摘要:
Techniques for supporting data transmission via a relay station are described. In an aspect, data transmission may be supported using ACK-and-suspend. A transmitter station sends a first transmission of a packet to a receiver station. The transmitter station receives no ACK information for the first transmission of the packet and suspends transmission of the packet. The transmitter station thereafter receives an indication to resume transmission of the packet and, in response, sends a second transmission of the packet. In another aspect, different ACK timeline may be used when applicable. The receiver station may send ACK information in a designated subframe if available for use or in a different subframe. In yet another aspect, ACK repetition may be used. The receiver may send ACK information in multiple subframes to facilitate reception of the ACK information when the transmitter station is unable to receive one or more of the multiple subframes.
摘要:
Systems and methodologies are described that facilitate blanking on portions of bandwidth, such as a subset of interlaces, utilized by communicating devices that are dominantly interfered by a disparate device in wireless communications networks. The portions of bandwidth can relate to critical data, such as control data, and one or more of the communicating devices can request that the dominantly interfering device blank on one or more of the portions. The communicating devices can subsequently transmit data over the blanked portions free of the dominant interference. Additionally, the dominantly interfering device can request reciprocal blanking from the one or more communicating devices.
摘要:
An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server.
摘要:
Providing for improved access communication for wireless systems is described herein. By way of example, wireless devices can employ wireless resource re-use in selecting a subset of access communication resources, to mitigate interference on uplink access requests. Re-use can be based on current network conditions, or on a type of base station facilitating the wireless communication. In some aspects, planned resource re-use can be facilitated by an access terminal. The access terminal requests neighboring or interfering network access points to reserve a set of resources for a serving access point. Reserved resources can be conveyed to the serving access point with an uplink access probe, to further mitigate interference.
摘要:
Systems and methodologies are described that facilitate communicating between access points using the same air interface as for serving wireless devices. Access points can communicate with one another over the air interface to exchange interference management messages related to negotiating and/or allocating resources among the access points or other messages. In addition, access points can prepare served wireless devices for time periods where the access points communicate with disparate access points over the air interface to mitigate confusion or radio link failure detection by the served wireless devices.
摘要:
Techniques for managing interference in a wireless network are described. A base station may receive enhanced pilot measurement reports from user equipments (UEs) and may make an interference management decision based on the received reports. The base station may select a serving base station for a UE based on an enhanced pilot measurement report received from the UE. The base station may determine resources with a low target interference level at a neighbor base station and may avoid scheduling a UE for uplink transmission on the resources. The base station may also determine whether to reserve resources for a neighbor base station based on data performance of the neighbor base station, whether the neighbor base station observes high interference from UEs served by the base station, or whether UEs served by the neighbor base station observe high interference from the base station, which may be determined based on the enhanced pilot measurement reports.
摘要:
Techniques for performing association with leakage-based metrics in a wireless network are described. Association may be performed to select a serving node (e.g., a base station or a relay) for a station (e.g., a UE or a relay). In one design, at least one metric may be determined for at least one candidate node for possible association by the station. A metric for each candidate node may be determined based on leakage of the candidate node. The leakage of the candidate node may include interference due to the candidate node at stations not served by the candidate node (excluding the station). The metric for each candidate node may include a signal-to-leakage ratio (SLR), a geometry-to-leakage ratio (GLR), or a throughput-to-leakage ratio (TLR). A serving node for the station may be selected from among the at least one candidate node based on the at least one metric.
摘要:
Techniques for selecting a serving base station for a terminal in a wireless communication network are described. In one design, multiple candidate base stations for the terminal may be identified, with each candidate base station being a candidate for selection as the serving base station for the terminal. The multiple candidate base stations may include base stations with different transmit power levels and/or may support interference mitigation. One of the multiple candidate base stations may be selected as the serving base station. In one design, the serving base station may be selected based on at least one metric for each candidate base station. The at least one metrics may be for pathloss, effective transmit power, effective geometry, projected data rate, control channel reliability, network utility, etc. The selected candidate base station may have a lower SINR than a highest SINR among the multiple candidate base stations.
摘要:
Techniques for selecting a serving base station for a terminal in a wireless communication network are described. In one design, multiple candidate base stations for the terminal may be identified, with each candidate base station being a candidate for selection as the serving base station for the terminal. The multiple candidate base stations may include base stations with different transmit power levels and/or may support interference mitigation. One of the multiple candidate base stations may be selected as the serving base station. In one design, the serving base station may be selected based on at least one metric for each candidate base station. The at least one metrics may be for pathloss, effective transmit power, effective geometry, projected data rate, control channel reliability, network utility, etc. The selected candidate base station may have a lower SINR than a highest SINR among the multiple candidate base stations.
摘要:
Systems and methodologies are described that facilitate multiplexing control data values over a single physical control channel at least in part by dividing the control channel into one or more logical channels. The physical control channel can have a corresponding Walsh space for transmitting a number of bits, or representations thereof, and the Walsh space can be divided among the logical control channels. Additionally, the logical control channels and/or physical channel can be scrambled according to an identifier of a mobile device (such as MAC ID) to differentiate the data on the channel. Furthermore, a sector identifier can be used to scramble the data where the sector is ascertainable.