Embodiments of the invention are defined by the claims below. A high-level overview of various embodiments of the invention is provided to introduce a summary of the systems, methods, and media that are further described in the detailed description section. This summary is neither intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in isolation to determine the scope of the claimed subject matter.
In an embodiment of the invention, a computer-implemented method of mitigating interference is described. A high downlink (DL) signal (e.g. high Reference Signal Receive Power) from a nearby base station (BS), such as another operator's BS or a public safety service BS, is received by a user equipment (UE). A serving BS detects that the high DL signal was received by the UE via a measurement report from the UE. The serving BS infers that the UE uplink (UL) signal is interfering with the nearby BS, based upon the detected high DL signal. The serving BS enables an interference mitigation algorithm. The DL signal of the nearby BS is measured by the UE and is reported to the serving BS. The interference mitigation algorithm is disabled when the measurement is lower than a threshold level. One or more computer-readable storage media, storing computer readable instructions thereon, that when executed by a computing device, perform the process steps for a method of mitigating interference, as described above are also contemplated by embodiments of the invention.
In another embodiment of the invention, one or more computer-readable storage media storing computer readable instructions for an interference mitigation algorithm thereon, that when executed by a computing device, perform the following process steps is also described. A subframe frequency dimension is divided into a plurality of resource block (RB) zones by a serving BS. One or more of the middle band RB zones are allocated, via the serving BS, to a UE when available. When there are no middle band RB zones available, a power level of one or more sub-carriers of an edge band RB zone is reduced by the serving BS. The edge band RB zone with the reduced power level of one or more sub-carriers is allocated to the UE by the serving BS. When the power level of the one or more sub-carriers cannot be reduced, a number of RBs to the UE is reduced by the serving BS.
In still another embodiment, an interference mitigation communication system is described. The interference mitigation communication system contains a BS that serves a plurality of UEs within a power transmission coverage cell. The system also contains an interference mitigation algorithm, which is enabled by the BS for controlling an UL signal being transmitted by one of the UEs operating near an edge of the power transmission coverage cell.
Illustrative embodiments of the invention are described in detail below, with reference to the attached drawing figures, which are incorporated by reference herein, and wherein:
Embodiments of the invention provide systems, methods, and computer-readable storage media with computer-readable instructions embodied thereon for mitigating communication interference. The terms “step,” “block,” etc. might be used herein to connote different acts of methods employed, but the terms should not be interpreted as implying any particular order, unless the order of individual steps, blocks, etc. is explicitly described. Likewise, the term “module,” “component,” etc., might be used herein to connote different components of systems employed, but the terms should not be interpreted as implying any particular order, unless the order of individual modules, components, etc., is explicitly described.
Throughout the description of different embodiments of the invention, several acronyms and shorthand notations are used to aid the understanding of certain concepts pertaining to the associated systems, methods and computer-readable storage media. These acronyms and shorthand notations are intended to help provide an easy methodology for communicating the ideas expressed herein and are not meant to limit the scope of any embodiment of the invention.
Embodiments of the invention include, among other things, a method, system, or set of instructions embodied on one or more computer-readable storage media. Computer-readable storage media include both volatile and nonvolatile media, removable and non-removable media, and media readable by a database and various other network devices. By way of example, and not limitation, computer-readable storage media comprise media implemented in any method or technology for storing information. Examples of stored information include computer-useable instructions, data structures, program modules, and other data representations. Media examples include, but are not limited to, information-delivery media, Random Access Memory (RAM), Read Only Memory (ROM), Electronically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, Compact Disc (CD) ROM, Digital Versatile Discs (DVD), holographic media or other optical disc storage, magnetic cassettes, magnetic tape, magnetic disk storage, and other magnetic storage devices. These technologies can store data momentarily, temporarily, or permanently. The computer readable storage media include cooperating or interconnected computer readable storage media, which exist exclusively on a processing system or are distributed among multiple interconnected processing systems that may be local to, or remote from, the processing system. Combinations of any of the above should also be included within the scope of computer-readable storage media.
An operating environment for devices and interfaces used for embodiments of the invention include a processing system with one or more high speed central processing unit(s) (CPU), or other types of processors, a memory component, and a data storage component. The embodiments of the invention are described below with reference to acts and symbolic representations of operations or instructions that are performed by the processing system, unless indicated otherwise. Such acts and operations or instructions are referred to as being computer executed, CPU executed, or processor executed. The memory locations where data bits are maintained are physical locations that have particular electrical, magnetic, optical, or organic properties corresponding to the data bits.
An overview of a telecommunications system will be described, with reference to a network diagram of
The mobile devices 12 include a mobile phone 12′, a personal digital assistant (PDA) 12″, a one and two-way pager 12′″, and other types of mobile devices (not illustrated). Mobile devices 12 may include devices that typically connect using a wireless communications medium such as radio frequency (RF) devices, infrared (IR) devices, or integrated devices combining one or more of the preceding devices. A mobile device, as described herein, refers to any type of wireless phone, handheld device, personal digital assistant (PDA), BlackBerry®, smartphone, digital camera, or other mobile devices (aside from a laptop) capable of communicating wirelessly. One skilled in the art will appreciate that mobile devices will also include a processor and computer-storage media to perform various functions. In embodiments, computing devices can also refer to devices that are running applications of which images are captured by the camera in a mobile device.
The mobile devices 12 encompass a general computing system used in accordance with embodiments of the invention. A mobile device computing system includes a bus that directly or indirectly couples a memory region, one or more processors, one or more presentation components, input/output ports, input/output components, and a power supply. The bus may be representative of one or more busses, such as an address bus, data bus, or any combination thereof.
The information network 20 is configured to allow network connections between a client device and other networked devices, such as database server 18. The information network 20 may be configured to employ a means of communicating information from one computing device to another, such as through a universal serial bus (USB) port, Ethernet link, or any combination thereof. In one embodiment, the information network 20 may be the Internet, or may include local area networks (LANs), wide area networks (WANs), or direct connections.
Information network 20 may further employ a plurality of wireless access technologies including, but not limited to, 2nd (2G), 3rd (3G), and 4th (4G) generation radio access for cellular systems, Wireless-LAN, or Wireless Router (WR) mesh. Access technologies such as 2G, 3G, 4G, and future access networks may enable wide area coverage for network devices with various degrees of mobility. For example, the information network 20 may enable a wireless network connection over one of the aforementioned access technologies using a protocol for wireless data transfer such as Global System for Mobile communication (GSM), General Packet Radio Services (GPRS), Enhanced Data GSM Environment (EDGE), and Wideband Code Division Multiple Access (WCDMA).
The wireless gateways 14 provide a Code Division Multiple Access (CDMA), Wideband CDMA (WCDMA), Time Division-Synchronous CDMA (TD-SCDMA), Advanced Mobile Phone Service (AMPS), Digital AMPS (D-AMPS), Universal Mobile Telecommunications System (UMTS), Radio Frequency (rf), paging and wireless messaging, Personal Communication Network (PCN), Global System for Mobile Communications, (GSMC), Worldwide Interoperability for Microwave Access (WiMAX), Generic Packet Radio Services (GPRS), Personal Communications Services (PCS), Cellular Digital Packet Data (CDPD), Wireless Application Protocol (WAP), Digital Audio Broadcasting (DAB), Bluetooth, 802.11a, 802.11b, or other types of wireless interfaces for the mobile devices 12. The WAP includes several protocols and standards designed to provide mobile devices with access to electronic content, and it was developed as an alternative to other markup languages and protocols developed for the World Wide Web. One component of the WAP is a Wireless Markup Language (WML), which includes markup tags, and provides control over formatting and layout of electronic content. The WML is often more appropriate to use for mobile devices such as wireless phones than other markup languages such as Hyper Text Markup Language (HTML), etc.
The wireless gateway 14 includes virtually any device that forwards network traffic. Such devices include, for example, routers, proxies, firewalls, access points, link load balancers, devices that perform network address translation, or any combination of the preceding devices. The wireless gateway 14 may recognize packets that are part of a particular communication protocol or are the same network connection or application session. The wireless gateway 14 may perform special processing on such packets including granting access to a client machine, logging or not logging an event, or network address and port translation.
The database 16 includes electronic content such as text, hypertext, graphical data or references to graphical data images, audio, video, and other content. The electronic content may be stored as a web page or WAP page on a database server, such as server 18. The server 18 can download electronic content from the database 16 to the mobile device 12.
Server 18 includes any computing device capable of establishing or maintaining a network connection with a client device. In one embodiment, server 18 is configured to operate as a web server. The server 18 can also operate as a messaging server, File Transfer Protocol (FTP) server, chat server, media server, or online gaming server. In addition, server 18 can be a single component in a larger online application. Devices that can operate as server 18 include, but are not limited to, personal computers, multiprocessor systems, microprocessor-based or programmable consumer electronics, network personal computers, or integrated devices combining one or more of the preceding devices.
A hypertext document includes markup codes called “tags.” The structure of hypertext documents is defined by document markup languages such as Hand Held Device Markup Language (HDML), HTML, compact HTML (cHTML), eXtensible Markup Language (XML), WML and Voice extensible Markup Language (VoxML), and others. Markup languages also allow references to additional electronic content other than text, including graphics, animation, audio, video, applets, and other electronic data.
Electronic content is displayed on a mobile device 12 with a software application, such as but not limited to a “browser.” A browser on a mobile device 12 may be a subset of a larger browser, or a micro-browser. A micro-browser may not be capable of fully displaying content requested from the database server 18. A micro-browser reads electronic content and renders the electronic content into a presentation, such as but not limited to text, graphics, animation, audio, video, etc., for display on the mobile device 12.
The mobile devices 12 illustrated in
Each mobile device 12 is coupled to a communication tower 13 via a wireless link, as illustrated in
Wireless mobile communication technology uses various standards and protocols to transmit data between a base transceiver station (BTS) of the communication tower 13 and a mobile device 12. A first mobile device 12, such as 12′, may be using a first frequency band. A second mobile device 12, such as 12″, may be using a second frequency band. The first mobile device 12′ may be associated with a first wireless interface with the communication tower 13, while the second mobile device 12″ may be associated with a second wireless interface with the communication tower 13. A wireless interface may correspond to an uplink communication from the mobile device 12 to the communication tower 13, or a downlink communication from the communication tower 13 to the mobile device 12.
Certain regulatory agencies, such as the Federal Communications Commission (FCC) in the United States, control radio frequency assignments for non-government use. As an example for illustrative purposes only, the FCC has divided up the available frequencies into different groups and assigned them to a specific use. One example is a portion of the 800 MHz band, such as 809-815 MHz, that is reserved for exclusive use by public safety agencies. The 809-815 MHz band is surrounded by adjacent non-public safety agency bands, such as Specialized Mobile Radio (SMR) or Enhanced SMR (ESMR) and cellular systems.
Devices or BSs that operate in one frequency band can adversely impact the operation of devices or BSs operating in an adjacent or nearby band, due to out-of-band emission levels radiated by the respective devices or BSs. As an example for illustrative purposes only, an ESMR may operate at a frequency band of 817-824 MHz, which is near the public safety agency operating in the 809-815 MHz frequency band. A guard band may exist between the two frequency bands in the 815-817 MHz frequency band. A UE, such as UE 320 may be transmitting a high power UL signal, since it is located near the edge of its operating cell 330. As a result, the emission level of UE 320 may encroach into the 813-814 MHz frequency band, which would likely interfere with the public safety agency band. The owner or lease holder of surrounding non-public safety agency bands need to control out-of-band emissions, so as not to interfere with the public safety bands. The above embodiment was illustrated with regard to a public safety agency band and surrounding non-public safety agency bands. However, out-of-band emissions are a concern with any radio frequency assignment, and controlling their respective emissions are contemplated by embodiments of the invention herein.
There are several potential sources of interference between adjacent cells, such as one BS interfering with another BS and its associated UEs. However, a major cause of interference is from UEs, such as UE 320 interfering with another BS, such as adjacent BS 340 and its associated UEs within adjacent cell 350. Interference can be countered by limiting the out-of-band emissions. However, that solution often leads to excessive cost and a larger UE size. Interference can also be controlled by an interference mitigation technique and associated algorithm, which limits UE emissions by controlling the maximum UL transmission power of the UE, as well as the number and location of assigned resource blocks, based upon the location of the UE.
An interference mitigation technique, executed by a serving BS, such as an eNodeB, is illustrated in the flow diagram of
In step 430, an interference mitigation algorithm is enabled by the serving BS 310. The interference mitigation algorithm will go through a series of steps to control the maximum UL transmission power of the UE 320, as well as the number and location of assigned resource blocks. The interference mitigation algorithm will be described in more detail below with regard to
A communications carrier operates within an assigned frequency domain. The assigned frequency domain contains a number of resource blocks (RBs). A RB is a two-dimensional (time and frequency) channel allocation. In an example, given for illustrative purposes only, a communication carrier may control a band of twenty-four contiguous RBs. The center RBs will have the least amount of rf interference, while the RBs at the edges of the contiguous group will have the most rf interference. RBs within the middle regions of the contiguous group will have a moderate amount of rf interference. One or more subcarriers operate within each RB.
A number of RBs are grouped into zones, illustrated in
Modulation protocols are specific techniques used to encode digital bits into analog signals for transmission over an analog line. The protocols define the method of encoding and the data transfer speed. Two internationally accepted modulation protocols are Quatenary Phase Shift Keying (QPSK) and Quadrature Amplitude Modulation (QAM). QPSK allows the transmission of two bits per symbol, where a symbol is defined as a phase range of a sine wave. For a transmission of two bits per symbol, two carrier signals can be used, each separated by 90 degrees of phase. QAM allows multiple bits to form a single symbol, which is impressed on a single sine wave. Quadrature means that four distinct amplitude levels are defined. As an example, 16 QAM creates a symbol of four bits through sixteen distinct variations in amplitude and phase. For a 2400 Hz carrier, a data rate of 9600 bps would be yielded.
A MCS level of a QPSK modulation and a lower bit rate might be assigned for UEs operating near the edge of their cell, such as UE 320 in cell 330, since the channel state of UE 320 is not good. On the other hand, UE 315 has a good channel state and is located near its serving BS 310. Therefore, a larger modulation level and channel coding rate might be used, such as 16 QAM and a higher bit rate.
In step 620 of
In step 715, it is determined, via the interference mitigation algorithm enabled by serving BS 310, whether any middle band RBs from the UL subframe structure are available, such as from the UL subframe structure illustrated in
If there are no middle band RBs available in step 715, then it is determined whether the power per tone of the RBs can be reduced in step 735. The step 735 determination is also made if the threshold level in step 725 is not less than a certain threshold level, δ. If the power per tone of the RBs can be reduced in step 735, the power per sub-carrier is reduced for the respective RBs in step 740. Serving BS 310 requests a measurement report of the DL reference signal from UE 320 in step 742. UE 320 reports the measurement to serving BS 310. In step 745, it is determined whether the measured DL reference signal is less than a threshold level, δ. When the measured DL reference signal is not less than the threshold level, it can be inferred that the UE UL signal is above an acceptable level and is likely to be interfering with a nearby BS, such as adjacent BS 340. If the measurement is less than δ, then the algorithm is disabled in step 730.
If the power per tone cannot be reduced in step 735, then the number of RBs are reduced in step 750. The number of RBs is also reduced if the measured DL reference signal level is not less than δ in step 745. After the number of RBs has been reduced, serving BS 310 requests a measurement report of the DL reference signal from UE 320 in step 752. UE 320 reports the measurement to serving BS 310. In step 755, it is determined whether the measured DL reference signal is less than a threshold level, δ. When the measured DL reference signal is not less than the threshold level, it can be inferred that the UE UL signal is above an acceptable level and is likely to be interfering with a nearby BS, such as adjacent BS 340. If the measurement is not less than the threshold level, δ then the number of RBs is further reduced until the measurement is less than the threshold level, δ. If the measurement is less than δ, then the algorithm is disabled in step 730.
Many different arrangements of the various components depicted, as well as components not shown, are possible without departing from the spirit and scope of the several embodiments of the invention. Embodiments of the invention have been described with the intent to be illustrative rather than restrictive.
It will be understood that certain features and subcombinations are of utility and may be employed without reference to other features and subcombinations and are contemplated within the scope of the claims. Not all steps listed in the various figures need be carried out in the specific order described.
This application is a continuation of U.S. application Ser. No. 13/437,383, filed on Apr. 2, 2012, titled “Uplink Interference Mitigation,” which is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
8135396 | Terabe et al. | Mar 2012 | B2 |
8315217 | Montojo et al. | Nov 2012 | B2 |
8824311 | Beaudin | Sep 2014 | B2 |
8874157 | Shelly et al. | Oct 2014 | B1 |
9100972 | Kim et al. | Aug 2015 | B2 |
9295003 | Oteri et al. | Mar 2016 | B2 |
9642121 | Song | May 2017 | B2 |
9749101 | Yu | Aug 2017 | B2 |
20080070586 | Kermoal et al. | Mar 2008 | A1 |
20080259802 | Pedersen et al. | Oct 2008 | A1 |
20080292032 | Belogolovy | Nov 2008 | A1 |
20090086843 | Li | Apr 2009 | A1 |
20090239524 | Terabe et al. | Sep 2009 | A1 |
20100124181 | Hosein | May 2010 | A1 |
20100151876 | Park | Jun 2010 | A1 |
20100197314 | Maaref | Aug 2010 | A1 |
20100214997 | Tao et al. | Aug 2010 | A1 |
20100246503 | Fox et al. | Sep 2010 | A1 |
20100322227 | Luo | Dec 2010 | A1 |
20110053589 | Kimura et al. | Mar 2011 | A1 |
20110081865 | Xiao et al. | Apr 2011 | A1 |
20110116490 | Wilhelmsson et al. | May 2011 | A1 |
20110136499 | Miyata | Jun 2011 | A1 |
20110274022 | Chen et al. | Nov 2011 | A1 |
20110319088 | Zhou et al. | Dec 2011 | A1 |
20120009909 | Lau | Jan 2012 | A1 |
20120014333 | Ji et al. | Jan 2012 | A1 |
20120014348 | Tanno et al. | Jan 2012 | A1 |
20120014360 | Zou et al. | Jan 2012 | A1 |
20120014371 | Weng et al. | Jan 2012 | A1 |
20120014468 | Wu et al. | Jan 2012 | A1 |
20120015603 | Proctor, Jr. et al. | Jan 2012 | A1 |
20120015653 | Paliwal et al. | Jan 2012 | A1 |
20120015658 | Kim et al. | Jan 2012 | A1 |
20120015664 | Han | Jan 2012 | A1 |
20120020209 | Ghosh et al. | Jan 2012 | A1 |
20120020230 | Chen et al. | Jan 2012 | A1 |
20120020248 | Granlund et al. | Jan 2012 | A1 |
20120020286 | Damnjanovic et al. | Jan 2012 | A1 |
20120020311 | Yamada et al. | Jan 2012 | A1 |
20120020321 | Higuchi et al. | Jan 2012 | A1 |
20120020323 | Noh et al. | Jan 2012 | A1 |
20120020421 | Larsson et al. | Jan 2012 | A1 |
20120021753 | Damnjanovic et al. | Jan 2012 | A1 |
20120021755 | Chin et al. | Jan 2012 | A1 |
20120021757 | Abgrall et al. | Jan 2012 | A1 |
20120021788 | Yavuz et al. | Jan 2012 | A1 |
20120021798 | Ishii et al. | Jan 2012 | A1 |
20120021800 | Wilson et al. | Jan 2012 | A1 |
20120026896 | Li et al. | Feb 2012 | A1 |
20120026963 | Kim et al. | Feb 2012 | A1 |
20120026964 | Koivisto et al. | Feb 2012 | A1 |
20120026965 | Cho et al. | Feb 2012 | A1 |
20120026969 | Fukuoka et al. | Feb 2012 | A1 |
20120026986 | Dass | Feb 2012 | A1 |
20120028648 | Chayat et al. | Feb 2012 | A1 |
20120040620 | Fu et al. | Feb 2012 | A1 |
20120082058 | Gerstenberger et al. | Apr 2012 | A1 |
20120120893 | Baligh et al. | May 2012 | A1 |
20120134267 | Noriega et al. | May 2012 | A1 |
20120236736 | Frank | Sep 2012 | A1 |
20120250565 | Zhang et al. | Oct 2012 | A1 |
20120257519 | Frank et al. | Oct 2012 | A1 |
20120275327 | Zangi et al. | Nov 2012 | A1 |
20120322453 | Weng et al. | Dec 2012 | A1 |
20120329503 | Jongren et al. | Dec 2012 | A1 |
20130005379 | Yamazaki | Jan 2013 | A1 |
20130005388 | Naka | Jan 2013 | A1 |
20130010749 | Chang et al. | Jan 2013 | A1 |
20130021999 | Jiang | Jan 2013 | A1 |
20130040683 | Siomina et al. | Feb 2013 | A1 |
20130044602 | Xiao et al. | Feb 2013 | A1 |
20130053039 | Jorguseski et al. | Feb 2013 | A1 |
20130115999 | Sirotkin et al. | May 2013 | A1 |
20130150068 | Hui et al. | Jun 2013 | A1 |
20130163536 | Anderson et al. | Jun 2013 | A1 |
20130170439 | Anderson et al. | Jul 2013 | A1 |
20130188576 | Chao | Jul 2013 | A1 |
20130195051 | Koivisto et al. | Aug 2013 | A1 |
20130208664 | Viswanathan | Aug 2013 | A1 |
20130223483 | Ghassemzadeh et al. | Aug 2013 | A1 |
20130229943 | Huang et al. | Sep 2013 | A1 |
20130249297 | Takehara et al. | Sep 2013 | A1 |
20130258869 | Zhou et al. | Oct 2013 | A1 |
20130315156 | Xiao et al. | Nov 2013 | A1 |
20130336274 | Simonsson et al. | Dec 2013 | A1 |
20140031031 | Gauvreau et al. | Jan 2014 | A1 |
20140057618 | Zirwas et al. | Feb 2014 | A1 |
20140071836 | Panchal | Mar 2014 | A1 |
20140078951 | Venkatachari et al. | Mar 2014 | A1 |
20140098748 | Chan et al. | Apr 2014 | A1 |
20140105135 | Tellado et al. | Apr 2014 | A1 |
20140113644 | Burchardt et al. | Apr 2014 | A1 |
20140146689 | Gaur et al. | May 2014 | A1 |
20140153433 | Zhou | Jun 2014 | A1 |
20140192769 | Wen | Jul 2014 | A1 |
20140233468 | Hejazi et al. | Aug 2014 | A1 |
20140235255 | Manssour | Aug 2014 | A1 |
20140256336 | Manssour | Sep 2014 | A1 |
20140269456 | Wang et al. | Sep 2014 | A1 |
20140328309 | Comstock | Nov 2014 | A1 |
20150016434 | Luo | Jan 2015 | A1 |
20160113028 | Caretti et al. | Apr 2016 | A1 |
20160127069 | Nuss et al. | May 2016 | A1 |
20160353290 | Nammi | Dec 2016 | A1 |
20160360420 | Liu | Dec 2016 | A1 |
Number | Date | Country |
---|---|---|
2809721 | Mar 2012 | CA |
102932930 | Feb 2013 | CN |
2456262 | May 2012 | EP |
2552152 | Jan 2013 | EP |
2013020512 | Feb 2013 | WO |
2014131190 | Sep 2014 | WO |
Entry |
---|
Final Office Action dated Aug. 31, 2016 in U.S. Appl. No. 13/437,486, 20 pages. |
Notice of Allowance dated Sep. 12, 2016 in U.S. Appl. No. 13/437,383, 6 pages. |
Final Office Action dated Nov. 17, 2016 in U.S. Appl. No. 14/466,590, 22 pages. |
Analytical Evaluation of Fractional Frequency Reuse for OFDMA Cellular Networks. Thomas David Novlan, Radha Krishna Ganti, Arunabha Ghosh, Jeffrey G. Andrews; Jan. 26, 2011, 25 pages. |
Non-Final Office Action dated Jul. 5, 2017 in U.S. Appl. No. 14/466,590, 18 pages. |
Number | Date | Country | |
---|---|---|---|
Parent | 13437383 | Apr 2012 | US |
Child | 15227712 | US |