during normal operation (module 450) and one when a maximum transmission power reduction factor is applied (module 460). Hence, in some embodiments, when probing the radio channel, the uplink interference, including the uplink PIM, resulting from not applying the transmission power reduction factor to any of the transmission resources is filtered with a first filter and the uplink interference, including the uplink PIM, resulting from continuously applying the transmission power reduction factor to all the transmission resources within the transmission slot is filtered with a second filter. Since application of the maximum transmission power reduction factor removes the effect of the uplink PIM, the other block measures the total effect of interference, noise and uplink PIM. The difference between the outputs of the two blocks thus represents the power caused by the uplink PIM. This quantity is custom-character, which is the quantity that is controlled.


In some embodiments, the feedback control loop meets global stability criteria that depend on the order n of the uplink PIM. There might be different conditions for the feedback control loop to meet the global stability criteria. In some examples, the proportional gain KP is determined from the global stability criteria. Particularly, the proportional gain KP might be determined such that:








(

n




K
_

p



T
_

I



)



(


(


m
c

+

m
p


)



t
TTI


)


<
θ




Here, as above, tTTI is the length of the transmission slot, n is the order of the uplink PIM, TI is the integration time of the feedback control loop, mc is an integer, mp is an integer, and θ is a global stability constant. In some non-limiting examples, θ=1.6, in more conservative examples, θ=1.0,


The integral feedback control loop can thus be globally stable, provided that the above loop-gain-loop-delay product stability condition holds. Having a globally stable feedback control loop is advantageous, since it is then known that the controller will always perform its task successfully, no matter what the measured uplink PIM would be.


In some aspects, the above global stability condition is used for configuration of the integral feedback control loop, where the only uplink PIM related prior knowledge that is needed is a bound on the maximal PIM order. This information is often known from measurements. Typically, the delays are also known. The integration time of the controller can then be selected as a kind of filtering time. The integration time sets the speed of the controller. A small value gives more noisy control than a larger value. The gain KP can then be computed from the stability condition, followed by a preferred reduction to obtain a stability margin. This completes the configuration of the control loop.


Reference is next made to the signalling diagram of FIG. 6. If not otherwise stated, all values, and all computations, are in the logarithmic domain.


S201: The reference value for the uplink PIM improvement, custom-characterΔPPIMrefcustom-character , is configured.


S202: A measured uplink PIM improvement value custom-characterΔPPIMcustom-character is received.


S203: The control error ē is computed.


S204: The control signal ū is computed.


S205: The value of └ū┘Q1,1 is computed.


In some examples, S202-S205 are performed as part of S102.


S206: The value of Pblank is computed and a signal is transmitted in the downlink as in S104.


S207: The signal transmitted in the downlink is subjected to PIM of order n.


S208: The signal as subjected to the PIM is propagated in the uplink.


S209: Interference I is received from user equipment 120a, 120b.


S210: A signal 20log (|hp|)+10nlog(Pmax)+n└ū┘Q1,1 +I+N is received.


S211: It is determined if it is time for muting all PRBs in the next transmission slot. If Yes, step S212 is entered. Else step S213 is entered.


S212: The control signal is set to mute all PRBs in the next transmission slot. Step S206 can then be entered again for the next transmission slot.


S213: A new measured uplink PIM improvement value custom-characterΔPPIMcustom-character is received for the next transmission slot. Step S203 can then be entered again for the next transmission slot.


To explain some benefits of the above disclosed embodiments, reference is for comparisons next made to the block diagram of an example feedback control loop 700 illustrated in FIG. 7. The feedback control loop 700 is executed in the linear domain. This block diagram thus represents the physical starting point, where, in contrast to the above disclosed embodiments, all quantities are represented in the linear power domain. Module 7x0 corresponds to module 4x0, where x=1, 2, 3, 4, 5, 6, 7 but where operations in module 7x0 are performed in the linear domain. That is, module 710 corresponds to module 410, etc. One advantage of replacing traditional control as applied in the linear domain (as in FIG. 7) with control applied in the logarithmic domain (as in FIG. 4) results from the transformation of the


PIM generation module from the factor |hp|2(·)n (as in module 740) in the linear domain to simply the factor n in the logarithmic domain (as in module 440). This follows from the equation derived above stating:









P

¯


blank



=







10






log






(






"\[LeftBracketingBar]"


h
p



"\[RightBracketingBar]"


2






(



P
max




10




u




Q
_


1
,
1




1

0




)

n


)



=



20



log

(



"\[LeftBracketingBar]"


h
p



"\[RightBracketingBar]"


)


+

10

n


log



(

P
max

)


+

n





u




Q
_


1
,
1



.








The fact that only the factor n (instead of the factor |hp|2(·)n) appears in the loop gain leads to the above global stability criterion and tuning only in terms of the factor n. In the linear domain the PIM channel gain appears in the loop and therefore also in the corresponding linear domain stability criterion:








(




"\[LeftBracketingBar]"


h

p
,
max




"\[RightBracketingBar]"




P
max
n



u
max

n
-
1





K
p


T
I



)




(


(


m
c

+

m
p


)


TTI

)


<
θ




The tuning of the controller in the linear domain therefore requires knowledge of the PIM channel. Since the PIM channel is very computationally complex to estimate, it follows that logarithmic feedback control of the uplink PIM as disclosed above also offers a significantly lower implementational complexity than traditional control in the linear domain.


In general terms, a feedback control system that is stable does not exhibit un-desired oscillation in terms of limit cycles, nor does it risk signal run-away. Stability may be local or global. If a feedback control system is locally stable, the stability holds in a restricted part of the state space, while global stability means that the stability holds irrespectively of where the system state may be. Thus, to be guaranteed to be always stable, the desired stability property of any engineering system is global stability. It is well known how to analyse stability for linear systems, however for non-linear systems the understanding and available methods to investigate stability are more limited. For non-linear systems with a certain structure, methods are available. As will become clear the infinite dimensional variants of the Circle and Popov-criteria will be of particular interest. These results enable mathematical proof of global stability for dynamic systems containing delays and static non-linear elements in the feedback path. Reference is here made to the block diagram 800 of FIG. 8 for which the Circle and Popov criteria hold. In FIG. 8, ĝ(s) as implemented in loop gain module 810 is the loop gain, φ(·) as implemented in function module 820 is a static nonlinear continuous function. Further, y1 and y2 are output signals, e1 and e2 are error signals, and u1 and u2 represents reference signals, feed-forward signals, disturbance signals, or combinations thereof. It is also assumed that the nonlinear element fulfils a sector condition. According to the Sector condition, a continuous function φ:R→R is said to belong to the sector [α, β], α≤β, if:








a


x
2




x

φ



(
x
)




β


x
2



,






or
,

equivalently
:







a



φ

(
x
)

x


β




Here x denotes any independent variable.


The Circle and Popov criteria are then given as follows.


The Circle Criterion: Consider the feedback system of FIG. 3 with





{circumflex over (g)}(s)={circumflex over (g)}a(s)


where ĝa ∈Â and where φ(·) is continuous and belongs to the sector [α, β]. Then if 0=α<β, ĝ(s) has no poles in the right half plane, and










inf



ω

R




Re



(


g
ˆ

(

j

ω

)

)


>

-

1
β



,




then the closed loop system is globally L2-stable.


The Popov criterion: Consider the feedback system of FIG. 3 where g(·), ∈ A, ġ(·) ∈ A, φ(·) is continuous and belongs to the sector [0, k], u1 ∈ E L2, u2 ∈ L2, {dot over (u)}2 ∈ L2. Then if there exists q≥0, δ>0, such that








Re



(


(

1
+

j

ω

q


)




g
ˆ

(

j

ω

)


)


>


-

1
k


+
δ

>
0

,




then the closed loop system is L2-stable.


Noting that delays can be interchanged with static nonlinear functions, it follows that the block diagram of FIG. 4 can be re-drawn into the block diagram of FIG. 9. In FIG. 9 is shown a block diagram of a feedback control loop 900 as implemented by the controller according to embodiments disclosed herein. The feedback control loop 900 is executed in the logarithmic domain. By comparing FIG. 8 and FIG. 9, the following quantities result:








u
1

(
s
)

=


n

10


log



(

P
max

)


+

20


log





"\[LeftBracketingBar]"


h
p



"\[RightBracketingBar]"



+


I
+
N


_


+


Δ


P
blank



_











u
2

(
s
)

=


e


-
s



m
c


TTI





C

¯


(
s
)








P
PIM
ref





_



(
s
)










g
ˆ

(
s
)

=


e


-

s

(


m
c

+

m
p


)



TTI




1


s


τ
¯


+
1





C
¯

(
s
)









φ

(

u
¯

)

=

n






u
_





Q
¯


1
,
1








The following assumptions B1 and B2 are introduced:


B1: C(s) (implemented in controller module 920) is proper and asymptotically stable. This implies that s is replaced by s+δ, for some small δ, in the PI controller.


B2: └ū┘Q1,1 (implemented in the logarithmic muting module 930) is bounded from below by a continuous function with rounded corners, └ū┘Q1,1,ε.


The Circle criterion is then applicable since ĝ(s) is asymptotically stable by condition B1 and strictly proper by condition B1, and hence ĝ ∈ Â, where s denotes the Laplace transform of the set of asymptotically stable and proper transfer functions. In addition, φ(ū) is continuous by condition B2.


To proceed with the analysis the following conditions B3 and B4 related to the sector condition are introduced:


B3: The last quantization step occurs for ū=ūmax<0.


B4: A bound on the PIM order, n (as implemented by the PIM generation module 940), is known.


To obtain analytical results, useful for tuning the special case of pure integral control without filtering (as implemented by filtering module 960) being considered, this means that:









C
¯

(
s
)

=




K
¯

p



T
¯

I




1
S



,
and







τ
¯

=
0




This case is also practically relevant since integration provides filtering as well. In this case a direct calculation shows that the Circle criterion results in the stability condition:










-
sin




(


(


m
c

+

m
p


)



ω

TTI

)


>

-

ω


(



K
¯

p



T
I

¯


)



n




=

-



(


m
c

+

m
p


)



ω

TTI



(




K
¯

p



T
I

¯



n

)




(


(


m
c

+

m
p


)


T

T

1

)





,


ω





It can be seen from the above expression that the total controller gain









K
¯

p



T
I

¯




n




affects the stability, and that the gain can be arbitrarily distributed between the controller (in modules 920, 970) and the quantizer (as implemented by the logarithmic muting module 930). A further analysis of the stability condition can be done. It is noted that −sin ((mc+mp)ωTTI) and






-

ω


(



K
¯

p



T
I

¯


)



n






intersect at ω=0. If the slope of −sin((mc+mp)ωTTI) is less negative than






-

1


(



K
¯

p



T
I

¯


)



n






in ω=0, there will be no intersections for






ω
>

0


since



d

d

ω





(


-
sin




(


(


m
c

+

m
p



)



ω

TTI

)


)






is minimal in ω=0. Hence the following criterion implies that the Circle criterion is fulfilled:








-

(


m
c

+

m
p


)



TTI

>

-

1


(


K
p


T
I


)



n







This is equivalent to the following loop-gain-loop-delay criterion implemented in delay modules 910, 960, 980:








(


(



K
¯

p



T
¯

I


)



n

)




(


m
c

+

m
p


)


TTI

<
1




This criterion is useful for tuning, as pointed out above. However, it can be made less conservative by an application of the Popov criterion. To use the Popov criterion the following additional conditions B5, B6, B7, and B8 are introduced:


B5: The interference and noise I+N is input output stable in L2.


B6: The PIM channel gain 20log (|hp|) is input output stable in L2.


B7: ΔPblank is input output stable in L2.


B8: custom-characterΔPPIMrefcustom-character(s) is input output stable in L2.


The Popov criterion is then applicable since ĝ(s) is asymptotically stable by condition B1 and strictly proper by condition B1, and hence ĝ ∈ Â and {circumflex over (ġ)} ∈ Â , φ(u) is continuous by condition B2, u1 and u2 are in L2 by conditions B1, B5-B8, and {dot over (u)}2 is in L2 by conditions B1, B5-B8.


A direct computation then gives the Popov curve:










Re



(

k



g
ˆ

(

j

ω

)


)


=



-
n





K
¯

p



T
_

I





sin



(


(


m
c

+

m
p


)



ω

TTI

)


ω









=



-

(


(

n




K

¯


p




T
_

I

¯



)




(


m
c

+

m
p


)


TTI

)





sin

(


(


m
c

+

m
p


)


TTI

ω

)



(


m
c

+

m
p


)


TTI

ω




,







ω

Im


(

k



g
ˆ

(

j

ω

)


)


=



-

(

n




K

¯


p



T
I

¯



)





(


(


m
c

+

m
p


)


TTI

)




cos

(


(


m
c

+

m
p


)


TTI

ω

)



(


m
c

+

m
p


)


TTI










The Popov curve can now be numerically evaluated.


A closer study of the stability limit case, results in the above stability condition:








(

n





K

¯


p



T
¯

I



)




(


(


m
c

+

m
p


)


TTI

)


<
θ




In this section the metric custom-characterΔPPIMcustom-character was used as the metric that would be set as the reference input to the controller, and is the measurement that is used directly by the controller. It can be appreciated that there are other difference metrics that can be used to measure the impact of the uplink PIM with and without application of the transmission power reduction factor.


In some aspects, the value of custom-characterΔPPIMrefcustom-character is automatically set using another measurement. In one example, the value of custom-characterΔPPIMrefcustom-character is selected so that the resulting level of PIM is 3 dB below the interference plus noise that is not due to the uplink PIM.


Simulation results will be disclosed next with reference to FIGS. 10-17. Results for an I controller are shown in FIGS. 10-13, and results for a PI controller are shown in FIGS. 14-17. Numerical values used during the simulations are listed in Table 2. The received interference plus noise as a function of time is shown in FIG. 10 for the I controller and in FIG. 14 for the PI controller. The received PIM power as a function of time is shown in FIG. 11 for the I controller and in FIG. 15 for the PI controller. The control signal as a function of time is shown in FIG. 12 for the I controller and in FIG. 16 for the PI controller. The measured uplink PIM improvement as a function of time is shown in FIG. 13 for the I controller and in FIG. 17 for the PI controller.









TABLE 2







List of numerical values


used during simulations










Parameter
Value







Bandwidth
100 MHZ, 272 PRBs











TS
0.001
s










mc
2



mp
2











Probing period
0.1
s







PPIMref 


3
dB











K
P

2.0047












T
I

0.030
s



Muting block size
8
PRBs










n
3










It can be concluded from the figures that the control loops for both I and PI controllers are globally stable and perform as intended. Using the PI controller results in a lower fraction of PRBs being muted and also provides better regulation.



FIG. 18 schematically illustrates, in terms of a number of functional units, the components of a controller 1700 according to an embodiment. Processing circuitry 1710 is provided using any combination of one or more of a suitable central processing unit (CPU), multiprocessor, microcontroller, digital signal processor (DSP), etc., capable of executing software instructions stored in a computer program product 1910 (as in FIG. 20), e.g. in the form of a storage medium 1730. The processing circuitry 1710 may further be provided as at least one application specific integrated circuit (ASIC), or field programmable gate array (FPGA).


Particularly, the processing circuitry 1710 is configured to cause the controller 1700 to perform a set of operations, or steps, as disclosed above. For example, the storage medium 1730 may store the set of operations, and the processing circuitry 1710 may be configured to retrieve the set of operations from the storage medium 1730 to cause the controller 1700 to perform the set of operations. The set of operations may be provided as a set of executable instructions.


Thus the processing circuitry 1710 is thereby arranged to execute methods as herein disclosed. The storage medium 1730 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid state memory or even remotely mounted memory. The controller 1700 may further comprise a communications interface 1720 at least configured for communications with other entities, functions, and devices. As such the communications interface 1720 may comprise one or more transmitters and receivers, comprising analogue and digital components. The processing circuitry 1710 controls the general operation of the controller 1700 e.g. by sending data and control signals to the communications interface 1720 and the storage medium 1730, by receiving data and reports from the communications interface 1720, and by retrieving data and instructions from the storage medium 1730. Other components, as well as the related functionality, of the controller 1700 are omitted in order not to obscure the concepts presented herein.



FIG. 19 schematically illustrates, in terms of a number of functional modules, the components of a controller 1700 according to an embodiment. The controller 1700 of FIG. 19 comprises a number of functional modules; a determine module 1810 configured to perform step S102, and an apply module 1820 configured to perform step S104. The controller 1700 of FIG. 19 may further comprise a number of optional functional modules, such as represented by functional module 1830. In general terms, each functional module 1810:1830 may in one embodiment be implemented only in hardware and in another embodiment with the help of software, i.e., the latter embodiment having computer program instructions stored on the storage medium 1730 which when run on the processing circuitry makes the controller 1700 perform the corresponding steps mentioned above in conjunction with FIG. 18. It should also be mentioned that even though the modules correspond to parts of a computer program, they do not need to be separate modules therein, but the way in which they are implemented in software is dependent on the programming language used. Preferably, one or more or all functional modules 1810:1830 may be implemented by the processing circuitry 1710, possibly in cooperation with the communications interface 1720 and/or the storage medium 1730. The processing circuitry 1710 may thus be configured to from the storage medium 1730 fetch instructions as provided by a functional module 1810:1830 and to execute these instructions, thereby performing any steps as disclosed herein.


The controller 1700 may be provided as a standalone device or as a part of at least one further device. For example, the controller 1700 may be provided in a node of an access network or in a node of a core network. Alternatively, functionality of the controller 1700 may be distributed between at least two devices, or nodes. These at least two nodes, or devices, may either be part of the same network part (such as the access network or the core network) or may be spread between at least two such network parts. In general terms, instructions that are required to be performed in real time may be performed in a device, or node, operatively closer to the cell than instructions that are not required to be performed in real time. Thus, a first portion of the instructions performed by the controller 1700 may be executed in a first device, and a second portion of the of the instructions performed by the controller 1700 may be executed in a second device; the herein disclosed embodiments are not limited to any particular number of devices on which the instructions performed by the controller 1700 may be executed. Hence, the methods according to the herein disclosed embodiments are suitable to be performed by a controller 1700 residing in a cloud computational environment. Therefore, although a single processing circuitry 1710 is illustrated in FIG. 18 the processing circuitry 1710 may be distributed among a plurality of devices, or nodes. The same applies to the functional modules 1810:1830 of FIG. 19 and the computer program 1920 of FIG. 20.



FIG. 20 shows one example of a computer program product 1910 comprising computer readable storage medium 1930. On this computer readable storage medium 1930, a computer program 1920 can be stored, which computer program 1920 can cause the processing circuitry 1710 and thereto operatively coupled entities and devices, such as the communications interface 1720 and the storage medium 1730, to execute methods according to embodiments described herein. The computer program 1920 and/or computer program product 1910 may thus provide means for performing any steps as herein disclosed.


In the example of FIG. 20, the computer program product 1910 is illustrated as an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc) or a Blu-Ray disc. The computer program product 1910 could also be embodied as a memory, such as a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), or an electrically erasable programmable read-only memory (EEPROM) and more particularly as a non-volatile storage medium of a device in an external memory such as a USB (Universal Serial Bus) memory or a Flash memory, such as a compact Flash memory. Thus, while the computer program 1920 is here schematically shown as a track on the depicted optical disk, the computer program 1920 can be stored in any way which is suitable for the computer program product 1910.


The inventive concept has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the inventive concept, as defined by the appended patent claims.

Claims
  • 1. A method for passive intermodulation, PIM, avoidance, the method being performed by a controller, the method comprising: determining, based on presence of uplink PIM, to which fractions of transmission resources within a transmission slot a transmission power reduction factor is to be applied, wherein the fraction of transmission resources being, in a logarithmic domain and according to a feedback control loop, determined as a function of a comparison between a measured improvement of the uplink PIM when having applied the transmission power reduction factor in a most recent transmission slot and a reference value for the improvement of the uplink PIM, and wherein the measured improvement of the uplink PIM being given by, in each transmission slot, probing a radio channel over which the uplink PIM is received; andapplying the transmission power reduction factor to the determined fraction of transmission resources within the transmission slot during transmission of a signal.
  • 2. The method according to claim 1, wherein the fraction of transmission resources further is determined as a function of control parameters of the feedback control loop.
  • 3. The method according to claim 2, wherein the uplink PIM has an order n, and wherein the control parameters depend on the order n of the uplink PIM.
  • 4. The method according to claim 1, wherein the probing is performed to measure the effect of applying the transmission power reduction factor, with an objective to not apply the transmission power reduction factor to more transmission resources than needed for the uplink PIM to maintain close to the reference value.
  • 5. The method according to claim 1, wherein probing the radio channel comprises comparing uplink interference, including the uplink PIM, resulting from not applying the transmission power reduction factor to any of the transmission resources within the transmission slot and uplink interference, including the uplink PIM, resulting from continuously applying the transmission power reduction factor to all the transmission resources within the transmission slot.
  • 6. The method according to claim 5, wherein, when probing the radio channel, the uplink interference, including the uplink PIM, resulting from not applying the transmission power reduction factor to any of the transmission resources is filtered with a first filter and the uplink interference, including the uplink PIM, resulting from continuously applying the transmission power reduction factor to all the transmission resources within the transmission slot is filtered with a second filter.
  • 7. The method according to claim 1, wherein the probing is performed between once every 10th to once every 1000th transmission slot, preferably between once every 25th to every 400th transmission slot, more preferably between once every 50th to once every 150th transmission slot, even more preferably between once every 75th to once every 125th transmission slot.
  • 8. The method according to claim 1, wherein the feedback control loop is an integral feedback control loop.
  • 9. The method according to claim 1, wherein the feedback control loop is a proportional integral feedback control loop.
  • 10. The method according to claim 1, wherein the feedback control loop meets global stability criteria that depend on the order n of the uplink PIM.
  • 11. The method according to claim 10, wherein the feedback control loop has a proportional gain KP, and wherein the proportional gain KP is determined from the global stability criteria.
  • 12. The method according to claim 11, wherein the proportional gain KP is determined such that:
  • 13. (canceled)
  • 14. (canceled)
  • 15. A controller for passive intermodulation, PIM, avoidance, the controller comprising processing circuitry, the processing circuitry being configured to cause the controller to: determine, based on presence of uplink PIM, to which fractions of transmission resources within a transmission slot a transmission power reduction factor is to be applied, the fraction of transmission resources being, in a logarithmic domain and according to a feedback control loop, determined as a function of a comparison between a measured improvement of the uplink PIM when having applied the transmission power reduction factor in a most recent transmission slot and a reference value for the improvement of the uplink PIM, and the measured improvement of the uplink PIM being given by, in each transmission slot, probing a radio channel over which the uplink PIM is received; andapply the transmission power reduction factor to the determined fraction of transmission resources within the transmission slot during transmission of a signal.
  • 16. (canceled)
  • 17. (canceled)
  • 18. A computer storage medium storing a computer program for passive intermodulation, PIM, avoidance, the computer program comprising computer code which, when run on processing circuitry of a controller, causes the controller to: determine, based on presence of uplink PIM, to which fractions of transmission resources within a transmission slot a transmission power reduction factor is to be applied, the fraction of transmission resources being, in a logarithmic domain and according to a feedback control loop, determined as a function of a comparison between a measured improvement of the uplink PIM when having applied the transmission power reduction factor in a most recent transmission slot and a reference value for the improvement of the uplink PIM, and the measured improvement of the uplink PIM being given by, in each transmission slot, probing a radio channel over which the uplink PIM is received; andapply the transmission power reduction factor to the determined fraction of transmission resources within the transmission slot during transmission of a signal.
  • 19. (canceled)
  • 20. The controller according to claim 15, wherein the fraction of transmission resources further is determined as a function of control parameters of the feedback control loop.
  • 21. The controller according to claim 20, wherein the uplink PIM has an order n, and wherein the control parameters depend on the order n of the uplink PIM.
  • 22. The controller according to claim 15, wherein the processing circuitry performs the probing to measure the effect of applying the transmission power reduction factor, with an objective to not apply the transmission power reduction factor to more transmission resources than needed for the uplink PIM to maintain close to the reference value.
  • 23. The controller according to claim 15, wherein probing the radio channel comprises comparing uplink interference, including the uplink PIM, resulting from not applying the transmission power reduction factor to any of the transmission resources within the transmission slot and uplink interference, including the uplink PIM, resulting from continuously applying the transmission power reduction factor to all the transmission resources within the transmission slot.
  • 24. The controller according to claim 23, wherein, when probing the radio channel, the uplink interference, including the uplink PIM, resulting from not applying the transmission power reduction factor to any of the transmission resources is filtered with a first filter and the uplink interference, including the uplink PIM, resulting from continuously applying the transmission power reduction factor to all the transmission resources within the transmission slot is filtered with a second filter.
  • 25. The controller according to claim 15, wherein the processing circuitry performs the probing between once every 10th to once every 1000th transmission slot, preferably between once every 25th to every 400th transmission slot, more preferably between once every 50th to once every 150th transmission slot, even more preferably between once every 75th to once every 125th transmission slot.
PCT Information
Filing Document Filing Date Country Kind
PCT/SE2022/050215 3/7/2022 WO