摘要:
Techniques for sending low reuse preambles in a wireless network are described. In an aspect, a base station may send a low reuse preamble on reserved frequency resources to allow terminals to detect the base station even in the presence of strong interfering base stations. The base station may generate the low reuse preamble to include a pilot portion and a data portion. The base station may determine frequency resources reserved for sending low reuse preambles by base stations. The base station may then send the low reuse preamble on the reserved frequency resources, e.g., at a pseudo-randomly selected time. A terminal may detect for low reuse preambles sent by the base stations on the reserved frequency resources. The terminal may recover information for a base station from a detected low reuse preamble.
摘要:
Systems and methodologies are described that facilitate blanking on portions of bandwidth, such as a subset of interlaces, utilized by communicating devices that are dominantly interfered by a disparate device in wireless communications networks. The portions of bandwidth can relate to critical data, such as control data, and one or more of the communicating devices can request that the dominantly interfering device blank on one or more of the portions. The communicating devices can subsequently transmit data over the blanked portions free of the dominant interference. Additionally, the dominantly interfering device can request reciprocal blanking from the one or more communicating devices.
摘要:
An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server.
摘要:
A method to mitigate interference in a wireless system is provided. The method includes processing a set of radio network identifiers and limiting a number of hypotheses associated with the radio network identifiers in order to mitigate interference in a wireless network. In another aspect, the method includes processing a set of hypotheses and limiting the set of hypotheses by limiting a number of downlink grants to a common space, limiting the number of downlink grants to a number of instances, or limiting the number of grants to a physical downlink control channel (PDCCH) type. In yet another aspect, the method includes processing a downlink set and generating a target termination level for the downlink data set, the termination level associated with a Hybrid automatic repeat-request.
摘要:
Systems and methodologies are described that facilitate defining new control channels in legacy wireless networks. Control data resources for new systems can be defined over resources reserved for general data communications in the legacy wireless network specification. In this regard, legacy devices can still be supported by devices implementing new control data resources, and the new control data resources can avoid substantial interference that is typically exhibited over legacy control and/or reference signal resources by instead using the general data resources. In addition, new system devices can avoid scheduling data communication resources over the new control resources to create a substantially non-interfered global control segment. Control data can be transmitted over the segment using beacon-based technologies, reuse schemes, and/or the like.
摘要:
Techniques for mitigating interference in a wireless communication network are described. A terminal may desire to communicate with a weaker serving base station and may observe high interference from a strong interfering base station. The two base stations may be asynchronous and have different frame timing. In an aspect, high interference may be mitigated by having the interfering base station reserve downlink and/or uplink resources. The interfering base station may transmit at a low power level or not at all on the reserved downlink resources to reduce interference to the terminal. Terminals served by the interfering base station may transmit at a low power level or not at all on the reserved uplink resources to reduce interference at the serving base station. The terminal may then be able to communicate with the serving base station.
摘要:
Techniques for sending low reuse preambles in a wireless network are described. In an aspect, a base station may send a low reuse preamble on reserved frequency resources to allow terminals to detect the base station even in the presence of strong interfering base stations. The base station may generate the low reuse preamble to include a pilot portion and a data portion. The base station may determine frequency resources reserved for sending low reuse preambles by base stations. The base station may then send the low reuse preamble on the reserved frequency resources, e.g., at a pseudo-randomly selected time. A terminal may detect for low reuse preambles sent by the base stations on the reserved frequency resources. The terminal may recover information for a base station from a detected low reuse preamble.
摘要:
Systems and methodologies are described that facilitate blanking on portions of bandwidth, such as a subset of interlaces, utilized by communicating devices that are dominantly interfered by a disparate device in wireless communications networks. The portions of bandwidth can relate to critical data, such as control data, and one or more of the communicating devices can request that the dominantly interfering device blank on one or more of the portions. The communicating devices can subsequently transmit data over the blanked portions free of the dominant interference. Additionally, the dominantly interfering device can request reciprocal blanking from the one or more communicating devices.
摘要:
An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server.
摘要:
Systems and methodologies are described that facilitate defining new control channels in legacy wireless networks. Control data resources for new systems can be defined over resources reserved for general data communications in the legacy wireless network specification. In this regard, legacy devices can still be supported by devices implementing new control data resources, and the new control data resources can avoid substantial interference that is typically exhibited over legacy control and/or reference signal resources by instead using the general data resources. In addition, new system devices can avoid scheduling data communication resources over the new control resources to create a substantially non-interfered global control segment. Control data can be transmitted over the segment using beacon-based technologies, reuse schemes, and/or the like.