WO2008037211A1 - Procédé et station de base servant à la distribution d'une ressource sans fil - Google Patents

Procédé et station de base servant à la distribution d'une ressource sans fil Download PDF

Info

Publication number
WO2008037211A1
WO2008037211A1 PCT/CN2007/070761 CN2007070761W WO2008037211A1 WO 2008037211 A1 WO2008037211 A1 WO 2008037211A1 CN 2007070761 W CN2007070761 W CN 2007070761W WO 2008037211 A1 WO2008037211 A1 WO 2008037211A1
Authority
WO
WIPO (PCT)
Prior art keywords
interference
neighbor
uplink
downlink
victim
Prior art date
Application number
PCT/CN2007/070761
Other languages
English (en)
Chinese (zh)
Inventor
Shulan Feng
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2008037211A1 publication Critical patent/WO2008037211A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/541Allocation or scheduling criteria for wireless resources based on quality criteria using the level of interference

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a method and a base station for performing radio resource allocation. Background of the invention
  • the base station (BS) and its associated terminal (SS) form the system.
  • the interference value of the SS is higher than the set threshold, or when the interference value of at least one SS of the at least one system to the BS of the other system is higher than the set threshold in the two systems, the two systems are said to constitute a neighbor. relationship.
  • Neighbor system Another system that has a neighbor relationship with a system is called the neighbor system of the system.
  • Neighbor BS If one system is a neighbor with another system, the two BSs in the two systems are each other's neighbor BSs.
  • Interference Neighbor A system's Interference Neighbor is defined as all other systems that interfere with or interfere with the system.
  • Interference victim system When a BS and/or SS in a system is interfered by neighbors of the system and the interference value is above a set threshold, the system is called an interference victim system.
  • the interference victim system may be the interference source system of its neighbors at the same time, or just the interference victim system of the neighbor system.
  • Interference source system When the interference value of the BS and/or SS in a system to the neighbor of the system is greater than the set threshold, the system is called the interference source system.
  • the interference source system may be The neighbor's interference victim system, or just the neighbor's interference source system.
  • the wireless spectrum is divided into a licensed frequency band and an unlicensed frequency band.
  • the licensed frequency band is a wireless transmission frequency band specially developed for a certain wireless communication service. Other wireless communication services cannot be transmitted in the frequency band, and the licensed frequency band is usually fixedly allocated to an operator, the operator.
  • the frequency bands used by each node in the system can be optimized to reduce mutual interference between nodes; the unlicensed frequency band is not fixedly allocated to an operator, and all the wireless communication services that meet certain requirements can use the frequency band. Since the frequency points adopted by the wireless communication service nodes are not fixed, and no operator optimizes the unlicensed frequency bands, the wireless communication services transmitted on the unlicensed frequency bands may interfere with each other.
  • IEEE 802.16h has developed a method for evading interference by time sharing channels.
  • Each uplink medium access control (MAC) frame and downlink MAC frame of a system according to the number N of neighbor systems of the system, The information is divided into N+1 subframes, where one subframe is used for transmitting interference-free services, and the remaining N subframes are used for time-division transmission of interference services by neighboring systems.
  • MAC medium access control
  • Figure 1 is a schematic diagram of the interference relationship between two mutually interfering systems.
  • BS0 and BS1 are neighbor BSs, and BS0 and SS0 and SS3 belong to the same system.
  • BS1 and SS1 and SS2 belong to the same system, because BS0
  • the transmission channel between SS3 and SS3 the transmission channel between BS1 and SS2 is the same channel, so BS0 will cause interference to SS2, and BS1 will interfere with SS3.
  • FIG. 2 is an interference avoidance method for a time-sharing shared channel by taking BS0 and BS1 in FIG. 1 as an example.
  • a schematic diagram illustrating the method, as shown in FIG. 2, divides a downlink MAC frame into three subframes, and the first subframe is used to transmit a non-interference service.
  • BS0 sends a service to SS0 through the subframe, and BS1 can pass The subframe sends a service to SS1, and the second subframe is used for transmitting the interfered service by BS0.
  • BS0 sends a service to SS3 through the subframe, and BS1 does not use the subframe, and the third subframe is used for BS1 to transmit the interfered service.
  • BS1 sends a service to SS2 through the subframe, and BS0 does not use the subframe.
  • the use of the uplink MAC frame is the same as the downlink MAC frame.
  • the shortcoming of the interference avoidance method is: performing the neighbor system detection on the BS only when the BS is initially accessed, and performing channel allocation according to the determined neighbor system.
  • the neighbor relationship is no longer changed, that is, only the access of the BS will cause the neighbor relationship of the BS to change.
  • the neighbor relationship of the BS changes due to the shutdown of the SS associated with the BS.
  • SS2 and SS3 are closed, Then, the neighbor relationship between BS0 and BS1 is released, and it is not necessary to perform time division of the shared channels of BS0 and BS1 at this time.
  • the prior art does not take this aspect into account, and it is clear that this will greatly reduce the utilization of channel resources.
  • a method for performing radio resource allocation including:
  • the BS detects that the interference state of its own system has changed, and re-allocates the radio resources according to the changed interference state.
  • the interference state detecting module is configured to record and update the interference state of the system, and if the interference state of the system is changed during the operation of the BS, the changed interference state is sent.
  • the radio resource allocation module is configured to perform radio resource allocation according to the changed interference state information sent by the interference state detecting module.
  • the embodiment of the present invention performs the radio resource allocation according to the changed interference state when the interference state of the system is changed during the operation of the BS, so that the BS can perform interference according to the system.
  • the state change is adjusted in real time to adjust the radio resource allocation, which improves the utilization of radio resources.
  • Figure 1 is a schematic diagram of interference relationships of systems that interfere with each other
  • FIG. 2 is a schematic diagram of an existing interference avoidance scheme
  • FIG. 4 is a flowchart of adding and releasing a downlink interference source neighbor system according to Embodiment 1 of the present invention to cause downlink channel re-allocation;
  • FIG. 6 is a flowchart of adding and releasing an uplink interference source neighbor system to cause uplink channel reallocation according to Embodiment 3 of the present invention
  • FIG. 7 is a flowchart of an increase and release of an uplink interference victim neighbor system according to Embodiment 4 of the present invention, causing an uplink channel to be re-allocated;
  • Embodiment 10 is a simultaneous release of a downlink and uplink interference victim neighbor system according to Embodiment 7 of the present invention. Flowchart of downlink and uplink channel redistribution caused by the release;
  • FIG. 11 is a flowchart of uplink and downlink channel re-allocation caused by simultaneous release of uplink and downlink interference victim neighbor systems according to Embodiment 8 of the present invention.
  • FIG. 12 is a schematic diagram of a composition of a BS for performing channel allocation according to Embodiment 1 of the present invention
  • FIG. 13 is a schematic diagram of a composition of a BS for performing radio resource allocation according to Embodiment 2 of the present invention. Mode for carrying out the invention
  • the radio resource refers to resources such as channel, frequency, time, coding mode, and power.
  • resources such as channel, frequency, time, coding mode, and power.
  • FIG. 3 is a flow chart of performing channel allocation according to the present invention. As shown in FIG. 3, the specific steps are as follows:
  • Step 301 The BS initially accesses the network, detects the interference source neighbor system and the interference victim neighbor system of the own system, and performs allocation of the shared uplink and downlink channels according to the detected interference neighbor system to obtain the interference-free shared uplink and downlink channels. .
  • Step 302 During the operation, the BS detects that the new system adds a new interference source or interferes with the neighboring system, and then re-allocates the shared channel according to the current neighbor to obtain a shared uplink and downlink channel without interference.
  • Step 303 During the operation, the BS detects that the interference source of the own system or the interference victim is released, and then re-allocates the shared channel according to the current neighbor to obtain the shared uplink and downlink channels.
  • the increase and release of the system's interference source neighbor system, and the increase and release of the interference neighbor system will cause the system to change the number of neighbor systems, thereby causing the BS of the system to re-allocate the shared channel.
  • a system's interference neighbor system changes can also be called the system's interference status. Change.
  • the following is the increase of the downlink interference source neighbor system, the redistribution of the downlink channel caused by the release, the increase of the downlink interference victim system, the redistribution of the downlink channel caused by the release, the increase of the uplink interference source neighbor system, and the uplink caused by the release.
  • Embodiments of channel redistribution, and uplink interference, redistribution of uplink channel caused by increase of uplink interference, and uplink and uplink channel reallocation caused by simultaneous release of downlink interference source and uplink interference source neighbor system Embodiments of downlink and uplink channel reallocation caused by simultaneous release of downlink interference sacrificing and uplink interference at the same time.
  • FIG. 4 is a flowchart of adding and releasing a downlink interference source neighbor system according to Embodiment 1 of the present invention, and causing downlink channel reallocation, as shown in FIG. 4, the specific steps are as follows:
  • Step 401 The BS initially accesses the network, detects a downlink interference source neighbor system and a downlink interference victim neighbor system of the system, and establishes a downlink interference source list and a downlink interference victim list.
  • the formats of the downlink interference source list and the downlink interference victim list are as shown in Table 1 and Table 2, respectively.
  • DL Interference Neighboring indicates whether there is a downlink interferer neighbor system, a value of 1 indicates presence, and a value of 0 indicates that it does not exist.
  • Interference BSID downlink interference source neighbor BS identifier
  • the downlink interference source list includes: whether there is a downlink interference source neighbor system indication; the total number of downlink interference source neighbor systems; the downlink interference source neighbor BS identifier, the downlink interference source neighbor BS IP address, and the downlink interference source neighbor The number of SSs of the system that the system interferes with, and the SS identifier of the system that is interfered by the neighboring system of the downlink interferer.
  • a total number of downlink interference source neighbor systems, and the number of SSs of the system interfered by the downlink interference source neighbor system are optional parameters, and the initial value of the three parameters may be set to 0.
  • the SS cylinder of the system interfered by the downlink interference source neighbor system is referred to as the downlink victim SS
  • the number of SSs of the system interfered by the downlink interference source neighbor system is referred to as the number of downlink interfered SS.
  • the SS identification cylinder of the system in which the downlink interference source neighbor system interferes is referred to as a downlink interfered SS identifier.
  • DL Victim Neighboring indicates whether there is a downlink interference victim neighbor system, a value of 1 indicates presence, a value of 0 indicates no presence
  • the downlink interference victim list includes: whether there is a downlink interference victim neighbor system indication; a downlink interference victim neighbor system total; a downlink interference victim neighbor BS identifier, a downlink interference victim neighbor BS IP address, the downlink interference victim neighbor system The number of SSs interfered by the system, and the downlink interference sacrifices the SS identifier of the neighbor system that is interfered by the system.
  • the presence or absence of the downlink interference victim neighbor system indication, the total number of downlink interference victim neighbor systems, and the number of SSs in the downlink interference victim system that are interfered by the system are optional parameters, and the initial value of the three parameters may be set to zero.
  • the SS buffer in the downlink interference victim neighbor system is called the downlink interference sacrificial SS
  • the downlink interference sacrifices the number of SSs interfered by the system in the neighbor system, which is called the number of downlink interference sacrificial SS
  • downlink interference The SS identification cylinder that is victimized by the system in the neighboring system is called the downlink interference sacrificial SS identifier.
  • the neighbor BS When the BS accesses, if the SS associated with the neighbor BS receives the downlink signal sent by the BS, the neighbor BS sends an updated downlink interference victim request that carries the neighbor BS identifier and the SS identifier associated with the neighbor BS to the BS.
  • the message after receiving the message, the BS adds the neighbor BS identifier to the downlink interference victim neighbor BS identifier list, and associates the neighbor BS.
  • the SS identifier is added to the downlink interference victim SS identification list.
  • Step 402 During the operation of the BS, the SS associated with the BS detects the downlink signal sent by the neighbor BS, and sends an update downlink interference source request message to the BS, where the message carries the neighbor BS identifier, the IP address of the neighbor BS, and the SS. Logo, etc.
  • Step 403 After receiving the update downlink interference source request message sent by the SS associated with the SS, the BS determines whether the downlink interference source list includes the neighbor BS identifier carried in the message, and if yes, step 404 is performed; otherwise, the step is performed. 407.
  • the BS may determine whether the downlink interference source list in the downlink interference source list contains the neighbor BS identifier carried in the message, and perform the subsequent steps according to the determination result; Determining a timing duration, the number of times the message is requested each time, if the number of updated downlink interference source request messages sent by a specific SS for a specific neighbor BS is greater than the preset number of times Then, it is determined whether the specific neighbor BS identifier is included in the downlink interference source list, and the subsequent steps are performed according to the judgment result.
  • Step 404 The BS determines whether the SS identifier of the downlink interfered SS identifier corresponding to the neighbor BS identifier in the downlink interference source list includes the SS identifier carried in the message. If yes, go to step 411; otherwise, go to step 405.
  • Step 405 The BS adds the SS identifier carried in the message to the downlink interfered SS identifier list corresponding to the neighbor BS identifier in the downlink interference source list, and adds the number of the downlink interfered SS corresponding to the neighbor BS identifier to one. .
  • Step 406 The BS transmits the service to the SS on its downlink interference time-sharing channel in the downlink shared channel, and the process goes to step 411.
  • the time-sharing channel for transmitting traffic to the SS without any interference is called a downlink non-interference time-sharing channel, and the time-sharing channel for each downlink-to-interfering SS transmission service of each BS is used. They are respectively referred to as downlink interference time-sharing channels of each BS.
  • Step 408 The BS determines whether the neighbor BS identifier is included in the downlink interference victim list. If yes, go to step 409; otherwise, go to step 410.
  • Step 409 The BS transmits the service to the SS on its own downlink interference time-sharing channel of the downlink shared channel, and the process goes to step 411.
  • Step 410 The BS determines that it adds a new downlink interference neighbor system, performs channel allocation negotiation with each downlink downlink interference neighbor system, and performs channel allocation and service transmission according to the negotiated channel allocation policy.
  • the downlink interference neighbor system includes: a downlink interference source neighbor system and a downlink interference victim neighbor system. If system B is both the downlink interference source neighbor system of system A and the downlink interference victim neighbor system, system A calculates the total number of downlink interference neighbor systems. System B is calculated as a downlink interference neighbor system.
  • Step 411 The BS detects that the downlink interference of the downlink interference source neighbor BS identifier corresponding to the SS in the downlink interference source list is not received by a downlink interfered SS in the downlink interference source list in the predetermined duration. Deleting the interference relationship of the SS, and deleting the SS identifier from the downlink interfered SS identifier list corresponding to the downlink interference source neighbor BS identifier in the downlink interference source list, and deleting the downlink interference source neighbor BS The number of downlink interfered SS corresponding to the identifier is decremented by one.
  • the channel allocation of the downlink interfered SS is updated.
  • the BS may also set a timing duration, and after each timing start, detect the number of times that each downlink interfered SS in the received downlink interference source list carries the downlink interference source column, if at this time If the number of times is less than the preset number of times, the SS identifier is deleted from the downlink interfered SS identifier list corresponding to the downlink interference source neighbor BS identifier in the downlink interference source list, and the downlink interference source neighbor BS identifier is correspondingly deleted. The number of downlink interfered SSs is reduced by 1.
  • the BS detects that the downlink interfered SS is shut down, for example, when receiving the message indicating that the downlink is received by the downlink interfered SS, the interference relationship of the SS may also be determined to be released.
  • the BS detects that the downlink interfered SS leaves the interference region, for example, when receiving the handover message sent by the downlink interfered SS indicating that the interference region is left, the interference relationship of the SS may also be determined to be released.
  • Step 412 The BS determines whether the number of downlink interfered SSs corresponding to the downlink interference source neighbor BS identifier is 0. If yes, go to step 413; otherwise, the processing ends.
  • the step may also be: the BS determines whether the downlink interfered SS identifier list corresponding to the downlink interference source neighbor BS identifier is empty, and if yes, performs step 413; otherwise, the process ends without processing.
  • Step 413 The BS deletes related information of the downlink interference source neighbor BS in the downlink interference source list, including: the downlink interference source neighbor BS identifier, the IP address of the downlink interference source neighbor BS, and the downlink interference of the downlink interference source neighbor BS Number of interfering SS: 0.
  • the total number of neighboring systems in the source interferes with each other, and after performing this step, if the downlink interference source list does not contain any downlink interference source neighbor BS identifiers, set the indication value to 0, and set the total value to 0;
  • the downlink interference source list further includes the downlink interference source neighbor BS identifier, and the total value is decremented by one.
  • Step 414 The BS determines whether its downlink interference source list and downlink interference victim list are 415; otherwise, step 416 is performed.
  • Step 415 The BS re-allocates the downlink channel, and the process ends.
  • Step 416 The BS determines whether the downlink interference source neighbor BS identifier is included in the downlink interference victim list. If yes, the process ends; otherwise, step 417 is performed.
  • Step 417 The BS determines that the downlink interference neighbor system of the own system is released, and performs downlink shared channel allocation according to the current total number of downlink interference neighbor systems, and performs service transmission according to the allocated channel.
  • steps 402-410 and steps 411-417 have no precedence.
  • steps 414 ⁇ 417 can also be replaced by the following steps:
  • Step 414 The BS determines whether the downlink interference source neighbor BS identifier is included in the downlink interference victim list. If yes, go to step 415; otherwise, go to step 416.
  • Step 415 The BS re-allocates the downlink channel, and the process ends.
  • Step 416 The BS determines whether the neighbor BS identifier is included in the uplink interference source list. If yes, go to step 418; otherwise, go to step 417.
  • Step 417 The BS determines whether the neighbor BS identifier is included in the uplink interference victim list. If yes, go to step 418; otherwise, go to step 419.
  • Step 418 The BS determines that the downlink interference neighbor system of the own system is released, and performs downlink shared channel allocation according to the current total number of downlink interference neighbor systems, and performs service transmission according to the allocated channel, and the process ends.
  • Step 419 The BS determines that the interference neighbor system of the own system is released, re-shares the shared channel according to the current total number of interference neighbor systems, and performs service transmission according to the allocated channel.
  • the BS may also send interference to the released interference neighbor system.
  • the neighbor delete command notifies the interference relationship to be released.
  • FIG. 5 is a flowchart of the downlink channel re-allocation caused by the increase and release of the downlink interference victim neighbor system according to the second embodiment of the present invention. As shown in FIG. 5, the specific steps are as follows: Step 501: The BS initially accesses the network, and detects The downlink interference source neighbor system and the downlink interference of the own system sacrifice the neighbor system, and establish a downlink interference source list and a downlink interference victim list.
  • the list of downlink interference sources established in this step is shown in Table 1.
  • the established downlink interference sacrifice list is shown in Table 2.
  • Step 502 The SS associated with the neighbor BS detects the downlink signal sent by the BS, and sends a new interference source message to the neighbor BS, where the message carries the identifier of the BS, the IP address of the BS, and the SS logo and so on.
  • Step 503 After receiving the new downlink interference source message sent by the SS, the neighbor BS sends an update downlink interference victim request message to the BS, where the message carries the neighbor BS identifier, the IP address of the neighbor BS, and the neighbor BS. SS logo.
  • the neighbor BS may not immediately send the update downlink interference victim request message to the BS, but only use the BS identifier as its own downlink interference source neighbor BS.
  • the identifier is saved.
  • the preset downlink interference interference time of the BS arrives, the updated downlink interference victim request message is sent to the BS, and the indication information that the updated downlink interference victim request message has been sent to the BS is recorded.
  • Step 504 After receiving the update downlink interference victim request message, the BS determines whether the downlink interference victim list includes the neighbor BS identifier carried in the message. If yes, go to step 505; otherwise, go to step 507.
  • the BS may determine whether the downlink downlink interference victim list includes the neighbor BS identifier carried in the message, and perform the subsequent step according to the determination result, and may perform the preset step.
  • Set a time duration in each After the start of the secondary timing, the number of times of updating the downlink interference victim request message sent by each neighboring BS for each SS identifier is recorded, if a certain specific neighbor BS receives a specific SS identifier sent by the specific neighbor BS within the time duration. If the number of times of updating the downlink interference request message is greater than the preset number of times, it is determined whether the specific downlink BS identifier is included in the downlink interference victim list of the body, and the subsequent step is performed according to the determination result.
  • Step 505 The BS determines whether the SS identifier of the downlink interference sacrificial SS identifier list corresponding to the neighbor BS identifier in the downlink interference victim list includes the SS identifier carried in the message. If yes, go to step 510; otherwise, go to step 506.
  • Step 506 The BS adds the SS identifier carried in the message to the downlink interference victim SS identifier list corresponding to the neighbor BS identifier in the downlink downlink victim victim list, and simultaneously corresponds to the neighbor BS identifier in the downlink downlink interference victim list.
  • the number of downlink interference sacrificial SS is increased by 1, and the process proceeds to step 510.
  • Step 507 The BS adds the correspondence between the neighbor BS identifier, the neighbor BS's IP address, the SS identifier, and the downlink interference victim SS number: 1 to the downlink interference victim list. If the indication value is 0 before this step, the indication value is set to 1 in this step. If the downlink interference victim list includes the total number of downlink interference victim neighbor systems, in this step, the total value is incremented by 1.
  • Step 508 The BS determines whether the neighbor BS identifier is included in the downlink interference source list. If yes, go to step 510; otherwise, go to step 509.
  • Step 509 The BS determines that the new downlink interference neighbor system is added, performs downlink channel allocation negotiation with the current downlink downlink neighbor system, and performs channel allocation and service transmission according to the negotiated channel allocation policy.
  • Step 510 The BS detects that the downlink interference is not received within the predetermined duration.
  • the downlink downlink interference is sent by the neighboring BS, and the updated downlink interference victim request message carrying the downlink interference victim SS identifier corresponding to the downlink interference victim neighbor BS determines that the interference relationship of the downlink interference victim SS is released, and the SS identifier is determined.
  • the downlink interference victim SS identifier list corresponding to the neighbor BS identifier in the downlink interference victim list is deleted, and the number of downlink interference victim SS corresponding to the neighbor BS identifier is decreased by 1.
  • the channel allocation of the downlink interference victim SS is updated.
  • the BS can also set a timing duration to detect the received self after each timing start.
  • the number of times of the downlink interference victim request message is updated. If the number of the downlink interference request message is less than the preset number of times, the SS identifier is deleted from the downlink interference victim SS identifier list corresponding to the neighbor BS identifier in the downlink interference victim list. At the same time, the number of downlink interference sacrificial SS corresponding to the neighbor BS identifier is decreased by one.
  • the BS detects downlink interference and sacrifices SS shutdown, for example: downlink interference sacrifices neighbors
  • the BS When the BS sends a message indicating that the downlink interference sacrifices the SS shutdown, it is determined that the SS interference relationship is released.
  • the BS detects that the downlink interference victim SS leaves the interference region, for example: Downlink interference
  • the victim neighbor BS sends a message indicating that the downlink interference victim SS leaves the interference region, and determines that the interference relationship of the SS is released.
  • Step 511 The BS determines whether the number of the downlink interference victim SS corresponding to the downlink interference victim neighbor BS identifier is 0. If yes, go to step 512; otherwise, if no processing is performed, the process ends.
  • the step may also be: the BS determines whether the downlink interference victim BS identifier list corresponding to the downlink interference victim neighbor BS identifier is empty, and if yes, executing step 512; otherwise, no processing is performed. This process ends.
  • Step 512 The BS deletes the related information of the downlink interference victim neighbor BS in the downlink downlink interference victim list, and includes: the neighbor BS identifier, the IP address of the neighbor BS, and the downlink interference victim SS number corresponding to the neighbor BS identifier: 0. And the downlink interference sacrifices the total number of neighbor systems, and after performing this step, the downlink interference victim list does not include any downlink interference victim neighbor BS identifier, then the indication value is set to 0, and the total value is set to 0; After the step, the downlink interference victim list further includes a downlink interference victim neighbor BS identifier, and the total value is decremented by one.
  • Step 513 The BS determines whether the downlink interference victim list includes the downlink interference victim neighbor BS identifier. If yes, the process ends; otherwise, step 514 is performed.
  • Step 514 The BS determines whether its downlink interference victim list and the downlink interference source list are 515; otherwise, step 516 is performed.
  • Step 515 The BS re-allocates the downlink channel, and the process ends.
  • Step 516 The BS determines that the downlink interference neighbor system of the own system is released, and performs the downlink shared channel allocation according to the current total number of downlink interference neighbor systems, and performs service transmission according to the allocated channel.
  • steps 502-509 and steps 510-516 are not sequential.
  • steps 513 ⁇ 516 can be replaced by the following steps:
  • Step 513 The BS determines whether the downlink interference victim neighbor BS identifier is included in the downlink interference source list. If yes, go to step 514; otherwise, go to step 515.
  • Step 514 The BS re-allocates the downlink channel, and the process ends.
  • Step 515 The BS determines whether the neighbor BS identifier is included in the uplink interference source list, and if yes, step 517 is performed; otherwise, step 516 is performed.
  • Step 516 The BS determines whether the neighbor BS identifier is included in the uplink interference victim list, and if yes, step 517 is performed; otherwise, step 518 is performed.
  • Step 517 The BS determines that the downlink interference neighbor system of the own system is released, and performs the downlink shared channel allocation according to the current total number of downlink interference neighbor systems, and performs service transmission according to the allocated channel, and the process ends.
  • Step 518 The BS determines that the interference neighbor system of the own system is released, re-shares the shared channel according to the current total number of interference neighbor systems, and performs service transmission according to the allocated channel.
  • the BS may further send an interference neighbor deletion command to the released interference neighbor system to notify the interference relationship to be released.
  • Step 601 The BS initially accesses the network, and detects The uplink interference source neighbor system of the own system and the uplink interference sacrifice the neighbor system, and establish an uplink interference source list and an uplink interference sacrifice list.
  • the formats of the uplink interference source list and the uplink interference victim list are as shown in Table 3 and Table 4, respectively.
  • UL Interference Neighboring indicates whether there is an upstream interferer neighbor system. A value of 1 indicates presence and a value of 0 indicates no presence.
  • the uplink interference source list includes: whether there is an indication of the uplink interference source neighbor system; the total number of uplink interference source neighbor systems; the uplink interference source neighbor BS identifier, the IP address of the uplink interference source neighbor BS, and the uplink interference of the interference system The number of SSs in the source neighbor system and the list of identifiers of the SSs in the neighbor system of the uplink interference source that interfere with the system.
  • the initial value of the three parameters can be set to 0.
  • the SS cylinder in the neighbor system of the uplink interference source that interferes with the system is called the uplink interference SS
  • the number of SSs in the neighbor system of the uplink interference source that interferes with the system is called the number of uplink interference SS, and the system is interfered with.
  • the identification cylinder of the SS in the neighboring system of the uplink interference source is called the identifier of the uplink interference SS.
  • UL Victim Neighboring indicates whether there is an upstream interference victim neighbor system, a value of 1 indicates presence, a value of 0 indicates no presence
  • Neighbors m Number of UL Victim uplink interference, the total number of neighbor systems, Neighbors m means
  • the uplink interference victim list includes: whether there is an uplink interference victim neighbor system indication; the uplink interference victim neighbor system total; the uplink interference victim neighbor BS identifier, the uplink interference victim neighbor BS IP address, the interference uplink interference victim neighbor The number of SSs in the system of the system, the list of identifiers of the SSs in the system that interfere with the uplink interference and the neighbor system.
  • the initial value of the three parameters may be set to zero.
  • the SS cartridge in the system that interferes with the uplink interference victim neighbor system is called the uplink victim interference SS
  • the number of SSs in the system that interferes with the uplink interference victim neighbor system is called the number of uplink victim interference SS.
  • the identification cylinder of the SS in the system that interferes with the uplink interference and the neighboring system is called the identifier of the uplink victim interference SS.
  • the neighbor BS When the BS accesses, if the neighbor BS receives the uplink signal sent by the SS associated with the BS, the neighbor BS sends the neighbor BS identifier and the SS associated with the BS to the BS.
  • the updated uplink interference victim request message is sent, and after receiving the message, the BS adds the neighbor BS identifier to the uplink interference victim list, and adds the SS identifier associated with itself to the uplink victim interference SS identifier list.
  • Step 602 The BS receives the uplink signal sent by the SS associated with the neighbor BS, and the signal carries the neighbor BS identifier, the IP address of the neighbor BS, and the SS identifier associated with the neighbor BS.
  • Step 603 The BS determines whether the neighbor interference BS identifier carried in the message is included in the uplink interference source list, and if yes, step 604 is performed; otherwise, step 606 is performed.
  • the BS may determine, if it receives the uplink signal sent by the SS associated with the neighbor BS, whether the neighboring BS identifier carried in the message is included in the uplink interference source list, and perform the subsequent steps according to the determination result;
  • a timing duration is set in advance, and after each timing start, the number of times of the uplink signal carrying the neighbor BS identifier sent by each SS associated with each neighbor BS is recorded, and if the timing is received within the timing duration, If the number of uplink signals sent by a specific SS to a specific neighbor BS is greater than a preset number of times, it is determined whether the specific neighbor BS identifier is included in the uplink interference source list, and the subsequent steps are performed according to the determination result.
  • Step 604 The BS determines whether the SS identifier of the uplink SS corresponding to the neighbor BS identifier in the uplink interference source list includes the SS identifier carried in the message. If yes, go to step 609; otherwise, go to step 605.
  • Step 605 The BS adds the SS identifier carried in the message to the uplink interference SS identifier list corresponding to the neighbor BS identifier in the uplink interference source list, and simultaneously, the uplink interference corresponding to the neighbor BS identifier in the uplink interference source list.
  • the number of SS is incremented by 1, and the flow proceeds to step 609.
  • Step 606 The BS adds the correspondence between the neighbor BS identifier, the IP address of the neighbor BS, the SS identifier, and the number of SSs of the uplink interference: 1 to the uplink interference source list. If the indication value is 0 before performing this step, the indication value is set to 1 in this step. If the uplink interference source list contains the total number of uplink interference source neighbor systems, in this step, the total value is incremented by 1.
  • Step 607 The BS determines whether the neighbor BS identifier is included in the uplink interference victim list. If yes, go to step 609; otherwise, go to step 608.
  • Step 608 The BS determines that the system adds a new uplink interference neighbor system, performs uplink channel allocation negotiation with each of the current uplink interference neighbor systems, and performs channel allocation and service transmission according to the negotiated channel allocation policy.
  • the uplink interference neighbor system includes: an uplink interference source neighbor system and an uplink interference victim neighbor system. If system B is both the uplink interference source neighbor system of system A and the uplink interference victim neighbor system, system A calculates the total number of uplink interference neighbor systems. System B is calculated as one uplink interference neighbor system.
  • Step 609 The BS detects that the uplink interference source neighbor BS identifier corresponding to the uplink interference SS identifier in the uplink interference source list is not received by the uplink interference source in the uplink interference source list.
  • the signal is used to delete the uplink interference SS identifier from the list, and the number of uplink interference SS corresponding to the uplink interference source neighbor BS identifier is decreased by one.
  • the BS detects that the interference relationship of the uplink interference SS is released, and the channel allocation of the uplink interference SS is to be updated.
  • the BS may also set a timing duration, and after each timing start, detect, in each of the uplink interference source neighboring BSs in the received uplink interference source list, the bearer interference source list corresponding to the neighbor BS identifier in the received uplink interference source list. If the number of uplink signals of the uplink interference SS is less than the preset number of times in the current timing, the SS identifier is removed from the uplink.
  • the BS detects that the uplink interference SS is shut down, for example, when receiving the message indicating that the uplink interference SS is off from the uplink interference source, it is determined that the interference relationship of the SS is released.
  • the BS detects that the uplink interference SS leaves the interference region, for example, when the uplink interference source receives the message indicating that the uplink interference SS leaves the interference region, it is determined that the interference relationship of the SS is removed.
  • Step 610 The BS determines whether the total number of SSs of the uplink interference corresponding to the neighboring BS identifier of the uplink interference source is 0. If yes, go to step 611; otherwise, if no processing is performed, the process ends.
  • the step may also be: the BS determines the uplink interference corresponding to the neighbor BS identifier of the uplink interference source.
  • SS identification list is empty. If yes, go to step 611; otherwise, if no processing is done, the process ends.
  • Step 611 The BS deletes related information of the uplink interference source neighbor BS in the uplink interference source list, and includes: the uplink interference source neighbor BS identifier, the IP address of the uplink interference source neighbor BS, and the uplink interference of the uplink interference source neighbor BS Number of SSs: 0.
  • the total number of interfering source neighbor systems and after performing this step, the uplink interference source list does not contain any uplink interference source neighbor BS identifiers, then the indication value is set to 0, and the total value is set to 0;
  • the uplink interference source list further includes the uplink interference source neighbor BS identifier, and the total value is decremented by 1.
  • Step 612 The BS determines whether the uplink interference source neighbor BS identifier is included in the uplink interference victim list. If yes, the process ends; otherwise, step 613 is performed.
  • Step 613 The BS determines whether its own uplink interference source list and the uplink interference victim list are 614; otherwise, step 615 is performed.
  • Step 614 The BS re-allocates the uplink channel, and the process ends.
  • Step 615 The BS determines that the uplink interference neighbor system of the own system is released, performs uplink shared channel allocation according to the current total number of uplink interference neighbor systems, and performs service transmission according to the allocated channel, and the process ends.
  • steps 602 ⁇ 608 and steps 609 ⁇ 615 are not sequential. In practical applications, steps 612 ⁇ 615 can also be replaced by the following steps:
  • Step 612 The BS determines whether the uplink interference source neighbor BS identifier is included in the uplink interference victim list. If yes, go to step 613; otherwise, go to step 614.
  • Step 613 The BS re-allocates the uplink channel, and the process ends.
  • Step 614 The BS determines whether the neighbor of the downlink interference source list of the system includes the neighbor.
  • Step 615 The BS determines whether the neighbor BS identifier is included in the downlink interference victim list of the system. If yes, go to step 616; otherwise, go to step 617.
  • Step 616 The BS determines that the uplink interference neighbor system of the own system is released, performs uplink shared channel allocation according to the current total number of uplink interference neighbor systems, and performs service transmission according to the allocated channel, and the process ends.
  • Step 617 The BS determines that the interference neighbor system of the own system is released, re-shares the shared channel according to the current total number of neighboring neighbor systems, and performs service transmission according to the allocated channel.
  • the BS may further send an interference neighbor deletion command to the released interference neighbor system to notify the interference relationship to be released.
  • FIG. 7 is a flowchart of the uplink channel re-allocation caused by the addition and release of the uplink interference victim neighbor system according to Embodiment 4 of the present invention. As shown in FIG. 7, the specific steps are as follows: Step 701: The BS initially accesses the network, and detects The uplink interference source neighbor system and the uplink interference of the own system sacrifice the neighbor system, and establish an uplink interference source list and an uplink interference victim column. Table.
  • the list of uplink interference sources established in this step is shown in Table 3.
  • the established uplink interference sacrifice list is shown in Table 4.
  • Step 702 During the operation of the BS, the neighbor BS receives the uplink signal sent by the SS associated with the BS, and sends an update uplink victim request message to the BS, where the message carries the neighbor BS identifier, the IP address of the neighbor BS, and the current BS. The associated SS identifier.
  • the neighbor BS may not immediately send an update uplink interference victim request message to the BS, but only save the BS identifier as its own uplink interference source neighbor BS identifier. And when the preset update uplink interference sacrifice time of the BS arrives, the update uplink interference victim request message is sent to the BS, and the indication information that the update uplink interference victim request message has been sent to the BS is recorded.
  • Step 703 The BS determines whether the neighboring BS identifier of the message is included in the uplink interference victim list, and if yes, step 704 is performed; otherwise, step 707 is performed.
  • the BS may determine, if it receives an update uplink victim request message sent by the neighbor BS, whether the neighbor information carried by the message is included in the uplink interference victim list.
  • the BS identifies and performs a subsequent step according to the judgment result.
  • a timing duration is preset, and after each timing starts, an update uplink sacrifice request message sent by each neighbor BS carrying the SS identifier associated with the BS is recorded. If the number of times of updating the uplink sacrifice request message for a specific SS identifier sent by a specific neighbor BS received by the specific neighbor BS is greater than the preset number of times, it is determined whether the uplink interference victim list of the body is included The specific neighbor BS identifier, and performing subsequent steps according to the judgment result.
  • Step 704 The BS determines whether the SS identifier of the uplink victim interference corresponding to the neighbor BS identifier in the uplink interference victim list includes the SS identifier carried in the message. If yes, go to step 711; otherwise, go to step 705.
  • Step 705 The BS adds the SS identifier carried in the message to the uplink interference victim column.
  • the number of uplink victim interference SSs corresponding to the neighbor BS identifier in the uplink interference victim list is increased by one.
  • Step 706 The BS transmits the service to the SS on its own uplink interference time-sharing channel in the uplink shared channel, and the process goes to step 711.
  • the time-sharing channel for transmitting traffic to the SS without any interference is called an uplink interference-free time-sharing channel, and the time-sharing channel for each BS to sacrifice the SS transmission service to its own uplink is sacrificed. They are called uplink interference time-sharing channels of each BS.
  • Step 707 The BS adds the correspondence between the neighbor BS identifier, the IP address of the neighbor BS, the SS identifier, and the number of SSs of the uplink victim interference: 1 to the uplink interference victim list. If the indication value is 0 before performing this step, the indication value is set to 1 in this step; if the uplink interference victim list includes the total number of uplink interference victim neighbor systems, in this step, the total value is added to 1 .
  • Step 708 The BS determines whether the neighbor BS identifier is included in the uplink interference source list, and if yes, performs step 709; otherwise, performs step 710.
  • Step 709 The BS transmits the service to the SS on its own uplink interference time-sharing channel of the uplink shared channel, and the process goes to step 711.
  • Step 710 The BS determines that the system adds a new uplink interference neighbor system, performs uplink channel allocation negotiation with each of the current uplink interference neighbor systems, and performs channel allocation and service transmission according to the negotiated channel allocation policy.
  • Step 711 The BS detects that the uplink victim interference SS is sent from an uplink interference victim SS sent by an uplink victim interference SS in the uplink interference victim list within a predetermined duration, and the uplink victim interference SS identifier is removed from the uplink victim interference SS identifier.
  • Uplink interference in the uplink interference victim list The number of uplink victim interference SSs corresponding to the uplink victim victim neighbor BS identifier is decremented by one.
  • the BS detects the uplink victim interference, and the interference relationship of the SS is released, and the channel allocation of the uplink victim channel SS is updated.
  • the BS can also set a timing duration to detect the received self after each timing start.
  • the SS identifier is used in the uplink victim interference SS identifier list corresponding to the uplink interference victim neighbor BS identifier in the uplink interference victim list. Deleting, and reducing the number of uplink victim interference SS corresponding to the uplink interference victim neighbor BS identifier by one.
  • the BS detects the uplink victim interference SS shutdown, such as: When receiving the message indicating the shutdown sent by the uplink victim interference SS, it is determined that the SS interference relationship is released.
  • the BS detects that the uplink victim interference SS leaves the interference region, for example, when receiving the handover message sent by the SS from the interference region, it is determined that the interference relationship of the SS is released.
  • Step 712 The BS determines whether the total number of SSs of the uplink victim interference corresponding to the uplink interference victim neighbor BS identifier is 0. If yes, go to step 713; otherwise, if no processing is performed, the process ends.
  • the step may also be: The BS determines whether the uplink victim interference corresponding to the neighboring BS identifier of the uplink interference is not empty, and if yes, step 713; otherwise, the process ends.
  • Step 713 The BS deletes related information of the uplink interference victim neighbor BS in the uplink interference victim list, including: the uplink interference victim neighbor BS identifier, the uplink interference victim neighbor BS IP address, and the uplink interference victim neighbor BS uplink sacrifice Number of interfering SS: 0. And the total number of neighbor systems is sacrificed by the uplink interference, and after performing this step, if the uplink interference victim list does not include any uplink interference victim neighbor BS identifier, the indication value is set to 0, and the total value is set to 0; After the step, the uplink interference victim list further includes an uplink interference victim neighbor BS identifier, and the total value is decremented by one.
  • Step 714 The BS determines whether its uplink interference source list and uplink interference victim list are 715; otherwise, step 716 is performed.
  • Step 715 The BS re-allocates the uplink channel, and the process ends.
  • Step 716 The BS determines whether the uplink interference victim neighbor BS identifier is included in the uplink interference source list. If yes, the process ends; otherwise, step 717 is performed.
  • Step 717 The BS determines that the uplink interference neighbor system of the own system is released, and performs uplink shared channel allocation according to the current total number of uplink interference neighbor systems, and performs service transmission according to the allocated channel, and the process ends.
  • steps 714 ⁇ 717 can be replaced by the following steps:
  • Step 714 The BS determines whether the neighbor BS identifier is included in the uplink interference source list. If yes, go to step 715; otherwise, go to step 716.
  • Step 715 The BS re-allocates the uplink channel, and the process ends.
  • Step 716 The BS determines whether the neighbor of the downlink interference source list of the system includes the neighbor.
  • Step 717 The BS determines whether the neighbor of the downlink interference in the system includes the neighbor.
  • Step 718 The BS determines that the uplink interference neighbor system of the own system is released, and performs uplink shared channel allocation according to the current total number of uplink interference neighbor systems, and according to the allocation. The channel is used for service transmission, and the process ends.
  • Step 719 The BS determines that the interference neighbor system of the own system is released, re-shares the shared channel according to the current total number of interference neighbor systems, and performs service transmission according to the allocated channel.
  • the BS may further send an interference neighbor deletion command to the released interference neighbor system to notify the interference relationship to be released.
  • FIG. 4 to FIG. 7 shows the case where the four uplink and downlink resources are independently allocated. In the practical application, the above four cases can be arbitrarily combined.
  • the following is an embodiment in which the uplink and downlink interference source neighbor systems simultaneously release channel redistribution, and the uplink and downlink interference victim neighbor systems simultaneously release channel redistribution.
  • FIG. 8 is a schematic diagram of an embodiment of a channel re-allocation caused by the simultaneous release of the uplink and downlink interference source neighbor systems according to the fifth embodiment of the present invention.
  • the BS first detects the downlink interference source neighbor system release, as shown in FIG. The specific steps are as follows:
  • Step 801 The BS detects that the interference relationship of a downlink interfered SS corresponding to a downlink interference source neighbor BS identifier in the downlink interference source list is removed, and the downlink interfered SS identifier is removed from the downlink interference source list.
  • the downlink interfered SS identifier list corresponding to the neighbor BS identifier is deleted, and the number of downlink interfered SS corresponding to the downlink interferer neighbor BS identifier is decreased by 1.
  • Step 802 The BS determines whether the number of downlink interfered SSs corresponding to the downlink interference source neighbor BS identifier is 0. If yes, go to step 803; otherwise, go to step 807.
  • the BS may determine whether the downlink interfered SS identifier list corresponding to the downlink interference source neighbor BS identifier is empty, and if yes, go to step 803; otherwise, go to step 807.
  • Step 803 The BS determines whether the downlink interference source list includes the downlink interference source neighbor BS identifier, and if yes, determines that the neighbor BS is the uplink interference source neighbor BS at the same time. At step 804; otherwise, step 805 is performed.
  • Step 804 The BS determines whether the number of the uplink interference SS corresponding to the uplink interference source neighbor BS identifier is 0. If yes, go to step 805; otherwise, go to step 806.
  • Step 805 The BS considers that the relationship between the interference source and the neighboring system is removed, and the related information of the neighboring BS of the downlink interference source in the downlink interference source list is deleted, including: the downlink interference source neighbor BS identifier, and the IP address of the downlink interference source neighbor BS.
  • the number of downlink interfered SSs of the downlink interference source neighbor BS 0;
  • deleting related information of the uplink interference source neighbor BS in the uplink interference source list including the uplink interference source neighbor BS identifier, and the uplink interference source neighbor
  • the IP address of the BS, the number of uplink interference SSs of the neighboring BS of the uplink interference source 0 and notifying the neighbor BS that the interference source relationship is released, and simultaneously performing downlink and uplink channel allocation, and the process ends.
  • Step 806 The BS deletes related information of the downlink interference source neighbor BS in the downlink interference source list, including: the downlink interference source neighbor BS identifier, the IP address of the downlink interference source neighbor BS, and the downlink interference of the downlink interference source neighbor BS Number of interfering SSs: 0.
  • the downlink channel allocation is re-executed, and the process ends.
  • Step 807 The BS re-allocates the SS downlink channel.
  • FIG. 9 is a schematic diagram of an embodiment of a channel re-allocation caused by the simultaneous release of the uplink and downlink interference source neighbor systems according to the sixth embodiment of the present invention.
  • the BS first detects the release of the uplink interference source neighbor system, as shown in FIG. The specific steps are as follows:
  • Step 901 The BS detects that the interference relationship of an uplink interference SS corresponding to an uplink interference source neighbor BS identifier in the uplink interference source list is removed, and the uplink interference SS identifier is removed from the uplink interference source list in the uplink interference source neighbor BS.
  • the identifier of the corresponding uplink interference SS identifier is deleted, and the number of uplink interference SS corresponding to the uplink interference source neighbor BS identifier is decreased by 1.
  • Step 902 The BS determines whether the number of uplink interference SSs corresponding to the neighboring BS identifier of the uplink interference source is 0. If yes, go to step 903; otherwise, go to step 907.
  • the BS may determine whether the uplink interference SS identifier list corresponding to the uplink interference source neighbor BS identifier is empty, and if yes, go to step 903; otherwise, go to step 907.
  • Step 903 The BS determines whether the uplink interference source neighbor is included in the downlink interference source list.
  • the BS identifier if yes, determining that the neighbor BS is both its own downlink interferer neighbor BS, and executing step 904; otherwise, executing step 906.
  • Step 904 The BS determines whether the number of downlink interfered SSs corresponding to the downlink interference source neighbor BS identifier is 0. If yes, go to step 905; otherwise, go to step 906.
  • Step 905 The BS considers that the relationship between the interference source and the neighboring system is removed, and deletes the related information of the neighboring BS of the uplink interference source in the uplink interference source list, including: the uplink interference source neighbor BS identifier, and the IP address of the uplink interference source neighbor BS Address, the number of uplink interference SSs of the uplink interference source neighbor BS: 0; At the same time, the related information of the downlink interference source neighbor BS in the downlink interference source list is deleted, including the downlink interference source neighbor BS identifier, and the downlink interference source neighbor BS The IP address, the number of downlink interfered SSs of the neighboring BSs of the downlink interferer: 0, and notifies the neighbor BS that the interference relationship is released, and at the same time, the uplink and downlink channel assignments are resumed, and the process ends.
  • Step 906 The BS deletes related information of the uplink interference source neighbor BS in the uplink interference source list, and includes: the uplink interference source neighbor BS identifier, the IP address of the uplink interference source neighbor BS, and the uplink interference of the uplink interference source neighbor BS Number of SSs: 0, At the same time, the uplink channel allocation is re-executed, and the process ends.
  • Step 907 The BS re-allocates the SS uplink channel.
  • Step 10 is an embodiment of the channel redistribution caused by the simultaneous release of the uplink and downlink interference victim neighbor systems according to the seventh embodiment of the present invention.
  • the BS first detects the downlink interference and the neighbor system release, as shown in FIG.
  • the specific steps are as follows: Step 1001: The BS detects that the interference relationship of the downlink interference victim SS corresponding to the downlink interference victim neighbor BS identifier in the downlink downlink interference victim list is removed, and the downlink interference victim SS identifier is removed from the downlink interference victim list.
  • the downlink interference victim SS identifier list corresponding to the neighbor BS identifier is deleted, and the downlink interference victim SS number corresponding to the downlink interference victim neighbor BS identifier is decreased by 1.
  • Step 1002 The BS determines whether the downlink interference victim BS number corresponding to the downlink interference victim neighbor BS identifier is 0. If yes, go to step 1003; otherwise, go to step 1007.
  • the BS may determine whether the downlink interference victim SS identifier list corresponding to the downlink interference victim neighbor BS identifier is empty. If yes, go to step 1003; otherwise, go to step 1007.
  • Step 1003 The BS determines whether the downlink interference victim neighbor BS identifier is included in the uplink interference victim list. If yes, it is determined that the neighbor BS also sacrifices the neighbor BS for its own uplink interference, and step 1004 is performed; otherwise, step 1006 is performed.
  • Step 1004 The BS determines whether the number of uplink victim interference SSs corresponding to the uplink interference victim neighbor BS identifier is 0. If yes, go to step 1005; otherwise, go to step 1006.
  • Step 1005 The BS considers that the interference relationship with the neighboring system is removed, and deletes the related information of the downlink interference victim neighbor BS in the downlink interference victim list, including: the downlink interference victim neighbor BS identifier, and the downlink interference victim neighbor BS IP address And the number of downlink interference sacrificial SSs of the downlink interference victim neighbor BS: 0; at the same time, deleting related information of the uplink interference victim neighbor BS in the uplink interference victim list, including the uplink interference victim neighbor BS identifier, and the uplink interference victim neighbor BS IP address, the uplink interference, the number of uplink victim interference SSs of the neighbor BS: 0. At the same time, the downlink and uplink channel allocation are resumed, and the process ends.
  • Step 1006 The BS deletes related information of the downlink interference victim neighbor BS in the downlink interference victim list, including: the downlink interference victim neighbor BS identifier, the downlink interference victim neighbor BS IP address, and the downlink interference victim neighbor BS downlink interference
  • the number of sacrificial SSs is 0.
  • the downlink channel allocation is re-executed, and the process ends.
  • Step 1007 The BS re-submits the downlink resource allocation.
  • the BS first detects the uplink interference and the neighbor system release, as shown in FIG. The specific steps are as follows:
  • Step 1101 The BS detects that the interference relationship of an uplink victim interference SS corresponding to an uplink interference victim neighbor BS identifier in the uplink interference victim list is removed, and the uplink victim interference SS identifier is sacrificed from the uplink interference victim list.
  • the number of uplink victim interference SSs corresponding to the neighboring BS identifier is deleted, and the number of uplink victim interference SS corresponding to the uplink interference victim neighbor BS identifier is decreased by one.
  • Step 710 The specific method for the BS to detect the cancellation of the interference relationship of the uplink victim interference SS is shown in step 710.
  • Step 1102 The BS determines whether the number of uplink victim interference SSs corresponding to the uplink interference victim neighbor BS identifier is 0. If yes, go to step 1103; otherwise, go to step 1107.
  • the step may also be: The BS determines whether the uplink victim interference SS identifier list corresponding to the uplink interference victim neighbor BS identifier is empty. If yes, go to step 1103; otherwise, go to step 1107.
  • Step 1103 The BS determines whether the downlink interference victim neighbor BS identifier is included in the downlink interference victim list. If yes, it is determined that the neighbor BS also sacrifices the neighbor BS for its downlink interference, and step 1104 is performed; otherwise, step 1106 is performed.
  • Step 1104 The BS determines whether the number of downlink interference sacrificial SSs corresponding to the downlink interference victim neighbor BS identifier is 0. If yes, go to step 1105; otherwise, go to step 1106.
  • Step 1105 The BS considers that the interference relationship with the neighbor system is released, and deletes the uplink interference.
  • the information about the uplink interference in the victim station is related to: the uplink interference victim neighbor BS identifier, the uplink interference victim neighbor BS IP address, and the uplink interference victim neighbor BS uplink victim interference SS number: 0; And deleting the information about the downlink interference victim neighbor BS in the downlink interference victim list, including the downlink interference victim neighbor BS identifier, the downlink interference victim neighbor BS IP address, and the downlink interference victim neighbor BS downlink interference victim SS number: 0,
  • the uplink and downlink channel assignments are re-established, and the process ends.
  • Step 1106 The BS deletes related information of the uplink interference victim neighbor BS in the uplink interference victim list, including: the uplink interference victim neighbor BS identifier, the uplink interference victim neighbor BS IP address, and the uplink interference victim neighbor BS uplink sacrifice Number of interfering SSs: 0. At the same time, the uplink channel allocation is re-executed, and the process ends.
  • Step 1107 The BS re-allocates the uplink resource.
  • FIG. 12 is a schematic structural diagram of a BS for performing channel allocation according to Embodiment 1 of the present invention. As shown in FIG. 12, the method mainly includes: a neighbor detection module 121 and a channel allocation module 122, where
  • the neighbor detection module 121 is configured to record and update the total number of neighbors of the BS, record and update the neighbor identifier of the BS, detect whether the neighbor of the BS changes during the running of the BS, and if the change occurs, the total number of neighbors after the change and the changed
  • the neighbor identity is sent to the channel assignment module 122.
  • the channel allocation module 122 is configured to re-allocate the channel according to the total number of neighbors and the neighbor identifier sent by the neighbor detection module 121.
  • the neighbor detection module 121 mainly includes: a downlink interference source neighbor detection module 12111 and a downlink interference victim neighbor detection module 12112, where:
  • the downlink interference source neighbor detection module 12111 is configured to record and update the total number of downlink interference source neighbors and downlink interference source neighbor identifiers of the BS, and detect the downlink of the BS during the operation of the BS. If the neighbor is changed, if the change is made, the downlink interference victim neighbor detection module 12112 is queried whether to record the changed neighbor identifier. If the downlink interference victim neighbor detection module 12112 returns an unrecorded indication, the total number of neighbors is determined to be changed, and the total number of neighbors to be changed is determined. And the changed neighbor identifier is sent to the channel allocation module 122 to detect whether it records the neighbor identifier sent by the downlink interference victim neighbor detection module 12112. If not, the unrecorded indication is returned.
  • the downlink interference victim neighbor detection module 12112 is configured to record and update the downlink interference victim total number of neighbors and the downlink interference victim neighbor identifier of the BS, and detect whether the downlink interference of the BS victim neighbor changes during the operation of the BS, and if the change, the downlink interference
  • the source neighbor detection module 12111 queries whether to record the changed neighbor identifier. If the downlink interference source neighbor detection module 12111 returns an unrecorded indication, the total number of neighbors is determined to be changed, and the changed total number of neighbors and the changed neighbor identifier are sent to the channel allocation module 122. And detecting whether the neighbor identifier sent by the downlink interference source neighbor detecting module 12111 is recorded, and if not recorded, returning an unrecorded indication.
  • the neighbor detection module 121 includes: an uplink interference source neighbor detection module 12121 and an uplink interference victim neighbor detection module 12122, where:
  • the uplink interference source neighbor detection module 12121 is configured to record and update the total number of uplink interference source neighbors and the uplink interference source neighbor identifier of the BS, and detect whether the uplink interference source neighbor of the BS changes during the operation of the BS, and if the change, the uplink interference is sacrificed.
  • the neighbor detection module 12122 queries whether to record the changed neighbor identifier. If the uplink interference victim neighbor detection module 12122 returns an unrecorded indication, the total number of neighbors is determined to be changed, and the changed total number of neighbors and the changed neighbor identifier are sent to the channel allocation module 122. It detects whether it records the neighbor identifier sent by the uplink interference victim neighbor detection module 12122, and if not, returns an unrecorded indication.
  • the uplink interference victim neighbor detection module 12122 is configured to record and update the total number of uplink interference victim neighbors and the uplink interference victim neighbor identifier of the BS. During the operation of the BS, detect whether the uplink interference of the BS victim neighbor is changed, and if it changes, the uplink interference is performed. The source neighbor detection module 12121 queries whether to record the changed neighbor identifier, if the uplink interference source neighbor detection module 12121 If the unrecorded indication is returned, the total number of neighbors is determined to be changed, and the changed total number of neighbors and the changed neighbor identifier are sent to the channel allocation module 122 to detect whether the neighbor identifier sent by the uplink interference source neighbor detection module 12121 is recorded. , returns an unrecorded indication.
  • FIG. 13 is a schematic structural diagram of a BS for performing resource allocation according to Embodiment 2 of the present invention. As shown in FIG. 13, the method mainly includes: an interference state detecting module 131 and a radio resource allocation module 132, where
  • the interference state detecting module 131 is configured to record and update the interference state of the system, such as: the total number of the neighboring systems of the system, the neighboring BS identifier of the system, and whether the interference state of the system is changed during the running of the BS, if the occurrence occurs. If the change is made, the changed interference state information, such as the total number of the neighboring systems and the neighboring system identifier, are sent to the radio resource allocation module 132.
  • the radio resource allocation module 132 is configured to perform radio resource allocation again according to the interference state information sent by the interference state detecting module 131.
  • the interference state detecting module 131 may be: a downlink interference source neighbor system detection module 1311, a downlink interference victim neighbor system detection module 1312, an uplink interference source neighbor system detection module 1313, and an uplink interference victim neighbor detection module 1314.
  • a downlink interference source neighbor system detection module 1311 a downlink interference victim neighbor system detection module 1312, an uplink interference source neighbor system detection module 1313, and an uplink interference victim neighbor detection module 1314.
  • the downlink interference source neighbor system detection module 1311 is configured to record and update the downlink interference source neighbor system information of the system, and during the operation of the BS, detect whether the downlink interference source neighbor system of the system is changed, and if it is changed, the changed The downlink interference source neighbor system information is sent to the resource allocation module 132.
  • the downlink interference victim neighboring system detecting module 1312 is configured to record and update the downlink interference victim neighbor system information of the system, and during the operation of the BS, detect whether the downlink interference of the system victim node is changed, and if it is changed, the changed The downlink interference victim neighbor system information is sent to the resource allocation module 132.
  • the uplink interference source neighbor system detection module 1313 is configured to record and update the uplink interference source neighbor system information of the system, and during the operation of the BS, detect whether the uplink interference source neighbor system of the system is changed, and if it is changed, the changed The uplink interference source neighbor system information is sent to the resource allocation module 132.
  • the uplink interference victim neighbor detection module 1314 is configured to record and update the uplink interference victim neighbor system information of the system, and during the operation of the BS, detect whether the uplink interference of the system victim node information is changed, and if it is changed, the changed The uplink interference victim neighbor system information is sent to the resource allocation module 132.
  • the channel allocation method mentioned in the embodiment of the present invention is also applicable to the allocation of radio resources such as frequency, time, coding mode, and power.

Landscapes

  • Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé de distribution d'une ressource sans fil mis en œuvre comme suit: une BS détecte un changement d'état d'auto-brouillage du système pendant le fonctionnement, et redistribue la ressource sans fil en fonction de l'état de brouillage modifié. En particulier, la BS redistribue une ressource de liaison descendante en détectant un critère modifié du système adjacent à la source de brouillage en liaison descendante et du système adjacent au sacrifice de brouillage en liaison descendante; la BS redistribue une ressource de liaison montante en détectant un critère modifié du système adjacent à la source de brouillage en liaison montante et du système adjacent au sacrifice de brouillage en liaison descendante. L'invention concerne également une BS destinée à distribuer une ressource sans fil, qui comprend un module de détection de brouillage et un module de distribution de ressource sans fil. La distribution de ressource sans fil peut être corrigée en temps opportun selon un critère modifié de l'état de brouillage de la BS pendant le fonctionnement, ce qui améliore le taux d'utilisation de la ressource sans fil.
PCT/CN2007/070761 2006-09-22 2007-09-24 Procédé et station de base servant à la distribution d'une ressource sans fil WO2008037211A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200610139027.4 2006-09-22
CN2006101390274A CN101150835B (zh) 2006-09-22 2006-09-22 进行信道分配的方法和基站

Publications (1)

Publication Number Publication Date
WO2008037211A1 true WO2008037211A1 (fr) 2008-04-03

Family

ID=39229749

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/070761 WO2008037211A1 (fr) 2006-09-22 2007-09-24 Procédé et station de base servant à la distribution d'une ressource sans fil

Country Status (2)

Country Link
CN (1) CN101150835B (fr)
WO (1) WO2008037211A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101686475B (zh) * 2008-09-22 2012-10-17 华为技术有限公司 干扰检测方法和干扰检测设备
US8358625B2 (en) * 2009-02-02 2013-01-22 Nokia Corporation Method and apparatus for signaling neighbor cell transmission frame allocations
US8761097B2 (en) 2010-05-19 2014-06-24 Qualcomm Incorporated Systems and methods for enhancing uplink coverage in interference scenerios
CN113939033B (zh) * 2021-09-16 2024-04-26 中国联合网络通信集团有限公司 资源分配方法、装置及计算机可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1360446A (zh) * 2000-12-22 2002-07-24 株式会社Ntt都科摩 无线电资源分配方法和使用该方法的基站
CN1441617A (zh) * 2002-01-17 2003-09-10 西门子公司 通过监测干扰状况管理无线电资源的方法
CN1615037A (zh) * 2003-11-07 2005-05-11 株式会社Ntt都科摩 移动通信系统中的基地局及发送功率设定方法
CN1665171A (zh) * 2004-03-05 2005-09-07 株式会社Ntt都科摩 基站、移动站、无线通信系统和无线传输方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69940301D1 (de) * 1999-03-15 2009-03-05 Motorola Inc Zeitaufteilung von Kommunikationsressourcen in zellularen Kommunikationssystemen

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1360446A (zh) * 2000-12-22 2002-07-24 株式会社Ntt都科摩 无线电资源分配方法和使用该方法的基站
CN1441617A (zh) * 2002-01-17 2003-09-10 西门子公司 通过监测干扰状况管理无线电资源的方法
CN1615037A (zh) * 2003-11-07 2005-05-11 株式会社Ntt都科摩 移动通信系统中的基地局及发送功率设定方法
CN1665171A (zh) * 2004-03-05 2005-09-07 株式会社Ntt都科摩 基站、移动站、无线通信系统和无线传输方法

Also Published As

Publication number Publication date
CN101150835B (zh) 2011-02-16
CN101150835A (zh) 2008-03-26

Similar Documents

Publication Publication Date Title
JP5476516B2 (ja) ワイヤレスofdmaシステムに適用する動的資源トランザクションのメカニズム
JP6433088B2 (ja) トラフィックのサービス品質(QoS)制約に基づき認可スペクトルまたは無認可スペクトル上でトラフィックを伝達するためのシステムおよび方法
KR101252725B1 (ko) 동적 스펙트럼 액세스 무선 시스템에서 점유 사용자로의통지
JP4701163B2 (ja) 周波数チャネル割り当てシステム、基地局、制御局、異システム間共通制御装置、周波数チャネル割り当て方法及び制御方法
KR102048757B1 (ko) 인가 및 비인가 스펙트럼에 대한 동적 리소스 할당을 위한 시스템 및 방법
US8040815B2 (en) Spectrum coordination controller
CN107135674B (zh) 超密集网络中的切换方法及设备
KR20060129807A (ko) 셀룰러 통신을 위한 중계통신 시스템 및 방법
WO2011032317A1 (fr) Procédé de planification de ressources pour système à partage du spectre, et station de base
WO2008022603A1 (fr) Procédé et appareil pour réaliser des mesures inter-fréquences
JP2013523024A (ja) 免許不要スペクトラムまたは共有スペクトラムによるセル間のベストエフォート無線バックホールのための方法および装置
TW201218709A (en) Method, Base Station and Relay Node for uplink transmission
KR20090005133A (ko) 셀룰러 통신 시스템 내의 자원 교환 디스커버리
WO2014101704A1 (fr) Procédé pour une affection de ressource de créneau temporel de liaison montante et de liaison descendante sur la base d'une cognition de brouillage dans un système duplex à répartition dans le temps
WO2014169488A1 (fr) Procédé de coordination de brouillage, dispositif et appareil pour systèmes présentant différents modes
WO2016101882A1 (fr) Procédé de coordination de brouillage inter-réseaux
CN103052079A (zh) 一种在lte集群通信系统中进行干扰协调的方法及基站
WO2016072782A1 (fr) Procédé et appareil d'accès à un réseau cellulaire
EP2887737B1 (fr) Command d'un transfert intercellulaire dans un systeme de radio cognitive selon une information de reconfiguration de spectre d'une cellule de destination
JP2016158101A (ja) 無線通信システムおよび無線通信方法
WO2008037211A1 (fr) Procédé et station de base servant à la distribution d'une ressource sans fil
JP6112420B2 (ja) 無線基地局装置、無線資源管理方法、無線資源管理プログラム、無線通信装置、及び無線通信システム
KR101189806B1 (ko) 자원 할당 방법 및 자원 할당 장치
WO2014082444A1 (fr) Procédé et système de programmation de ressources de groupe dans un système de communication à grappes
WO2009049537A1 (fr) Procédé et dispositif de transmission de données sous h-fdd

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07816952

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07816952

Country of ref document: EP

Kind code of ref document: A1