摘要:
Systems and methodologies are described that facilitate employing interference-overload indications to generate pilot strength reports that can be leveraged to mitigate reverse link interference. An affected base station can send interference-overload indications when experiencing a strong interference/jamming scenario due to reverse link transmission by an offending access terminal. The offending access terminal can monitor interference-overload indications from the affected base station (e.g., although the affected base station can be excluded from an active set of the offending access terminal) and send a pilot strength report to a serving base station in response. The serving base station can receive the interference induced pilot strength report and command the offending access terminal not to transmit on certain channel resources (e.g., time, frequency, spatial, . . . ); thus, the affected base station can use these resources to schedule transmission(s) by access terminal(s) served thereby.
摘要:
Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.
摘要:
Systems and methodologies are described that facilitate employing distributed frequency planning and reuse factor optimization based upon forward link and/or reverse link interference management techniques. An optimal reuse factor for a base station can be determined based upon a metric that evaluates levels of service associated with neighboring base stations. Moreover, a subset of available resource sets can be selected for use by the base station; thus, a base station specific collection of resource sets can be formed through such selection. Further, mappings of each resource set to a set of physical resources can be disseminated in a network or portion thereof. According to another example, frequency hopping can be constrained to use of resources within a resource set (rather than across more than one resource set) as provided in a base station specific hopping pattern.
摘要:
Techniques for centralized control of peer-to-peer (P2P) communication and centralized control of femto cell operation are described. For centralized control of P2P communication, a designated network entity (e.g., a base station) may control P2P communication of stations (e.g., UEs) located within its coverage area. The designated network entity may receive an indication of a first station (e.g., a UE) desiring to communicate with a second station (e.g., another UE). The designated network entity may determine whether or not to select peer-to-peer communication for the first and second stations, e.g., based on the quality of their communication link. The designated network entity may assign resources to the stations if peer-to-peer communication is selected. For centralized control of femto cell operation, the designated network entity may control the operation of femto cells (e.g., may activate or deactivate femto cells) within its coverage area.
摘要:
Providing for management of wireless communications in a heterogeneous wireless access point (AP) environment is described herein. By way of example, system data of an over-the-air message can be configured to include information identifying a distinct type of transmitting base station. In some aspects, the information can include an access type of the base station and/or a sector ID for distinguishing the base station among large numbers of other base stations. According to other aspects, the information can include wireless channel resources designated for a particular type of base station, or blanked by the transmitting base station, to facilitate interference reduction on such resources. By employing aspects of wireless communication management disclosed herein, efficient and reliable communication can be affected in large heterogeneous AP networks.
摘要:
Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.
摘要:
Techniques for centralized control of peer discovery pilot transmission are described. In an aspect, a designated network entity (e.g., a base station or a network controller) may control transmission of peer discovery pilots by stations located within its coverage area. In one design, the network entity may receive signaling triggering peer discovery pilot transmission. The network entity may direct each of at least one station to transmit a peer discovery pilot to allow one or more stations to detect the at least one station. The peer discovery pilot may include at least one synchronization signal or at least one reference signal. The network entity may receive pilot measurements from the one or more stations for peer discovery pilots from peer stations and/or reference signals from base stations. The network entity may determine whether or not to select peer-to-peer communication for two stations based on the pilot measurements.
摘要:
Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.
摘要:
Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.
摘要:
To reduce inter-sector interference for “weak” users and combat a potentially large variation in interference levels observed by “strong” and weak users, system resources (e.g., frequency subbands) available for data transmission in a system are partitioned into multiple (e.g., three) disjoint sets. Each sector in the system is assigned one subband set. Neighboring sectors are assigned different subband sets such that the subband set assigned to each sector is orthogonal to the subband sets assigned to neighboring sectors. Each sector has an assigned subband set and an unassigned subband set, which contains all subbands not in the assigned set. Weak users in each sector (which are typically strong interferers to neighboring sectors) are allocated subbands in the assigned set. Strong users in each sector are allocated subbands in the unassigned set. The weak users in each sector are then orthogonal to strong interferers in neighboring sectors.