摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmissions by a first access point (e.g., a femto cell) are restricted upon detecting an access terminal in the vicinity of the first access point in the event the access terminal is communicating with a second access point (e.g., a macro cell). Upon detection of such an access terminal, the access terminal restricts transmission (e.g., beacon transmission) on a downlink carrier frequency on which the access terminal is actively receiving information from the second access point. This restriction of transmission by the access point may involve, for example, temporarily reducing transmit power, reducing the periodicity of transmission, or ceasing transmission.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
摘要:
Transmissions by a first access point (e.g., a femto cell) are restricted upon detecting an access terminal in the vicinity of the first access point in the event the access terminal is communicating with a second access point (e.g., a macro cell). Upon detection of such an access terminal, the access terminal restricts transmission (e.g., beacon transmission) on a downlink carrier frequency on which the access terminal is actively receiving information from the second access point. This restriction of transmission by the access point may involve, for example, temporarily reducing transmit power, reducing the periodicity of transmission, or ceasing transmission.
摘要:
A method for reducing frequent idle handoffs of a wireless communication device is described. A registration request is received by a base station or a femto access point from the wireless communication device. The number of registration requests received from the wireless communication device are counted while the registration timer is running. It is determined that frequent handoffs are happening when the number of registration requests received is greater than a registration threshold. A transmit power of a femto access point is adjusted if the number of registration requests received indicates that frequent handoffs are happening.
摘要:
A method for reducing frequent idle handoffs of a wireless communication device is described. A registration request is received by a base station or a femto access point from the wireless communication device. The number of registration requests received from the wireless communication device are counted while the registration timer is running. It is determined that frequent handoffs are happening when the number of registration requests received is greater than a registration threshold. A transmit power of a femto access point is adjusted if the number of registration requests received indicates that frequent handoffs are happening.
摘要:
A power calibration scheme adjusts power levels of network of femtocells based on macro signals seen at different points in and around a coverage area and based on the mutual positions of the femtocells (e.g., based on femtocell signals seen at these points). The power calibration scheme thus facilitates a good balance between providing a desired level of coverage and mitigation of interference to nearby macrocells and femtocells.
摘要:
An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal.