GB2591762A - Wireless telecommunications network - Google Patents

Wireless telecommunications network Download PDF

Info

Publication number
GB2591762A
GB2591762A GB2001529.3A GB202001529A GB2591762A GB 2591762 A GB2591762 A GB 2591762A GB 202001529 A GB202001529 A GB 202001529A GB 2591762 A GB2591762 A GB 2591762A
Authority
GB
United Kingdom
Prior art keywords
class
base station
field exposure
electro
telecommunications network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB2001529.3A
Other versions
GB2591762B (en
GB202001529D0 (en
Inventor
Mehran Farhad
Mackenzie Richard
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to GB2001529.3A priority Critical patent/GB2591762B/en
Publication of GB202001529D0 publication Critical patent/GB202001529D0/en
Priority to EP20820421.4A priority patent/EP4101075A1/en
Priority to US17/760,217 priority patent/US20230051491A1/en
Priority to PCT/EP2020/085463 priority patent/WO2021155980A1/en
Publication of GB2591762A publication Critical patent/GB2591762A/en
Application granted granted Critical
Publication of GB2591762B publication Critical patent/GB2591762B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/3833Hand-held transceivers
    • H04B1/3838Arrangements for reducing RF exposure to the user, e.g. by changing the shape of the transceiver while in use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/20Monitoring; Testing of receivers
    • H04B17/21Monitoring; Testing of receivers for calibration; for correcting measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • H04B17/3912Simulation models, e.g. distribution of spectral power density or received signal strength indicator [RSSI] for a given geographic region
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/30TPC using constraints in the total amount of available transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/30TPC using constraints in the total amount of available transmission power
    • H04W52/36TPC using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
    • H04W52/367Power values between minimum and maximum limits, e.g. dynamic range
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/38TPC being performed in particular situations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • H04W16/28Cell structures using beam steering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/242TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account path loss

Abstract

This invention provides a method of operating a network node in a wireless telecommunications network, wherein the wireless telecommunications network includes a first access 10 point having a transmitter configured to transmit in a first coverage area, the method comprising the steps of: receiving, from a sensor 30, data indicating a location of an object within the first coverage area of the transmitter; classifying the object in a first class or second class; determining an electromagnetic field exposure threshold for the object, wherein the field exposure threshold is dependent on the object’s classification in the first class or second class; determining that a value of th field exposure for the object exceeds an exposure threshold; and causing an adjustment of the first access point so as to reduce the value of field exposure for the object. The electromagnetic field exposure threshold could be time dependent. The first class could be an occupational worker, and the second class a member of he general public. The sensor may be a camera, and computer vision techniques used to locate the object. Alternatively an Internet of Things sensor may be used. Adjustments to the access point may involve beam power or angle adjustments.

Description

Field of the Invention
The present invention relates to a method of reconfiguring a wireless transmitter in a wireless telecommunications network.
Background
A wireless access point transmits wireless signals at a particular transmission power level. The transmission power levels are generally adapted to provide a suitable balance between, on the one hand, capacity and range, and on the other hand, causing interference on transmissions from other wireless access points. However, there is a further consideration, which generally applies to large wireless access points such as macro base stations, in that radio frequency exposure levels must be kept below regulatory standards in public areas. These exposure levels may exceed the regulatory standards in a region immediately surrounding the access point's antenna within which public access is excluded (known as an "exclusion zone"), and drop below the standard a particular distance away from the antenna as the signal strength decreases with distance. Network operators must monitor access to this exclusion zone to prevent access by members of the public and to ensure that maintenance staff (for example) do not receive an excessive dose. This is typically done by manual security controls, such as locked doors to rooftop base stations.
Summary of the Invention
According to a first aspect of the invention, there is provided a method of operating a network node in a wireless telecommunications network, wherein the wireless telecommunications network includes a first access point having a transmitter configured to transmit in a first coverage area, the method comprising the steps of receiving, from a sensor, data indicating a location of an object within the first coverage area of the first access point's transmitter; classifying the object in a first class or second class; determining an electro and/or magnetic field exposure threshold for the object, wherein the electro and/or magnetic field exposure threshold is dependent on the object's classification in the first class or second class; determining that a value of electro and/or magnetic field exposure for the object exceeds the electro and/or magnetic field exposure threshold; and causing an adjustment of the first access point so as to reduce the value of electro and/or magnetic field exposure for the object.
The electro and/or magnetic field exposure threshold may be time dependent. The electro and/or magnetic field exposure threshold may be time dependent when the object is in the first class.
The first class may be an occupational worker and the second class may be a member of the general public.
The sensor may be a camera and the method may further comprise a step of performing a computer vision operation on the data to determine the location of the object. The sensor may be is an Internet of Things, loT, sensor configured to detect the presence of an object within the first coverage area.
The object may be classified in the first class or second class based on a computer vision operation. The computer vision operation may include one or more of a group comprising: a facial recognition operation, and an optical character recognition operation.
The step of causing an adjustment of the first access point may include adjusting a transmit power of the first transmitter and/or adjusting a beam angle of the first transmitter.
According to a second aspect of the invention, there is provided a computer program comprising instructions which, when the program is executed by a computer, cause the computer to carry out the steps of the first aspect of the invention. The computer program may be stored on a computer readable carrier medium.
According to a third aspect of the invention, there is provided a network node for a wireless telecommunications network comprising a processor configured to carry out the steps of the first aspect of the invention.
According to a fourth aspect of the invention, there is provided a system for a wireless telecommunications network comprising one or more nodes configured to carry out the steps of the first aspect of the invention.
Brief Description of the Figures
In order that the present invention may be better understood, embodiments thereof will now be described, by way of example only, with reference to the accompanying drawings in which: Figure 1 is a schematic diagram of a wireless telecommunications network of an embodiment of the present invention; Figure 2 is a schematic diagram of a first base station of the network of Figure 1; Figure 3 is a schematic diagram of a beam management node of the network of Figure 1; Figure 4 is a flow diagram illustrating a calibration technique, used in a first and second embodiment of a method of the present invention; Figure 5 is a schematic diagram of a wireless telecommunications network implementing the first embodiment of a method of the present invention, in a first state; Figure 6 is a schematic diagram of a wireless telecommunications network implementing the first embodiment of a method of the present invention, in second state; Figure 7 is a schematic diagram of a wireless telecommunications network implementing the first embodiment of a method of the present invention, in a third state; Figures 8a and 8b show a flow diagram illustrating the first embodiment of a method of the present invention; Figure 9 is a schematic diagram of a wireless telecommunications network implementing the second embodiment of a method of the present invention; Figures 10a and 10b show a flow diagram illustrating the second embodiment of a method of the present invention; Figure 11 is a flow diagram of the first embodiment of the present invention; and Figure 12 is a flow diagram of the second embodiment of the present invention.
Detailed Description of Embodiments
A first embodiment of a wireless telecommunications network of the present invention will now be described with reference to Figures 1 to 3. In this embodiment, the wireless telecommunications network is a cellular telecommunications network 1 including a first base station 10, second base station 20 and a beam management node 50. The first and second base stations 10, 20 are both configured for communications according to a cellular telecommunications protocol, such as the 51h Generation (5G) protocol defined by the 3' Generation Partnership Project (3GPP), and transmit in one or more frequency ranges which, in this example, are below 6GHz. The first and second base stations 10, 20 include backhaul connections to a cellular core network (not shown).
As shown in Figure 1, the first and second base stations 10, 20 each include a plurality of transceivers that are configured for beamforming, so that distinct beams 12, 14, 22, 24 may be formed to provide voice and/or data service to users within the geographical areas defined by each beam. The first and second base stations 10, 20 may create, reconfigure and remove each beam of their respective sets of beams. One operating parameter of each transceiver of the plurality of transceivers for the first and second base station 10, 20 is the transmission power. Generally, increasing the transmission power of a transceiver increases both the capacity and the range of the transmissions. The signal strength of these transmissions decreases with distance from the transceiver (for example, by an inverse square law for propagation in free space or by some other function in a real-world example), and may therefore exceed a regulatory standard in a region immediately surrounding the transceiver (known as an "exclusion zone") and drop below the regulatory standard outside the exclusion zone. An exclusion zone for the first base station 10 (which may be based on a function of the transmission powers of one or more of its respective plurality of transceivers) and an exclusion zone for the second base station 20 (which, again, may be based on a function of the transmission powers of one or more of its respective plurality of transceivers) are shown in Figure 1 (by hatching).
Figure 1 further illustrates an optical camera 30. The optical camera 30 is configured to capture images or video (i.e. a sequence of images) in the visible spectrum (that is, electromagnetic radiation having wavelengths in the range of around 400 to 700 nanometres). The optical camera 30 is in a fixed location and is positioned so as to capture images or video of a geographical area that includes the first base station 10.
The first base station 10 is shown in more detail in Figure 2. The first base station includes a first communications interface 11 (connectable to an antenna), a second communications interface 12 (connectable to a core network via a backhaul connection), a processor 13 for processing wireless signals received/transmitted via the first and second communications interfaces, and memory 15, all connected via bus 17. The second base station 20 is substantially the same as the first base station 10.
The cellular telecommunications network 1 further includes a beam management node 50, residing in the core network and connected to both the first and second base stations 10, 20. As shown in more detail in Figure 3, the beam management node 50 includes a communications interface 51, a processor 53 and memory 55, all connected via bus 57.
Memory 55 includes a database of visual training data for a computer vision learning agent In this embodiment, memory 55 includes a database storing: 1. An identifier for a type of object (e.g. a person, car, cow, etc.); and 2. One or more training images of that type of object (e.g. including a number of variations of that type of object, such as different car models and images at different angles).
The database may be periodically updated with new images.
In this embodiment, the processor 53 of beam management node 50 implements a computer vision process by a learning agent 53a and an inference agent 53b. The learning agent 53a is configured to train a machine learning algorithm, in this case a classification model, based on the visual training data in the database. The classification model maps between each training image from the database and the corresponding identifier for that type of object. The trained classification model may then be used by the inference agent 53b.
The learning agent 53a performs periodic learning operations to update the classification algorithm, thus adapting to any new images of objects. The inference agent 53b uses the trained classification model in order to map between an input image (e.g. an image captured by the optical camera 30) and an object identifier. In response to certain classifications, the beam management node 50 may reconfigure beams of the first and/or second base station 10, 20 (as discussed below in the first and second embodiments of methods of the present invention).
Both the first and second embodiments utilise a dataset created by a calibration phase.
The calibration phase will now be described with reference to Figure 4. The calibration phase may be used to correlate one or more pixels of the image from the optical camera 30 with real-world positions. To achieve this, in a first step (S101), a maximum coverage area of the first base station 10 is determined based on the theoretical maximum distance of transmissions from the first base station 10. This may be estimated based on path loss models or coverage simulation tools (e.g. Forsk Atoll). In step S103, this maximum coverage area is divided into an array of unit cells having a predetermined area (e.g. 4 square metres). In step S105, a mobile device having a Global Navigation Satellite System (GNSS) module (such as the widely-used Global Positioning System, GPS) is positioned in a unit cell of this array of unit cells and a position measurement (i.e. GNSS coordinates) is captured and recorded in memory, together with a timestamp indicating the time the position measurement was captured. Step S105 is then repeated for each unit cell in the array of unit cells, resulting in a GNSS coordinate reading for each unit cell of the array of unit cells.
In step S107, which is performed in parallel (i.e. at the same time) to all iterations of step S105, a video is captured of the maximum coverage area (e.g. by the optical camera 30). Each constituent image of the video is recorded together with a timestamp indicating the time the image was captured.
In step S109, the beam management node 50 receives a first dataset from the mobile device, including the GNSS coordinates of each unit cell of the array of unit cells (together with a timestamp of the GNSS coordinate measurement), and a second dataset from the optical camera 30, including the video (together with a timestamp indicating the time each image in the video was captured). The beam management node 50 then creates a third dataset by processing each record in the first dataset as follows: 1) identify the timestamp associated with the GNSS coordinates for the unit cell 2) retrieve a record from the second dataset for an image having the same (or closest) timestamp; 3) identify the mobile device in the image and select a reference pixel representing the mobile device's position in the image. The reference pixel may be, for example, the lowermost, centre pixel of the mobile device in the image; and 4) create a new data record for the third dataset having a first data field for the GNSS coordinates and a second data field for the reference pixel.
Step 109 is repeated for each record (i.e. each unit cell) in the first dataset, so that the third dataset includes a record for each unit cell linking the GNSS coordinates for that unit cell to a reference pixel in an image captured by the optical camera 30.
The third dataset is stored in the beam management node's memory 55 and may be used in the following first and second embodiments of a method of the present invention.
The first embodiment will now be described with reference to Figures 5 to 8.
The cellular telecommunications network is initially in a first state as shown in Figure 5.
Figure 5 illustrates an object On this first embodiment, a car) positioned within the coverage area of the first base station 10 but outside the first base station's exclusion zone. The car is associated with a User Equipment (UE), such as an occupant's cellular/mobile phone, which is served by the first base station 10.
In a first step (step 201) of the first embodiment (as shown in the flow diagram of Figure 8), the optical camera 30 captures an image of the geographical area. In step 203, the optical camera 30 sends this data to the beam management node 50.
On receipt of this data, the beam management node 50 processes the image to detect each object in the image (step S205). Upon detection, the beam management node 50 determines the lowermost, centre pixel of the detected object, and performs a matching operation on the third dataset to identify the closest reference pixel to the lowermost, centre pixel of the detected object. The beam management node 50 then retrieves the GNSS coordinates for this closest reference pixel (step S207).
In step S209, the beam management node 50 determines the distance and angle between the base station and the detected object based on the retrieved GNSS coordinates and the first base station's GNSS coordinates. In step S211, the beam management node 50 determines the strength of the first base station's signal at the detected object based on the first base station's transmission power at the determined angle, the determined distance between the first base station and detected object, and a path loss model. The determined signal strength at the detected object's location is then compared to an exposure rate threshold. The exposure rate threshold represents the maximum instantaneous exposure rate to radio frequencies as defined by regulatory standards (e.g. 0.08W/kg for frequencies less than 6GHz or 20W/m2 for frequencies above 6GHz) and a reference mass (e.g. 60kg) or reference frontal surface area (e.g. 1m2).
In this first iteration, the signal strength is less than the exposure rate threshold and the operation loops back to step S201.
Figure 6 illustrates the cellular telecommunications network in a second state, in which the car is within the coverage area of the first base station and is also within the first base station's exclusion zone.
In a second iteration of this embodiment, steps S201 to S209 are performed again so as to capture an image of the geographical area, send the image data to the beam management node 50, process the image to detect each object in the image, retrieve GNSS coordinates for the closest reference pixel corresponding to the lowermost, centre pixel of the detected object in the image, and determine the distance and angle between the first base station and the object.
In step S211, the beam management node determines the strength of the first base station's signal at the detected object based on the first base station's transmission power at the determined angle, the determined distance between the first base station and the detected object, and a path loss model, and compares this to the exposure threshold. In this second iteration, the determined strength for the car is greater than the exposure threshold and the process continues to step S213.
In step S213, the beam management node 50 extracts a portion of the image corresponding to the detected object. The extracted image portion of the detected object is then inputted to the inference agent 53b, which uses its trained classification model to output an object type identifier (step S215) indicating that the extracted image portion includes a car.
In step S217, the beam management node determines the access rights for the identifier (based on a further preconfigured database associating each identifier with their access rights, stored in memory 55). In this embodiment, there are three possible access rights -excluded, differentiated restrictions, and no restrictions. In this second iteration of the first embodiment, the identifier is associated with the excluded access right. In step S219, the beam management node 50 responds to this determination by sending instruction messages to both the first and second base stations 10, 20 to reconfigure their beams.
The instruction message to the first base station will now be described. This first instruction message includes an instruction to the first base station 10 to reconfigure so that the signal strength of its transmissions at the location of the detected object are less than the exposure rate threshold, and further includes the determined distance and determined angle between the detected object and the first base station 10.
In step 3221, upon receipt of this first instruction message, the first base station 10 calculates a transmission power for one or more of its transceivers so that the signal strength at the location of the detected object is less than the exposure threshold at the determined distance and angle. This calculation is based on the exposure rate threshold, the distance between the first base station 10 and the detected object, and the path loss model.
In step 3223, the first base station 10 reconfigures its transceiver(s) to use the calculated transmission power(s). The signal strength of transmissions from the first base station 10 at the location of the excluded object are now less than the exposure rate threshold.
The second instruction message will now be described. This second instruction message is sent to the second base station 20 and includes an instruction to the second base station 20 to reconfigure so that its transmissions cover the location of the detected object so that the signal strength of its transmissions at the detected object's location is at a target value that is: 1) above a service threshold so that the UE associated with the car may receive voice and/or data services from the second base station, and 2) below the exposure rate threshold, and further includes the GNSS coordinates of the detected object.
In step 3220, the second base station 20 reacts to this second instruction message by calculating a transmission power for one or more of its transceivers so that its transmissions cover the detected object's location by 1) determining the distance and angle between the second base station and the detected object based on the GNSS coordinates of the detected object and the GNSS coordinates of the second base station 20, and 2) calculating the transmission power for the one or more transceivers based on the target signal strength value, the distance between the second base station and the detected object, and a path loss model. In step 3222, the second base station 20 reconfigures its transceiver(s) to use the calculated transmission power(s).
Figure 7 illustrates the cellular telecommunications network in a third state, in which the first and second base stations have reconfigured so that the signal strength of transmissions of the first base station 10 at the car's location are less than the exposure rate threshold, and so that the strength of the second base station's transmissions at the car's location are above the target signal strength value.
Following step S223, the signal strength from the first base station 10 as measured by the UE (associated with the car) is less than a threshold so as to trigger a handover. In response, the first base station 10 hands over the UE to the second base station 20. This is now possible as (following steps 3220 to 3222) transmissions from the second base station 20 now cover the car's location. This first embodiment therefore provides the benefit of handing over the UE to an alternative base station following reconfiguration of a serving base station when the UE enters the serving base station's exclusion zone, ensuring continuity of service. In an alternative scenario in which step S223 completes before step S222 is complete, then the UE may temporarily lose service before connecting to the second base station 20. Nonetheless, this first embodiment provides the benefit that this period of loss of service is minimised.
A second embodiment of a method of the present invention will now be described with reference to Figures 9 to 10. Figure 9 illustrates the cellular telecommunications network in a first state, in which a person is located within the first base station's coverage area and is also inside the first base station's exclusion zone. As shown in the flow diagram of Figures 10a and 10b, steps 3301 to 3311 (corresponding to steps 3201 to 3211 of the first embodiment above) are performed so as to capture an image of the geographical area, send the image data to the beam management node 50, process the image to detect each object in the image, retrieve GNSS coordinates for the closest reference pixel corresponding to the lowermost, centre pixel of the detected object, determine the distance and angle between the first base station and the detected object, and determine the strength of the first base station's signal at the detected object based on the first base station's transmission power at the determined angle and based on the determined distance between the first base station and detected object. In this second embodiment, the determined signal strength of transmissions at the detected object's location is greater than the exposure rate threshold and the process continues to step S313.
In step 3313, the beam management node extracts a portion of the image corresponding to the detected object. The extracted image portion of the detected object is then inputted to the inference agent 53b, which uses its trained classification model to output an identifier (step 3315) indicating that the extracted image portion includes a person. In step 3317, the beam management node determines the access rights for the identifier. In this embodiment, the identifier is associated with the differentiated restrictions access right, so the process continues to step 3318, in which it is determined whether the person is a member of the general public (and so should use a first restriction configuration) or an occupational worker (and so should use a second restriction configuration). This determination may be based on, for example, a facial recognition process to positively identify the person against a database of known workers, or alternatively on an optical character recognition process to identify a company name or logo on the person's clothing or a vehicle's bodywork. In this example, the first restriction configuration is to immediately reconfigure transmissions to below a first exposure rate threshold, whilst the second restriction configuration is to monitor the detected object over a period of time and determine whether its exposure satisfies a second exposure threshold.
An example of each restriction configuration will now be described. In a first example, the person is identified as a member of the general public and the first restriction configuration is used. In step 3319, the beam management node 50 sends a third instruction message to the first base station 10. This third instruction message includes an instruction to the first base station 10 to reconfigure so that the signal strength of its transmissions at the location of the detected object are less than the first exposure rate threshold, and further includes the determined distance and determined angle between the detected object and the first base station 10. In step 3321, upon receipt of this third instruction message, the first base station 10 calculates a transmission power for one or more of its transceivers so that the signal strength at the location of the detected object is less than the first exposure rate threshold at the determined distance and angle. This calculation is based on the first exposure rate threshold, the distance between the first base station 10 and the detected object, and the path loss model. In step 3323, the first base station 10 reconfigures its transceiver(s) to use the calculated transmission power(s). The signal strength of transmissions from the first base station 10 at the location of the excluded object are now less than the first exposure rate threshold.
In a second example, the person is positively identified as an occupational worker and the second restriction configuration is used. In step S325, the beam management node begins a monitoring operation on the detected object so as to monitor the detected object's movement. If the detected object has moved out of the exclusion zone, then the process ends. If the detected object is still within the exclusion zone, the beam management node 50 records a time value representing the total time the detected object has been within the exclusion zone. In step S327, the beam management node identifies a second exposure rate threshold (representing a maximum instantaneous exposure rate for the detected object) based on the current time value, selected from a plurality of exposure rate thresholds for a plurality of time ranges, e.g. Time in Exclusion Zone (min) Exposure Threshold (W/kg) 0 -2 1.2 2 -4 0.6 4 -6 OA In step S329, the beam management node 50 calculates the signal strength of transmissions from the first base station 10 at the detected object's current location, and compares this to the current second exposure rate threshold. If the signal strength is below the relevant threshold, then the process loops back to step S325 and the monitoring continues (and a new second exposure threshold may be selected if the time spent in the exclusion zone enters a new time range). If the signal strength is above the relevant threshold, then (in step S331), the beam management node sends a fourth instruction message to the first base station 10 instructing it to reconfigure so that the signal strength of its transmissions at the location of the detected object are less than the second exposure rate threshold (which may be carried out in the same manner as the first example above).
The second embodiment therefore provides a benefit of a differentiated response following detection of a person in the exclusion zone based on their classification as a worker or a member of the general public. As workers may be considered to understand the risks of radio frequency exposure, and take mitigating actions, then the signal strength does not need to be immediately reduced. This response may therefore maintain a larger coverage area outside the exclusion zone (compared to the coverage area if the signal strength was reduced down to the first exclusion rate threshold), so that any U Es within this coverage area may continue to receive voice and/or data services.
The skilled person will understand that there are other ways to implement a second restriction configuration by monitoring exposure over time. In a further example, the beam management node 50 determines a cumulative exposure for the detected object by monitoring the object's location over a period of time and integrating a series of instantaneous exposure rate measurements over the period of time. This may then be compared to a cumulative exposure threshold. This cumulative exposure may be stored in memory if the object leaves the exclusion zone, which may then be used as a starting value should the object be re-detected in the exclusion zone. In another example, the beam management node 50 determines the detected object's instantaneous exposure rate, determines a corresponding category for this instantaneous exposure rate (e.g. high/medium/low) to identify a time period threshold (representing the maximum time the detected object may spend in this category), and determine whether or not the detected object's elapsed time in the exclusion zone surpasses the time period threshold.
In another example, the beam management node 50 may be configured to both identify the person as an occupational worker (e.g. based on face recognition) and determine the work being performed. This work may be associated with a time period (e.g. 30 minutes), and the beam management node 50 may then reconfigure the first base station 10 so that the instantaneous exposure rate and/or cumulative exposure does not exceed a particular threshold over that time period.
In the second embodiment, the beam management node 50 detects the object as it enters the exclusion zone (i.e. following detection that the signal strength of transmissions from the first base station 10 go above the exposure threshold). To avoid situations in which the beam management node 50 only begins monitoring the object once it has already been in the exclusion zone for some time, then the beam management node 50 may optionally determine whether the detected object has just entered the exclusion zone. If this cannot be verified, then the process defaults to the first restriction configuration. This determination may be based on a threshold distance between the detected object's location and a calculated boundary of the exclusion zone.
The skilled person will understand that other differentiated responses may be used. For example, the first and second restriction configurations may be based on different exposure rate thresholds, so that the transmission power is reduced by a smaller amount for occupational workers than for members of the general public.
In the first embodiment, the second beam of the second base station is reconfigured so as to provide coverage and service to a UE associated with the detected object in the first base station's exclusion zone. In an enhancement, the second beam may be configured to also provide coverage and service to other UEs in the first base station's original coverage area (such as those outside the exclusion zone). This may be achieved by providing a single beam with suitable coverage, or multiple beams to provide suitable overall coverage.
Furthermore, in the above first and second embodiments, the signal strength at the location of the detected object is determined based on a path loss model. However, other methods may be used, such as by comparison of the location with a simulated coverage map.
In the above first and second embodiments, the first beam of the first base station is reconfigured so that the signal strength at the detected object's location is below the exposure rate threshold by reducing its transmission power. However, this is non-essential. In alternative implementations, the beam angle may be modified so that the signal strength at the detected objection's location is below the exposure rate threshold. Furthermore, in the first embodiment, it is non-essential that an existing beam is reconfigured so as to cover the detected object's location. Instead, a new beam may be configured to cover that location.
In the above first and second embodiments, the object identifier may be associated with the no restrictions access right. An example object that may use this access right is an unmanned vehicle. If an object is matched with an identifier having the no restrictions access right, then the process may end so that no action is taken.
The skilled person will also understand that it is non-essential that an optical camera and a computer vision process is used to detect the presence of an object in the exclusion zone. Alternatively, one or more connected sensors (i.e. Internet of Things (loT) sensors) may be used. For example, in a scenario of a rooftop antenna in which the whole rooftop area is an exclusion zone, a door sensor may be used to identify whether a person is entering or leaving the exclusion zone. The loT sensor(s) may be part of the base station, or may be connected with other systems in the geographical area. Furthermore, an access token system may be used to determine whether the person uses a first restriction configuration or a second restriction configuration. The loT sensor may therefore be a sensor for detecting a presence of an object (either through direct sensing or by implication) within the exclusion zone.
The skilled person will also understand that it is non-essential that the present invention is performed by a beam management node in the core network. The method may be performed by any node (or a group of cooperating nodes) anywhere in the network, with suitable communications interfaces for transmitting and receiving data. Furthermore, the implementation of the present invention in a cellular telecommunications network is just one example, and may instead be implemented in any form of wireless telecommunications network having a wireless access point, such as a wireless local area network, wireless wide area network, wireless ad hoc network, or wireless personal area network.
In the first embodiment, the exposure threshold may be based on the object type, so that a different threshold may be used depending on the type of object. The beam management node may therefore include a further database of thresholds for different object types. This database may be updateable. Furthermore, the reference mass/frontal surface area used above are merely examples, and different values may be used (which may also be dependent on the detected object type).
In the above embodiments, the object's location is based on a comparison of a reference pixel to the third dataset. This reference pixel may be any pixel for the object, but it is preferable that the same point of the object (e.g. lowermost-centre in the above embodiments) is used for both the generation of the third dataset and in the operational phase of the first and second embodiment.
A flowchart representing the first embodiment of the present invention is shown in Figure 11. In the first embodiment, data is received indicating a location of an object within a first coverage area of a first access point's transmitter. This data may be received from a camera (e.g. an optical camera) or another form of sensor, such as an loT sensor. The data is then analysed to determine that an EMF exposure value at the objects location is above an exposure threshold. These exposure thresholds may be based on the type of object (so that different thresholds may be used for different types of object). Following this determination, there is an adjustment of both the first access point so as to reduce the EMF exposure value for the object to below the exposure threshold and an adjustment of a second access point so that a coverage area of the second access point covers the object's location (and, optionally, to cover one or more other UEs within the first coverage area). In doing so, the second access point may provide coverage to a UE associated with the object, ensuring continuity of service.
A flowchart representing the second embodiment of the present invention is shown in Figure 12. In the second embodiment, data is received indicating a location of an object within a first coverage area of a first access point's transmitter. Again, this data may be received from a camera (e.g. an optical camera) or another form of sensor, such as an loT sensor. The object is then analysed to classify it in a first class or second class. An EMF exposure threshold is then determined for the object, which is dependent on the object's classification in the first class or second class. It is then determined that the EMF exposure threshold for the object exceeds an EMF exposure threshold, and there is an adjustment of the first access point so as to reduce the EMF exposure value for the object. In doing so, there may be different EMF exposure thresholds for different types of object (e.g. worker or general public) enabling a differentiated response. For example, the first and second classes of object may use different values of EMF exposure threshold, one EMF exposure threshold may be time dependent and the other EMF exposure threshold may not be time dependent, or both EMF exposure thresholds may be time dependent but with different time values.
The skilled person will understand that any combination of features is possible within the scope of the invention, as claimed.

Claims (13)

  1. CLAIMS1. A method of operating a network node in a wireless telecommunications network, wherein the wireless telecommunications network includes a first access point having a transmitter configured to transmit in a first coverage area, the method comprising the steps of: receiving, from a sensor, data indicating a location of an object within the first coverage area of the first access point's transmitter; classifying the object in a first class or second class; determining an electro and/or magnetic field exposure threshold for the object, wherein the electro and/or magnetic field exposure threshold is dependent on the object's classification in the first class or second class; determining that a value of electro and/or magnetic field exposure for the object exceeds the electro and/or magnetic field exposure threshold; and causing an adjustment of the first access point so as to reduce the value of electro and/or magnetic field exposure for the object.
  2. 2. A method as claimed in Claim 1, wherein the electro and/or magnetic field exposure threshold is time dependent.
  3. 3. A method as claimed in Claim 2, wherein the electro and/or magnetic field exposure threshold is time dependent when the object is in the first class.
  4. 4. A method as claimed in any one of the preceding claims, wherein the first class is an occupational worker and the second class is a member of the general public.
  5. 5. A method as claimed in any one of the preceding claims, wherein the sensor is a camera and the method further comprises a step of performing a computer vision operation on the data to determine the location of the object.
  6. 6. A method as claimed in any one of Claims 1 to 4, wherein the sensor is an Internet of Things, loT, sensor configured to detect the presence of an object within the first coverage area.
  7. 7. A method as claimed in any one of the preceding claims, wherein the object is classified in the first class or second class based on a computer vision operation.
  8. 8. A method as claimed in Claim 7, wherein the computer vision operation includes one or more of a group comprising: a facial recognition operation, and an optical character recognition operation.
  9. 9. A method as claimed in any one of the preceding claims, wherein the step of causing an adjustment of the first access point includes adjusting a transmit power of the first transmitter and/or adjusting a beam angle of the first transmitter.
  10. 10. A computer program comprising instructions which, when the program is executed by a computer, cause the computer to carry out the steps of any one of Claims 1 to 9.
  11. 11. A computer readable carrier medium comprising the computer program of Claim 10.
  12. 12. A network node for a wireless telecommunications network comprising a processor configured to carry out the steps of any one of Claims 1 to 9
  13. 13. A system for a wireless telecommunications network comprising one or more nodes configured to carry out the steps of any one of Claims 1 to 9.
GB2001529.3A 2020-02-05 2020-02-05 Wireless telecommunications network Active GB2591762B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
GB2001529.3A GB2591762B (en) 2020-02-05 2020-02-05 Wireless telecommunications network
EP20820421.4A EP4101075A1 (en) 2020-02-05 2020-12-10 Wireless telecommunications network
US17/760,217 US20230051491A1 (en) 2020-02-05 2020-12-10 Wireless telecommunications network
PCT/EP2020/085463 WO2021155980A1 (en) 2020-02-05 2020-12-10 Wireless telecommunications network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB2001529.3A GB2591762B (en) 2020-02-05 2020-02-05 Wireless telecommunications network

Publications (3)

Publication Number Publication Date
GB202001529D0 GB202001529D0 (en) 2020-03-18
GB2591762A true GB2591762A (en) 2021-08-11
GB2591762B GB2591762B (en) 2022-09-14

Family

ID=69800111

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2001529.3A Active GB2591762B (en) 2020-02-05 2020-02-05 Wireless telecommunications network

Country Status (1)

Country Link
GB (1) GB2591762B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4340472A1 (en) * 2022-09-16 2024-03-20 Deutsche Telekom AG Adaptive antenna system for a cellular network and method of operation

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2601372B (en) * 2020-11-30 2022-12-14 British Telecomm Wireless telecommunications network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2814292A1 (en) * 2013-06-13 2014-12-17 BlackBerry Limited Method and device for dynamic control of RF power emissions
US20180160377A1 (en) * 2016-12-07 2018-06-07 Qualcomm Incorporated Techniques for mitigating radio frequency exposure of objects proximate to a wireless device
WO2018134629A1 (en) * 2017-01-23 2018-07-26 Vodafone Ip Licensing Limited Antenna system
EP3518587A1 (en) * 2018-01-26 2019-07-31 Nokia Solutions and Networks Oy Regulating transmission powers from nodes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2814292A1 (en) * 2013-06-13 2014-12-17 BlackBerry Limited Method and device for dynamic control of RF power emissions
US20180160377A1 (en) * 2016-12-07 2018-06-07 Qualcomm Incorporated Techniques for mitigating radio frequency exposure of objects proximate to a wireless device
WO2018134629A1 (en) * 2017-01-23 2018-07-26 Vodafone Ip Licensing Limited Antenna system
EP3518587A1 (en) * 2018-01-26 2019-07-31 Nokia Solutions and Networks Oy Regulating transmission powers from nodes

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4340472A1 (en) * 2022-09-16 2024-03-20 Deutsche Telekom AG Adaptive antenna system for a cellular network and method of operation

Also Published As

Publication number Publication date
GB2591762B (en) 2022-09-14
GB202001529D0 (en) 2020-03-18

Similar Documents

Publication Publication Date Title
Atia et al. Dynamic online-calibrated radio maps for indoor positioning in wireless local area networks
Huang et al. Deployment of heterogeneous UAV base stations for optimal quality of coverage
EP2050286A2 (en) System and method to facilitate handover
EP3518587B1 (en) Regulating transmission powers from nodes
US20120208587A1 (en) Method and apparatus for evaluating cross-cell coverage
US20210120521A1 (en) Systems and methods for efficient drone detection
GB2591762A (en) Wireless telecommunications network
González et al. Energy-efficient indoor localization WiFi-fingerprint system: An experimental study
US20210076229A1 (en) Executing analysis and management of a mobile communication network based on performance information, configuration information and environmental information
Ryden et al. Rogue drone detection: A machine learning approach
Qureshi et al. Enhanced MDT-based performance estimation for AI driven optimization in future cellular networks
US11039388B2 (en) Cellular telecommunications network
Wang et al. Mobile device localization in 5G wireless networks
US20230051491A1 (en) Wireless telecommunications network
Schloemann et al. Localization performance in cellular networks
López et al. Measurement-Based Outage Probability Estimation for Mission-Critical Services
US11956053B2 (en) Wireless telecommunications network
US11812320B2 (en) Initiation of transfer of user equipment to base station according to visual data
Cao et al. Spectrum awareness scheme of the rapidly deployable eNodeB for unexpected and temporary events
GB2609911A (en) Wireless telecommunications network
GB2601892A (en) Wireless telecommunications network
Eedara Classification of wireless device location based on Wi-Fi metadata
Gloss et al. Calibrating radio propagation models based on smartphone measurements for geo-aware cellular network self-optimization
GB2588989A (en) Cellular telecommunications network
Silva et al. Analysis and prediction of path loss in UAVBS air-to-ground communication using neural networks