摘要:
A universal mobile telecommunications system (UMTS) receiver uses Pilot Symbol Assisted Modulation (PSAM) in demodulating a received Binary Phase Shift Keying (BPSK) signal. The UMTS receiver uses a ratio of the transmitted energy per pilot symbol to the transmitted energy per data symbol as an index into a look-up table to return a value for a scale factor for use in demodulation of the received signal, which provides better performance during periods when the fading distribution is unknown.
摘要:
Aspects of the present disclosure provide apparatus, methods, processing systems, and computer readable mediums for initiating directional repeaters (wireless devices that relay directional wireless signals) that have an ability to be controlled by a base station (BS), for example, for beamforming purposes.
摘要:
Systems, apparatus, methods and computer program products are provided. In some embodiments, a method for facilitating interference management in an unplanned wireless communication system is provided. The method can include a non-serving base station obtaining information about a user equipment served by a serving base station; and determining signal information based, at least, in part, on the information. The method can also include the non-serving base station disallowing access to the user equipment due to restricted access rules for the non-serving base station. The method can also include the non-serving base station performing interference management of the user equipment served by the serving base station. The interference management can be performed based, at least, in part, on the determined signal information.
摘要:
Apparatuses and methods are disclosed for infrastructure assisted discovery in wireless peer-to-peer networks. Various discovery procedures may be implemented where a first node supports discovery of other nodes for a second node.
摘要:
Interference management may involve the transmission of interference management messages by wireless nodes that are experiencing interference and appropriate responses by potential interferers that receive the interference management messages. Upon detection of interfering signals, a wireless node may determine whether the signals are from a synchronous interferer or an asynchronous interferer. Based on this determination, the wireless node may use different types of signals to manage the different types of interference. In some aspects, asynchronous interference management may involve backing-off in frequency and/or in time in response to interference signals. Asynchronous interference management may involve transmitting back-off beacons to clear potential interferers from a given carrier. Here, the transmission of beacons by a wireless node may be metered to facilitate fair sharing of communication resources.
摘要:
A wireless node configured to communicate with a remote node using a timeslot structure. The timeslot structure includes a plurality of data channels and a plurality of control channels, wherein each of the control channels comprises a plurality of control units. The wireless node is further configured to assign any one of a plurality of control messages for the data channels to any one of the control units.
摘要:
Techniques are described for providing a-priori information about the implication of a network device operator interaction with a network device, e.g., a software configuration or hardware change, to be performed on the network device before the interaction actually takes place. The network device operator is provided with information that may be used to make a decision whether to proceed with the interaction. For each logically distinct feature of a network device, the techniques generate a trigger outcome domain (TOD). Each TOD is defined to include a list of operator interactions that defines relevant events in the network device that may be triggerable by the operator interactions, a list of potential outcomes in the network based on the potential events in the network device, and a user interface to display the list of potential outcomes for the operator interactions prior to performing any of the interactions.
摘要:
Systems, methods, apparatus and computer program products to facilitate determining nominal interference from one or more interfering base stations are provided. In one embodiment, the method can include computing a nominal interference. The method can also include transmitting the nominal interference to one or more interfering base stations. The nominal interference can be transmitted to at least one of the one or more interfering base stations to compute a loss in transmission rate to a user equipment in a selected cell if at least one of the one or more interfering base stations transmits over a same set of resources on which the user equipment in the selected cell receives information.
摘要:
An adaptive scheme controls the transmission of interference management messages by wireless nodes. For example, the adaptive scheme may be used to determine whether and/or how to transmit resource utilization messages. Such a determination may be based on, for example, comparison of a quality of service threshold with a current quality of service level associated with received data. A quality of service threshold may be adapted based on the effect of previously transmitted resource utilization messages. A quality of service threshold for a given wireless node may be adapted based on the frequency at which the wireless node transmits resource utilization messages. A quality of service threshold for a given wireless node may be adapted based on information received from another wireless node. An adaptation scheme also may depend on the type of traffic received by a given wireless node. A quality of service threshold also may be adapted based on throughput information.
摘要:
Systems, apparatus, methods and computer program products are provided. In some embodiments, a method for configuration of scheduling policy to facilitate distributed scheduling is provided. The method can include receiving configuration information for configuring the scheduling policy for traffic. The scheduling policy can be configured according to a provisioned priority function. The configuration information can be received at a plurality of base stations in a respective plurality of different cells for provisioning a priority function at the plurality of base stations.