WO2020065121A1 - Communications de réseau sans fil basées sur une indication de robustesse - Google Patents

Communications de réseau sans fil basées sur une indication de robustesse Download PDF

Info

Publication number
WO2020065121A1
WO2020065121A1 PCT/FI2018/050699 FI2018050699W WO2020065121A1 WO 2020065121 A1 WO2020065121 A1 WO 2020065121A1 FI 2018050699 W FI2018050699 W FI 2018050699W WO 2020065121 A1 WO2020065121 A1 WO 2020065121A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless
indication
robustness
frequency band
wireless device
Prior art date
Application number
PCT/FI2018/050699
Other languages
English (en)
Inventor
Claudio Rosa
Frank Frederiksen
Klaus Pedersen
Roberto Maldonado
Original Assignee
Nokia Technologies Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Technologies Oy filed Critical Nokia Technologies Oy
Priority to PCT/FI2018/050699 priority Critical patent/WO2020065121A1/fr
Publication of WO2020065121A1 publication Critical patent/WO2020065121A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0808Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • LBT Listen-before -talk
  • Wireless networks operating in a common geographical area and on a common frequency band, such as in an unlicensed spectrum may be improved by including indications in wireless transmissions that indicate a robustness of the wireless transmission to noise and interference.
  • Such indications may be used by devices in the wireless networks to set channel access parameters when performing clear channel assessment in a listen-before -talk scheme. For example, a wireless device in one wireless network may select a lower energy detection threshold for determining whether a wireless channel is idle or busy if a received wireless transmission from the other wireless network includes a robustness indication indicating that the wireless transmission has a high tolerance to interference. The lower energy detection threshold will increase the probability that the wireless device will have access to the wireless channel.
  • the transmitting node may transmit a preamble including an indication of the level of robustness.
  • the preamble may further include an indication of the priority of the corresponding data transmission, or an indication of the wireless network to which the transmitting node is associated.
  • the level of robustness may be based on the modulation coding scheme selected by the transmitting node.
  • the listening node may receive the preamble, decode the indications for the level of robustness, and optionally the indication of priority, and adapt its channel access parameters based on these indications.
  • the channel access parameters may include energy detection threshold, channel occupancy time, contention window, or a combination of thereof.
  • Some aspects include apparatuses, methods, and computer readable media for transmitting and receiving data according to the robustness indication. Other aspects are discussed further below.
  • FIGS. 1 A and 1B show example network environments.
  • FIG. 1C shows an example wireless transmission in the example environments of FIGS. 1A and 1B.
  • FIG. 1D shows an example data frame.
  • FIG. 2 shows example methods for sending a wireless transmission and receiving a wireless transmission based on a robustness indication.
  • FIG. 3 shows an example method of identifying one or more indications in a wireless transmission.
  • FIG. 4 shows an example method of determining an energy level threshold based on one or more indications received in a wireless transmission.
  • FIG. 5 shows an example method of determining whether to transmit in a wireless channel.
  • FIG. 6 shows an example method of determining parameters of a wireless transmission.
  • FIG. 7 shows an example method of selecting a robustness indication for inserting into a wireless transmission.
  • FIG. 8 shows an example method assembling and transmitting a data frame including a robustness indication.
  • FIG. 9 shows an example system diagram of a communication device. DETAILED DESCRIPTION
  • FIG. 1 A illustrates a wireless network environment in which multiple radio access technologies (RATs) and/or multiple radio acess networks may operate in the same wireless frequency spectrum. Illustrated in the figure are two different wireless networks 100 and 110, with multiple devices operating in each network.
  • Wireless network 100 may include devices 101 , 102, 103, 104, and 105 that exchange information via wireless transmission between these devices.
  • wireless network 110 may include devices 11 1, 112, 1 13, 1 14, and 115 that exchange information via wireless transmission between these devices.
  • Devices in wireless networks 100 and 110 coordinate communications within each network according to the respective communication protocols used in each network, but the communications in one network may not be coordinated with the communications in the other network. This creates a problem of communications in one network conflicting with communications in the other network when the frequency bands used by each network overlap in the same geographical area.
  • Fig. 1B illustrates an example of the wireless environment illustrated in Fig. 1 A in which node 101 and node 111 are access nodes for their respective wireless networks 100 and 1 10. Access nodes 101 and 111 provide wireless access for the remaining devices in the networks, which may be user equipment, wireless stations, etc.
  • wireless networks 100 and 110 may include, for example, different or cells within a cellular or different base service sets within a WLAN network.
  • Networks may include, for example, 3GPP-based RATs, such as Long-term Evolution (LTE) or 5G New Radio (NR), 5G NR in unlicensed spectrum (NR-U), and IEEE 802.1 1 -based RATs for Wireless Local Access Networks (WLANs), each operating in an unlicensed spectrum.
  • LTE Long-term Evolution
  • NR 5G New Radio
  • NR-U unlicensed spectrum
  • IEEE 802.1 1 -based RATs for Wireless Local Access Networks (WLANs), each operating in an unlicensed spectrum.
  • network 100 may be a base service set in a WLAN network that complies with an IEEE802.1 1 standard
  • network 110 may be a cell for a radio access network (e.g., LTE, NR, or NR-U) for a cellular network, with nodes 1 10 and 1 11 being service provider access points for each respective network.
  • a radio access network e.g., LTE, NR, or NR-U
  • Devices 102, 103, 104, and 105 of network 100 and devices 1 12, 1 13, 1 14, and 1 15 of network 1 10 may comprise devices, such as a personal computer (PC), a laptop, a tablet computer, a cellular phone, a palm computer, a sensor device, a router device, or any other apparatus provided with radio communication capability.
  • the devices carrying out the functions of 101- 105 and 1 11-1 15 may comprise circuitry, e.g. a chip, a chipset, a processor, a micro controller, or a combination of such circuitries in any one of the above-described devices. Circuitry is further described below with respect to Fig. 9.
  • Devices 101 -105 may make up a basic service set (BSS) of the WLAN network, and devices 1 11-115 may make up a radio access network (e.g., LTE, NR, NR-U) portion (e.g., a cell, which is also referred herein as a BSS) of a cellular network, with each network being referred to herein as an overlapping basic service set (OBSS) to the other.
  • a radio access network e.g., LTE, NR, NR-U
  • OBSS overlapping basic service set
  • network 100 (101-105) andnetwork 1 10 (1 11-1 15) are portions ofthe same radio access networks, e.g., each of 100 and 1 10 may include a different base station (or cell) ofthe same LTE, NR, or NR-U network.
  • WLAN, LTE, NR, and NR-U are used as examples of wireless networks in this description, other variations include wireless networks based on other specifications, e.g. WiMAX (Worldwide Interoperability for Microwave Access), 5G cellular communication systems, including unlicensed radio variants, Multefire, mobile ad hoc networks (MANET), mesh networks, and other networks having cognitive radio features that include transmission medium sensing features and adaptive capability to coexist with radio access networks based on different specifications and/or standards.
  • An LTE, NR, and NR-U, networks are examples of radio access network parts of cellular networks.
  • other radio technologies may be applied instead or in addition to these examples. The following description may be generalized and applied equally to other types of RATs as well.
  • Fig. 1C illustrates a scenario in which operation of one wireless network interferes with operation of the other wireless network.
  • node 1 11 e.g., an access point in an LTE, NR, or NR-U network
  • transmits a wireless signal (denoted by a solid line) containing a data frame to node 1 14 in its same network (e.g., BSS).
  • the wireless transmission may also be received (denoted with dotted lines) by nodes 101 and 104 in the other wireless network (e.g., OBSS, different cell, etc.). If occurring at the same time and at the same frequency, this transmission from 1 1 1 could interfere with transmissions to and from 101 and 104 in the other network.
  • nodes 101 and 104 were to transmit a signal at this time and at the same frequency, such signals may interfere with reception by 114 of the signal sent from 111.
  • LBT Listen-before -talk
  • Latency may be improved by increasing the wireless network’s ability for spatial reuse.
  • each wireless network may account for the tolerance to interference of the other wireless network’s signaling.
  • At least one of the networks includes in at least some of its wireless transmissions, an indication as to the tolerance to interference of that wireless transmission.
  • This indication may be based, for example, on one or more parameters, including the modulation-coding scheme being used for that wireless transmission, channel quality or contention situation of the channel as experienced by the transmitting device, priority (e.g. target block error rate) of the wireless transmission, quality of service (QoS), etc.
  • priority e.g. target block error rate
  • QoS quality of service
  • Fig. 1D shows an example wireless transmission, which may be in the form of a data frame, which may include within the frame one or more indicators that provide signaling to devices that receive the transmission.
  • the indicators can be in any form, such as a data bit or combination of data bits that are encoded to provide specific information about the wireless transmission or information about the wireless network from which it was transmitted.
  • the indicators may include, for example, a robustness indication, a transmission priority indication, or any combination thereof.
  • the frame may include a header (or preamble) (e.g., a PHY header of the BSS) in which the indicators are located.
  • a preamble in which the indicators are located is within a first part of the header.
  • the preamble may be before the header.
  • the indicators are implicit, for example, by using different synchronization sequences in a preamble that correspond to different indicators or different indicator values.
  • a device in networks 100 or 110 that receive the frame may utilize these indicators to carry out clear channel assessment in which a listening device that is not the intended recipient (e.g., 101 or 104) decides whether the channel is clear based on the energy level of the received signal. In deciding whether the channel is clear, the listening device determines (e.g. measures) the energy level of the received signal and compares the energy level to a threshold, referred to herein as an energy detection (ED) threshold. If the energy level is above the threshold (e.g., the signal is strong), the listening device determines that the wireless channel (e.g., a frequency band) is busy being used by another wireless device (e.g., OBSS).
  • ED energy detection
  • the listening device determines the wireless channel is idle (clear) and not being used, and thus, the listening device can send transmissions on the channel.
  • Signals with an energy level below the threshold are assumed to be from a (geographically) distant device, such that if the listening device were to send a transmission (e.g., to an access node in its own BSS), it would not interfere with the distant device’s communications.
  • a listening device may use one or more of the indicators in the received wireless transmission to determine at which level to set the ED threshold or other channel access parameters (e.g., channel occupancy time, contention window, or a combination of thereof).
  • the robustness indication may indicate multiple levels (e.g., high, medium, low) of tolerance of the wireless transmission to interference (for example, based on which modulation coding scheme is being used). If the transmission is highly robust to interference, the listening device may set the energy level threshold lower, since the listening device’s own transmission will be less likely to cause intolerable interference to the wireless transmission that included the robustness indication. The listening device may also base the ED threshold on the transmission priority indication, wireless network indication, or a combination of one or more of these indications as further described below.
  • Fig. 2 illustrates two processes: 210 performed by a device (for example, 101-105, 1 11-1 15) transmitting a wireless signal (e.g., including a frame), and 200 performed by a listening device (for example, 101 -105, 1 11-115) assessing whether a channel is clear (e.g., before transmitting its own signal).
  • a device for example, 101-105, 1 11-1 15
  • a listening device for example, 101 -105, 1 11-115
  • assessing whether a channel is clear e.g., before transmitting its own signal.
  • Process 210 of the transmitting device begins with step 21 1, in which the transmitting device selects a modulation-coding scheme (MCS) for the wireless signal to be transmitted.
  • MCS modulation-coding scheme
  • the transmitting device may select the modulation coding scheme from a plurality of modulation coding schemes, for example, based on each modulation coding scheme’s tolerance to a different interference level of a plurality of interference levels. For example, some modulation-coding schemes may be more tolerant to interference by using forward error correction (FEC) to encode the data such that a number of bit errors due to noise and interference can be corrected.
  • FEC forward error correction
  • Other MCSs use lower or higher bit transmission rates, which may be tolerant to higher or lower interference levels, respectively.
  • the transmitting device may select the modulation-coding scheme based on required data transmission requirements (e.g., data rate, latency, priority, etc.) and other factors such as the amount of data to be transmitted, the radio resources available for transmission, channel condition, experienced contention situation, detected interference, etc. For example, the transmitting device may select the modulation-coding scheme having the greatest tolerance to noise that permits all data transmission requirements to be met.
  • Fig. 6, illustrates one example process 600 by which the transmitting device may implement step 211.
  • Process 600 may (optionally) include step 601 in which the transmitting device may determine an interference level in the environment in which the transmitting device, or the intended destination is located.
  • the interference level may be determined based on a measure of noise and signals in the wireless channel, bit error rates of previous transmissions in the wireless channel, or any other process.
  • the transmitting device may determine a transmission priority for the data to be carried in the transmission. Transmission priority, for example, may be based on required latency parameters, data rate parameters, quality-of-service parameters, etc.
  • the transmitting device may determine a correspondence between one or more interference levels and one or more modulation coding schemes. For example, modulation coding schemes with higher data rates may be more susceptible to bit errors caused by noise and interference, and thus, correspond to a lower interference level.
  • step 604 the transmitting device may determine a correspondence between one or more transmission priority levels and one or more modulation coding schemes.
  • different modulation coding schemes may provide different data rates, latency, and quality of service, and step 604 may include determining which modulation coding scheme provides the required levels of such parameters for the transmission priority determined in step 602.
  • the transmitting device may select a modulation coding scheme which is very robust against interference.
  • An example of such very robust modulation coding scheme could be QPSK with coding rate 1/12. The coding rate of 1/12 indicates that each bit in a payload message will on average be represented by 12 bits on the physical transmission medium.
  • the transmitting device may select a robust modulation coding scheme.
  • a high transmission priority may inform other nodes to increase the energy detection threshold and will avoid interference with current delay-sensitive transmissions.
  • a higher modulation coding scheme could be chosen, and low transmission priority may be selected allowing other nodes to transmit simultaneously.
  • a modulation coding scheme for the wireless signal to be transmitted is selected, which is optionally based on the interference level determined in step 601 and correspondence between an interference level and modulation coding scheme in step 603, optionally based on the transmission priority determined in step 602 and correspondence between an transmission priority and modulation coding scheme in step 604, or based on any combination of performing steps 601 - 604.
  • any combination of the selected modulation coding scheme, determined interference level, and determined transmission priority may be stored to a memory. Storing this information to memory may include saving the information to a memory device (e.g., RAM), saving the information in a hardware register, or saving the information as software variables (which is implicitly saved in memory), for immediate or later use.
  • a memory device e.g., RAM
  • saving the information in a hardware register e.g., RAM
  • saving the information as software variables which is implicitly saved in memory
  • step 212 includes the transmitting device selecting a robustness indication to insert into the wireless signal to be transmitted.
  • the robustness indication may correspond to the modulation coding scheme selected in step 21 1.
  • Fig. 7, illustrates one example process 700 by which the transmitting device may implement step 212.
  • steps 701 , 702, and 703 may include determining an interference level, a transmission priority level, and a modulation coding scheme, respectively for the wireless signal to be transmitted. These steps may be the same as steps 601 , 602, and 605 in Fig. 6. Alternatively (or additionally) these steps may include retrieving this information from a memory, for example, retrieving the values stored in step 606 of Fig. 6.
  • Process 700 proceeds by selecting the robustness indication alternatively based on the interference level (step 704), based on the interference level and transmission priority (step 705), based on the modulation-coding scheme (step 706), or based on the modulation coding scheme and the transmission priority (step 707).
  • Steps 704, 705, 706, and 707 may further select the robustness indication based on additional parameters, for example, channel quality or contention situation of the channel as experienced by the transmitting device, priority (e.g. target block error rate) of the wireless transmission, quality of service (QoS), etc.
  • Each of these steps may include additional bases for selecting the modulation coding scheme in addition to each of those listed in the steps.
  • the robustness indication selected in step 704, 705, 706, or 707 is stored to memory. Storing the robustness indication to memory may include saving the indication to a memory device (e.g., RAM), saving the indication in a hardware register, or saving the indication as a software variable (which is implicitly saved in memory), for immediate or later use.
  • step 213 includes causing the transmission of a wireless signal including data (e.g., a frame as illustrated in Fig. 1D), which comprises the robustness indication determined in step 212.
  • Fig. 8 illustrates one example process 800 by which the transmitting device may implement step 213.
  • Process 800 begins with steps 801 , 802, 803, and 804 of retrieving the robustness indication, transmission priority indication, wireless network indication, and modulation coding scheme, respectively. Each of these steps is optional. For example, any combination of these parameters may be retrieved from memory, for example, the parameters previously stored in steps 606 and 708 may be retrieved.
  • a frame may be assembled which includes any combination of robustness indication, transmission priority indication, and wireless network indication (e.g., 802.1 lax color bit).
  • Step 805 may include assembling a frame header and combining the frame header with data to form the frame. Any of the robustness indication, transmission priority indication, and wireless network indication may be included in the header (preamble) of the frame.
  • Step 805 may include storing the frame in a memory (e.g., a buffer).
  • the frame may optionally be forwarded to a transmitter device (e.g., wireless transceiver), and in step 807, the frame may be wireless transmitted, for example, by the transceiver device using the modulation coding scheme retrieved in step 804.
  • a transmitter device e.g., wireless transceiver
  • Process 200 illustrated in Fig. 2 may be performed by a listening device (for example, 101 -105, 1 11-115) in assessing whether a channel is clear (e.g., before transmitting its own signal).
  • the process may begin with step 201 in which a listening device receives a wireless transmission, for example, the wireless transmission sent as result of a transmitting device performing process 210.
  • Step 201 may include receiving the entire wireless transmission (e.g., an entire frame) or only a portion of the wireless transmission (e.g., a frame header, particular indications, etc.).
  • the listening device may identify one or more indications in the wireless transmission, for example, a robustness indication, a transmission priority indication, or a wireless network indication.
  • Fig. 3 illustrates an example process 300 by which the listening device may implement step 202.
  • Process 300 begins with step 301, in which the listening device extracts data from the wireless transmission.
  • Step 301 may include, for example, down converting and demodulating the wireless signal to extract a stream of data bits encoded in the wireless signal.
  • the listening device may detect a frame or frame boundary in the extracted data. This may be performed, for example, by detecting a bit pattern in the extracted data or based on any other synchronization technique that enables the listening device to delineate the frame header (preamble) from other portions of the frame.
  • the listening device may identify a robustness indication in the extracted data, for example, in the header of the frame of the extracted data.
  • steps 305 and 306 may be performed in which the listening device identifies a traffic priority indication and wireless network indication in the extracted data.
  • These indications may be in the frame, in the header of the frame, collocated with robustness indication, or a combination thereof.
  • indications could be implicit, for example, by using different synchronization sequences in a preamble (e.g., use three different PHY signatures to signal high, medium and low robustness level values, respectively).
  • the indications identified in steps 304, 305, and 306 may be stored to a memory of the listening device. Storing the indications to memory may include saving the indication to a memory device (e.g., RAM), saving the indications in hardware registers, or saving the indications as software variables (which is implicitly saved in memory), for immediate or later use.
  • the listening device in step 203 may select an energy level threshold .
  • the listening device may use one or more of the indications identified in step 202 to determine at which level to set the ED threshold.
  • Fig. 4 illustrate an example process 400 by which the listening device implements step 202.
  • Process 400 may begin with retrieving one or more indications stored in memory, for example, the robustness indication, traffic priority indication, and wireless network identification that was stored in step 306 or process 300.
  • the listening device may determine a correspondence between a robustness indication obtained from the wireless transmission (or from a previous wireless transmission) and an energy detection threshold.
  • the listening device may access a table or other information that provides a correspondence between a plurality of robustness indication (for example, three or more robustness indications), and a plurality of energy detection thresholds. Table 1 below illustrates such a table.
  • the robustness indication may be represented as different states (or values or levels).
  • the representation of each state may be encoded in different manners, for example, by a bit or combination of bits, which may have been extracted from the wireless signal.
  • the robustness indication is encoded in two bits. Different combinations of the bits may represent different states (or values or levels) of robustness of the wireless signal, for example: low, medium or high robustness.
  • the representation of each indication state may be encoded implicitly, for example, as different synchronization patterns (or signatures) in a preamble.
  • the robustness indication may be encoded using three different PHY signatures (e.g., 802.11 preamble synchronization patterns) that correspond to high, medium, and low robustness levels, respectively.
  • each different robustness indication value may correspond to an energy detection threshold (as indicated in the left most column).
  • the corresponding energy detection thresholds may be different for each different robustness indication value, or different robustness indication values may correspond to the same energy detection threshold.
  • Some examples include three or more robustness indication values.
  • the listening device may correlate particular robustness indication values to particular energy detection threshold values. Alternatively, the listening device may interpret robustness indication values as different robustness levels (e.g., high, medium, low) and correlate different robustness levels to different energy detection thresholds.
  • the listening device may determine, respectively, correspondence between transmission priority indication and the energy detection threshold, and between the wireless network indication and the energy detection threshold in a similar manner to that performed in step 402 with respect to robustness indication.
  • Steps 402-404 may include determining a correspondence between energy detection threshold values and any combination of robustness indication values, transmission priority indication values, and wireless network indication values. For example, in one variation, if the wireless network indication value indicates that the received wireless transmission is from a device in the same network 100 or 110 (e.g., same BSS or same cell) as the listening device, then the listening device considers the channel to be busy, but if the wireless network indication value indicates that the received wireless transmission is from a device in a different network (e.g., OBSS or different cell) as the listening device then the energy detection threshold is determined based on the robustness indication (e.g., as shown in table 1 above).
  • the robustness indication e.g., as shown in table 1 above.
  • Table 2 provides another example in which a plurality of energy detection threshold values are correlated to a combination of robustness indication values and transmission priority values.
  • the robustness indication has three values, 01 , 10, and 1 1 , which represent low, medium, and high levels of robustness, respectively, and the transmission priority (e.g., data priority) indication has three values 01, 10, and 11, which represent low, medium, and high levels of priority for the data being transmitted in the wireless signal.
  • Each combination of robustness indication value and transmission priority indication value is correlated to a particular energy detection threshold value. In the example above, each energy detection threshold is different. In other variations, different combinations of robustness indication value and transmission priority indication value could be correlated to the same energy detection threshold value.
  • Step 405 may include selecting an energy detection threshold based on the correspondences determined in steps 402-405.
  • Step 405 may further include selecting an energy detection threshold further based on a transmission priority for data pending transmission from the listening device. For example, if the listening device has data pending for transmission that has a particular (e.g., high) priority, the listening device may determine the energy detection threshold to be lower, thereby increasing the probability of the listening device being able to transmit the pending data.
  • the energy detection threshold may be determined based on any combination of the robustness indication, transmission priority indication, wireless network indication, and transmission priority of data pending transmission from the listening device.
  • Table 3 provides an example in which a plurality of energy detection threshold values are correlated to a combination of robustness indication values and transmission priority of data pending transmission from the listening device.
  • the robustness indication has three values, 01 , 10, and 1 1 , which represent low, medium, and high levels of robustness, respectively.
  • the transmission priority of data pending transmission from the listening device is listed in the center column.
  • Each combination of robustness indication value and transmission priority of data pending transmission from the listening device is correlated to a particular energy detection threshold value. In the example above, each energy detection threshold is different. In other variations, different combinations of robustness indication value and transmission priority could be correlated to the same energy detection threshold value .
  • the listening device may dynamically adjust the energy detection threshold for each wireless transmission (e.g., frame) received or for groups of wireless transmissions (e.g. several frames) received.
  • Process 400 may optionally include step 406, in which the selected energy detection threshold is stored to memory. Storing the energy detection threshold to memory may include saving the threshold to a memory device (e.g., RAM), saving the threshold in a hardware register, or saving the threshold as a software variable (which is implicitly saved in memory), for immediate or later use.
  • a power level is measured, e.g., by performing an LBT process.
  • the power level may be measured, for example, by taking a wideband measurement of power in the wireless band (from any active transmitter in that band).
  • the listening device may measure the power level directly or may receive the power level from another device.
  • step 205 the energy detection threshold is compared to the power level previously detected in step 204.
  • the listening device determines, based on the comparison of step 205, whether the wireless channel is busy or idle. Based on whether the channel is busy or idle, the listening device may transmit a wireless signal in the same frequency band as the received wireless signal, or may prevent such transmission.
  • an additional step may be included for selecting other channel access parameters based on the one or more of the indications identified in step 202.
  • channel access parameters that are selected based on the indications may include maximum frequency band occupancy time, maximum contention window, or defer time, or a combination of these, or any of these combined with an energy detection threshold.
  • This additional step may replace step 203 or may be performed in addition to step 203. If energy detection threshold is not selected based on the indications in 202, than step 203-205 may not be performed, or may be performed independent from the indications identified in step 202.
  • Step 206 may be based on the other channel access parameters determined based on the indications of step 202, or may be based on a combination of steps 203-205 and on other channel access parameters determined based on the indications of step 202.
  • this step may be performed according to process 400 in Fig. 4, except that references to energy detection threshold (including in tables 1, 2, and 3) are replaced with one or more other channel access parameters.
  • Fig. 5 illustrates an example process 500 that the listening device may use to implement step 206.
  • Process 500 begins with step 501 , in which the results of the comparison of step 205 between the energy level and the energy detection threshold are received.
  • Step 501 may include retrieving the result from a memory in the listening device.
  • step 502 if the energy level is determined to be greater than (or greater than or equal) the energy detection threshold, than the listening device may determine that the wireless channel is busy, in which case the process proceeds to step 503.
  • the listen device prevents transmission of the listen device’s own data.
  • the listening device may determine that the wireless channel is idle and proceed to step 504.
  • the listening device determines channel access and other parameters are determined for a wireless signal to be transmitted from the listening device.
  • the channel access and other parameters may include, for example, modulation coding scheme, maximum frequency band occupancy time, maximum contention window, defer time, etc. Selection of the channel access parameters, for example, may be based on the robustness indication value, transmission priority indication value, wireless network indication value, or a combination thereof in the received wireless signal.
  • the listening device causes a wireless signal with the pending data to be transmitted using the channel access and other parameters determined in step 504.
  • Step 504 may include controlling a wireless transmitter in the listening device to transmit the signal.
  • an additional optional step may be included after the one or more indications in the wireless transmission are identified in step 202, ifthe identified indications include the wireless network indication value. If included, if the wireless network indication value indicates that the wireless transmission is from a device in the same network (e.g., same BSS or same cell) as the listening device, the listening device may determine that the wireless channel is busy in step 206, without (or regardless) if steps 203 and/or 205 are performed. If the wireless network indication value indicates that the wireless transmission is from a device in a different network (e.g., OBSS) as the listening device, may proceed with steps 203-206 as described above.
  • This optional step could be implemented in multiple different ways, such as its own step between steps 202 and 203 in Fig.
  • step 501 or between 501 and 502 in Fig. 5 that determines if the wireless transmission is from the same or different network based on the wireless network indication. If the determination is that the wireless transmission is from the same network, the process proceeds to 503 to prevent transmission by the listening device in the wireless frequency band. If the determination is that the wireless transmission is from a different network, the process proceeds to step 501 (or 502).
  • FIG. 9 illustrates an example apparatus, in particular a computing device 912, that may be used in a communication network such as the one illustrated in Fig. 1 and Fig. 2, to implement any or all of devices 101 -105 and 1 11-1 15 to perform the processes, wireless signal transmissions, and wireless signal receptions illustrated in Figs. 2-8.
  • Computing device may include an access node, an access point, wireless station, or any other device communicating in a wireless network, such as an access point or wireless station in an 802.1 1 WLAN network or as a base station or user equipment in an LTE, NR, or NR-U network.
  • Computing device 912 may include a controller 925.
  • the controller 925 may be connected to a user interface control 930, display 936 and/or other elements as illustrated.
  • Controller 925 may include circuitry, such as for example one or more processors 928 and one or more memory 934 storing software 940 and configuration data.
  • the software 940 may comprise, for example, one or more of the following software options: client software 165, user interface software, server software, etc.
  • Configuration data may comprise information received in wireless transmissions or generated during execution of the software, or prestored for configuration of device (e.g., tables 1 and 2) and performance of the processes disclosed herein.
  • Device 912 may also include a battery 950 or other power supply device, speaker 953, and one or more antennae 954.
  • Device 912 may include user interface circuitry, such as user interface control 930.
  • User interface control 930 may include controllers or adapters, and other circuitry, configured to receive input from or provide output to a keypad, touch screen, voice interface - for example via microphone 956, function keys, joystick, data glove, mouse and the like.
  • the user interface circuitry and user interface software may be configured to facilitate user control of at least some functions of device 912 though use of a display 936.
  • Display 936 may be configured to display at least a portion of a user interface of device 912. Additionally, the display may be configured to facilitate user control of at least some functions of the device (for example, display 936 could be a touch screen).
  • Software 940 may be stored within memory 934 to provide instructions to processor 928 such that when the instructions are executed, processor 928, device 912 and/or other components of device 912 are caused to perform various functions or methods such as those described herein (e.g., Figs. 2-8).
  • the software may comprise machine executable instructions and data used by processor 928 and other components of computing device 912 may be stored in a storage facility such as memory 934 and/or in hardware logic in an integrated circuit, ASIC, etc.
  • Software may include both applications and operating system software, and may include code segments, instructions, applets, pre-compiled code, compiled code, computer programs, program modules, engines, program logic, and combinations thereof.
  • Memory 934 may include any of various types of tangible machine -readable storage medium, including one or more of the following types of storage devices: read only memory (ROM) modules, random access memory (RAM) modules, magnetic tape, magnetic discs (for example, a fixed hard disk drive or a removable floppy disk), optical disk (for example, a CD-ROM disc, a CD-RW disc, a DVD disc), flash memory, and EEPROM memory.
  • ROM read only memory
  • RAM random access memory
  • magnetic tape magnetic discs
  • magnetic discs for example, a fixed hard disk drive or a removable floppy disk
  • optical disk for example, a CD-ROM disc, a CD-RW disc, a DVD disc
  • flash memory for example, a CD-ROM disc, a CD-RW disc, a DVD disc
  • EEPROM memory electrically erasable programmable read-only memory
  • processor 928 may include any of various types whether used alone or in combination with executable instructions stored in a memory or other computer-readable storage medium should be understood to encompass any of various types of well-known computing structures including but not limited to one or more microprocessors, special-purpose computer chips, field-programmable gate arrays (FPGAs), controllers, application-specific integrated circuits (ASICs), combinations of hardware/firmware/software, or other special or general-purpose processing circuitry.
  • microprocessors special-purpose computer chips
  • FPGAs field-programmable gate arrays
  • ASICs application-specific integrated circuits
  • circuitry may refer to all of the following: (a) hardware-only circuit implementations (such as implementations in only analog and/or digital circuitry) and (b) to combinations of circuits and software (and/or firmware), such as (as applicable): (i) to a combination of processor(s) or (ii) to portions of processor(s)/software (including digital signal processor(s)), software, and memory(ies) that work together to cause an apparatus, such as a mobile phone or server, to perform various functions) and (c) to circuits, such as a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation, even if the software or firmware is not physically present.
  • circuitry applies to all uses of this term in this application, including in any claims.
  • the term“circuitry” would also cover an implementation of merely a processor (or multiple processors) or portion of a processor and its (or their) accompanying software and/or firmware.
  • the term“circuitry” would also cover, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, or other network device.
  • Device 912 or its various components may be mobile and be configured to receive, decode and process various types of transmissions including transmissions in Wi-Fi networks according to a wireless local area network (e.g., the IEEE 802.11 WLAN standards 802.1 ln, 802.1 lac, 802.1 1. ax etc.) and/or wireless metro area network (WMAN) standards (e.g., 802.16), through a specific one or more WLAN transceivers 943, one or more WMAN transceivers 941.
  • a wireless local area network e.g., the IEEE 802.11 WLAN standards 802.1 ln, 802.1 lac, 802.1 1. ax etc.
  • WMAN wireless metro area network
  • One or more embodiments described herein may be applicable to a wireless local area network with improved spectrum efficiency.
  • device 912 may be configured to receive, decode and process transmissions through various other transceivers, such as FM/AM Radio transceiver 942, and telecommunications transceiver 944 (e.g., cellular network receiver such as CDMA, GSM, LTE, NR, NR-U, etc. receiver). Additionally or alternatively, device 912 may include aa transceiver 945 for wired communication (coaxial, optical fiber, etc.) to other networks. Communicating over a wired network connection (for example, by an access point) may include the components or a subset of the components described above, and may be configured to perform the same or similar functions as device 912 and its components.
  • transceivers such as FM/AM Radio transceiver 942, and telecommunications transceiver 944 (e.g., cellular network receiver such as CDMA, GSM, LTE, NR, NR-U, etc. receiver).
  • device 912 may include aa transceiver 945 for wired communication (co
  • Access points as described herein may include the components, a subset of the components, or a multiple of the components (e.g., integrated in one or more servers) configured to perform the steps, described herein.
  • Interfaces 941-945 may comprise analogue radio communication components and digital baseband processing components for processing received frames and frames to be transmitted.
  • the interface components 941-945 may comprise standard well-known components such as a radio modem, an amplifier, filter, frequency-converter, (de)modulator, and encoder/decoder circuitries and one or more antennas.
  • a first apparatus that comprises means for carrying out at least some of the following features: receiving, by the first apparatus in a first wireless network from a second apparatus in a second wireless network, a transmission in a wireless frequency band, wherein the transmission comprises a frame, and wherein the frame comprises a robustness indication; selecting, based on the robustness indication, one or more channel access parameters; and determining whether to transmit on the wireless frequency band using the one or more channel access parameters.
  • the above embodiment may further include the first apparatus comprising means for carrying out at least some of the additional following features: wherein the one or more channel access parameters comprise an energy detection threshold, comparing an energy level of the wireless frequency band to the energy detection threshold; and determining, based on the comparing, whether to transmit on the wireless frequency band.
  • the one or more channel access parameters comprise an energy detection threshold, comparing an energy level of the wireless frequency band to the energy detection threshold; and determining, based on the comparing, whether to transmit on the wireless frequency band.
  • an apparatus may comprise means for carrying out at least some of the following features: selecting a modulation coding scheme of a plurality of modulation coding schemes, wherein each of the plurality of modulation coding schemes is tolerant to a different one of a plurality of interference levels; selecting a robustness indication, wherein the robustness indication corresponds to the modulation coding scheme; causing, by the apparatus, transmission of a frame in a wireless frequency band using the modulation coding scheme, wherein the frame comprises the robustness indication.
  • an apparatus may comprise means for carrying out some or all the steps of the methods described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Selon la présente invention, des réseaux sans fil fonctionnant dans une zone géographique commune et sur une bande de fréquence commune peuvent être améliorés avec des indications comprises dans des transmissions sans fil qui indiquent une robustesse de la transmission sans fil au bruit et aux interférences. De telles indications peuvent être utilisées par des dispositifs dans les réseaux sans fil pour établir des seuils de détection d'énergie lors de l'exécution d'une évaluation de canal libre dans un schéma d'écoute avant de parler. Un dispositif sans fil dans un réseau sans fil peut sélectionner des seuils de détection d'énergie inférieure pour déterminer si un canal sans fil est inactif ou occupé si une transmission sans fil reçue à partir de l'autre réseau sans fil comprend une indication de robustesse indiquant que la transmission sans fil a une tolérance élevée aux interférences.
PCT/FI2018/050699 2018-09-28 2018-09-28 Communications de réseau sans fil basées sur une indication de robustesse WO2020065121A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/FI2018/050699 WO2020065121A1 (fr) 2018-09-28 2018-09-28 Communications de réseau sans fil basées sur une indication de robustesse

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/FI2018/050699 WO2020065121A1 (fr) 2018-09-28 2018-09-28 Communications de réseau sans fil basées sur une indication de robustesse

Publications (1)

Publication Number Publication Date
WO2020065121A1 true WO2020065121A1 (fr) 2020-04-02

Family

ID=63834044

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2018/050699 WO2020065121A1 (fr) 2018-09-28 2018-09-28 Communications de réseau sans fil basées sur une indication de robustesse

Country Status (1)

Country Link
WO (1) WO2020065121A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022205420A1 (fr) * 2021-04-02 2022-10-06 Qualcomm Incorporated Sélection dynamique de fréquence basée sur un motif d'énergie pour partage de spectre de bande haute

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050025131A1 (en) * 2003-07-29 2005-02-03 Seong-Yun Ko Medium access control in wireless local area network
US20140126580A1 (en) * 2012-11-02 2014-05-08 Qualcomm Incorporated Method, device, and apparatus for error detection and correction in wireless communications
CN105450330A (zh) * 2014-06-16 2016-03-30 华为技术有限公司 一种上行传输方法、站点、通信系统及管理实体
US20170257728A1 (en) * 2016-03-07 2017-09-07 Research & Business Foundation Sungkyunkwan University Method and apparatus for energy adaptive resource allocation in energy harvesting network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050025131A1 (en) * 2003-07-29 2005-02-03 Seong-Yun Ko Medium access control in wireless local area network
US20140126580A1 (en) * 2012-11-02 2014-05-08 Qualcomm Incorporated Method, device, and apparatus for error detection and correction in wireless communications
CN105450330A (zh) * 2014-06-16 2016-03-30 华为技术有限公司 一种上行传输方法、站点、通信系统及管理实体
US20170257728A1 (en) * 2016-03-07 2017-09-07 Research & Business Foundation Sungkyunkwan University Method and apparatus for energy adaptive resource allocation in energy harvesting network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022205420A1 (fr) * 2021-04-02 2022-10-06 Qualcomm Incorporated Sélection dynamique de fréquence basée sur un motif d'énergie pour partage de spectre de bande haute

Similar Documents

Publication Publication Date Title
CN106576350B (zh) 共享频谱中的信道选择扫描
US10153970B2 (en) Partial channel reservation on a shared communication medium
EP3058787B1 (fr) Utilisation de ressources pour une émission de liaison montante sur la base d'une interférence indiquée
CN109474372B (zh) 一种数据传输的方法、装置及系统
CN112803979B (zh) 无线通信方法和终端
EP2849526B1 (fr) Évitement des interférences entre des réseaux sans fil se chevauchant
US20220095281A1 (en) Resource selection method in internet of vehicles system and user equipment thereof
WO2019237832A1 (fr) Procédé, dispositif et appareil d'émission et de réception d'un signal de requête
JP5653838B2 (ja) 無線基地局装置および送信電力制御方法
US11219031B2 (en) Apparatus and method for resource management in wireless communication system
US10390230B2 (en) MAC delimiter enhancement for spatial reuse
EP3298850B1 (fr) Commande d'accès à un support sans fil partagé
CN112188622A (zh) 一种协作传输方法及通信装置
CN109842940B (zh) 一种链路恢复方法、终端设备及网络设备
US20220264344A1 (en) Method for link quality monitoring and related products
CN109075901B (zh) 许可辅助接入载波上的链路自适应
WO2020065121A1 (fr) Communications de réseau sans fil basées sur une indication de robustesse
CN111788844B (zh) 无线通信控制方法、无线通信系统以及管理服务器
US20220417953A1 (en) Subscriber in a wireless communication system, base station, method for receiving data and computer program, for increasing the probability of getting through for subscribers with poor reception conditions or high qos requirements in communication systems with a high density of subscribers
US20110306377A1 (en) Radio communication system, radio base station, radio terminal, and communication control method
WO2014101056A1 (fr) Procédé et dispositif de régulation de puissance
CN115606226A (zh) 选择用于确定波束故障检测和无线电链路监测的参考信号
WO2011124744A1 (fr) Extraction de politique de performance radio sur la base d'une détection de spectre
CN113330808A (zh) 用于在无线网络中调度传输的方法、设备和装置可读介质
WO2018201502A1 (fr) Procédé et appareil de traitement de signaux

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18785689

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18785689

Country of ref document: EP

Kind code of ref document: A1