WO2009009547A2 - Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p) - Google Patents

Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p) Download PDF

Info

Publication number
WO2009009547A2
WO2009009547A2 PCT/US2008/069450 US2008069450W WO2009009547A2 WO 2009009547 A2 WO2009009547 A2 WO 2009009547A2 US 2008069450 W US2008069450 W US 2008069450W WO 2009009547 A2 WO2009009547 A2 WO 2009009547A2
Authority
WO
WIPO (PCT)
Prior art keywords
traffic
signal
transmission request
signaling format
peer
Prior art date
Application number
PCT/US2008/069450
Other languages
English (en)
Other versions
WO2009009547A3 (fr
Inventor
Junyi Li
Rajiv Laroia
Saurabh Tavildar
Xinzhou Wu
Original Assignee
Qualcomm Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/168,690 external-priority patent/US8238836B2/en
Application filed by Qualcomm Incorporated filed Critical Qualcomm Incorporated
Publication of WO2009009547A2 publication Critical patent/WO2009009547A2/fr
Publication of WO2009009547A3 publication Critical patent/WO2009009547A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0006Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/345Interference values
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/18Interfaces between hierarchically similar devices between terminal devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention relates to wireless communication within a peer-to-peer network and, in particular, to methods by which a mobile terminal may send small amounts of data to an intended receiver terminal.
  • a terminal In a wireless network, e.g., an ad hoc network, in which a network infrastructure does not exist, a terminal has to combat certain challenges in order to set up a communication link with another peer terminal.
  • One challenge is that when a terminal just powers up or moves into a new area, the terminal may have to first find out whether another terminal is present in the vicinity before any communication between the two terminals can start.
  • terminals in an ad hoc wireless network may often not have a common timing reference or network controller which can assist in traffic management. So it is possible that when a first terminal is transmitting a signal and a second terminal is not in the receiving mode, therefore the transmitted signal does not help the second terminal to detect the presence of the first terminal. Power efficiency has great impact on the battery life of the terminals and is thus another important issue in the wireless system.
  • a plurality of wireless terminals may operate in an environment while sharing a frequency spectrum to establish ad hoc peer-to-peer communications. Because such ad hoc peer-to-peer communications are not centrally managed by a centralized controller, interference between multiple peer-to-peer links among nearby wireless terminals is problem. That is, transmissions from a wireless terminal may cause interference with other unintended receiver wireless terminals.
  • a fourth device having a peer-to-peer connection with a third device to facilitate interference management for a second peer-to-peer connection between a first device and a second device within a wireless network.
  • the fourth device may monitor to receive a first transmission request signal from the third device and a second transmission request signal from the first device.
  • the first transmission request signal indicating that the third device intends to send a traffic signal to the fourth device in a traffic slot corresponding to the first transmission request signal and the second transmission request signal indicating that the first device intends to send a traffic signal to the second device in the same traffic slot.
  • the second transmission request signal further including information indicative of the signaling format to be used in the traffic signal from the first device to the second device.
  • the signaling format being one of at least a Gaussian signaling format and a flash signaling format.
  • the fourth device may recover the information indicative of the signaling format from the second transmission request signal.
  • the fourth device may then calculate an interference power as a function of the signal strength of the received second transmission request.
  • the fourth device may then determine whether to receive the traffic signal from the third device based on the calculated interference power.
  • the fourth device may also determine whether the priority corresponding to the second transmission request is higher than the first transmission request.
  • a desired signal power may be calculated by the fourth device as a function of the signal strength of the received first transmission request. It may then send a transmission request response signal to the third device if it is determined that the ratio of the calculated desired signal power and the calculated interference power exceeds a threshold.
  • the fourth device may receive the traffic signal in the traffic slot.
  • the value of the calculated interference power is determined as a function of the recovered signaling format.
  • the value of the calculated interference power may be smaller if the flash signaling format is to be used than if the Gaussian signaling format is to be used.
  • the traffic signal may be to be sent by the first device in a fraction of the traffic channel resource in the traffic slot if the flash signaling format is to be used. For instance, the fraction may be less than twenty percent of the traffic channel.
  • the second transmission request signal may be sent using a plurality of tones and the information indicative of the signaling format to be used in the traffic signal is sent using the phases of the plurality of tones.
  • the number of information bits to be sent in the traffic signal when the Gaussian signaling format is used are at least twice as many as the number of information bits to be sent in the traffic signal when the flash signaling format is used.
  • the fourth device may also monitor transmission request resources to determine the number of devices that intend to use the flash signaling format in the traffic channel of the traffic slot. If it is determined that the number of devices that intend to use the flash signaling format in the traffic channel of the traffic slot exceeds a threshold number, the fourth device may restrain from sending the transmission request response.
  • FIG. l is a block diagram illustrating the how an ad hoc peer-to-peer network may be implemented, e.g., in conjunction a wide area network.
  • FIG. 2 is a block diagram illustrating an environment in which a plurality of wireless terminals may establish peer-to-peer communication connections that may cause interference to other nearby wireless terminals.
  • FIG. 3 illustrates one example of a transmission channel architecture that may be used by wireless terminals to transport control signaling and traffic for a peer-to-peer communication connection between wireless terminals.
  • FIG. 4 illustrates an example time-frequency grid that may be used in signal transmissions over the channel architecture of FIG. 3.
  • FIG. 5 is a flow diagram illustrating the operation of various wireless terminals in an ad hoc peer-to-peer network that facilitates connection scheduling where a plurality of wireless terminals share a communication channel.
  • FIG. 6 is a flow diagram illustrating how transmit power scaling may be implemented for a peer-to-peer connection between two wireless terminals.
  • FIG. 7 illustrates an example of how power may be reduced when transmitting a small packet in a peer-to-peer network.
  • FIG. 8 illustrates a method operational at a second device having a peer-to-peer connection with a first device to facilitate interference management of small packet transmissions using flash signaling within an ad hoc wireless network.
  • FIG. 9 illustrates a method operational at a first device having a peer-to-peer connection with a second device to facilitate interference management of small packet transmissions within an ad hoc wireless network.
  • FIG. 10 (comprising FIGS. 1OA and 10B) illustrates a method of operating a first wireless device in a peer-to-peer communication network.
  • FIG. 11 illustrates a method of operating a second wireless device in a peer to peer communication network.
  • FIG. 12 illustrates a method of operating a third wireless device in a peer to peer communication network.
  • FIG. 13 (comprising FIGS. 13A and 13B) illustrates a method operational in a third device having a peer-to-peer connection with a fourth device to facilitate interference management for a second peer-to-peer connection between a first device and a second device within a wireless network.
  • FIG. 14 (comprising FIGS. 14A and 14B) illustrates a method operational in a fourth device having a peer-to-peer connection with a third device to facilitate interference management for a second peer-to-peer connection between a first device and a second device within a wireless network.
  • FIG. 15 illustrates a method of operating a second wireless device in a peer-to- peer communication network, the second wireless device having a connection with a transmitter first wireless device.
  • FIG. 16 illustrates a method of operating a second wireless device in a peer-to- peer communication network, where the second wireless device has a connection with a transmitter first wireless device.
  • FIG. 17 is a block diagram of a first wireless terminal that may be configured to facilitate peer-to-peer communications with a second wireless terminal over a shared frequency spectrum.
  • the configurations may be described as a process that is depicted as a flowchart, a flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged.
  • a process is terminated when its operations are completed.
  • a process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
  • the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
  • Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage media may be any available media that can be accessed by a general purpose or special purpose computer.
  • such computer-readable media can comprise RAM, ROM, EEPROM, CD- ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code means in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium.
  • Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also be included within the scope of computer-readable media.
  • a storage medium may represent one or more devices for storing data, including read-only memory (ROM), random access memory (RAM), magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information.
  • ROM read-only memory
  • RAM random access memory
  • magnetic disk storage mediums including magnetic disks, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information.
  • configurations may be implemented by hardware, software, firmware, middleware, microcode, or any combination thereof.
  • the program code or code segments to perform the necessary tasks may be stored in a computer-readable medium such as a storage medium or other storage(s).
  • a processor may perform the necessary tasks.
  • a code segment may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements.
  • a code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
  • One feature provides a transmitter wireless terminal configured to establish a peer to peer communication link with a receiver wireless terminal over a shared communication channel.
  • the transmitter wireless terminal may scale its transmit power as a function of a channel gain for the communication channel between the transmitter and receiver wireless terminals.
  • the scaled transmit power may be utilized by the transmitter and receiver wireless terminals to perform link scheduling over the communication channel. For instance, the scaled transmit power may be used by the transmitter wireless terminal to perform a transmitter yielding with other neighboring transmitter wireless terminals utilizing the shared communication channel. Similarly, the scaled transmit power may be used by the receiver wireless terminal to perform receiver yielding with other neighboring receiver wireless terminal utilizing the shared communication channel.
  • Another feature provides an improved mechanism that facilitates transmission of small packets.
  • a transmitter voluntarily backs down on the transmitter power as a smaller packet will require much lower SNR. This will improve the signal energy per bit per noise power density (E_b/N_0) for the transmission as well as minimize the interference caused to other wireless communications happening in the same spectrum.
  • E_b/N_0 signal energy per bit per noise power density
  • the fact that a small packet is being transmitted can be signaled in a control channel so that the other peer- to-peer devices can use this information for their scheduling and rate prediction algorithms.
  • An ad hoc peer-to-peer wireless network may be established among two or more terminals without intervention of a centralized network controller.
  • the wireless network may operate within a frequency spectrum shared among a plurality of wireless terminals.
  • FIG. 1 is a block diagram illustrating the how an ad hoc peer-to-peer network may be implemented, e.g., in conjunction a wide area network.
  • the peer-to-peer network and the wide area network may share the same frequency spectrum.
  • the peer-to-peer network is operated at a different frequency spectrum, e.g., a spectrum dedicated to the use of the peer-to-peer network.
  • a communication system 100 may comprise one or more wireless terminals WT-A 102, WT-B 106, and WT-C 112.
  • wireless terminals WT-A 102, WT-B 106, and WT-C 112 may include any number of wireless terminals.
  • the wireless terminals WT-A 102, WT-B 106, and WT-C 112 can be, for example, cellular phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, and/or any other suitable device for communicating over wireless communication system 100.
  • the communication system 100 may support a wide area network (WAN) which may include one or more access nodes AN-A 104 and AN-B 110 (e.g., base station, access point, etc.) and/or any number of disparate access nodes (not shown) in one or more sectors / cells / regions that receive, transmit, repeat, etc., wireless communication signals to each other and/or to the one or more wireless terminals WT-A 102, WT-B 106, and WT-C 112.
  • WAN wide area network
  • Each access node AN-A 104 and AN-B 110 may comprise a transmitter chain and a receiver chain, each of which can in turn comprise a plurality of components associated with signal transmission and reception (e.g., processors, modulators, multiplexers, demodulators, demultiplexers, antennas, ... ) as will be appreciated by one skilled in the art.
  • the wireless terminal(s) when communicating through the WAN, may transmit signals to and/or receive signals from an access node when communicating via the wide area infra-structure network supported by the communication system 100.
  • wireless terminals WT-A 102 and WT-B 106 may communicate with the network via access node AN-A 104 while wireless terminal WT-C 112 may communication with a different access node AN-B 110.
  • the wireless terminals may also communicate directly with each other via a local area peer-to-peer (P2P) network (e.g., ad hoc network).
  • P2P peer-to-peer
  • Peer-to-peer communications may be effectuated by directly transferring signals between wireless terminals.
  • the signals need not traverse through an access node (e.g., a base station) or centrally managed network.
  • the peer-to-peer network may provide short range, high data rate communication (e.g., within a home, office, etc. type setting).
  • wireless terminals WT-A 102 and WT-B 106 may establish a first peer-to-peer network 108 and wireless terminals WT-B 106 and WT-C 112 may also establish a second peer-to-peer network 114.
  • each peer-to-peer network connection 108 and 114 may include wireless terminals within a similar geographic area (e.g., within range of one another). However, it is to be appreciated that wireless terminals need not be associated with the same sector and/or cell to be included in a common peer-to-peer network. Further, peer-to-peer networks may overlap such that one peer-to-peer network may take place within a region that overlaps or is encompassed with another larger peer-to-peer network. Additionally, a wireless terminal may not be supported by a peer-to-peer network. Wireless terminals may employ the wide area network and/or the peer-to-peer network where such networks overlap (e.g., concurrently or serially). Moreover, wireless terminals may seamlessly switch or concurrently leverage such networks. Accordingly, wireless terminals whether transmitting and/or receiving may selectively employ one or more of the networks to optimize communications.
  • Peer-to-peer communications between the wireless terminals may be synchronous.
  • wireless terminals WT-A 102 and WT-B 106 may utilize a common clock reference to synchronize performance of distinct functions.
  • the wireless terminals WT-A 102 and WT-B 106 may obtain timing signals from the access node AN-A 104.
  • the wireless terminals WT-A 102 and WT-B 106 may also obtain timing signals from other sources, for instance, GPS satellites or television broadcast stations.
  • time may be meaningfully partitioned in a peer-to-peer network for functions such as peer discovery, paging, and traffic. Further, it is contemplated that each peer-to-peer network may set its own time.
  • the two peer wireless terminals may detect and identity each other.
  • the process by which this mutual detection and identification between peers takes place may be referred to as peer discovery.
  • the communication system 100 may support peer discovery by providing that peers (terminals), desiring to establish peer-to-peer communications, periodically transmit short messages and listen to the transmissions of others.
  • the wireless terminals WT-A 102 e.g., transmitting wireless terminal
  • the wireless terminals WT-B 106 may periodically broadcast or send signals to the other wireless terminal(s) WT-B 106 (e.g., receiving wireless terminal(s)).
  • Transmissions for peer discovery may periodically occur during specified times referred to as peer discovery intervals, the timing of which may be predetermined by a protocol and known to the wireless terminals WT-A 102 and WT-B 106.
  • Wireless terminals WT-A 102 and WT-B 106 may each transmit respective signals to identify themselves. For example, each wireless terminal WT-A 102 and WT-B 106 may send a signal during a portion of a peer discovery interval.
  • each wireless terminal WT-A 102 and WT-B 106 may monitor signals potentially transmitted by other wireless terminals in a remainder of the peer discovery interval.
  • the signal may be a beacon signal.
  • the peer discovery interval may include a number of symbols (e.g., OFDM symbols).
  • Each wireless terminal WT-A 102 may select at least one symbol in the peer discovery interval for transmission by that wireless terminal WT-A 102.
  • each wireless terminal WT-A 102 may transmit a corresponding signal in one tone in the symbol selected by that wireless terminal WT-A 102.
  • the local area peer-to-peer network and the wide area network may share a common wireless spectrum to effectuate communication; thus, bandwidth may be shared for transferring data via the disparate types of networks.
  • the peer-to-peer network and the wide area network may both communicate over the licensed spectrum.
  • the peer-to-peer communication need not utilize the wide area network infrastructure.
  • wireless terminals After wireless terminals discover each other, they may proceed to establish connections. In some examples, a connection links two wireless terminals, e.g., in FIG. 1 connection 108 links wireless terminals WT-A and WT-B. Terminal WT-A 102 can then transmit traffic to terminal WT-B 106 using connection 108. Terminal WT-B 106 can also transmit traffic to terminal WT-A 102 using connection 108.
  • An interference management protocol allows a plurality of wireless terminals to operate in an environment while sharing a frequency spectrum to establish ad hoc peer-to-peer communications. Because ad hoc peer-to-peer communications are not centrally managed by a centralized controller, interference between multiple peer-to- peer links among nearby wireless terminals may be a problem. However, the peer-to-peer protocol described herein facilitates establishing and/or maintaining ad hoc peer-to-peer connections among different wireless terminals without the assistance of a centralized controller.
  • FIG. 2 is a block diagram illustrating an environment in which a plurality of wireless terminals may establish peer-to-peer communication connections that may cause interference to other nearby wireless terminals.
  • a peer-to-peer network 200 may include a plurality of wireless terminals that may share and/or concurrently use a frequency spectrum.
  • the shared frequency spectrum may include one or more transmission and/or control channels, with each transmission (traffic) channel having a corresponding traffic control channel.
  • the traffic control channel may be used to send a traffic request for communications over a corresponding transmission (traffic) channel.
  • a first wireless terminal WT A 202 may be attempting to transmit 210 to a second wireless terminal WT B 204 while a third wireless terminal WT C 206 is concurrently attempting to transmit 214 to a fourth wireless terminal WT D 208 using the same traffic channel bandwidth resource.
  • the first wireless terminal WT A 202 may be referred to as the intended transmitter
  • the second wireless terminal WT B 204 may be referred to as the intended receiver
  • the third wireless terminal WT C 206 may be considered the interferer.
  • a transmission and control channel pair may be shared by the plurality of the wireless terminals WT A, WT B, WT C, and WT D.
  • transmission (traffic) and/or control channel is shared (e.g., frequency spectrum sharing) by the wireless terminals, it may also result in unwanted interference 214' and 210' among the wireless terminals. For instance, if both transmissions 210 and 214 actually take place, then the signal 214' from the third wireless terminal WT C 206 may be seen as interference to the second wireless terminal WT B 204 receiver and may degrade its ability to successfully recover the desired signal 210 from the first wireless terminal WT A 202. Therefore, certain interference management protocol is needed to manage interference from the third wireless terminal WT C 206 to the second wireless terminal WT B 204.
  • One goal of the interference management protocol is to allow the third wireless terminal WT C 206 to transmit without creating excessive interference to the second wireless terminal WT B 204, thereby increasing the overall throughput and improving the system performance.
  • the first wireless terminal WT A 202 may also cause interference 210' to the fourth wireless terminal WT D 208, and a similar interference management protocol may also be used to control that interference.
  • a similar interference management protocol may also be used to control that interference.
  • a transmission CID may be used to indicate a particular transmission channel (e.g., frequency or time slot) to a receiving terminal WT B 204 and 208. Consequently, when the same transmission CID is used by two terminals, they may also be concurrently transmitting on the same channel or overlapping channels. If both transmitting terminals WT A 202 and WT C 206 are within range of the receiver terminals WT B 204 and/or WT D 208, then the receiver terminals WT B 204 and/or WT D 208 may perceive interference.
  • a particular transmission channel e.g., frequency or time slot
  • transmitter and/or receiver yielding may be implemented by devices in a peer-to-peer network that allows a device to backoff if it is likely to cause interference to other nearby devices of higher priority. Consequently, if the first connection 210 between the first device WT A 202 and second device WT B 204 has a higher priority than the second connection 214 between the third device WT C 206 and the fourth device WT D 208, the third device WT C 206 may implement transmitter yielding and/or the fourth device WT D 208 may implement receiver yielding.
  • yielding a device determines whether its transmission power will unacceptably interfere with transmissions of other nearby devices. Such yielding may also take into account the relative priority of the different transmissions or peer-to-peer connections associated with such transmissions. For instance, a device may decide to yield only if it has a lower connection or transmission priority than another connection or transmission.
  • a receiving device may not send an echo or reply transmission (e.g., in response to a transmission request) if its noise-to-signal ratio is too low, thereby preventing a corresponding interfering transmitting device from sending traffic to the receive device on the selected channel.
  • the receiver device may indicate that a lower transmit power should be used by its corresponding transmitter device to avoid interference.
  • a transmitting device may determine whether its own transmissions will cause unacceptable interference to another device utilizing a shared channel, and if so, it may not send data transmissions on that shared channel.
  • wireless terminal WT A 202 may determine a transmit power P A for traffic data transmissions.
  • Power P A need not be fixed and can be varied in accordance with certain criteria, such as traffic type, Quality of Service ("QoS") conditions, for example.
  • QoS Quality of Service
  • the transmitter for a wireless terminal can vary its power without notifying the receiver in advance.
  • the transmit power P A may be defined according to the following equation:
  • Constant C may be chosen to optimize the signal-to-noise ratio SNR in a particular system, and constant /?, in one embodiment, may be 0.5.
  • a transmitter may determine its transmission power to a specific receiver in the peer discovery and/or the paging phase of the communication. A transmitter may also update its transmission power by inspecting the recent control channel feedback from a specific receiver during a previous transmission.
  • the first wireless terminal WT A 202 may transmit a traffic request 210 to the second wireless terminal WT B 204.
  • the second wireless terminal WT B 204 may yield the transmission channel to third wireless terminal WT C 206 by not sending an echo or reply transmission to the first wireless terminal WT A 202. For instance, this may be the case if the connection from WT C to WT D is higher priority than the connection from WT A to WT B.
  • an acceptable interference threshold i.e., Pr c /Pr A > threshold
  • the second wireless terminal WT B 204 may reply to the received traffic request 210 with an echo transmission 212 having a transmit power P B inversely proportional to the received power Pr (e.g., based on signal strength) received in the traffic request 210.
  • the third wireless terminal WT C 206 may also receive the echo or reply transmission 212' from neighboring second wireless terminal WT B 204.
  • the echo transmission 212 is intended for the first wireless terminal WT A 202, other neighboring wireless terminals in the peer-to-peer network 200, including WT C 206, may also to receive the echo transmission 212'.
  • the first wireless terminal WT A 202 and third wireless terminal WT C 206 may utilize the same control and/or transmission channels (e.g., same frequency or timeslot) within the shared communication channel or frequency spectrum.
  • the first wireless terminal WT A 202 and third wireless terminal WT C 206 may utilize different control and/or transmission channels within the shared communication channel but these different control and/or transmission channels maybe sufficiently close that the energy from transmissions in one channel (for a first wireless terminal) interferes with transmissions in another channel (for another wireless terminal).
  • the third wireless terminal WT C 206 may use the echo transmission 212' (and potentially other echo transmission for other wireless terminals) to ascertain whether it should transmit on a particular transmission channel (i.e., corresponding to the control channel being used) or allow a different terminal to use the transmission channel. That is, the third wireless terminal WT C 206 may use the echo transmission 212' to ascertain whether its own transmission (at a particular power Pc) may adversely affect transmissions between WT A and WT B on the same transmission channel. For example, upon receiving the echo transmission 212' from the second wireless terminal WT B 204, the third wireless terminal WT C 206 may determine the signal noise to interference plus noise ratio expected that may be perceived by the second wireless terminal WT B 204 as:
  • Equation 2 Pc is the proposed transmit power of the third wireless terminal WT C 206 (which need not be fixed) and the SINR threshold is a particular signal to interference plus noise ratio appropriate for the network 200.
  • the remaining terms of Equation 2 are derived from the received power (P r ) from the second wireless WT B 204. If Equation 2 evaluates to true (i.e., SINR > (P A * ⁇ AB )/(P C * h BC ) ), then the third wireless terminal WT C 206 determines that its transmission to WT D 208 (e.g., or any other wireless terminal in network 200 on the same transmission channel as the transmission from WT A to WT B) would negatively impact the transmission from the first wireless terminal WT A 202 to the second wireless WT B 204.
  • WT D 208 e.g., or any other wireless terminal in network 200 on the same transmission channel as the transmission from WT A to WT B
  • the third wireless terminal WT C 206 may yield transmission to WT A 202. However, if Equation 2 evaluates to false (i.e., SINR ⁇ (P A * ⁇ AB )/(P C * h BC ) ) , then the third wireless terminal WT C 206 determines that its transmission to WT D 208 (e.g., or any other wireless terminal in network 200 on the same transmission channel as the transmission from WT A to WT B) would not negatively impact the transmission from WT A 202 to WT B 204. Therefore, the third wireless terminal WT C 206 may proceed to transmitting on the same transmission channel as WT A 202.
  • WT D 208 e.g., or any other wireless terminal in network 200 on the same transmission channel as the transmission from WT A to WT B
  • the third wireless terminal WT C 206 may yield transmissions on a first transmission channel to the first wireless terminal WT A 202 only when WT A 202 has higher priority than WT C 206.
  • the priority for each transmitting wireless terminal can be based on a particular priority scheme, such as priority based on its frequency index assignment, for example. In a priority-based arrangement, lower priority terminals or devices may yield to higher priority terminals or devices.
  • the third wireless terminal WT C 206 may send a traffic request 215 at power P c to the fourth wireless terminal WT D 208.
  • the fourth wireless terminal WT D 208 may perform receiver yielding if transmissions from WT C 206 are likely to interfere with transmissions from WT A 202 to WT B 204.
  • the fourth wireless terminal WT D 208 may not send an echo transmission to the third wireless terminal WT C 206, thereby declining the connection and yielding to the connection between WT A 202 and WT B 204.
  • WT D 208 may receive the traffic request 214 at power Pc * hue (where hue is the channel gain between WT C and WT D) and the traffic request 210' at power PA * //AD (where /?AD is the channel gain between WT A and WT D).
  • connection scheduling and prioritization may be achieved.
  • FIG. 3 illustrates one example of a transmission channel architecture 300 that may be used by wireless terminals to transport control signaling and traffic for a peer-to-peer communication connection between wireless terminals.
  • a channel architecture includes a control slot 314 in inserted every so often between traffic slots 310.
  • a peer-to-peer transmission channel 300 may include a plurality of traffic slots 310. Traffic slots 310 are time intervals during which a transmitter terminal may send peer-to-peer traffic data to a receiver terminal through the transmission channel.
  • Each traffic channel slot 310 may include a traffic management channel 301 and a traffic channel 303.
  • the traffic management channel 301 may be used for signaling related to traffic data transmissions in the traffic channel 306.
  • a connection scheduling segment 302, a rate scheduling segment 304, and an acknowledgment segment 308 are collectively referred to as the traffic management channel 301.
  • a data transmission segment 306 may be referred to as the traffic channel 303.
  • the connection scheduling segment 302, the rate scheduling segment 304, the data segment 306 and the acknowledgment 308 shown in FIG. 3 comprise a traffic slot.
  • the connection scheduling segment 302 may be used by a transmitter terminal to indicate to its receiver terminal (in a peer-to-peer connection) to indicate that it is ready to transmit traffic data.
  • the rate scheduling segment 304 allows the transmitter/receiver terminals (in the peer-to-peer connection) to obtain a transmission rate and/or power to use in transmitting the traffic data.
  • the data transmission segment 306 is then used to transmit the desired traffic data at the obtained transmission rate and/or power.
  • the acknowledgement segment 308 may be used by the receiver terminal to indicate that the traffic data was received or not received in the data transmission segment 306.
  • the time duration of a traffic slot is approximately two (2) milliseconds. As the traffic slots 310 repeat over time, the time sequence structure shown in FIG.
  • the transmitter and receiver terminals may have established a peer-to-peer connection via a control slot 304 (in Fig. 3).
  • the first device WT A 202 (FIG. 2) may transmit a first transmission request, which is heard by the second device WT B 204.
  • the second device WT B 204 then transmits a second transmission request response, which is heard by the first device WT A 202 so that the first device knows that the second device is ready to receive traffic transmission from the first device.
  • Both the first and the second devices WT A 202 and WT B 204 proceed to the second stage.
  • the second transmission request response is also heard by the third device, which will determine whether it will cause large enough interference to the second device if it chooses to proceed to transmit traffic channel. If it is determined that it will cause excessive interference, the third device will choose not to proceed to the second stage of the protocol. For the sake of description, it is assumed that the traffic transmission from the third device is of lower scheduling priority.
  • the first device WT A 202 transmits a first pilot signal. If the third device WT C 206 does not drop out in the connection scheduling stage, it also transmits a second pilot signal.
  • the second device WT B 204 determines a data rate it can support of the traffic transmission from the first device WT A 202 as a functional of the received signal strengths of the first pilot from the first device and the second pilot from the third device.
  • the second device WT B then sends a rate report to the first device WT A 202 which includes the determined data rate.
  • the first device WT A 202 determines an actual data rate, as a function of the received rate report from the second device WT B 204, and transmits traffic to the second device WT B 204.
  • the transmission channel 300 may also include a control channel 314 comprising a plurality of control slots 314.
  • a control slot 314 may serve to establish and maintain a peer-to-peer connection between the transmitter and receiver terminals.
  • Each control slot 314 may include a Signaling Broadcast Channel 316 and a Paging Channel 318.
  • the Signaling Broadcast Channel 316 may be used, for example, to indicate those peer-to-peer connection identifiers (CIDs) that are in use by nearby connections and to indicate whether a peer-to-peer connection is still alive.
  • the transmitter and receiver terminals may monitor the Signaling Broadcast Channel 316 to determine which CIDs are in use.
  • the Paging Channel 318 is used by the transmitter and receiver terminals to establish new CIDs for a new peer-to- peer connection.
  • the control slots 314 may occur at much longer intervals than traffic slots 310. For instance, the control slots 314 may occur every second or so.
  • FIG. 4 illustrates an example time-frequency grid 400 that may be used in signal transmissions over the channel architecture of FIG. 3.
  • the exemplary signal may be an OFDM signal.
  • the time-frequency grid 400 is the resource available for transmitting and/or receiving signals over a peer-to-peer network, e.g., during a control slot (e.g., control slot 314) and/or traffic channel slot (traffic slot 310 in Fig. 3 within traffic management channel 301).
  • the x-axis represents time and may include N symbols (e.g., where N may be any integer), and the y-axis represents frequency and may include M tones (e.g., where M may be any integer).
  • a transmitter and/or receiver terminal may use the time-frequency grid 400 in the traffic management channel.
  • the time-frequency grid may be considered a connection identifier CID resource space from which a terminal may select a CID resource unit corresponding to a CID.
  • a transmitter terminal may select a CID resource unit to signal a transmission request to the corresponding receiver terminal of the connection associated with the CID.
  • the receiver terminal may select a CID resource unit to signal a request response to the transmitter terminal.
  • the CID resource units available for the transmitter terminal and for the receiver terminal may be partitioned a priori in a fixed manner so that the transmitter terminal selects a CID resource unit in a fixed subset of the total time-frequency grid of the traffic management channel, while the receiver terminal selects a CID resource unit in a different fixed subset of the total time-frequency grid 400 of the traffic management channel.
  • Such CID resource space may be transmitted, for example, in a control slot 314 and/or traffic slot 310 (e.g., within traffic management channel 301).
  • a CID resource unit may be defined by a symbol-tone combination (e.g., a subset of tones within a symbol).
  • a terminal may select a particular symbol (e.g., transmission time) for transmission based upon an identifier of the wireless terminal or a user who is utilizing the wireless terminal and/or a time variable (e.g., time counter) that may be commonly understood within a peer-to-peer network to identify the current slot interval. Further, a particular tone corresponding to the selected symbol may be determined (e.g., based upon the identifier and/or time variable).
  • a hash function of the identifier and the time variable may yield the selected symbol position and/or tone position. For example, for a given peer-to-peer connection, when the time variable takes a first value, the hash function may yield symbol X 1 and tone yi such that the wireless terminal transmits a single-tone signal as the CID resource unit. When the time variable takes a second value, the hash function may yield symbol x 2 and tone y 2 such that the wireless terminal transmits a single-tone signal P 2 as the CID resource unit.
  • the second terminal may send back a traffic request response signal, also in the traffic management channel 301. It is also possible that the second terminal does not send back the traffic request response signal if it senses that another higher priority transmitter is also requesting use of the current traffic slot.
  • the first terminal receives the traffic request signal from the second terminal and possibly other traffic request signals from other terminals in the peer-to-peer network, it will make a decision on whether or not to use the current traffic slot. The decision is made by measuring the signal strength of the traffic request response signals from higher priority receiver terminals in the peer-to-peer network. If any of the signals has strength above a certain threshold, the first terminal thinks that it is creating a strong interference for the corresponding higher priority receiver terminal and will decide to refrain using the current transmit slot.
  • FIG. 5 is a flow diagram illustrating the operation of various wireless terminals in an ad hoc peer-to-peer network that facilitates connection scheduling where a plurality of wireless terminals share a communication channel.
  • the shared communication channel includes a control channel and a transmission channel.
  • a first wireless terminal WT A 502 may select a transmit power P A and transmits a traffic request at power P A 508 (or at a power proportional to P A ) over the control channel to a second wireless terminal WT B 504.
  • Such traffic request may serve to establish a peer-to-peer connection between WT A 502 and WT B 504 over a transmission channel associated with the control channel.
  • the channel gain between WT A 502 and WT B 504 is denoted by ⁇ AB -
  • the second wireless terminal WT B 504 may determine whether the received power (P A * /? AB ) of the traffic request is likely to interfere with a nearby transmissions of higher priority and, if so, does not send an echo or reply transmission 509 to the first wireless terminal WT A.
  • WT B may estimate the signal to interference ratio, where the desired signal power is (PA * ⁇ AB), while the interference power is determined by the received power of other traffic requests with higher priority. Those traffic requests are sent by other transmitters to their corresponding receivers.
  • the second wireless terminal WT B may obtain a transmit power P B that is proportional to 1/(P A * ⁇ AB ) 510.
  • the second wireless terminal WT B 504 may then broadcast a reply or echo transmission at power P B 512 (denoted 512a or 512b) in response to the traffic request from WT A.
  • the first wireless terminal 502 may then transmit to the second wireless terminal WT B 504 over the transmission channel 514 associated with the control channel.
  • the echo transmission 512 (denoted 512a or 512b) is broadcast over a shared communication channel
  • other nearby devices such as third wireless terminal WT C 506, may receive the echo transmissions.
  • the third wireless terminal WT C 506 may cause unacceptable interference to the transmissions between WT A and WT B.
  • the connection of WT C is of lower priority than the connection between WT A and WT B in the present traffic slot.
  • WT C may need to make sure its intended traffic transmission does not create excessive to the receiver device WT B. Therefore, the third wireless terminal WT C 506 may ascertain a relative measure between its transmission (P c * ⁇ BC) and the transmission from WT A (P A * ⁇ AB), as received by the second wireless terminal WT B, where Pc is the transmission power for the third wireless terminal WT C.
  • the power of the echo transmission as received at the third wireless terminal WT C is proportional to the channel gain /? BC and the echo transmission power PB or /ZBC/(PA * ⁇ AB)
  • a ratio (PA * /*AB)/( PC * ⁇ BC) may be ascertained.
  • the third wireless terminal WT C 506 can use this ratio as an indicator of whether its transmissions may negatively impact reception of the transmissions from the first wireless terminal WT A 502 to the second wireless terminal WT B 504.
  • the third wireless terminal WT C 506 may conclude that its transmissions will have an unacceptably negative impact on the transmissions from WT A 502 to WT B 504 and yield the transmission channel to the first wireless terminal WT A 516. Otherwise, if the ratio (P A * ⁇ AB)/( PC * ⁇ BC) is less than or equal the SINR threshold, it may transmit on the shared transmission channel (e.g., to WT B or another device) 518.
  • Transmission priority for each transmitting wireless terminal may be based on a particular priority scheme, such as priority based on its frequency index assignment, for example. In a priority-based arrangement, lower priority terminals or devices may yield to higher priority terminals or devices.
  • a wireless terminal may also adjust its transmit power to avoid causing interference to nearby wireless terminals.
  • a wireless terminal may include a variable power transmitter and a receiver.
  • a transmit power is obtained by a wireless terminal and used for communications over its control channel and the corresponding transmission channel. Note that, in one example, the same transmit power is used in the control channel and the traffic channel, thereby facilitating connection scheduling.
  • the transmit power may be determined in different ways.
  • the transmit power may be a constant power Po, or power controlled (e.g., power Po divided by channel gain h), or a function of power P 0 and channel gain h (e.g., Po/Vh).
  • the channel gain h is a value between zero (0) and one (1) (e.g., 0 ⁇ h ⁇ 1) and may be obtained by the transmitter wireless terminal beforehand, for example, during paging or discovery phases of establishing the peer-to-peer connection.
  • a wireless terminal may transmit at constant power P 0 .
  • the wireless terminal may create more interference than necessary. This is because the constant transmit power P 0 is typically selected for the longest communication range which is wasted in shorter range communications. Therefore, unless a connection has the highest priority, use of constant power Po will cause frequent transmitter yielding and/or receiver yielding since it will cause interference with other connections. Thus, a connection using constant transmit power Po may be active for very small periods of time scheduled since transmitter yielding and/or receiver yielding will cause other connection (e.g., those that cause less interference or have higher priority) to be favored. Additionally, the use of a constant transmit power is also wasteful of limited power resources often available to mobile or portable wireless terminals.
  • a wireless terminal may transmit at a controlled power P 0 /h (taking into account channel gain h) so that the received power is constant.
  • the power may be adjusted based on channel gain.
  • the controlled transmit power P 0 /h may be lower than ideal, especially where the channel is susceptible to sporadic interference.
  • the scaled transmit power Pscaied may be a predetermined constant power Po, or a function of measured channel gain, e.g., inversely proportional to channel gain C* Po/h, or to the square root of channel gain D*(P 0 / Vh), where C and D may be different scaling factors for antenna gains (e.g., for receiver and/or transmitter antennas).
  • the wireless terminal WT A 502 may reduce interference to other wireless terminals and, consequently, may have the opportunity to have transmissions scheduled more often.
  • FIG. 6 is a flow diagram illustrating how transmit power scaling may be implemented for a peer-to-peer connection between two wireless terminals.
  • a first wireless terminal WT A 602 may obtain a channel gain II AB 606 for the communication channel to a second wireless terminal WT B 604.
  • the wireless terminal WT A 602 may obtain a scaled transmit power P A based on a constant power Po and a function f of the channel gain II AB 608.
  • connection scheduling may be performed 607 for the connection between the wireless terminals WT A 602 and WT B 604.
  • such connection scheduling may be performed according to a transmitter yielding and/or receiver yielding scheme as illustrated in FIGS. 3 and 4, and/or during the connection scheduling segment 302 of FIG. 3.
  • the first wireless terminal WT A 602 may then transmit a pilot signal at a power C * P A 610 to the second wireless terminal WT B 604. That is, the total pilot transmit power may have a fixed relationship with the total data transmit power of the corresponding data traffic segment. For example, depending on the signal format of the pilot signal, if the pilot is a single-tone signal while the data signal is spread across many tones, then the per tone power may be higher for the pilot signal than for the data signal.
  • the second wireless terminal WT B 604 may then obtain or select a transmission rate R AB based on the received signal power P A * h A ⁇ 612. This transmission rate R AB is sent 614 to the first wireless terminal WT A 602 which can then transmit on a shared transmission channel at power P A and at the transmission rate R AB 616.
  • the relationship between the power a first terminal uses to send traffic request signal to a second terminal and the power the first terminal uses to send the traffic data in the traffic slot is universally well understood throughout the network since the powers will directly affect the receiver yielding decisions made at the receiver terminals and may also affect the transmitter yielding decisions at other transmitter terminals.
  • the relationship is to enforce the transmit power of the traffic request signal to be proportional to the transmit power of the actual traffic data transmission, where the ratio between the two may be constant and known to all the terminals in the network. In one example, the constant is equal to 1.
  • the transmitter terminal may want to adjust the above power ratio.
  • the transmitter terminal may want to reduce the transmission power of the traffic slot, so that it would cause less interference to other high priority traffic transmissions - this way, the transmitter terminal may not have to TX yield to those high priority traffic transmissions. In another example, if the transmitter terminal does not have much data to send, using large transmission power in the traffic block is wasteful.
  • the transmission power per degree of freedom e.g., per tone in an OFDM symbol
  • a device may wish to transmit a small amount of data that is smaller than a normal traffic frame size or length. Consequently, the small amount of data can be transmitted in a "small packet" rather than a normal traffic frame.
  • a "small packet” may include a packet or amount of data that is smaller than a maximum threshold length. Such "small packet” has a length that is smaller, by a pre-determined amount, than a normal frame length. For instance, the small packet may have a length or size that is smaller by fifty percent or smaller than the normal frame size. In other example, a typical frame size may be 4000 bits long and a small packet is 1000 bits or less.
  • a transmitter When transmitting a small packet, a transmitter intends to use less traffic transmission power than when transmitting a normal packet, so that the small packet traffic transmission causes less interference to other traffic transmissions in the vicinity.
  • the reason that the transmitter is able to reduce transmission power without scarifying communication reliability is that the transmitter may use low coding rate to maintain the required Eb/N0.
  • the corresponding control information e.g., transmission request, may need to be transmitted at the same power as it would have had the transmission been a normal or large packet transmission. This is because the same amount of control information needs to be communicated irrespective of whether traffic is a small or normal packet.
  • a receiver device Under normal receiver yielding, a receiver device may seek to reduce a transmitter device's traffic transmission power to minimize interference to other nearby device.
  • a rate prediction algorithm can be split into a channel measurement stage and an interference measurement stage.
  • a small packet transmitter device uses the full power for the channel measurement stage whereas it uses a reduced power for the interference measurement stage. This has the advantage of providing a good channel estimate, since the transmitter device used the full power, without compromising on the interference measurement since the transmitter used the reduced power in the interference measurement part that will also be used for the data transmission.
  • the transmitter power is reduced since a smaller packet will require much lower SNR. This will maintain the E_b/N_0 for the transmission as well as minimize the interference caused to other wireless communications happening in the same spectrum.
  • FIG. 7 illustrates an example of how power may be reduced when transmitting a small packet in a peer-to-peer network.
  • a first device WT A 702 has a peer- to-peer connection with a second device WT B 704 while a third device WT C 706 has a peer-to-peer connection with a fourth device WT D 708. Since the devices operate within range of each other in a shared frequency spectrum, transmissions from the third device WT C 706 to the fourth device WT D 708 are considered "interfering" to transmissions from the first device WT A 702 to the second device WT B 704.
  • the first device WT A 702 intends to transmit a small packet to the second device WT B 704 over their peer-to- peer connection.
  • Such small packet size or length may be an amount of data that is smaller than a threshold size or data length.
  • the first device WT A 702 first determines whether the data traffic to be transmitted in the current time slot is "small” (e.g., smaller than a certain threshold size) or not and select either a small packet or normal packet indicator depending on size of data traffic to be sent 711.
  • the first device WT A 702 uses the same first power level in the transmit request resource as it does for any other normal size or length packet transmission. That is, the first device WT A sends a first transmission request to the second device WT B at the first power level along with a packet size indicator 712.
  • Such indicator may be a single bit, or one or two phases that indicates either a normal or small packet.
  • the transmitter device may have two tones to signal the traffic request, in which case the transmitter may use a first tone to send a reference symbol and a second tone to signal information related to whether the corresponding traffic is a small or normal packet, and if it is a small packet, how much power backoff (i.e., power reduction) the transmitter will use in the traffic signal relative to the power used for a normal packet traffic.
  • the information is signaled in the phase of the second tone.
  • phase of the second tone may not be discrete.
  • the phase value in between 90 and 270 degrees represents a power backoff value between the minimum and the maximum values. This way, the phase can be used to signal much more possible power backoff values.
  • the second device WT B 704 echoes the request response using the same second power level as it uses for normal size or length packet transmission. That is, the second device WT B sends a first transmission request response to the first device WT A at the normal second power level 714.
  • the second power level may be inversely proportional to the first power level. It is desirable, though not required, for the small packet transmitter first device WT A 702 to also indicate the nature of the transmission by marking one bit in transmit request message. [00103]
  • the transmitter devices WT A 702 and WT C 806 operate as discussed under the baseline protocol.
  • the lower priority third device WT C 706 may detect the request response 714b and determine whether its own data traffic transmission in the same traffic slot will cause unacceptable interference to the second device WT B 704.
  • the request response 714 is inversely proportional to the transmit power of the first device WT A 702
  • the third device WT C 706 knows whether its own transmit power will cause unacceptable interference to the second device WT B 704.
  • the receiver devices WT B 704 and WT D 708 have to first decide the nature of the interfering transmissions, if available, and take that into account in making the yielding decision.
  • the receiver fourth device WT D 708 may sense a higher priority transmitter WT A 702 with strong received power in the request signal but it also finds out that the transmission (from WT A to WT B) is a small packet transmission. The fourth device WT D 708 can find this out because this information is included in the first transmission request. In this case, the fourth device WT D 708 might not have to yield since the traffic transmission power of the transmitter WT A 702 will be much smaller than the first power level it used in the connection scheduling stage 710.
  • the fourth device WT D 708 can predict the interference power caused by the traffic signal from WT A by using the measurement from the traffic request signal 712 and the decoded power backoff. For example, if the measured power of the received traffic request signal is X and the power backoff announced by WT A is Y, then the predicted interference power may be XIY. For example, if Y is 10 dB, then the predicted interference power is 10 times smaller than the measured power of the received traffic request signal.
  • WT C to WT D traffic is of lower priority than WT A to WT B traffic so that WT D needs to consider the receiver yielding.
  • WT A to WT B traffic is of lower priority than WT C to WT D traffic
  • WT A needs to consider the transmitter yielding.
  • the transmitter device WT A 702 may sense a higher priority receiver WT D 708 with strong received power in the request response signal but it also knows that the transmission (from WT A to WT B) is a small packet transmission.
  • WT A 702 might not have to yield since the traffic transmission power of the transmitter WT A 702 will be much smaller than the first power level it used in the connection scheduling stage 710 so that WT A may not cause as much as interference to WT D.
  • the power backoff used by WT A is 10 dB
  • the interference from WT A to WT D is ten (10) times smaller when WT A is going to transmit a small packet traffic than when WT A is going to transmit a normal packet traffic.
  • the rate prediction algorithm is split in two parts: first a channel measurement part, and second an interference measurement part.
  • the small packet transmitter first device WT A 702 uses the full power for the channel measurement part but uses the reduced power for the interference measurement part. This has the advantage of providing a good channel estimate, since the transmitter first device WT A used the full power, without compromising the interference measurement since the transmitter WT A 702 used the reduced power in the interference measurement part that will also be used for the data transmission.
  • pilot signals 720 and 722 are broadcast by the transmitter first device WT A 702 and third device WT C 706.
  • the second device WT B 704 can utilize the signal strength of the received pilots to generate a first maximum rate for traffic transmissions 724 from the first device WT A 702. This first maximum rate is provided 726 to the first device WT A 702. Additional power back off for the transmitter device WT A 702 can also be signaled by the receiver device WT B 704, since now the second device WT B 704 has a more precise estimation of the channel condition. For a small packet transmission, the rate granularity required would in general be much smaller than the large packet transmission.
  • the transmission is a small packet transmission has already been communicated to the receiver during the connection scheduling stage. Therefore, remaining bits in the rate feedback can be used to indicate to the intended transmitter to further reduce the power of the transmission. This will not improve the rates for other devices, but will reduce the interference caused to other devices and also increase the battery life of the device.
  • flash signaling may be used to transmit small packets over the data burst of a large size. That is, an indication of a packet size may be provided by using one of either Gaussian signaling or flash signaling.
  • one option is to let the small-packet transmitter WT A indicate its intention to transmit a flash signaling packet by marking one bit in the transmit request message.
  • the small packet receiver WT B monitors the transmit request resource and echoes a transmit request response, which also carries the information of the nature of the granted transmission.
  • a set of preferable rules for making transmitter and receiver yielding decisions may be defined among devices.
  • a different threshold is used on the received power in the transmit request resource for making yielding decision to interfering normal transmission as compared to the threshold used to receive a normal size packet transmission.
  • the baseline protocol (described in FIGS. 2, 3, 5, and 6) is used to make yielding decision against other interfering normal packet transmissions.
  • the normal packet receiver uses a different threshold to decide whether to yield to a higher priority interfering flash transmission.
  • the threshold is chosen such that the flash transmission does not desense the reception from its intended transmitter.
  • the yielding decision can also take into account of the loss of degrees of freedom due to the presence of higher priority flash signaling devices.
  • the transmitter monitors the request responses in the transmission request response resource. Similarly, the transmitter uses a different power threshold to decide whether to yield to an interfering normal packet transmission as compared to the threshold it would use if the transmission is for a normal packet. More precisely, the yielding decision is made when the flash signaling transmitter realizes that it might desense a higher priority normal packet transmission.
  • the transmitter uses the baseline protocol (described in FIGS. 2, 3, 5, and 6) to decide whether to yield to another normal packet transmission. It will use a different threshold to decide whether to yield to a small packet transmission.
  • connection scheduling is to use the same signaling as in the baseline protocol (described in FIGS. 2, 3, 5, and 6) for both small packet and normal packet transmissions.
  • the transmitter device monitors the transmission request response resource and makes a decision then about whether to use flash signaling or not.
  • a small packet transmitter might decide to use flash signaling if all or part of the following conditions are satisfied:
  • the number of bits contained in the current packet can be transmitted using flash signaling (e.g., the data traffic packet is smaller than a threshold size).
  • a normal transmission is not allowed, e.g., the transmitter would have to yield to other higher priority transmissions if the baseline protocol is used.
  • the flash signaling transmission would not desense any other higher priority transmissions.
  • the transmitter In the rate scheduling stage, if the flash signaling decision is made at the end of the connection scheduling stage, it is necessary for the transmitter to indicate its intention to use flash signaling here.
  • An easy way to do this is for the transmitter to use a different pilot scheme other than the pilot scheme used by normal packet transmissions.
  • a normal packet transmission can use pseudo-random noise (PN)-like pilot signal in rate scheduling stage while a flash signaling format can use beacon-type pilots.
  • PN pseudo-random noise
  • the intended receiver has to make a binary hypothesis testing to check the format of the data transmission.
  • the total power to be used on the pilots are the same for both pilot formats so that other coexisting receivers can still get a good estimate of the interference caused by the flash signaling transmitter.
  • the small packet transmitter In the traffic transmission stage, the small packet transmitter, if deciding to use Flash signaling transmission, will only put power on a subset of the degrees of freedom in the current data burst.
  • the data information will be carried over the position of these degrees of freedom only or a combination of position and phase difference.
  • part of the degrees of freedom used in flash signaling will serve as pilots for the total transmission.
  • a small packet can transmit around 400-600 bits over a data burst of 6000 degrees of freedom without causing much disturbance to the neighboring normal transmissions, i.e., the other transmissions will take the degrees of freedom used by flash signaling as erasures, which can be recovered from coding.
  • a first device WT A sends a high energy tone at a fixed power (Pl) and a fixed phase (thetal) for all segments.
  • 13 may be the interference that the second device WT B receives from the third device C.
  • the complex numbers Sl and 13 are known to the second device WT B which can be done, for example, through the pilot control channel or connection scheduling channel or a combination of both.
  • the second device WT B then uses Sl and 13 to determine the high energy tone that was sent by the first device WT A.
  • tone t that is: argmax
  • ⁇ 2 (Rule 1) t 1,..., 64
  • Rule 1 does not use 13, where as Rule 3 which is a generalization of Rule 2 uses 13 and hence performs better, but is more complicated to evaluate.
  • the first device WT A sends the high energy tone at a fixed power (Pl), but a phase (thetal(s)) that is changing pseudo-randomly with segment s.
  • I3(s) is the interference that the second device WT B receives from the third device WT C.
  • the complex numbers Sl(s) and 13 (s) are known to the second device
  • the second device WT B uses Sl(s) and 13 (s) to determine the high energy tone that was sent by first device WT A.
  • the idea is that the received signal should be have high energy, and be closer to Sl(s), but not close to I3(s).
  • Three canonical rules can be used by the second device WT B for this purpose.
  • a good choice for the pseudo-random variation thetal(s) is that it is independent across segments and uniform between 0 and 2*pi for each segment.
  • Scheme 3 is very similar to scheme 2, but both power and phase change pseudo- randomly with the segment. That is, the first device WT A sends the high energy tone at a power (Pl(s)) and phase (thetal(s)) that are changing pseudo-randomly with segment s.
  • I3(s) be the interference that the second device WT B receives from the third device WT C.
  • the complex numbers Sl(s) and I3(s) are known to the second device WT B for each segment which can be done, for example, through the pilot control channel / link scheduling or a combination of both.
  • the second device WT B uses Sl(s) and I3(s) to determine the high energy tone that was sent by the first device WT A.
  • the idea is that the received signal should be have high energy, and be closer to Sl(s), but not close to I3(s).
  • the canonical rules that the second device WT B uses are the same as that of scheme 2.
  • a good choice for the pseudo-random variation thetal(s) is that it is independent across segments and uniform between 0 and 2*pi for each segment, and a good rule for the pseudo-random variation Pl(s) is that the lowest value that it takes be lower bounded by IOdb over interference. This is so that the tone does not get confused with the background Gaussian interference.
  • a flash signaling receiver first estimates the phase rotation from its intended transmitter in the rate scheduling phase of the protocol and then uses the estimated phase rotation in addition to received power level to determine the set of tone- symbols (degrees of freedom) used by its Flash transmitter in the data transmission segment.
  • a flash signaling transmitter first determines a subset of tone-symbols (or degrees of freedom) in the data transmission block based on the codeword to be transmitted. The information is coded by the position of these tone-symbols.
  • the transmitter may apply phase rotation pattern to the signals to be transmitted over the chosen tone-symbols where said phase rotation pattern is a based on the identity of the transmitter, which is known by its receiver.
  • FIG. 8 illustrates a method operational at a second device having a peer-to-peer connection with a first device to facilitate interference management of small packet transmissions using flash signaling within an ad hoc wireless network.
  • the second device receives a signal in a plurality of predetermined subsets of resource units 802.
  • the calculation of the first phase is not based on the received signal but based on the expected format of the desired signal.
  • the expected format may be determined by the identifiers of the connection, the transmitter and/or receiver.
  • the second device may use the rules described in the above.
  • the second device may further recover information bits transported in the desired signal from the location of the determined one resource unit in each of the plurality of predetermined subsets of resource units 808.
  • the calculated first phase may be the same in each of the plurality of predetermined subsets of resource units and is generated from at least one of a first identifier associated with the first device, a second identifier associated with the second device and the peer-to-peer connection between the first and second devices.
  • the calculated first phase may be determined as a function of a predetermined sequence, the calculated first phase being different in different ones of the predetermined subsets of resource units.
  • the predetermined sequence may be generated from at least one of a first identifier associated with the first device, a second identifier associated with the second device and the peer-to-peer connection between the first and second devices.
  • the second device may also calculate a power to be used in the desired signal in each of the plurality of predetermined subsets of resource units, wherein the calculated power is determined as a function of a predetermined sequence, where the calculated power is different in different predetermined subsets of resource units, and the one resource unit is also determined as a function of the calculated power 810.
  • the second device may also calculate a second phase to be used in an interference signal in each of the plurality of predetermined subsets of resource units, the interference signal being transmitted by an interfering device, wherein the one resource unit is also determined as a function of the calculated second phase 812.
  • FIG. 9 illustrates a method operational at a first device having a peer-to-peer connection with a second device to facilitate interference management of small packet transmissions within an ad hoc wireless network.
  • the first device may partition a set of resource units into a plurality of predetermined subsets of resource units 902 and then determines one resource unit in each of the plurality of predetermined subsets of resource units as a function of a set of bits 904.
  • the set of resource units are partitioned into 100 subsets, each of which having 64 resource units. Then for each subset, the first device determines one of the 64 resource units to send a signal, and the choice depends on the 6 bits to be signaled in the subset.
  • the set of 600 bits may be generated from a set of information bits with an encoder.
  • a signal is then transmitted by the first device in the determined one resource unit in each of the plurality of predetermined subsets of resource units 906.
  • the phase of the transmitted signal in the determined one resource unit is the same in each of the plurality of predetermined subsets of resource units and is generated from at least one of a first identifier associated with the first device, a second identifier associated with the second device and the peer-to-peer connection between the first and second devices.
  • the first device may further generate a plurality of phases as a function of a predetermined sequence, where the phase of the transmitted signal in the determined one resource unit in each of the plurality of predetermined subsets of resource units is equal to one of the generated plurality of phases 908.
  • the predetermined sequence may be generated from at least one of a first identifier associated with the first device, a second identifier associated with the second device and the peer-to-peer connection between the first and second devices.
  • the first device may also generates a plurality of power values as a function of a predetermined sequence, wherein the power of the transmitted signal in the determined one resource unit in each of the plurality of predetermined subsets of resource units is equal to one of the generated plurality of power values 910.
  • a transmission request may have a first transmit power which is indicative of the transmit power of a subsequent traffic signal.
  • the power used for the transmission request signal may be the same power as is subsequently used to transmit a traffic signal in a corresponding traffic slot.
  • a transmitter first device WT A may use the first power for the transmission request to a second device WT B but utilizes a lower second power for the small packet traffic transmissions.
  • the transmitter first device may not have much flexibility to adjust the coding rate used in the transmission request signal, the transmission power in the request signal may not be reduced proportionally if it is determined that the traffic transmission power is to be reduced. Otherwise, the transmission request signal would be less reliable.
  • a transmitter first device may determine the transmission power to send traffic data in a current traffic slot when the transmission request signal is sent so that other neighboring devices in the peer-to-peer network can use the measurement from the transmission request signal in order to properly predict and manage the interference in the traffic slot.
  • the transmitter first device may determine a power ratio between the traffic signal and the transmission request signal, and further broadcasts the determined power ratio, e.g., in the transmission request signal.
  • the power ratio may be one of two predetermined values.
  • the transmitter first device may choose one of the two values, and broadcasts the choice in the transmission request signal (e.g., using 1 bit). The transmission power used in the transmission request signal remains the same.
  • the traffic transmission power is in effect changed.
  • the transmitter terminal does not have much data traffic to send in the traffic data block (i.e., a small packet mode)
  • the difference between the two power ratios is at least 10 dB.
  • the power ratio can be one of a predetermined set of discrete values.
  • the power ratio can be any value between the predetermined minimum and maximum values, in which case the possible value of the power ratio is not discrete but continuous.
  • the receiver second device When the receiver second device recovers the specific power ratio to be used from the received request signal, the receiver second device predicts the received power of traffic transmission from the power ratio and the measured power of the received transmission request signal. The receiver second device then predicts the signal-to-interference ratio of the traffic transmission to determine whether it is ready to receive traffic transmission from the transmitter first device. If so, the receiver second device sends a request response signal to inform the transmitter first device.
  • the transmission power of the request response signal is determined as a function of the received power of the transmission request signal. For example, the transmission power of the request response signal is inversely proportional to the received power of the transmission request signal.
  • the power of the request response signal may be independent of the power ratio. In other words, even if the receiver second device notices from the received power ratio information in the request signal that the transmitter first device is going to reduce the traffic transmission power, the receiver second device does not increase or decrease the transmission power of the request response signal.
  • a first device WT A sends a first transmission request signal with a first power level to a second device WT B in a first transmission request resource associated with a first traffic slot.
  • the transmission request signal may include a first packet length information for a first packet to be transmitted in the current traffic slot.
  • the first device WT A then sends a first traffic signal including the first packet over the first traffic slot with a second power level.
  • the first device may also send a second transmission request signal with the first power level to the second device in a second transmission request resource associated with a second traffic slot.
  • the second transmission request signal including a second packet length information, where the second packet length information is different from first packet length information.
  • the first device then sends a second data transmission signal over the second data transmission resource with a third power level, where the third power level is at least 3dB smaller than the first power level.
  • the transmitter first device may wish to adjust its announced power ratio of transmission requests signal power to traffic signal power.
  • the transmitter first device may want to reduce the transmission power of the traffic slot, so that it causes less interference to other high priority traffic transmission. This way, the transmitter first device may not have to perform transmitter yielding to favor other higher priority traffic transmissions.
  • the transmitter first device may not have much data to send, and using large transmission power in the current traffic slot is wasteful.
  • the transmitter first device When the transmitter first device reduces the transmission power, although the transmission power per degree of freedom (e.g., per tone in an OFDM symbol) is reduced, the transmitter first device can use a low coding rate to compensate the reduced SNR per degree of freedom and therefore maintain the proper Eb/NO requirement. In effect, the transmitter first device adjusts the coding rate, and therefore the amount of data to be transported in the traffic slot, in order to accommodate the reduction in transmission power.
  • the transmission power per degree of freedom e.g., per tone in an OFDM symbol
  • FIG. 10 illustrates a method of operating a first wireless device in a peer-to-peer communication network.
  • the first wireless device having a connection with a second wireless device.
  • the first device may select a first power ratio value from a plurality of predetermined power ratio values 1002.
  • a first transmission request signal is sent by the first device in a first traffic slot 1004.
  • the first device then monitors (e.g., the first traffic slot) to receive a request response signal from the second wireless device, the request response signal indicating that the second wireless device is ready to receive a traffic signal from the first wireless device 1006.
  • the first device may send a first traffic signal in the first traffic slot with the transmission power determined as a function of the transmission power of the first transmission request signal and the determined first power ratio value 1014.
  • the first device may send a first pilot signal in a first part of a pilot channel associated with the first traffic slot, where the transmission power of the first pilot signal being a function of the transmission power of the first transmission request signal 1008.
  • the first device may send a second pilot signal in a second part of the pilot channel the transmission power of the first pilot signal being a function of the transmission power of the first traffic signal 1010.
  • the first device monitors (e.g., the current traffic slot) to receive a rate feedback signal in a rate feed back channel associated with the first traffic slot, and wherein the transmission power of the first traffic signal is determined also as a function of the rate feedback signal 1012.
  • the ratio of the power of the first traffic signal and the power of the first transmission request signal may be equal to the determined first power ratio value.
  • the first transmission request signal may include information (e.g., such as a rate bit) indicative of the determined first power ratio value.
  • the first power ratio value is selected from two predetermined power ratio values, where the difference between the two predetermined power ratio values is at least 10 dB.
  • the first power ratio value may be determined as a function of the amount of data to be sent in the first traffic signal.
  • the first request signal may be sent in two tones and the information indicative of the determined first power ratio value is signaled in a phase difference between the two tones.
  • the plurality of predetermined power ratio values may include values in a continuous interval between two predetermined values.
  • the first device may also check an amount of traffic data to be sent to the second wireless device 1016.
  • a second power ratio value may be selected by the first device, as a function of the amount of data to be sent, from the plurality of predetermined power ratio values, where the second power ratio value is different from the first power ratio value 1018.
  • a second transmission request signal is then sent in a second traffic slot 1020.
  • the first device may then monitor to receive a request response signal from the second wireless device, where the request response signal indicates that the second wireless device is ready to receive a traffic signal from the first wireless device 1022.
  • the first device sends a second traffic signal in the second traffic slot with the transmission power determined as a function of the transmission power of the second transmission request signal and the determined second power ratio value 1024.
  • the amount of data to be sent in the second traffic slot may be at least twice as much as the amount of data sent in the first traffic slot and the second power ratio is at least 10 dB greater than the first power ratio.
  • the transmission power of the second request signal may be the same as the transmission power used in the first request signal.
  • FIG. 11 illustrates a method of operating a second wireless device in a peer to peer communication network.
  • the second wireless device having a connection with a first wireless device.
  • the second device may be a target of traffic transmissions from the first device over a peer-to-peer connection.
  • a transmission request signal is received from the first wireless device, the first transmission request signal indicating that the first wireless device intends to send a traffic signal to the second wireless device and including information indicative of a power ratio value 1102.
  • the second device may recover the power ratio value from the transmission request signal 1104.
  • the power of the received transmission request signal may then be measured by the second device 1106.
  • the power of the traffic signal to be received from the first wireless device may be predicted by the second device as a function of the measured power of the received transmission request signal and the recovered power ratio value 1108.
  • the second device may then determine whether to receive the traffic signal from the first wireless device as a function of the predicted power 1110.
  • the second device then sends a request response signal to the first wireless device if it is determined to receive the traffic signal 1112.
  • the predicted power may be equal to the measured power of the received transmission request signal multiplied by the recovered power ratio value.
  • the transmission power of the request response signal may be determined as a function of the measured power of the received transmission request signal and may be independent of the recovered power ratio value.
  • FIG. 12 illustrates a method of operating a third wireless device in a peer to peer communication network.
  • the third wireless device may have a peer-to-peer connection with a fourth wireless device.
  • the third device is considered the interferer of peer- to-peer communications between a first and second device having higher priority.
  • the third device may receive a first transmission request signal in a traffic slot from the fourth wireless device, the first transmission request signal indicating that the fourth wireless device intends to send a traffic signal to the third wireless device 1202.
  • the third device receives a second transmission request signal in the traffic slot from a first wireless device, the second transmission request signal indicating that the first wireless device intends to send another traffic signal to a second wireless device different from the third wireless device, the second transmission request signal including information indicative of a power ratio value 1204.
  • the power ratio value may be recovered by the third device from the second transmission request signal 1206.
  • the power of the received first and second transmission request signals may be measured by the third device 1208.
  • the power of the desired traffic signal to be received from the fourth wireless device may be predicted by the third device as a function of the measured power of the received first transmission request signal 1210.
  • the power of the interfering traffic signal to be transmitted by the first wireless device may be predicted by the third device as a function of the measured power of the received second transmission request signal and the recovered power ratio value 1212.
  • the third device may then determine whether to receive the traffic signal from the fourth wireless device as a function of the predicted powers of the desired and interfering traffic signals 1214. If the third device determines that it can receive the traffic signal from the fourth wireless device it may send a request response signal to the fourth wireless device 1216.
  • the predicted power of the interfering traffic signal may be equal to the measured power of the received second transmission request signal multiplied by the recovered power ratio value.
  • the decision of whether to receive the traffic signal from the fourth wireless device may be determined as a function of ratio between the predicted powers of the desired and interfering traffic signals.
  • devices within a peer-to-peer network may undertake yielding decisions based on packet length information ascertainable from pilot signals.
  • a first device WT A may wish to transmit a small packet to a second device WT B via a first peer-to-peer connection while a third device WT C may wish to transmit a normal packet to a fourth device WT D.
  • a traffic slot consists of a traffic management (or traffic control) channel portion and a traffic channel portion.
  • the traffic channel portion is used to send actual data traffic, while the traffic control channel portion is used by the terminals for managing interference among them.
  • a first terminal WT-A intends to send traffic to a second terminal WT-B and a third terminal WT-C intends to send traffic to fourth terminal WT-D.
  • traffic transmissions from the first to second terminals is of higher priority than traffic transmissions from the third to fourth terminals traffic so the third terminal WT C (low-priority transmitter) has to make sure the interference it would generate to the second terminal WT-B (high-priority receiver) is acceptable, otherwise, the third terminal WT-C has to restrain (i.e., transmit yield) from sending the traffic to the fourth terminal WT-D in the present traffic slot.
  • the third terminal WT C low-priority transmitter
  • the third terminal WT-C has to make sure the interference it would generate to the second terminal WT-B (high-priority receiver) is acceptable, otherwise, the third terminal WT-C has to restrain (i.e., transmit yield) from sending the traffic to the fourth terminal WT-D in the present traffic slot.
  • the third terminal WT-C estimates the "interference cost" to the second terminal WT-B.
  • the "interference cost” is a function of the transmission power that the third terminal WT-C intends to use to send the traffic to the fourth terminal WT-D.
  • the third terminal WT-C may reduce its transmission power to reduce the interference cost so that it does not need to yield to the traffic from first to the second terminals WT-A and WT-B.
  • the "interference cost” may also be a function of the signaling format.
  • Two signaling formats are considered.
  • the first signaling format is a Gaussian signaling format, in which the signal occupies all the degrees of freedom.
  • the second signaling format is a non-Gaussian signaling format, referred to as a "flash signaling" format, in which the signal occupies a small fraction, e.g., 10%, of the total degrees of freedom.
  • the traffic channel portion includes a number of OFDM symbols, each OFDM symbol including a number of tones.
  • the Gaussian signaling format the signal is transmitted in all the tones of all the OFDM symbols.
  • the transmitter terminal may transmit a complex symbol, e.g., QPSK symbol, in every tone of every OFDM symbol.
  • the signal is transmitted in a small fraction of tones in some OFDM symbols.
  • the signal may be transmitted in only one tone in every OFDM symbol.
  • the interference cost calculated by third terminal WT C may depend on whether the Gaussian or flash signaling format is to be used for the traffic from the third to the fourth terminals. In particular, the interference cost is lower when flash signaling format is used. In other words, assuming everything else equal, using flash signaling format, the third terminal WT-C will need to yield less often.
  • the third terminal WT-C monitors (a traffic management channel) to determine the number of other high-priority connections that are going to use flash signaling format in the traffic channel of the present traffic slot. If the number is large, e.g., greater than three, the third terminal WT-C may decide to yield (i.e., not transmit its traffic in the current traffic slot).
  • FIG. 13 illustrates a method operational in a third device having a peer-to-peer connection with a fourth device to facilitate interference management for a second peer-to-peer connection between a first device and a second device within a wireless network.
  • the third device may determine a signaling format to be used for a traffic signal to be sent to the fourth device, the signaling format being one of at least Gaussian signaling format and flash signaling format 1302.
  • a transmission request signal is sent by the third device to the fourth device in a transmission request resource 1304.
  • the third device monitors a transmission request response resource to receive a first transmission request response from the second device, the transmission request response from the second device indicating that the second device is prepared to receive a traffic signal from the first device different from the third device 1306.
  • An interference cost to the second device may be calculated by the third device as a function of the determined signaling format 1308.
  • the third device can then determine whether to send the traffic signal to the fourth device based on the calculated interference cost, the traffic signal to be sent in a traffic slot corresponding to the transmission request signal 1310.
  • the third device may monitor a transmission request response resource to receive a second transmission request response from the fourth device, the second transmission request response from the fourth device indicating that the fourth device is prepared to receive a traffic signal from the third device 1312.
  • the third device can then determine whether the priority corresponding to the first transmission request response received from the second device is higher than the second transmission request response received from the fourth device 1314. [00152] According to one alternative, the third device may then send the traffic signal in the traffic slot if it is determined that the calculated interference cost is below a threshold 1316. The value of calculated interference cost is smaller if it is determined that a flash signaling format is to be used rather than if it is determined that a Gaussian signaling format is to be used. The traffic signal is sent in a fraction of the traffic channel resource in the traffic slot if it is determined the flash signaling format is to be used. The fraction may be less than twenty percent of the traffic channel.
  • the transmission request signal may include information indicative of the signaling format to be used in the traffic signal.
  • the transmission request signal may be sent using a plurality of tones and information indicative of the signaling format to be used in the traffic signal is sent using the phases of the plurality of tones.
  • the number of information bits to be sent in the traffic signal when the Gaussian signaling format is used may be at least twice as many as the number of information bits to be sent in the traffic signal when the flash signaling format is used.
  • the third device may change the signaling format from the Gaussian signaling format to the flash signaling format if it is determined that the calculated interference cost is sufficiently high that the third device is restrained from sending the traffic signal to the fourth device if the third device is to use the Gaussian signaling format 1318. The third device may then send the traffic signal in the traffic slot using the flash signaling format 1320.
  • the third device may monitor transmission request response resources to determine the number of devices that intend to use the flash signaling format in the traffic channel of the traffic slot 1322. The third device may then restraining from using the flash signaling format if it is determined that the number of devices that intend to use the flash signaling format in the traffic channel of the traffic slot exceeds a threshold number 1324.
  • a first terminal WT-A intends to send traffic to a second terminal WT-B and a third terminal WT-C intends to send traffic to fourth terminal WT-D.
  • the fourth terminal (low-priority receiver) has to make sure the interference from first terminal (high-priority transmitter) is acceptable; otherwise, the fourth terminal does not respond to the transmission request from third terminal WT-C so that third terminal WT-C will not send the traffic to the fourth terminal WT-D in the current traffic slot, i.e., perform receiver yielding.
  • the fourth terminal WT-D estimates the "signal to interference ratio" where the signal power is associated with the signal to be sent by the third terminal WT-C and the interference power is associated with the signal to be sent by first terminal WT-A.
  • the interference power may be obtained as a function of the received power of a transmission request that is sent by first terminal WT-A to the second terminal WT-B but received at fourth terminal WT-D.
  • the interference power is also a function of the signaling format, e.g., Gaussian versus flash signaling formats.
  • the interference power calculated by fourth terminal WT-D may depend on whether the Gaussian or flash signaling format is to be used for the traffic from the first terminal WT-A to the second terminal WT-B. In particular, the interference power may be lower when flash signaling format is used. In other words, assuming everything else equal, if the first terminal WT-A is going to use flash signaling format, the fourth terminal WT-D will need to yield less often. In one embodiment, the fourth terminal WT-D monitors to see the number of other high-priority connections that are going to use flash signaling format in the traffic channel of the current traffic slot. If the number is large, e.g., greater than three, the fourth terminal WT-D may decide to yield.
  • FIG. 14 (comprising FIGS. 14A and 14B) illustrates a method operational in a fourth device having a peer-to-peer connection with a third device to facilitate interference management for a second peer-to-peer connection between a first device and a second device within a wireless network.
  • the fourth device may monitor to receive a first transmission request signal from the third device and a second transmission request signal from the first device, the first transmission request signal indicating that the third device intends to send a traffic signal to the fourth device in a traffic slot corresponding to the first transmission request signal and the second transmission request signal indicating that the first device intends to send a traffic signal to the second device in the same traffic slot, the second transmission request signal further including information indicative of the signaling format to be used in the traffic signal from the first device to the second device, the signaling format being one of at least a Gaussian signaling format and a flash signaling format 1402.
  • the information indicative of the signaling format may be recovered by the fourth device from the second transmission request signal 1404.
  • the fourth device may then calculate an interference power as a function of the signal strength of the received second transmission request 1406.
  • the value of the calculated interference power may be determined as a function of the recovered signaling format.
  • the value of the calculated interference power is smaller if the flash signaling format is to be used than if the Gaussian signaling format is to be used.
  • the traffic signal is to be sent by the first device in a fraction of the traffic channel resource in the traffic slot if the flash signaling format is to be used. The fraction may be less than twenty percent of the traffic channel.
  • the second transmission request signal may be sent using a plurality of tones and the information indicative of the signaling format to be used in the traffic signal is sent using the phases of the plurality of tones.
  • the fourth device may then determine whether to receive the traffic signal from the third device based on the calculated interference power 1408. In making such determination, the fourth device may take a number of steps. For example, the fourth device may further determine whether the priority corresponding to the second transmission request is higher than the first transmission request 1410. The fourth device may also monitor transmission request resources to determine the number of devices that intend to use the flash signaling format in the traffic channel of the traffic slot. If the fourth device determines that the number of devices that intend to use the flash signaling format in the traffic channel of the traffic slot exceeds a threshold number, it may restrain from sending the transmission request response 1414.
  • the fourth device may also calculate a desired signal power as a function of the signal strength of the received first transmission request 1416.
  • a transmission request response signal may be sent by the fourth device to the third device if it is determined that the ratio of the calculated desired signal power and the calculated interference power exceeds a threshold 1418. Subsequently, the fourth device may receive the traffic signal in the traffic slot 1420.
  • the number of information bits to be sent in the traffic signal when the Gaussian signaling format is used are at least twice as many as the number of information bits to be sent in the traffic signal when the flash signaling format is used.
  • the typical rate scheduling algorithm is split into two stages or phases.
  • the transmitter first device WT A sends a pilot signal over a pilot channel which is used by the receiver second device WT B for SINR estimation.
  • the receiver then sends back quantized SINR value in a channel quality indicator (CQI) channel to the transmitter first device WT A so that the transmitter first device WT A can decide the rate format that should be used for the traffic data transmission.
  • CQI channel quality indicator
  • the first device WT A transmits a packet using Gaussian signaling to the second device WT B and the third device WT C transmits a small packet to the fourth device WT D using non-Gaussian signaling or flash signaling.
  • the fourth device WT D should be informed that the third device WT C has a small packet and is using non- Gaussian (flash) signaling.
  • the second is that the SINR calculation done by the second device WT B should accurately take into account the fact the transmission from the third device WT C that acts as interference (to the transmission from the first device WT A) is using non-Gaussian signaling. This means that the if the traffic signal from the third device WT C is received at a high power at the second device WT B, then such interference will act as erasures, otherwise it will act as additive noise.
  • a hybrid rate signaling scheme is used for the pilot channel.
  • the main idea is to mimic the signaling used for traffic data communications during the pilot channel. That is, the first device WT A which is using the usual Gaussian signaling for traffic communication, sends a pseudo-random noise (PN) sequence occupying the entire degrees of freedom used for the pilot channel, whereas the third device WT C which is using non- Gaussian signaling uses a proportionate number of high energy tones within the pilot channel.
  • PN pseudo-random noise
  • the pilot channel consists of 128 complex degrees of freedom.
  • the first device WT A transmits at pseudo-random noise sequence of length 128, this sequence is known to the second device WT B.
  • the third device WT C transmits a small number (2-4) of high energy tones.
  • the tone locations may be picked pseudo-randomly and are known to the fourth device WT-D.
  • the second device WT B may first determine the set of high energy tones amongst received 128 tones. For example, this can be defined as tones that are at least 10 db higher than the average energy. Then, if this set of tones includes that set of tones that the first device WT A would have used if it had a small packet (which is known to the second device) then the second device WT B assumes that the first device WT A has a small packet to send, and sends back a default message (typically corresponding to the lowest rate option) back to the first device WT A during the CQI channel. Otherwise, the second device WT B discards these tones as erasures, and uses the remaining tones for SINR estimation.
  • this set of tones includes that set of tones that the first device WT A would have used if it had a small packet (which is known to the second device) then the second device WT B assumes that the first device WT A has a small packet to send, and sends back a default message (typical
  • the fourth device WT-D behaves similar to the second device WT B.
  • FIG. 15 illustrates a method of operating a second wireless device in a peer-to- peer communication network, the second wireless device having a connection with a transmitter first wireless device.
  • the second device (WT-B or WT-D) may monitor to receive a pilot signal from the first device in a pilot channel associated with a data traffic slot 1502.
  • the second device may determine a pilot format being used by the first device based on the received pilot signal 1504.
  • the second device may determine a fraction of the transmission resource in the pilot channel to be used by the first device assuming that the pilot format used by the first device corresponds to a flash signaling data traffic format 1506.
  • the second device may determine that the pilot format used by the second device corresponds to a flash signaling data traffic format 1510.
  • the second device can then determine a data traffic format to be used in the data transmission slot based on the determined pilot format 1512.
  • the data traffic format may be one of a flash signaling data traffic format and a Gaussian signaling data traffic format.
  • the pilot format corresponding to flash signaling data traffic format is used, the pilot signal from the second device is sent on a fraction of transmission resource of the entire pilot channel.
  • the fraction of the pilot channel used may be less than twenty percent.
  • the fraction of the pilot channel used is the same as the fraction of transmission resource of the flash signaling data traffic format in the data traffic slot. This relationship in the protocol is used by the second device to determine that the same fraction will be used in the data traffic slot as it is in the pilot channel.
  • the interference power can be calculated by the second device based on the determined pilot format and received pilot signal 1514.
  • the second device may determine a fraction of transmission resources in the pilot channel over which the measured average received power is at least 1OdB stronger than the measured average power in the pilot channel, where the calculated interference power is calculated based on the received signal in the remaining fraction of transmission resources in the pilot channel 1516.
  • a data rate can then be determined by the second device based on the calculated interference power and the determined data traffic format 1518.
  • a typically CQI channel is designed to carry number of bits that corresponds to the total number rate options that the system supports (typically 3-4 bits). But, for a small packet format, the number of possible rate options is fairly small. Thus, according to one feature, the additional available bits are used to indicate power backoff that the transmitter device should use without hurting the reliability of the transmission significantly.
  • a first device WT A intends to transmit a small packet to a second device WT B over a peer-to-peer network connection. Let's assume that CQI channel supports 4 bits, and there is just one rate option corresponding to the small packet mode. Either through a link scheduling stage or during the pilot transmission, the second device WT B is made aware that the first device WT A has a small packet for transmission.
  • the first device WT A sends a pilot signal to the second device WT B over the pilot channel.
  • the second device WT B uses the pilot signal to obtain a SINR estimation. If the SINR measured, SINR m, is more than the SINR needed for transmission of a small packet, SINR s, then the first device WT A can lower the power used for the data transmission by a factor of SINR m/SINR s. Therefore, the second device WT B may quantize SINR m/SINR s to 4 bits, and sends these 4 bits on the CQI channel. The first device WT A interprets these bits as power backoff bits rather than rate option bits since it knows the transmission is a small packet transmission.
  • FIG. 16 illustrates a method of operating a second wireless device in a peer-to- peer communication network, where the second wireless device has a connection with a transmitter first wireless device.
  • the second device receives a pilot signal from the second device in a pilot channel associated with a data traffic slot 1602.
  • a data transmission format to be used in the data traffic slot is then determined by the second device, where the data transmission format includes at least a small packet format and a normal packet format 1604. If the second device determines that the data transmission format to be used in the data traffic slot is a small packet format, it may determine an amount of power back off based on at least the pilot signals received in the pilot channel, the power back off indicating the amount that the second wireless device can reduce for the transmission power of the data traffic slot 1606.
  • a rate feedback format to be used in a rate feedback channel associated with the data traffic slot may then be determined by the second device based on the determined data transmission format 1608.
  • the second device then sends a rate feedback signal in the rate feedback channel using the rate feedback format 1610. It may also signal the determined amount of power back off in the rate feedback signal 1612.
  • the rate feedback signal may contain information indicative of a rate selected from a plurality of predetermined rates in a rate table, the rate table being a function of the determined data transmission format.
  • the number of rates in the rate table may be smaller when the data transmission format is a small packet format than when the data transmission format is a normal packet format.
  • the data transmission format may be determined based on information contained in the pilot signal.
  • the wireless terminal 1702 is a block diagram of a first wireless terminal that may be configured to facilitate peer-to-peer communications with a second wireless terminal over a shared frequency spectrum.
  • the wireless terminal 1702 may include a processing circuit 1704 (e.g., one or more circuits or processors), a peer-to-peer communication controller 1712, a wide area network (WAN) controller 1710 and a transceiver 1714 coupled to at least one antenna 1706.
  • the transceiver 1714 may include a (wireless) transmitter and a (wireless) receiver.
  • the wireless terminal 1702 may communicate via a managed network infrastructure using the WAN communication controller 1210 and/or it may communicate over a peer-to-peer network using the peer-to-peer communication controller 1712.
  • the first wireless terminal 1702 may be configured to perform one or more of the features illustrated in FIGS. 1-16.
  • nodes described herein are implemented using one or more modules to perform the steps corresponding to one or more methods, for example, generating a beacon signal, transmitting a beacon signal, receiving beacon signals, monitoring for beacon signals, recovering information from received beacon signals, determining a timing adjustment, implementing a timing adjustment, changing a mode of operation, initiating a communication session, etc.
  • various features are implemented using modules. Such modules may be implemented using software, hardware or a combination of software and hardware.
  • machine executable instructions such as software
  • a machine readable medium such as a memory device, e.g., RAM, floppy disk, etc.
  • a machine e.g., general purpose computer with or without additional hardware
  • various embodiments are directed to a machine-readable medium including machine executable instructions for causing a machine, e.g., processor and associated hardware, to perform one or more of the steps of the above-described method(s).
  • the methods and apparatus of various embodiments may be, and in various embodiments are, used with CDMA, orthogonal frequency division multiplexing (OFDM), and/or various other types of communications techniques which may be used to provide wireless communications links between access nodes and mobile nodes.
  • the access nodes are implemented as base stations which establish communications links with mobile nodes using OFDM and/or CDMA.
  • the mobile nodes are implemented as notebook computers, personal data assistants (PDAs), or other portable devices including receiver/transmitter circuits and logic and/or routines, for implementing the methods of various embodiments.
  • One or more of the components, steps, and/or functions illustrated in Figures 1-17 may be rearranged and/or combined into a single component, step, or function or embodied in several components, steps, or functions. Additional elements, components, steps, and/or functions may also be added.
  • the apparatus, devices, and/or components illustrated in Figures 1, 2, and/or 17 may be configured or adapted to perform one or more of the methods, features, or steps described in Figures 3-16.
  • the algorithms described herein may be efficiently implemented in software and/or embedded hardware.
  • the secondary microphone cover detector may be implemented in a single circuit or module, on separate circuits or modules, executed by one or more processors, executed by computer-readable instructions incorporated in a machine-readable or computer- readable medium, and/or embodied in a handheld device, mobile computer, and/or mobile phone.

Abstract

L'invention concerne un mécanisme amélioré facilitant la transmission de petits paquets dans un réseau de pairs ad-hoc. Un petit paquet est identifié au niveau d'un récepteur dans un canal de commande, de sorte que sa puissance inférieure puisse être prise en compte dans le cadre d'un protocole de gestion des interférences mis en œuvre au sein de dispositifs de pairs locaux. Dans un intervalle de trafic, un émetteur diminue volontairement sa puissance de transmission dans la mesure où un petit paquet nécessite un rapport signal-bruit beaucoup plus faible, ce qui, d'une part, améliore le rapport entre l'énergie du signal par bit et la densité de puissance du bruit pour la transmission; et, d'autre part, réduit au minimum l'interférence causée aux autres communications sans fil en train de se dérouler dans le même spectre.
PCT/US2008/069450 2007-07-09 2008-07-09 Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p) WO2009009547A2 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US94865407P 2007-07-09 2007-07-09
US60/948,654 2007-07-09
US12/168,690 US8238836B2 (en) 2007-07-09 2008-07-07 Methods for sending small packets in a peer-to-peer (P2P) network
US12/168,690 2008-07-07

Publications (2)

Publication Number Publication Date
WO2009009547A2 true WO2009009547A2 (fr) 2009-01-15
WO2009009547A3 WO2009009547A3 (fr) 2009-03-26

Family

ID=40112055

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/069450 WO2009009547A2 (fr) 2007-07-09 2008-07-09 Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p)

Country Status (1)

Country Link
WO (1) WO2009009547A2 (fr)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010053851A1 (fr) * 2008-11-10 2010-05-14 Qualcomm Incorporated Procédés et appareils prenant en charge la programmation adaptative décentralisée du trafic pour les communications sans fil
WO2012009466A1 (fr) * 2010-07-13 2012-01-19 Qualcomm Incorporated Procédés et appareil de commande de puissance d'émission en présence d'interférences
WO2013052126A1 (fr) * 2011-10-03 2013-04-11 Qualcomm Incorporated Procédés et appareil pour accès au support distribué dans des réseaux poste à poste sans fil
US8526461B2 (en) 2008-11-10 2013-09-03 Qualcomm Incorporated Methods and apparatus supporting adaptive decentralized traffic scheduling including a dynamic transmitter yielding threshold
US8582492B2 (en) 2008-11-10 2013-11-12 Qualcomm Incorporated Methods and apparatus supporting adaptive decentralized traffic scheduling including a dynamic receiver yielding threshold
WO2017220990A1 (fr) 2016-06-20 2017-12-28 Kymab Limited Anticorps anti-pd-l1

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040229625A1 (en) * 2002-08-08 2004-11-18 Rajiv Laroia Methods and apparatus of enhanced coding in multi-user communication systems
US20050233752A1 (en) * 2004-04-15 2005-10-20 Rajiv Laroia Multi-carrier communications methods and apparatus
WO2006124042A1 (fr) * 2005-05-13 2006-11-23 Qualcomm Incorporated Transmission de pilotes a la demande sur une liaison inverse
US20070093209A1 (en) * 2005-10-25 2007-04-26 Avneesh Agrawal Four way handshake for robust channel estimation and rate prediction
US20070105574A1 (en) * 2005-10-26 2007-05-10 Qualcomm Incorporated Interference management using resource utilization masks sent at constant psd
WO2007059448A1 (fr) * 2005-11-10 2007-05-24 Olympus Communication Technology Of America, Inc. Commande d'accès au réseau

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040229625A1 (en) * 2002-08-08 2004-11-18 Rajiv Laroia Methods and apparatus of enhanced coding in multi-user communication systems
US20050233752A1 (en) * 2004-04-15 2005-10-20 Rajiv Laroia Multi-carrier communications methods and apparatus
WO2006124042A1 (fr) * 2005-05-13 2006-11-23 Qualcomm Incorporated Transmission de pilotes a la demande sur une liaison inverse
US20070093209A1 (en) * 2005-10-25 2007-04-26 Avneesh Agrawal Four way handshake for robust channel estimation and rate prediction
US20070105574A1 (en) * 2005-10-26 2007-05-10 Qualcomm Incorporated Interference management using resource utilization masks sent at constant psd
WO2007059448A1 (fr) * 2005-11-10 2007-05-24 Olympus Communication Technology Of America, Inc. Commande d'accès au réseau

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8072917B2 (en) 2007-10-31 2011-12-06 Qualcomm Incorporated Methods and apparatus supporting adaptive decentralized traffic scheduling for wireless communications
WO2010053851A1 (fr) * 2008-11-10 2010-05-14 Qualcomm Incorporated Procédés et appareils prenant en charge la programmation adaptative décentralisée du trafic pour les communications sans fil
US8526461B2 (en) 2008-11-10 2013-09-03 Qualcomm Incorporated Methods and apparatus supporting adaptive decentralized traffic scheduling including a dynamic transmitter yielding threshold
US8582492B2 (en) 2008-11-10 2013-11-12 Qualcomm Incorporated Methods and apparatus supporting adaptive decentralized traffic scheduling including a dynamic receiver yielding threshold
WO2012009466A1 (fr) * 2010-07-13 2012-01-19 Qualcomm Incorporated Procédés et appareil de commande de puissance d'émission en présence d'interférences
US8521208B2 (en) 2010-07-13 2013-08-27 Qualcomm Incorporated Methods and apparatus of transmission power control in the presence of interference
WO2013052126A1 (fr) * 2011-10-03 2013-04-11 Qualcomm Incorporated Procédés et appareil pour accès au support distribué dans des réseaux poste à poste sans fil
US9049694B2 (en) 2011-10-03 2015-06-02 Qualcomm Incorporated Methods and apparatus for distributed medium access in wireless peer-to-peer networks
WO2017220990A1 (fr) 2016-06-20 2017-12-28 Kymab Limited Anticorps anti-pd-l1
WO2017220988A1 (fr) 2016-06-20 2017-12-28 Kymab Limited Anticorps multispécifiques pour l'immuno-oncologie
WO2017220989A1 (fr) 2016-06-20 2017-12-28 Kymab Limited Anti-pd-l1 et cytokines il-2

Also Published As

Publication number Publication date
WO2009009547A3 (fr) 2009-03-26

Similar Documents

Publication Publication Date Title
US8139531B2 (en) Methods for sending small packets in a peer-to-peer (P2P) network
US8300715B2 (en) Method and apparatus for reuse of WAN infrastructure resources in a wireless peer-to-peer (P2P) network
US8270923B2 (en) Techniques for receiver beamforming and yielding-threshold adjustments in peer-to-peer networks
US8432786B2 (en) Control channel design to support one-to-one, many-to-one, and one-to-many peer-to-peer communications
US7876701B2 (en) Control channel design to support one-to-one, many-to-one, and one-to-many peer-to-peer communications
US8433349B2 (en) Methods and apparatus for successive interference cancellation based on transmit power control by interfering device with success probability adaptation in peer-to-peer wireless networks
EP2171949B1 (fr) Procédés et appareil d'annulation successive d'interférences basée sur un plafonnement de débit dans des réseaux de pairs
JP2013138433A5 (fr)
US20090017759A1 (en) Methods and apparatus for active successive interference cancellation in peer-to-peer networks
US20090017783A1 (en) Methods and apparatus for active successive interference cancellation based on one rate feedback and probability adaptation in peer-to-peer networks
WO2009009547A2 (fr) Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p)
WO2009009549A2 (fr) Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p)
WO2009009545A2 (fr) Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p)
WO2009009548A2 (fr) Procédés d'envoi de paquets de petite taille dans un réseau entre homologues (p2p)
CN115516929A (zh) 快速唤醒信号检测器
WO2009009546A2 (fr) Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p)
WO2009009544A2 (fr) Méthodes d'envoi de petits paquets dans un réseau de pairs (p2p)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08796113

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08796113

Country of ref document: EP

Kind code of ref document: A2