Abstract:
Wireless communication in a heterogeneous network may be facilitated by establishing connections with femto nodes based on page notifications from macro nodes to user equipment (UE). A UE in idle mode may monitor paging resources provided by a macro node, discover presence of a femto node based on signals received from the femto node, and establish a communicative connection with the femto node based on a page notification received from the macro node over the paging resources.
Abstract:
A method or apparatus for configuring OLPC parameters for uplink communications in a cellular wireless network includes determining an estimated number of neighbor cells deployed within radio range of a cell, and configuring OLPC parameters for uplink communications, based on the estimated number of neighbor cells. Determining the estimated number of neighbor cells may include measuring respective signal strengths of the neighbor cells using network listen functionality. At least two OLPC intermediate parameters Po and α may be selected from a data table, based on the estimated number of neighbor cells. A path loss statistic may be determined, based on UE measurement reports including path losses of UEs to itself and other cells. The OLPC parameters may be selected based on the path loss statistic and Po and α, and/or adapted based on at least one of UE power headroom reports or overload indicators received from the neighbor cells.
Abstract:
An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal.
Abstract:
Transmit power for an access point is controlled based on measurement reports received by the access point from one or more access terminals that are not currently being served by the access point. In some aspects, transmit power is controlled based on the number of received messages that correspond to a particular event. In some aspects, transmit power is controlled based on the contents of the received messages. For example, the access point may use signal strength information included in the messages to determine a level of transmit power that mitigates interference at a defined subset of reporting access terminals.
Abstract:
Transmit power for an access point is controlled based on information received by the access point. For example, an access point may employ one or more algorithms that use messages received from nearby access terminals to maintain an acceptable tradeoff between providing an adequate coverage area for access point transmissions and mitigating interference that these transmissions cause at nearby access terminals. Here, the access point may employ a network listen-based algorithm upon initialization of the access terminal to provide preliminary transmit power control until sufficient information is collected for another transmit power control algorithm (e.g., an access terminal assisted algorithm). Also, the access terminal may employ an active access terminal protection scheme to mitigate interference the access point may otherwise cause to a nearby access terminal that is in active communication with another access point.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided in connection with improving PCI selection and/or allocation so as to reduce interference from unloaded cells. In one example, a network entity is equipped to determine whether a cell is loaded or unloaded, and allocate a PCI from a common pool of PCIs to the cell when the cell is unloaded. In another example, a network entity is equipped to determine that a cell is to transition between an unloaded state and a loaded state, and use a first PCI from a common PCI pool associated with the cell in the unloaded state and a second PCI associated with the cell in the loaded state. In another example, a communications device is equipped to attempt to access a first cell associated with a first PCI which indicated that the first cell is unloaded.
Abstract:
Methods, systems, and devices for wireless communication are described for monitoring interference level to selectively control usage of a contention-based protocol. In an example, a wireless device may transmit, while operating in a non-contention-based mode for a wireless link with a second wireless device, a first beamformed data transmission to the second wireless device over a shared channel. The wireless device may determine that an interference level condition is satisfied for the shared channel and transition from operating in the non-contention-based mode to operating in a contention-based mode for the wireless link based at least in part on the interference level condition being satisfied. The wireless device may perform a contention-based protocol, while operating in the contention-based mode for the wireless link with the second wireless device, prior to transmission of a second beamformed data transmission to the second wireless device over the shared channel.
Abstract:
Methods, systems, and devices for wireless communication are described. A user equipment (UE) and a base station operating in unlicensed spectrum may temporarily increase a paging opportunity window (POW) size, or reduce a time between POWs, in order to meet performance metrics or account for time periods when a base station is unable to win access to the wireless medium during a POW. In some cases, a UE may identify a failed listen-before-talk procedure and autonomously update the POW size. In other examples, a base station may initiate a change in POW size or increase a number of paging opportunities in order to meet achieve one or more key performance indicators (KPIs). After a predetermined period, or after a triggering condition is no longer present, the UE and the base station may reset the POW size or the number of paging opportunities to a nominal amount to conserve power.
Abstract:
Techniques for managing preamble transmission and processing on a shared communication medium are disclosed. An access point or an access terminal, for example, may generate a preamble for silencing communication on a communication medium with respect to an upcoming data transmission, configure the preamble to identify one or more target devices for the silencing, and transmit the preamble over the communication medium in advance of the data transmission. Conversely, the access point or the access terminal may receive a preamble (as a receiving device) over a communication medium, identify one or more target devices for silencing communication on the communication medium with respect to an upcoming data transmission based on the preamble, and selectively silence communication over the communication medium based on itself (as the receiving device) being among the one or more target devices.