US20090170497A1 - Probabilistic interference mitigation for wireless cellular networks - Google Patents

Probabilistic interference mitigation for wireless cellular networks Download PDF

Info

Publication number
US20090170497A1
US20090170497A1 US11/965,788 US96578807A US2009170497A1 US 20090170497 A1 US20090170497 A1 US 20090170497A1 US 96578807 A US96578807 A US 96578807A US 2009170497 A1 US2009170497 A1 US 2009170497A1
Authority
US
United States
Prior art keywords
base station
subscriber
interference
threshold
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/965,788
Inventor
Guowang Miao
Nageen Himayat
Shilpa Talwar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to US11/965,788 priority Critical patent/US20090170497A1/en
Assigned to INTEL CORPORATION reassignment INTEL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HIMAYAT, NAGEEN, TALWAR, SHILPA, MIAO, GUOWANG
Publication of US20090170497A1 publication Critical patent/US20090170497A1/en
Priority to US13/224,148 priority patent/US8798653B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/541Allocation or scheduling criteria for wireless resources based on quality criteria using the level of interference

Definitions

  • This application relates to wireless cellular systems and, more particularly, to mitigation of co-channel interference in a wireless neighborhood.
  • the performance of wireless cellular systems is significantly limited due to co-channel interference from neighboring base stations, especially as these systems move towards aggressive frequency reuse scenarios. While the overall spectral efficiency of the cellular system may improve with aggressive frequency reuse, the performance of cell-edge users degrades substantially.
  • Recent research is focused on a variety of interference management techniques, ranging from the design of fractional frequency reuse (FFR) mechanisms for cell-edge users, to coordinated transmit beam-forming techniques, to receiver interference cancellation using multiple antennas.
  • FFR fractional frequency reuse
  • FFR fractional frequency reuse
  • FIG. 1 shows an exemplary network deployment 50 with fractional frequency reuse.
  • a deployment enables most of the frequencies (‘white’) to be reused over a significant portion of each cell, and only a fraction of frequencies to be set aside for cell-edges (‘dotted’, ‘vertical striped’, ‘diagonal striped’).
  • initial deployments with FFR may use a static sub-division of cell-edge and cell-center frequencies, it is expected that the frequency reuse patterns be dynamically adjustable through coordination across the network, since the traffic load and user distribution may not be uniform across the network.
  • FIG. 1 is an exemplary network deployment with fractional frequency reuse, according to the prior art
  • FIG. 2 is a block diagram of a interference mitigation system, according to some embodiments.
  • FIG. 3 is a diagram of a wireless neighborhood using the interference mitigation system of FIG. 2 , according to some embodiments;
  • FIG. 4 is a flow diagram showing the co-channel interference avoidance of the interference mitigation system of FIG. 2 , according to some embodiments;
  • FIG. 5 is a flow diagram the transmission randomization of the interference mitigation system of FIG. 2 , according to some embodiments.
  • FIG. 6 is a graph of a co-channel interference avoidance trigger threshold, according to some embodiments.
  • FIG. 7 is a graph of comparing the CIA MAC of FIG. 2 with a legacy MAC, according to some embodiments.
  • FIG. 8 is a graph showing interference to carrier ratio versus distance, according to some embodiments.
  • FIG. 9 is a graph showing the spectral efficiency improvement using the CIA MAC of FIG. 2 , according to some embodiments.
  • the interference mitigation system includes a co-channel interference avoidance (CIA) medium access controller (MAC) in both a base station and a subscriber station of a wireless neighborhood.
  • the interference mitigation method randomizes transmissions to cell-edge users by carefully controlling the probability of transmission to these users, thereby creating a virtual fractional frequency system that does not require extensive frequency management and coordination across the network.
  • the interference mitigation method identifies severely interfered links and reduces the probability of transmission on these links, with the result being a reduced probability of interference.
  • the interference mitigation system 100 includes a serving base station 20 and a subscriber station 30 .
  • the serving base station is typically selected by the subscriber 30 , based on the relative strength of the base station signal received by the subscriber.
  • the system 100 may include one or more other base stations, denoted as base station 24 , base station 26 , and base station 28 .
  • the serving base station 20 has a medium access controller (MAC) 20 and the subscriber station 30 has a MAC 32 .
  • the MACs 22 and 32 include functional and structural components not described herein, which are well-known to those of ordinary skill in the art. These functional and structural components, which are common to all base stations in the wireless region, are known herein as legacy MAC operations.
  • the MACs 22 and 32 each include novel components suitable for co-channel interference avoidance (CIA), known as the CIA MAC 40 . Because the MACs 22 and 32 continue to support other MAC functions not described herein, both the serving base station 20 and the subscriber station 30 have both legacy MAC and CIA MAC 40 functionality.
  • CIA co-channel interference avoidance
  • the CIA MAC 40 includes co-channel interference avoidance 200 , transmission randomization 300 , and physical layer optimization 400 , in some embodiments. As shown in FIG. 2 , co-channel avoidance 200 is performed by the subscriber station 30 while transmission randomization 300 and physical layer optimization 400 are performed by the base stations 20 , 24 , 26 , 28 . Co-channel avoidance 200 is described in the flow diagram of FIG. 3 ; transmission randomization 300 is described in the flow diagram of FIG. 4 .
  • a wireless neighborhood 60 is depicted in FIG. 3 , to facilitate understanding the system 100 of FIG. 2 , according to some embodiments.
  • the wireless neighborhood 60 includes seven cells 62 , each of which has a base station, BS 1 -BS 7 (collectively, base stations BS).
  • Subscribers depicted as mobile devices, denoted M 1 , M 2 , . . . M 9 , are employed throughout the wireless neighborhood 60 (collectively, subscribers M).
  • the number of subscribers M may vary over time.
  • Lines c 1 show the desired links between mobile subscribers and base stations. For mobile subscriber M 1 , there exists a desired link, c 1 , to the base station, BS 1 .
  • interferences on the same channel are occurring from base stations, BS 4 and BS 2 , indicated as i c1 in both cases.
  • the interference mitigation system 100 commences with the subscriber station 30 .
  • the subscriber station 30 notifies the serving base station 20 of interference from some other base station in the wireless neighborhood 50 .
  • a feedback link 34 is shown pointing from the subscriber station 30 to the serving base station 20 to indicate this step.
  • the serving base station 20 shares the interference report(s) with the other base stations in the wireless neighborhood 50 that there has been a report of interference.
  • Interference reporting links 36 are shown in FIG. 2 between the serving base station 20 and each of the base stations 24 , 26 , and 28 in the system 100 .
  • Co-channel interference avoidance 200 operates according to the flow diagram of FIG. 4 , in some embodiments.
  • the operations are performed by the subscriber 30 (or one of the subscribers M in the wireless neighborhood 50 ), although the operations may be performed simultaneously by multiple subscribers.
  • the subscriber 30 identifies the base station 20 (or stations) causing the most interference to transmissions on its link to the serving base-station (block 202 ).
  • the subscriber 30 then makes a determination whether to notify its serving base station 20 of the interference by comparing the interference-to-carrier ratios (ICR) to a threshold ( ⁇ ) (block 204 ).
  • ICR interference-to-carrier ratios
  • threshold
  • the interference is not sufficient to trigger the notification by the subscriber 30 . Otherwise, the subscriber 30 submits the identity of the base-station(s) causing the most interference to its serving base station, 20 (block 208 ). In some embodiments, the submission operation constitutes one or more exchanges of the CIA MAC trigger information between the subscriber station 30 and the serving base station 20 .
  • CIA MAC trigger means events that lead the subscriber station 30 or the serving base station 20 to invoke the CIA MAC 40 of their respective MACs 22 , 32 . In other words, the CIA MAC trigger is when the subscriber station 30 determines that the interference exceeds the threshold.
  • the serving base station 20 communicates the information reported by the subscriber 30 to other base stations in the wireless neighborhood 50 (block 210 ). At this point, each base station knows the links in which interference has been reported, which are the links in which transmissions may optimally be randomized (block 212 ).
  • the CIA MAC trigger may be based on average SINR conditions, determined by system geometry and location of subscribers. In these embodiments, the CIA MAC trigger is updated and coordinated among other base stations in the wireless neighborhood periodically.
  • FIG. 5 is a flow diagram showing operations performed to randomize transmissions in the wireless neighborhood 50 , according to some embodiments. The operations in FIG. 5 may be performed by all base stations BS in the wireless neighborhood 50 , but, for simplification, only one base station is indicated in the flow diagram.
  • the base station identifies the link to be analyzed (block 302 ), which is the link between the serving base station 20 and the subscriber 30 that reported the interference.
  • the base station determines a channel threshold for the CIA MAC link (block 304 ). If the channel gain on the link does not exceed a “channel threshold”, H (block 306 ), no transmission to the subscriber 30 occurs (block 308 ). Otherwise, the base station 20 transmits to the subscriber 30 with optimized physical layer parameters (block 310 ). Hence, in some embodiments, the transmission probability is proportional to the probability of exceeding the “channel threshold”.
  • the CIA MAC 40 also includes physical layer optimization 400 . In some embodiments, the power and modulation on each link is optimized separately.
  • the components of the CIA MAC 40 shown in FIG. 2 may be realized in different ways.
  • the system 100 determines the transmission threshold H , the power allocation, and the modulation selection policy through optimization of the following criterion. This criterion is based on a proportional fair approach of maximizing the product of the goodput of all users.
  • the transmission threshold, power allocation, and modulation parameters may also be derived through alternative optimization criteria.
  • the system 100 uses an optimization equation to determine the threshold and the optimal link parameters for transmission to the subscriber 30 , as follows:
  • (i,j) k is the link between the i th base station and the j th subscriber on the k th channel;
  • R(i,j) k is the rate on link (i,j) k ;
  • FER(i,j) k is the average frame error rate on link (i,j) k ;
  • p(i,j) k is the probability of transmission on link (i,j) k ;
  • N j is the set of base stations comprising severe interferers for the j th subscriber;
  • p l is the probability of transmission by the l th interfering base station;
  • H is the threshold for transmission;
  • P(i,j) k is the average transmit power on link (i,j) k ;
  • f(h) is the probability distribution of fast fading channel with cumulative distribution function, F; and
  • S is the frame length.
  • An example approach to solving the above optimization problem is to separate the optimization function into two distinct parts.
  • the separation is motivated in part by the fact that maximization of the objective function is equivalent to maximizing the log of the objective function.
  • the two parts separately address the issue of minimizing collisions and maximizing throughput.
  • the logarithm function splits the problem into two parts.
  • the first part is related to the transmission probabilities of the desired and interfering base-stations.
  • the objective in this case, thus reduces to finding the threshold H to minimize the probability of collision in the network.
  • the second part maximizes the sum of the average throughput on all links, which can be solved through a suitable power and rate allocation strategy per link.
  • the probability of transmission is determined by the system 100 as follows.
  • the threshold H is determined through a solution to the following optimization criterion:
  • H _ * arg ⁇ max H _ ⁇ ⁇ ⁇ ( i , j ) k ⁇ ln ( p ⁇ ( i , j ) k ⁇ ⁇ l ⁇ N j ⁇ ( 1 - p l ) )
  • ⁇ (i,j) k is the number of base stations severely interfering on channel(i,j) k .
  • the interference mitigation system 100 performs physical layer optimization 400 , in some embodiments.
  • This part of the CIA MAC 40 resides in all base stations in the wireless neighborhood 50 .
  • the interference mitigation system 100 optimizes the physical layer parameters per link.
  • the physical power and rate parameters on the link are determined through maximization of the throughput of all users, using the following objective function:
  • P * ⁇ ( i , j ) k arg ⁇ max ⁇ P ⁇ ( i , j ) k ⁇ ⁇ R ⁇ ( i , j ) k subject ⁇ ⁇ to ⁇ H _ ⁇ ( i , j ) k ⁇ ⁇ f ⁇ ( h ) ⁇ P ⁇ ( i , j ) k ⁇ ( h ) ⁇ ⁇ h ⁇ P _ ⁇ ⁇ ( average ⁇ ⁇ power ⁇ ⁇ constraint ) 0 ⁇ P ⁇ ( i , j ) k ⁇ P max ⁇ ⁇ ( Peak ⁇ ⁇ power ⁇ ⁇ constraint )
  • SNR signal-to-noise ratio
  • R′ ⁇ 1 ( ⁇ ) the data rate function R′ ⁇ 1 ( ⁇ ) is continuously differentiable with first order derivative positive and strictly decreasing, i.e. concave of ⁇ .
  • the power allocation is given by:
  • the interference mitigation system 100 determines the threshold for the CIA MAC trigger.
  • each subscriber 30 makes a decision to trigger the CIA MAC 40 . This trigger is based on comparing the measured interference-to-carrier-ratio (ICR) from each base-station to a threshold, as described in FIG. 3 , above.
  • the threshold is derived based on the assumption of one strong interferer per subscriber. The extension to multiple interferers is straightforward.
  • the optimal threshold is derived by comparing the goodput of a system using the CIA MAC with that of a system having no CIA MAC.
  • the goodput of CIA MAC is greater than the good-put of a traditional MAC.
  • the values of the ICR thresholds are calculated as a function of the SNR, as shown in the graph 70 of FIG. 6 , according to some embodiments.
  • the value of the threshold at a high SNR is derived as a function of the target probability of error P e and the number of data symbols, L d , as
  • the graph 70 plots the values of the thresholds as a function of the SNR for various numbers of data symbols.
  • the interference mitigation system 100 may employ alternate methods for triggering the CIA MAC. These include but are not limited to comparing goodput based on more than one strong interferer, using location-based information or cooperation between subscribers to determine severely interfered users, etc.
  • a graph 80 ( FIG. 7 ) is a comparison of the CIA MAC with a traditional MAC for a frequency reuse system.
  • the use of the CIA MAC is triggered at a distance of 1.2 kilometers (km) from the center of the cell 62 , based on the throughput shown at different distances.
  • a graph 90 ( FIG. 8 ) plots distance to call center versus interference to carrier ratio, in some embodiments. Again, the CIA MAC is triggered at a distance of 1.2 km to ensure the best overall throughput at the center cell and at the cell edge.
  • a graph 110 ( FIG. 7 ) is a comparison of the CIA MAC with a traditional MAC for a frequency reuse system.
  • the use of the CIA MAC is triggered at a distance of 1.2 kilometers (km) from the center of the cell 62 , based on the throughput shown at different distances.
  • a graph 90 ( FIG. 8 ) plots distance to call center versus interference to carrier ratio, in some embodiments.
  • the graph 110 shows spectral efficiency improvement with the CIA MAC 10 for 8QAM modulation: 75% for CIA MAC with cross-layer optimization, 34% without cross-layer optimization (reference 43 dBm).
  • a simple extension is based on determining the CIA-triggers and thresholds based on the average interference power in the entire OFDM band. Subsequent transmission on each OFDMA sub-channel are controlled by the average “channel threshold” and the instantaneous channel gain on the sub-channel.
  • both the base stations 20 and the subscriber station 30 have CIA MAC functionality.
  • the interference mitigation system 100 may operate with a legacy subscriber station, i.e., one without CIA MAC functionality.
  • the base station 20 may trigger the CIA MAC 40 when the subscriber is located a predetermined distance from the center of the cell 62 . For example, if the legacy subscriber is 1.2 km from its cell center, the subscriber is likely to be at the edge of the cell 62 , and thus may be more susceptible to interference by other base stations. In this manner, the location of the subscriber station would be the “notification of interference” to the base station, obviating the need for the subscriber station to notify the base station of a likely interference situation.
  • the interference mitigation system 100 provides a low-complexity method for interference mitigation, which involves limited coordination between base-stations.
  • the interference mitigation system 100 provides for a relatively decentralized and automatic method for controlling the degree of frequency reuse to improve performance of cell-edge users. Complex frequency reuse and power management schemes across a cellular system are avoided with the interference mitigation system 100 .
  • the interference mitigation system 100 may provide significant benefit to cellular users severely impacted by co-channel interference, thereby improving their quality-of-service.
  • the interference mitigation system 100 may be standardized within next generation cellular standards.
  • the interference mitigation system 100 is novel in its use of randomization by the base station for controlling the level of interference in the wireless neighborhood.
  • the interference mitigation system 100 provides fair transmission opportunities for users affected by co-channel interference.
  • randomization for collision avoidance is used extensively for uplink random access channels and wireless local area network (LAN) systems, its use by the interference mitigation system 100 for automatically controlling the level of downlink interference per link is novel.

Abstract

An interference mitigation system randomizes transmissions to cell-edge users by carefully controlling the probability of transmission to these users, thereby creating a virtual fractional frequency system that does not require extensive frequency management and coordination across the network. In some embodiments, the interference mitigation system identifies severely interfered links and reduces the probability of transmission on these links, with the result being a reduced probability of interference.

Description

    TECHNICAL FIELD
  • This application relates to wireless cellular systems and, more particularly, to mitigation of co-channel interference in a wireless neighborhood.
  • BACKGROUND
  • The performance of wireless cellular systems is significantly limited due to co-channel interference from neighboring base stations, especially as these systems move towards aggressive frequency reuse scenarios. While the overall spectral efficiency of the cellular system may improve with aggressive frequency reuse, the performance of cell-edge users degrades substantially. Recent research is focused on a variety of interference management techniques, ranging from the design of fractional frequency reuse (FFR) mechanisms for cell-edge users, to coordinated transmit beam-forming techniques, to receiver interference cancellation using multiple antennas.
  • One simple approach to reducing interference for the cell edge users is to reserve a set of frequencies used for transmission to only cell-edge users in a fashion such that adjacent cells use different sets of frequencies. This may be achieved through a fractional frequency reuse (FFR) mechanism wherein a lower frequency reuse is specified for users at the cell edge, cell-center users enjoy full frequency reuse. This improves the throughput performance of cell-edge users since they experience lower levels of interference.
  • FIG. 1 shows an exemplary network deployment 50 with fractional frequency reuse. Such a deployment enables most of the frequencies (‘white’) to be reused over a significant portion of each cell, and only a fraction of frequencies to be set aside for cell-edges (‘dotted’, ‘vertical striped’, ‘diagonal striped’). While initial deployments with FFR may use a static sub-division of cell-edge and cell-center frequencies, it is expected that the frequency reuse patterns be dynamically adjustable through coordination across the network, since the traffic load and user distribution may not be uniform across the network.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing aspects and many of the attendant advantages of this document will become more readily appreciated as the same becomes better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein like reference numerals refer to like parts throughout the various views, unless otherwise specified.
  • FIG. 1 is an exemplary network deployment with fractional frequency reuse, according to the prior art;
  • FIG. 2 is a block diagram of a interference mitigation system, according to some embodiments;
  • FIG. 3 is a diagram of a wireless neighborhood using the interference mitigation system of FIG. 2, according to some embodiments;
  • FIG. 4 is a flow diagram showing the co-channel interference avoidance of the interference mitigation system of FIG. 2, according to some embodiments;
  • FIG. 5 is a flow diagram the transmission randomization of the interference mitigation system of FIG. 2, according to some embodiments;
  • FIG. 6 is a graph of a co-channel interference avoidance trigger threshold, according to some embodiments;
  • FIG. 7 is a graph of comparing the CIA MAC of FIG. 2 with a legacy MAC, according to some embodiments;
  • FIG. 8 is a graph showing interference to carrier ratio versus distance, according to some embodiments; and
  • FIG. 9 is a graph showing the spectral efficiency improvement using the CIA MAC of FIG. 2, according to some embodiments;
  • DETAILED DESCRIPTION
  • In accordance with the embodiments described herein, a system and method for reducing interference in a network, or interference mitigation system and method, are disclosed. The interference mitigation system includes a co-channel interference avoidance (CIA) medium access controller (MAC) in both a base station and a subscriber station of a wireless neighborhood. The interference mitigation method randomizes transmissions to cell-edge users by carefully controlling the probability of transmission to these users, thereby creating a virtual fractional frequency system that does not require extensive frequency management and coordination across the network. In some embodiments, the interference mitigation method identifies severely interfered links and reduces the probability of transmission on these links, with the result being a reduced probability of interference.
  • An interference mitigation system 100 is depicted in FIG. 2, according to some embodiments. The interference mitigation system 100 includes a serving base station 20 and a subscriber station 30. The serving base station is typically selected by the subscriber 30, based on the relative strength of the base station signal received by the subscriber. The system 100 may include one or more other base stations, denoted as base station 24, base station 26, and base station 28. The serving base station 20 has a medium access controller (MAC) 20 and the subscriber station 30 has a MAC 32. The MACs 22 and 32 include functional and structural components not described herein, which are well-known to those of ordinary skill in the art. These functional and structural components, which are common to all base stations in the wireless region, are known herein as legacy MAC operations.
  • In some embodiments, the MACs 22 and 32 each include novel components suitable for co-channel interference avoidance (CIA), known as the CIA MAC 40. Because the MACs 22 and 32 continue to support other MAC functions not described herein, both the serving base station 20 and the subscriber station 30 have both legacy MAC and CIA MAC 40 functionality.
  • The CIA MAC 40 includes co-channel interference avoidance 200, transmission randomization 300, and physical layer optimization 400, in some embodiments. As shown in FIG. 2, co-channel avoidance 200 is performed by the subscriber station 30 while transmission randomization 300 and physical layer optimization 400 are performed by the base stations 20, 24, 26, 28. Co-channel avoidance 200 is described in the flow diagram of FIG. 3; transmission randomization 300 is described in the flow diagram of FIG. 4.
  • A wireless neighborhood 60 is depicted in FIG. 3, to facilitate understanding the system 100 of FIG. 2, according to some embodiments. The wireless neighborhood 60 includes seven cells 62, each of which has a base station, BS1-BS7 (collectively, base stations BS). Subscribers, depicted as mobile devices, denoted M1, M2, . . . M9, are employed throughout the wireless neighborhood 60 (collectively, subscribers M). The number of subscribers M may vary over time. Lines c1 show the desired links between mobile subscribers and base stations. For mobile subscriber M1, there exists a desired link, c1, to the base station, BS1. Because the base stations are transmitting on channel 1 (c1) using the same frequency, such transmission may cause interference to mobile stations in other cells. For example, in FIG. 3, interferences on the same channel are occurring from base stations, BS4 and BS2, indicated as ic1 in both cases.
  • The interference mitigation system 100 commences with the subscriber station 30. The subscriber station 30 notifies the serving base station 20 of interference from some other base station in the wireless neighborhood 50. In FIG. 2, a feedback link 34 is shown pointing from the subscriber station 30 to the serving base station 20 to indicate this step. Then, the serving base station 20 shares the interference report(s) with the other base stations in the wireless neighborhood 50 that there has been a report of interference. Interference reporting links 36 are shown in FIG. 2 between the serving base station 20 and each of the base stations 24, 26, and 28 in the system 100. Once all base stations in the wireless neighborhood 50 are aware of the interference, the base stations determine whether to perform transmission randomization 300, in some embodiments. Like other transmissions, randomized transmissions occur according to parameters obtained through physical layer optimization 400.
  • Co-channel interference avoidance 200 operates according to the flow diagram of FIG. 4, in some embodiments. The operations are performed by the subscriber 30 (or one of the subscribers M in the wireless neighborhood 50), although the operations may be performed simultaneously by multiple subscribers. The subscriber 30 identifies the base station 20 (or stations) causing the most interference to transmissions on its link to the serving base-station (block 202). The subscriber 30 then makes a determination whether to notify its serving base station 20 of the interference by comparing the interference-to-carrier ratios (ICR) to a threshold (Γ) (block 204).
  • If the threshold is not exceeded (block 206), the interference is not sufficient to trigger the notification by the subscriber 30. Otherwise, the subscriber 30 submits the identity of the base-station(s) causing the most interference to its serving base station, 20 (block 208). In some embodiments, the submission operation constitutes one or more exchanges of the CIA MAC trigger information between the subscriber station 30 and the serving base station 20. As used herein “CIA MAC trigger” means events that lead the subscriber station 30 or the serving base station 20 to invoke the CIA MAC 40 of their respective MACs 22, 32. In other words, the CIA MAC trigger is when the subscriber station 30 determines that the interference exceeds the threshold.
  • The serving base station 20 communicates the information reported by the subscriber 30 to other base stations in the wireless neighborhood 50 (block 210). At this point, each base station knows the links in which interference has been reported, which are the links in which transmissions may optimally be randomized (block 212). In some embodiments, the CIA MAC trigger may be based on average SINR conditions, determined by system geometry and location of subscribers. In these embodiments, the CIA MAC trigger is updated and coordinated among other base stations in the wireless neighborhood periodically.
  • Once the CIA MAC 40 is triggered, the transmission randomization 300 of the MAC 22 in the serving base station 20 is initiated. The other base stations in the wireless neighborhood likewise initiate transmission randomization to the subscriber station 30. FIG. 5 is a flow diagram showing operations performed to randomize transmissions in the wireless neighborhood 50, according to some embodiments. The operations in FIG. 5 may be performed by all base stations BS in the wireless neighborhood 50, but, for simplification, only one base station is indicated in the flow diagram.
  • The base station identifies the link to be analyzed (block 302), which is the link between the serving base station 20 and the subscriber 30 that reported the interference. The base station determines a channel threshold for the CIA MAC link (block 304). If the channel gain on the link does not exceed a “channel threshold”, H (block 306), no transmission to the subscriber 30 occurs (block 308). Otherwise, the base station 20 transmits to the subscriber 30 with optimized physical layer parameters (block 310). Hence, in some embodiments, the transmission probability is proportional to the probability of exceeding the “channel threshold”.
  • The CIA MAC 40 also includes physical layer optimization 400. In some embodiments, the power and modulation on each link is optimized separately. The components of the CIA MAC 40 shown in FIG. 2 may be realized in different ways.
  • In some embodiments, once a decision to trigger the CIA MAC 40 on a given link is reached, the system 100 determines the transmission threshold H , the power allocation, and the modulation selection policy through optimization of the following criterion. This criterion is based on a proportional fair approach of maximizing the product of the goodput of all users. The transmission threshold, power allocation, and modulation parameters may also be derived through alternative optimization criteria.
  • In some embodiments, the system 100 uses an optimization equation to determine the threshold and the optimal link parameters for transmission to the subscriber 30, as follows:
  • C * = Arg max { H _ , P } ( i , j ) k [ R ( i , j ) k S ( 1 - FER ( i , j ) k p ( i , k ) k l N j ( 1 - p l ) ] subject to H _ ( i , j ) k f ( h ) P ( i , j ) k h P _ ( Average power constraint ) 0 P ( i , j ) k P max ( Peak power constraint )
  • where (i,j)k is the link between the ith base station and the jth subscriber on the kth channel; R(i,j)k, is the rate on link (i,j)k; FER(i,j)k is the average frame error rate on link (i,j)k; p(i,j)k is the probability of transmission on link (i,j)k; Nj is the set of base stations comprising severe interferers for the jth subscriber; pl is the probability of transmission by the lth interfering base station; H is the threshold for transmission; P(i,j)k is the average transmit power on link (i,j)k; f(h) is the probability distribution of fast fading channel with cumulative distribution function, F; and S is the frame length.
  • An example approach to solving the above optimization problem is to separate the optimization function into two distinct parts. The separation is motivated in part by the fact that maximization of the objective function is equivalent to maximizing the log of the objective function. The two parts separately address the issue of minimizing collisions and maximizing throughput.
  • Using the logarithm function splits the problem into two parts. The first part is related to the transmission probabilities of the desired and interfering base-stations. The objective, in this case, thus reduces to finding the threshold H to minimize the probability of collision in the network. The second part maximizes the sum of the average throughput on all links, which can be solved through a suitable power and rate allocation strategy per link. The objective functions for the two problems are defined in the following sections.
  • First, the probability of transmission is determined by the system 100 as follows. In some embodiments, the threshold H is determined through a solution to the following optimization criterion:
  • H _ * = arg max H _ ( i , j ) k ln ( p ( i , j ) k l N j ( 1 - p l ) )
  • It can be shown that the optimal threshold and consequently the probability of transmission on a given link is given by:
  • H _ * ( i , j ) k = F - 1 ( Γ ( i , j ) k Γ ( i , j ) k + 1 ) and p * ( i , j ) k = 1 Γ ( i , j ) k + 1
  • In the above, Γ(i,j)k is the number of base stations severely interfering on channel(i,j)k.
  • Next, the interference mitigation system 100 performs physical layer optimization 400, in some embodiments. This part of the CIA MAC 40 resides in all base stations in the wireless neighborhood 50. The interference mitigation system 100 optimizes the physical layer parameters per link. In some embodiments, the physical power and rate parameters on the link are determined through maximization of the throughput of all users, using the following objective function:
  • P * ( i , j ) k = arg max { P ( i , j ) k } R ( i , j ) k subject to H _ ( i , j ) k f ( h ) P ( i , j ) k ( h ) h P _ ( average power constraint ) 0 P ( i , j ) k P max ( Peak power constraint )
  • Each user may vary both the transmitted power and rate to achieve best transmission performance. The signal-to-noise ratio (SNR) is denoted as η, the data rate function R′−1(η) is continuously differentiable with first order derivative positive and strictly decreasing, i.e. concave of η. The power allocation is given by:
  • if P m < P _ 1 - F ( H _ ( i , j ) k * ) , P ( i , j ) k * ( h ) = P m for h H _ ( i , j ) k * , otherwise , P ( i , j ) k * ( h ) = { P m υ * < R ( hP m n o W ) h n o W 0 υ * R ( hP m n o W ) h n o W , R - 1 ( υ * n o W h ) n o W h otherwise
  • for h≧ H*(i,j) k . R′−1( ) is the inverse function of R′( ). υ*≧0 is uniquely given by
  • H _ ( i , j ) k P ( i , j ) k * ( h ) f ( h ) h = P _ .
  • Before the transmission randomization 300 and physical layer optimizations 400 can take place, however, the interference mitigation system 100 determines the threshold for the CIA MAC trigger. In some embodiments, each subscriber 30 makes a decision to trigger the CIA MAC 40. This trigger is based on comparing the measured interference-to-carrier-ratio (ICR) from each base-station to a threshold, as described in FIG. 3, above. In some embodiments the threshold is derived based on the assumption of one strong interferer per subscriber. The extension to multiple interferers is straightforward. In some embodiments, where there is a single interferer, the optimal threshold is derived by comparing the goodput of a system using the CIA MAC with that of a system having no CIA MAC. For the optimal threshold, the goodput of CIA MAC is greater than the good-put of a traditional MAC. The values of the ICR thresholds are calculated as a function of the SNR, as shown in the graph 70 of FIG. 6, according to some embodiments.
  • The value of the threshold at a high SNR is derived as a function of the target probability of error Pe and the number of data symbols, Ld, as
  • Γ = 1 P e 1 - ( 1 / 4 ) 1 / L d R - 1 SNR .
  • The graph 70 plots the values of the thresholds as a function of the SNR for various numbers of data symbols.
  • The interference mitigation system 100 may employ alternate methods for triggering the CIA MAC. These include but are not limited to comparing goodput based on more than one strong interferer, using location-based information or cooperation between subscribers to determine severely interfered users, etc.
  • Observed improvements in throughput and spectral efficiency with the use of the CIA MAC are shown in the following figures. A graph 80 (FIG. 7) is a comparison of the CIA MAC with a traditional MAC for a frequency reuse system. In some embodiments, the use of the CIA MAC is triggered at a distance of 1.2 kilometers (km) from the center of the cell 62, based on the throughput shown at different distances. A graph 90 (FIG. 8) plots distance to call center versus interference to carrier ratio, in some embodiments. Again, the CIA MAC is triggered at a distance of 1.2 km to ensure the best overall throughput at the center cell and at the cell edge. A graph 110 (FIG. 9) plots spectrum efficiency versus transmit power (dBm). The graph 110 shows spectral efficiency improvement with the CIA MAC 10 for 8QAM modulation: 75% for CIA MAC with cross-layer optimization, 34% without cross-layer optimization (reference 43 dBm).
  • The above results are described for a single-carrier scenario. However, extensions to a multi-carrier OFDM system are achieved, in some embodiments. A simple extension is based on determining the CIA-triggers and thresholds based on the average interference power in the entire OFDM band. Subsequent transmission on each OFDMA sub-channel are controlled by the average “channel threshold” and the instantaneous channel gain on the sub-channel.
  • In FIG. 2, both the base stations 20 and the subscriber station 30 have CIA MAC functionality. In some embodiments, the interference mitigation system 100 may operate with a legacy subscriber station, i.e., one without CIA MAC functionality. In such a system, the base station 20 may trigger the CIA MAC 40 when the subscriber is located a predetermined distance from the center of the cell 62. For example, if the legacy subscriber is 1.2 km from its cell center, the subscriber is likely to be at the edge of the cell 62, and thus may be more susceptible to interference by other base stations. In this manner, the location of the subscriber station would be the “notification of interference” to the base station, obviating the need for the subscriber station to notify the base station of a likely interference situation.
  • The interference mitigation system 100 provides a low-complexity method for interference mitigation, which involves limited coordination between base-stations. In some embodiments, the interference mitigation system 100 provides for a relatively decentralized and automatic method for controlling the degree of frequency reuse to improve performance of cell-edge users. Complex frequency reuse and power management schemes across a cellular system are avoided with the interference mitigation system 100.
  • The interference mitigation system 100 may provide significant benefit to cellular users severely impacted by co-channel interference, thereby improving their quality-of-service. The interference mitigation system 100 may be standardized within next generation cellular standards.
  • The interference mitigation system 100 is novel in its use of randomization by the base station for controlling the level of interference in the wireless neighborhood. In particular, the interference mitigation system 100 provides fair transmission opportunities for users affected by co-channel interference. Although randomization for collision avoidance is used extensively for uplink random access channels and wireless local area network (LAN) systems, its use by the interference mitigation system 100 for automatically controlling the level of downlink interference per link is novel.
  • While the application has been described with respect to a limited number of embodiments, those skilled in the art will appreciate numerous modifications and variations therefrom. It is intended that the appended claims cover all such modifications and variations as fall within the true spirit and scope of the invention.

Claims (19)

1. A system, comprising:
a base station comprising a medium access controller, the medium access controller comprising transmission randomization capability;
a subscriber station comprising co-channel interference avoidance, the subscriber to notify the base station when interference exceeds a threshold;
wherein transmissions to the subscriber station are randomized based on a channel threshold for the subscriber station.
2. The system of claim 1, further comprising:
a second base station comprising a second medium access controller the second medium access controller comprising transmission randomization capability, the base station to notify the second base station when interference exceeds the threshold;
wherein transmissions by the second base station to the subscriber station are randomized based on the channel threshold.
3. The system of claim 2, wherein the transmissions to the subscriber station are randomized after receiving notification from both base stations.
4. The system of claim 2, the base station and the second base station further comprising physical layer optimization, wherein the base stations determine power allocation and rate parameters for a link between the base station and the subscriber station.
5. The system of claim 4, wherein the power allocation is given by:
if P m < P _ 1 - F ( H _ ( i , j ) k * ) , P ( i , j ) k * ( h ) = P m for h H _ ( i , j ) k * , otherwise , P ( i , j ) k * ( h ) = { P m υ * < R ( hP m n o W ) h n o W 0 υ * R ( hP m n o W ) h n o W , R - 1 ( υ * n o W h ) n o W h otherwise
where h≧ H (i,j) k *. R′−1( ) is an inverse function of R′( ), and υ*≧0 is uniquely given by
H _ ( i , k ) k P ( i , j ) k * ( h ) f ( h ) h = P _ .
6. The system of claim 1, wherein the threshold is determined using an optimization equation:
H _ * = arg max X _ ( i , j ) k ln ( p ( i , j ) k l N j ( 1 - p l ) ) ,
where (i,j)k is the link between the ith base station and the jth subscriber on the kth channel, and p(i,j)k is the probability of transmission on link (i,j)k, and pl is the probability of transmission by the lth interfering base station.
7. A method, comprising:
determining a channel threshold for a link between a base station and a subscriber; and
setting a probability of transmission for the link based on the channel threshold.
8. The method of claim 7, further comprising:
receiving an indication of interference from the subscriber by the base station;
wherein the subscriber interference indication causes the base station to determine the channel threshold.
9. The method of claim 7, further comprising:
determining a location of the subscriber;
wherein the base station determines the channel threshold when the location exceeds a predetermined distance from a cell center in which the base station resides.
10. The method of claim 7, further comprising:
identifying interference by the subscriber, the subscriber being part of a wireless neighborhood comprising base stations and subscribers.
11. The method of claim 10, further comprising:
comparing an interference-to-carrier ratio of the link to a threshold; and
not reporting interference to the base station if the threshold is not exceeded.
12. The method of claim 11, further comprising:
reporting the interference to the base station if the threshold is exceeded.
13. The method of claim 12, further comprising:
reporting the interference to other base stations in the wireless neighborhood;
wherein each base station communicates with the subscriber according to the probability of transmission.
14. The method of claim 13, further comprising:
obtaining the threshold using an optimization equation.
15. The method of claim 14, obtaining the threshold using an optimization equation further comprising:
using optimization equation
H _ * = arg max H _ ( i , j ) k ln ( p ( i , j ) k l N j ( 1 - p l ) ) ,
 where (i,j)k is the link between the ith base station and the jth subscriber on the kth channel, and p(i,j)k is the probability of transmission on link (i,j)k, and pl is the probability of transmission by the lth interfering base station.
16. A method, comprising:
identifying interference by a subscriber, the subscriber being part of a wireless neighborhood comprising base stations and subscribers, wherein the subscriber reports the interference to a base station;
determining a channel threshold for a link between the base station and the subscriber; and
setting a probability of transmission for the link based on the channel threshold.
17. The method of claim 16, further comprising:
comparing an interference-to-carrier ratio of the link to a threshold; and
not reporting interference to the base station if the threshold is not exceeded.
18. The method of claim 17, further comprising:
reporting the interference to the base station if the threshold is exceeded.
19. The method of claim 18, further comprising:
using optimization equation
H _ * = arg max H _ ( i , j ) k ln ( p ( i , j ) k l N j ( 1 - p l ) ) ,
 where (i,j)k is the link between the ith base station and the jth subscriber on the kth channel, and p(i,j)k is the probability of transmission on link (i,j)k, and pl is the probability of transmission by the lth interfering base station.
US11/965,788 2007-12-28 2007-12-28 Probabilistic interference mitigation for wireless cellular networks Abandoned US20090170497A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/965,788 US20090170497A1 (en) 2007-12-28 2007-12-28 Probabilistic interference mitigation for wireless cellular networks
US13/224,148 US8798653B2 (en) 2007-12-28 2011-09-01 Probabilistic interference mitigation for wireless cellular networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/965,788 US20090170497A1 (en) 2007-12-28 2007-12-28 Probabilistic interference mitigation for wireless cellular networks

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/224,148 Continuation US8798653B2 (en) 2007-12-28 2011-09-01 Probabilistic interference mitigation for wireless cellular networks

Publications (1)

Publication Number Publication Date
US20090170497A1 true US20090170497A1 (en) 2009-07-02

Family

ID=40799114

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/965,788 Abandoned US20090170497A1 (en) 2007-12-28 2007-12-28 Probabilistic interference mitigation for wireless cellular networks
US13/224,148 Expired - Fee Related US8798653B2 (en) 2007-12-28 2011-09-01 Probabilistic interference mitigation for wireless cellular networks

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/224,148 Expired - Fee Related US8798653B2 (en) 2007-12-28 2011-09-01 Probabilistic interference mitigation for wireless cellular networks

Country Status (1)

Country Link
US (2) US20090170497A1 (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110081865A1 (en) * 2009-10-05 2011-04-07 Futurewei Technologies, Inc. System and Method for Inter-Cell Interference Coordination
US20110134876A1 (en) * 2008-08-12 2011-06-09 Hitachi, Ltd. Wireless Communication System, Wireless Communication Device, and Wireless Resource Management Method
CN102104878A (en) * 2009-12-21 2011-06-22 中兴通讯股份有限公司 Method and device for harmonizing cell interference
US20110199957A1 (en) * 2008-03-14 2011-08-18 Ozgur Oyman Resource management and interference mitigation techniques for relay-based wireless netoworks
US20120058789A1 (en) * 2007-12-28 2012-03-08 Guowang Miao Probabilistic interference mitigation for wireless cellular networks
US20120120893A1 (en) * 2010-11-17 2012-05-17 Futurewei Technologies, Inc. Methods and Apparatus for Inter-cell Interference Coordination Self-Organized Network
US8472968B1 (en) * 2008-08-11 2013-06-25 Marvell International Ltd. Location-based detection of interference in cellular communications systems
US8532041B1 (en) 2009-04-24 2013-09-10 Marvell International Ltd. Method for transmitting information in a regulated spectrum and network configured to operate in the regulated spectrum
US8571479B2 (en) 2008-06-16 2013-10-29 Marvell World Trade Ltd. Short-range wireless communication
US8588705B1 (en) 2007-12-11 2013-11-19 Marvell International Ltd. System and method of determining Power over Ethernet impairment
US8649734B1 (en) 2007-08-13 2014-02-11 Marvell International Ltd. Bluetooth scan modes
US8923788B1 (en) 2008-06-27 2014-12-30 Marvell International Ltd. Circuit and method for adjusting a digitally controlled oscillator
US8983557B1 (en) 2011-06-30 2015-03-17 Marvell International Ltd. Reducing power consumption of a multi-antenna transceiver
US9066369B1 (en) 2009-09-16 2015-06-23 Marvell International Ltd. Coexisting radio communication
US9078108B1 (en) 2011-05-26 2015-07-07 Marvell International Ltd. Method and apparatus for off-channel invitation
US9125216B1 (en) 2011-09-28 2015-09-01 Marvell International Ltd. Method and apparatus for avoiding interference among multiple radios
US9131520B1 (en) 2009-04-06 2015-09-08 Marvell International Ltd. Packet exchange arbitration for coexisting radios
US20150281978A1 (en) * 2014-03-31 2015-10-01 Nec Laboratories America, Inc. Multicell beamforming system and methods for ofdma small-cell networks
US20150305039A1 (en) * 2012-09-28 2015-10-22 Nokia Solutions and Network OY Method, Apparatuses and Computer Program for Reporting In-Device Coexistence Information
US9215708B2 (en) 2012-02-07 2015-12-15 Marvell World Trade Ltd. Method and apparatus for multi-network communication
US9294997B1 (en) 2010-05-11 2016-03-22 Marvell International Ltd. Wakeup beacons for mesh networks
US9332488B2 (en) 2010-10-20 2016-05-03 Marvell World Trade Ltd. Pre-association discovery
US9401737B1 (en) 2007-09-21 2016-07-26 Marvell International Ltd. Circuits and methods for generating oscillating signals
US9450649B2 (en) 2012-07-02 2016-09-20 Marvell World Trade Ltd. Shaping near-field transmission signals
US9655041B1 (en) 2008-12-31 2017-05-16 Marvell International Ltd. Discovery-phase power conservation

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8340677B2 (en) * 2009-07-02 2012-12-25 Futurewei Technologies, Inc. System and method for semi-static downlink inter-cell interference coordination for wireless communications
EP3225044B1 (en) * 2014-11-27 2020-01-15 Guowang Miao Methods and apparatus for enabling proximity services in mobile networks
US9961487B1 (en) * 2014-11-27 2018-05-01 Guowang Miao Methods and apparatus for enabling proximity services in mobile networks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060217062A1 (en) * 2003-09-23 2006-09-28 Saffre Fabrice T P Decentralized channel selection in a self-organizing adhoc network
US20070238480A1 (en) * 2006-03-28 2007-10-11 Lin Xintian E Wireless network feedback techniques to improve power control and co-channel interference
US20090270043A1 (en) * 2000-06-26 2009-10-29 Panasonic Corporation Mobile communication system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6603753B1 (en) * 1999-12-03 2003-08-05 Lucent Technologies Inc. Down-link transmission inter-cell scheduling in CDMA data networks
US7408914B2 (en) * 2004-01-08 2008-08-05 Qualcomm Incorporated Time-hopping systems and techniques for wireless communications
US8023955B2 (en) * 2005-08-22 2011-09-20 Sony Corporation Uplink resource allocation to control intercell interference in a wireless communication system
KR101112146B1 (en) * 2006-10-31 2012-04-10 콸콤 인코포레이티드 Inter-cell power control in the presence of fractional frequency reuse
US20090170497A1 (en) * 2007-12-28 2009-07-02 Guowang Miao Probabilistic interference mitigation for wireless cellular networks
US8458345B2 (en) * 2008-03-07 2013-06-04 Qualcomm Incorporated Method and apparatus for frequency reuse in a multi-carrier communications system
US8594028B2 (en) * 2008-05-30 2013-11-26 George Mason Intellectual Properties, Inc. Cognitive channel assignment in wireless networks
US8705484B2 (en) * 2008-08-15 2014-04-22 Ntt Docomo, Inc. Method for varying transmit power patterns in a multi-cell environment
US8412243B2 (en) * 2008-12-05 2013-04-02 Electronics And Telecommunications Research Institute Power control method and apparatus for inter-cell interference removal
JP2010213243A (en) * 2009-03-12 2010-09-24 Ntt Docomo Inc Controller and control method used for radio station for radio communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090270043A1 (en) * 2000-06-26 2009-10-29 Panasonic Corporation Mobile communication system
US20060217062A1 (en) * 2003-09-23 2006-09-28 Saffre Fabrice T P Decentralized channel selection in a self-organizing adhoc network
US20070238480A1 (en) * 2006-03-28 2007-10-11 Lin Xintian E Wireless network feedback techniques to improve power control and co-channel interference

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8897706B1 (en) 2007-08-13 2014-11-25 Marvell International Ltd. Bluetooth wideband scan mode
US8649734B1 (en) 2007-08-13 2014-02-11 Marvell International Ltd. Bluetooth scan modes
US9401737B1 (en) 2007-09-21 2016-07-26 Marvell International Ltd. Circuits and methods for generating oscillating signals
US8588705B1 (en) 2007-12-11 2013-11-19 Marvell International Ltd. System and method of determining Power over Ethernet impairment
US9148200B1 (en) 2007-12-11 2015-09-29 Marvell International Ltd. Determining power over ethernet impairment
US20120058789A1 (en) * 2007-12-28 2012-03-08 Guowang Miao Probabilistic interference mitigation for wireless cellular networks
US8798653B2 (en) * 2007-12-28 2014-08-05 Intel Corporation Probabilistic interference mitigation for wireless cellular networks
US20110199957A1 (en) * 2008-03-14 2011-08-18 Ozgur Oyman Resource management and interference mitigation techniques for relay-based wireless netoworks
US8422940B2 (en) 2008-03-14 2013-04-16 Intel Corporation Resource management and interference mitigation techniques for relay-based wireless networks
US20110211618A1 (en) * 2008-03-14 2011-09-01 Ozgur Oyman Resource management and interference mitigation techniques for relay-based wireless netoworks
US8265547B2 (en) 2008-03-14 2012-09-11 Intel Corporation Resource management and interference mitigation techniques for relay-based wireless netoworks
US8571479B2 (en) 2008-06-16 2013-10-29 Marvell World Trade Ltd. Short-range wireless communication
US8989669B2 (en) 2008-06-16 2015-03-24 Marvell World Trade Ltd. Short-range wireless communication
US8655279B2 (en) 2008-06-16 2014-02-18 Marvell World Trade Ltd. Short-range wireless communication
US8923788B1 (en) 2008-06-27 2014-12-30 Marvell International Ltd. Circuit and method for adjusting a digitally controlled oscillator
US8472968B1 (en) * 2008-08-11 2013-06-25 Marvell International Ltd. Location-based detection of interference in cellular communications systems
US9055460B1 (en) 2008-08-11 2015-06-09 Marvell International Ltd. Location-based detection of interference in cellular communications systems
US20110134876A1 (en) * 2008-08-12 2011-06-09 Hitachi, Ltd. Wireless Communication System, Wireless Communication Device, and Wireless Resource Management Method
US9655041B1 (en) 2008-12-31 2017-05-16 Marvell International Ltd. Discovery-phase power conservation
US9131520B1 (en) 2009-04-06 2015-09-08 Marvell International Ltd. Packet exchange arbitration for coexisting radios
US8982826B1 (en) 2009-04-24 2015-03-17 Marvell International Ltd. Method for transmitting information in a regulated spectrum and network configured to operate in the regulated spectrum
US8532041B1 (en) 2009-04-24 2013-09-10 Marvell International Ltd. Method for transmitting information in a regulated spectrum and network configured to operate in the regulated spectrum
US9066369B1 (en) 2009-09-16 2015-06-23 Marvell International Ltd. Coexisting radio communication
US9031032B2 (en) * 2009-10-05 2015-05-12 Futurewei Technologies, Inc. System and method for inter-cell interference coordination
US20110081865A1 (en) * 2009-10-05 2011-04-07 Futurewei Technologies, Inc. System and Method for Inter-Cell Interference Coordination
US9787445B2 (en) 2009-10-05 2017-10-10 Futurewei Technologies, Inc. System and method for inter-cell interference coordination
CN102104878A (en) * 2009-12-21 2011-06-22 中兴通讯股份有限公司 Method and device for harmonizing cell interference
US9294997B1 (en) 2010-05-11 2016-03-22 Marvell International Ltd. Wakeup beacons for mesh networks
US9332488B2 (en) 2010-10-20 2016-05-03 Marvell World Trade Ltd. Pre-association discovery
US8817723B2 (en) * 2010-11-17 2014-08-26 Futurewei Technologies, Inc. Methods and apparatus for inter-cell interference coordination self-organized network
US20120120893A1 (en) * 2010-11-17 2012-05-17 Futurewei Technologies, Inc. Methods and Apparatus for Inter-cell Interference Coordination Self-Organized Network
US9078108B1 (en) 2011-05-26 2015-07-07 Marvell International Ltd. Method and apparatus for off-channel invitation
US8983557B1 (en) 2011-06-30 2015-03-17 Marvell International Ltd. Reducing power consumption of a multi-antenna transceiver
US9125216B1 (en) 2011-09-28 2015-09-01 Marvell International Ltd. Method and apparatus for avoiding interference among multiple radios
US9215708B2 (en) 2012-02-07 2015-12-15 Marvell World Trade Ltd. Method and apparatus for multi-network communication
US9450649B2 (en) 2012-07-02 2016-09-20 Marvell World Trade Ltd. Shaping near-field transmission signals
US20150305039A1 (en) * 2012-09-28 2015-10-22 Nokia Solutions and Network OY Method, Apparatuses and Computer Program for Reporting In-Device Coexistence Information
US9756639B2 (en) * 2012-09-28 2017-09-05 Nokia Solutions And Networks Oy Method, apparatuses and computer program for reporting in-device coexistence information
US10980023B2 (en) 2012-09-28 2021-04-13 Nokia Technologies Oy Reporting information
US9521560B2 (en) * 2014-03-31 2016-12-13 Nec Corporation Multicell beamforming system and methods for OFDMA small-cell networks
US20150281978A1 (en) * 2014-03-31 2015-10-01 Nec Laboratories America, Inc. Multicell beamforming system and methods for ofdma small-cell networks

Also Published As

Publication number Publication date
US8798653B2 (en) 2014-08-05
US20120058789A1 (en) 2012-03-08

Similar Documents

Publication Publication Date Title
US8798653B2 (en) Probabilistic interference mitigation for wireless cellular networks
CN101909352B (en) Interference control method and device in a wireless communication system
KR100964577B1 (en) Method and system for controlling power in a communication system
US8948807B2 (en) Coordinated power boost and power back-off
US8798073B2 (en) Method of performing uplink scheduling
CN101902775B (en) Interference control method and device in a wireless communication system
EP2894910B1 (en) Spectrum management system
US8565161B2 (en) Adaptive frequency reuse scheme
US9185664B2 (en) Method and apparatus for power control and load balancing based on load estimation of neighbor cell in wireless communication system
US8483038B2 (en) Radio communication apparatus and radio communication method
EP2560426A1 (en) Wireless communication system, high-power base station, low-power base station, and communication control method
US8412243B2 (en) Power control method and apparatus for inter-cell interference removal
CN101199174A (en) Radio resource allocation in telecommunication system
CN101171814B (en) Interference control in a wireless communication system
US7236789B2 (en) Channel rate and physical channel selection in wireless communications networks
WO2010018015A1 (en) Method for reducing interference in the downlink direction of a cellular radio communication network and corresponding base station
Voicu et al. Wi-Fi evolution for future dense networks: Does sensing threshold adaptation help?
EP1855423B1 (en) Decentralized multi-user link adaptation for QoS support
Eguizabal et al. Interference management and cell range expansion analysis for LTE picocell deployments
US20220417953A1 (en) Subscriber in a wireless communication system, base station, method for receiving data and computer program, for increasing the probability of getting through for subscribers with poor reception conditions or high qos requirements in communication systems with a high density of subscribers
EP1855422B1 (en) Receiver feedback and broadcast signaling using busy bursts
Feng et al. Coordinated scheduling based on overload indicator for LTE/LTE-A uplink
Balachandran et al. Flexible duplex in FDD spectrum
Porjazoski et al. Impact of fractional frequency reuse on LTE performances in uplink
Janardhanan et al. LTE-Wi-Fi coexistence in 5 GHz band

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTEL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MIAO, GUOWANG;HIMAYAT, NAGEEN;TALWAR, SHILPA;REEL/FRAME:022841/0699;SIGNING DATES FROM 20071215 TO 20080118

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE