摘要:
Methods and apparatuses are provided that include calibrating transmit power of a femto node based on measuring one or more parameters related to usage of the femto node. The femto node can temporarily increase transmit power and analyze received measurement reports to determine a transmit power calibration. The femto node can additionally measure uplink received signal strength indicators over multiple time periods following handover of a user equipment (UE) to determine whether to increase transmit power to cover the UE.
摘要:
Methods and apparatuses are provided for determining whether to handover a device to mitigate uplink interference while achieving acceptable uplink service quality in a wireless network. One or more parameters related to a device can be evaluated to determine whether to handover the device, such as a number of transmission power reports received from the device over a period of time, a frame error rate, setpoint, or power control commands related to the uplink of the device, a received pilot signal strength at the device, an uplink throughput or buffer size at the device, etc., from which transmit power information of the device can be inferred for determining whether the device potentially interferes with access points or devices. Based on the one or more parameters, an access point can determine whether handing over the device may mitigate such uplink interference while ensuring uplink service quality, and accordingly handover the device.
摘要:
Methods and apparatuses are provided that facilitate providing access point measurements to restricted access points. Restricted access points can lessen restrictions to allow devices to register with the restricted access point for providing measurements thereto. Additionally or alternatively, access point measurements can be provided to a minimization of drive tests (MDT) server for providing to the restricted access points. Thus, restricted access points can obtain the access point measurements for performing enhanced interference management or other functionality based at least in part on the measurements.
摘要:
An access point transmits cell information via a physical layer channel. In some cases, the cell information sent on the physical layer channel comprises a physical layer identifier. For example, a physical layer channel may be modulated based on a cell identifier and/or a closed subscriber group identifier associated with the access point. Through the use of this cell information, an access point may be quickly identified for mobility and/or interference management operations. In addition, this cell information may be used for finger-printing operations.
摘要:
Access terminals are provisioned to conduct intra-frequency, inter-frequency, and inter-RAT measurements and report physical layer identifiers of detected cells. The provisioning may involve cycling through all or a portion of a defined superset of physical layer identifier one subset at a time. In addition, the physical layer identifiers may be prioritized to improve the search procedure. Measurement report messages (including physical layer identifiers of the detected cells) are received at an access point as a result of the provisioning. A neighbor cell list for the femtocell is maintained based on the received measurement report messages and, optionally, other information. This other information may related to, for example, one or more of: physical layer identifier information received from access terminals that register with the access point, physical layer identifier information received via network listen operations, information regarding co-located cells, or physical layer identifier information received from a network entity.
摘要:
Transmit power for an access point is controlled based on measurement reports received by the access point from one or more access terminals that are not currently being served by the access point. In some aspects, transmit power is controlled based on the number of received messages that correspond to a particular event. In some aspects, transmit power is controlled based on the contents of the received messages. For example, the access point may use signal strength information included in the messages to determine a level of transmit power that mitigates interference at a defined subset of reporting access terminals.
摘要:
Transmit power for an access point is controlled based on measurement reports received by the access point from one or more access terminals that are not currently being served by the access point. In some aspects, transmit power is controlled based on the number of received messages that correspond to a particular event. In some aspects, transmit power is controlled based on the contents of the received messages. For example, the access point may use signal strength information included in the messages to determine a level of transmit power that mitigates interference at a defined subset of reporting access terminals.
摘要:
Transmit power for an access point is controlled based on measurement reports received by the access point from one or more access terminals that are not currently being served by the access point. In some aspects, transmit power is controlled based on the number of received messages that correspond to a particular event. In some aspects, transmit power is controlled based on the contents of the received messages. For example, the access point may use signal strength information included in the messages to determine a level of transmit power that mitigates interference at a defined subset of reporting access terminals.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.