Abstract:
Techniques are described for wireless communication. A first method may include inserting, in a first transmission using a first radio access technology (RAT), a channel occupancy identifier for a second transmission using a second RAT. The first method may also include transmitting the first transmission having the channel occupancy identifier over an unlicensed radio frequency spectrum band. A second method may include receiving, at a receiver operated using a first RAT, a channel occupancy identifier for a transmission using a second RAT. The channel occupancy identifier may be received over an unlicensed radio frequency spectrum band. The second method may also include decoding the channel occupancy identifier to identify a backoff period, and refraining from accessing the unlicensed radio frequency spectrum band using the first RAT based at least in part on the identified backoff period.
Abstract:
Methods, systems, and devices for wireless communication are described that provide for detection and management of hidden node interference. A user equipment (UE) may provide measurement reports to a serving transmitting device to help identify the hidden node interferer in response to detecting hidden node interference. The serving transmitting device may collaborate with one or more neighboring transmitting devices, such as other transmitting devices of an operator of a wireless communications system, to identify one or more of the neighboring transmitting devices that are within an energy detect or preamble detect radius of the hidden node. The serving transmitting device may coordinate with the neighboring transmitting device(s) to determine when the hidden node may transmit, to transmit coordinated preamble transmissions to prevent the hidden node from transmitting during a transmission, or to identify a modulation and coding scheme for the transmission.
Abstract:
Techniques are described for wireless communication. One method includes implementing, at a first node, a first access protocol to contend for access to a wireless communication medium shared by a plurality of nodes; determining whether a triggering event has occurred; and implementing, at the first node, a second access protocol to contend for access to the wireless communication medium based at least in part on a determination that the triggering event has occurred.
Abstract:
Techniques are described for wireless communication. A first method may include transmitting a reference signal from an access point over a shared spectrum to a user equipment (UE), and receiving a measurement of the reference signal from the UE. A second method may include receiving at a UE over a shared spectrum a reference signal from an access point, and transmitting a measurement of the reference signal to the access point. In each of the first and second methods, the measurement may indicate interference with the shared spectrum from outside of a clear channel assessment (CCA) range of the access point. A third method may include receiving a plurality of reference signal measurements, where each reference signal measurement corresponds to one of a plurality of access points and indicates interference with a shared spectrum from outside of a CCA range of the corresponding access point, and performing channel selection for the plurality of access points based at least in part on the received reference signal measurements.
Abstract:
Aspects of the present disclosure relate to techniques for activating opportunistic relays. A combination of uplink and downlink pilots may be used to switch on user equipment relays (UeNBs) in an effort to make more accurate measurements in an effort to enable handovers. According to aspects of the present disclosure, a relay may evaluate one or more channel conditions, determine whether or not to transmit downlink reference signals to a UE based on the evaluation, and transmit downlink reference signals to the UE based on the determination. According to aspects, a relay may determine a set of resources reserved for transmission of uplink pilots by UEs, monitor the set of resources to detect transmission of uplink pilots, and report, to an eNB, a power at which the uplink pilots were received.
Abstract:
Techniques are described for wireless communication. One method includes implementing, at a first node, a first access protocol to contend for access to a wireless communication medium shared by a plurality of nodes; determining whether a triggering event has occurred; and implementing, at the first node, a second access protocol to contend for access to the wireless communication medium based at least in part on a determination that the triggering event has occurred.
Abstract:
A modulation and coding scheme (MCS) is selected for one or more transmissions from a first wireless device to a second wireless device, based at least in part on interference at the second wireless device during a time period. The interference excludes wireless signals present at the second wireless device at first times during the time period when the first wireless device is transmitting and at second times during the time period when the first wireless device detects transmissions.
Abstract:
Aspects of the present disclosure relate to techniques for activating opportunistic relays. A combination of uplink and downlink pilots may be used to switch on user equipment relays (UeNBs) in an effort to make more accurate measurements in an effort to enable handovers. According to aspects of the present disclosure, a relay may evaluate one or more channel conditions, determine whether or not to transmit downlink reference signals to a UE based on the evaluation, and transmit downlink reference signals to the UE based on the determination. According to aspects, a relay may determine a set of resources reserved for transmission of uplink pilots by UEs, monitor the set of resources to detect transmission of uplink pilots, and report, to an eNB, a power at which the uplink pilots were received.