GUIDED DISTRIBUTED INTERFERENCE MANAGEMENT SYSTEM UTILIZING POSITIVE CO-CHANNEL INTERFERENCE DETECTION, MEASUREMENT AND MITIGATION EMPLOYING A COMMUNICATION NETWORK OR AN INTERNET CONNECTION
20180302173 ยท 2018-10-18
Assignee
Inventors
Cpc classification
H04B2215/00
ELECTRICITY
H04W52/247
ELECTRICITY
H04W16/14
ELECTRICITY
H04W52/244
ELECTRICITY
International classification
H04W52/24
ELECTRICITY
Abstract
Various embodiments of the system and method relate to improvements in co-channel interference mitigation in shared spectrum environments operating under the aegis of a Spectrum Access System and companion database. Implementation orchestrates, detects, and obtains noise measurements from a potentially-affected receiver utilizing programmed reduction of transmitted power from a potential interferer when the two entities connect over the Internet or other communication network. Receivers and transmitters may use the method with the same or different Physical Layers (PHYs) and protocols. In one embodiment, a momentary reduction of transmitter power is noted during which putative interference is measured at the receiver. In another embodiment, an isolated burst is sent from a not-yet commissioned transmitter to contemporaneously detect possible interference at an operating receiver. A third embodiment can be used to measure and mitigate interference from a stationary mobile transmitter. A fourth embodiment establishes hosting for potential interference recognition as a service.
Claims
1. A method of resolving co-channel interference for a plurality of spectrum sharing wireless communication systems configured to communicate with a distributed spectrum interference management system, wherein the plurality of spectrum sharing wireless communication systems includes at least one interference initiator and an interference victim, the method comprising the steps of: receiving, by the master policy management controller, an interference assessment request from a local policy management controller in communication with the interference victim, wherein the master policy management controller is configured to be in communication with the distributed spectrum interference management system and the master database; initiating, by the master policy management controller upon receiving the interference assessment request, launch of a data collection application to collect interference data from a plurality of memories each containing a local spectrum management database associated with respective ones of the plurality of spectrum sharing wireless communication systems; storing, within the master database, the interference data received from the plurality of spectrum sharing wireless communication systems, wherein the master database is configured to be in communication with the distributed spectrum interference management system; ranking, by the master policy management controller, the plurality of spectrum sharing wireless communication systems based on the interference data received from the plurality of spectrum sharing wireless communication systems and based upon a predetermined policy to generate a list of potential interference initiators; repeating a comparison of the interference data received from the plurality of spectrum sharing wireless communication systems with the interference assessment request until the interference initiator is identified; and transferring control, by the master policy management controller in response to identification of the interference initiator, of resolution of the co-channel interference to the local policy management controller in communication with the interference victim, wherein transferring control to the local policy management controller comprises transferring control of execution of a blank burst application program from the master policy management controller to the local policy management controller and wherein the blank burst application controls the resolution of the co-channel interference between the interference victim and the interference initiator.
2. The method of claim 1, wherein the blank burst application program comprises a Distributed Spectrum Interference Management System (DSIMS) for controlling the resolution of the co-channel interference between the interference victim and the interference initiator.
3. The method of claim 2, wherein the DSIMS comprises a Blank Burst Candidate Interference operation for controlling the resolution of the co-channel interference between the interference victim and the interference initiator.
4. The method of claim 2, wherein the DSIMS comprises a Reverse Blank Burst Interference operation for controlling the resolution of the co-channel interference between the interference victim and the interference initiator.
5. The method of claim 2, wherein the DSIMS comprises a Reverse Blank Burst Mobile Unit Candidate Interference operation for controlling the resolution of the co-channel interference between the interference victim and the interference initiator.
6. A method of detecting, measuring and mitigating interference between a mobile terminal located within a boundary region between a home base station connected to the mobile terminal and an incumbent base station, the method comprising: receiving a notification at the home base station that an incumbent system is experiencing interference from the mobile terminal connected to the home base station; sending, from the mobile terminal, a Blank Burst request to the home base station; initiating, by the home base station, the requested blank burst; measuring, during the blank burst, a signal strength difference between a pre-blank burst signal strength and a post-blank burst signal strength; if the signal strength difference satisfies a predetermined margin, sending an identification request from the mobile terminal to the home base station to identify a nearby base station most likely to experience interference; if the signal strength difference does not satisfy the predetermined margin, the method terminates; sending a request from the home base station to the incumbent base station to schedule a Reverse Blank Burst; sending a confirmation of the Reverse Blank Burst for a scheduled time from the home base station to the mobile terminal; transmitting the Reverse Blank Burst from the mobile terminal to the incumbent base station at the scheduled time; recording, by the incumbent base station, a signal strength level of the Reverse Blank Burst; transmitting, from the incumbent base station, signal strength data associated with the signal strength level of the Reverse Blank Burst to the home base station, and the home base station sending the signal strength data to the mobile terminal; if the signal strength level does not exceed the predetermined interference level, the method terminates; if the signal strength level exceeds a predetermined interference level, determining, by a mobile terminal application, whether the home base station sent a reduced power setting to the mobile terminal; if the mobile terminal received a reduced power level setting from the home base station, the method terminates; if the mobile terminal does not receive the reduced power setting from the home base station, the mobile terminal application autonomously resets a new power level for the mobile terminal; sending, by the mobile terminal, a notification initiated by the mobile terminal application to the home base station, wherein the notification informs the home base station that the power level of the mobile terminal has been reset autonomously; and if a geographical location of the mobile terminal changes, returning to the step of sending, from the mobile terminal, the Blank Burst request to the home base station.
7. A method of detecting potential co-channel interference for one or more spectrum sharing wireless communication systems using a Distributed Spectrum Interference Management System configured to communicate with a plurality of spectrum sharing wireless communication systems or services to identify potential co-channel interference victims experiencing a meaningful or harmful level of co-channel interference; the method comprising the steps of: securely connecting to one or more receivers or transmitters at locations belonging to a communications service or provider to identify potential co-channel interference victims based on local measurement at receiver site locations belonging to an interference detection and mitigation service; sampling, continuously, signal characteristics at each participating receiver over time from the plurality of participating receiver sites; storing the data in a master database; performing, continuously, analyses of the data stored in the master database to identify signals that may identify potential of meaningful interference; and initiating, by use of a master policy management controller, a co-channel interference indication and notification to at least one of a plurality of spectrum sharing wireless communication systems by the master policy management controller to pursue identification and mitigation, if allowed, using the Blank Burst process.
8. The method of claim 7, wherein the one or more spectrum sharing wireless communication system is configured as a networked Multiple-Input and Multiple-Output (MIMO) antenna systems or beam forming radio transmission systems.
9. The method of claim 8, wherein the securely connecting further includes securely connecting to one or more MIMOs or beam-forming radio transmitters.
10. The method of claim 9, further comprising scheduling interruption or dimming of each of the one or more MIMOs or the beam-forming radio transmitters sequentially or collectively, as a selected group, while being monitored by a victim receiver.
11. The method of claim 10, wherein the sampling further includes sampling the signal characteristics at the victim receiver over time from a plurality of participating networked MIMOs or beam-forming radio transmitters.
12. The method of claim 11, wherein the performing analyses of data further includes performing analyses of the data stored in the master database to identify that the signals emitted from a specific transmitter or a specific group of transmitters constitute meaningful interference to the victim receiver.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0027] The skilled artisan will understand that the drawings described below are for illustrative purposes only. The drawings are not intended to limit the scope of the present teachings in any way.
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
DETAIL DESCRIPTION OF THE EMBODIMENT(S)
[0043] This detailed description will reference various embodiments, examples of which are illustrated in the accompanying drawings. However, these various exemplary embodiments are not intended to limit the disclosure. On the contrary, the disclosure is intended to cover alternatives, modifications, and equivalents.
[0044] Throughout the application, description of various embodiments may use comprising language, however, it will be understood by one of skill in the art, that in some specific instances, an embodiment can alternatively be described using the language consisting essentially of or consisting of.
[0045] For purposes of better understanding the present teachings and in no way limiting the scope of the teachings, it will be clear to one of skill in the art that the use of the singular includes the plural unless specifically stated otherwise. Therefore, the terms a, an and at least one are used interchangeably in this application.
[0046] Unless otherwise indicated, all numbers expressing quantities, percentages or proportions, and other numerical values used in the specification and claims, are to be understood as being modified in all instances by the term about or approximately. Accordingly, unless indicated to the contrary, the numerical parameters set forth in the following specification and attached claims are approximations that may vary depending upon the desired properties sought to be obtained. In some instances, about or approximately can be understood to mean a given value 5%. Therefore, for example, about 100 degrees Fahrenheit could mean 95-105 degrees Fahrenheit.
[0047] As a summary overview, shared spectrum approaches will require the use of a new and more advanced, automated and distributed type of spectrum interference management system to allow cooperation and maximize use of the wireless resource. This DSIMS system approach can function as a clearinghouse for license management as well as maintain descriptive properties that characterize the transmitter, receiver, and antenna operations used by each of the services with companion interference information. Further, the main DSIMS system may be supplemented by other distributed, cloud-based systems and communications networks. The DSIMS and Distributed Spectrum Coordinating Clearinghouse Processes utilize associated communication networks containing databases that maintain details about devices in each service/system. These databases can be used to facilitate communication between services/systems for the purpose of identifying transmitter emissions that could pose potential interference to receivers within the service areas of these services/systems.
[0048] The architecture of the DSIMS system with its Distributed Spectrum Coordinating Clearinghouse Process is illustrated in the architectural diagram of
[0049] The automated DSIMS Policy Management process is illustrated in
[0050] The Blank Burst methodology employs techniques to automatically isolate, measure, report, suggest, and optionally adjust the level of co-channel interference sources operating in a shared spectrum environment.
[0051] An important benefit of the Blank Burst method for automating the process of interference management and mitigation is the utilization of policy management, big data analytics, and machine learning to rapidly identify the source of potential interference and to enable measurement of the signal at the victim's receiver. If meaningful interference is detected, the transmitter can be requested to reduce power or optionally reduce power automatically if allowed by the rule base. The key to detecting the strength of interference at the victim's receiver is to measure the signal level during the Pre-Blank Burst interval, to then measure the signal level during the Blank Burst interval, and lastly to measure the signal level during the Post-Blank Burst interval. The victim's receiver can then determine if there is a measurable reduction in signal level observed during the Blank Burst interval from a particular interference source as illustrated
[0052] The Blank Burst methodology can be further extended as the Reverse Blank Burst where a new or prospective system transmitter is installed and a need exists to assess the potential interference offered to an incumbent's receiver. Instead of dimming or eliminating the transmit power level during the burst, it is instead increased. The signal level experienced by the receiver during the burst quantifies how much excess signal is contributed. The process can be sequentially applied to determine how much interference can be tolerated at the receiver without harm.
[0053] The key to determining a new or prospective transmitter's power level at an incumbent receiver that may result in an acceptable interference power level is to measure the signal level during the Pre-Reverse Blank Burst interval, to then measure the signal level during the Reverse Blank Burst interval and then to measure the signal level during the Post-Reverse Blank Burst interval in order to assess how much power the transmitter can emit while still resulting in an acceptable co-channel noise level at an incumbent receiver. The process is illustrated in
[0054] The Guided Distributed Spectrum Interference Management System (DSIMS) and/or a Distributed Spectrum Coordinating Clearinghouse Process can also be utilized in a Public/Private system architecture configuration as illustrated in the architectural diagram of
[0055] The Public/Private System Architecture can be used to measure and mitigate interference to a Public Incumbent System as illustrated in
[0056]
[0057] Referring to
[0058] In various embodiments, the Blank Burst and Reverse Blank Burst methods may require that all Local Public or Private Spectrum Sharing Wireless Communication Systems register with the national or regional Cloud DSIMS system 101 by establishing a communication network connection or an Internet connection to the DSIMS via a national secure communications network or the Internet 103 to register their identities and properties. In some embodiments, registration of one or more Local Public or Private Spectrum Sharing Wireless Communications Systems with the national or regional cloud DSIMS 101 may not be required for operation of the system according to the present teachings.
[0059] In another embodiment, The DSIMS Master Policy Management Controller may include a cloud-based application that pro-actively monitors co-channel interference on behalf of a system/service operator whose receiver(s) could experience co-channel interference. This interference might occur as a result of emissions from transmitters external to the operator's service, or emissions by transmitters in the operator's own network. In such an Interference Management as a Service (IMaaS) arrangement, the DSIMS uses its Master Policy Management controller to connect to a system/service operator's network controller directly via a secure link to sample each receiver's signal strength and other characteristics remotely at intervals. The application is thus used to highlight potential interference conditions at individual receiver locations that may benefit from treatment by Blank Burst and Reverse Blank Burst processes as described previously. If a signature of potential interference is detected, the DSIMS issues a Potential Interference Indicator (PRI) message to alert the operator's system so that Blank Burst and Reverse Blank Burst operations may be begun by the operator's Blank Burst Coordinator. Use of the IMaaS cloud application permits the DSIMS to manage the entire process of automatically detecting, isolating, measuring and mitigating co-channel interference for a wireless communications system operator, if desired.
[0060] Once some, or all Local Public or Private Spectrum Sharing Wireless Communication Systems, 1-n, are registered with the Cloud Secure DSIMS Master Database 102, they can utilize the Blank Burst and Reverse Blank Burst methods to isolate and measure the presence of co-channel interference experienced by a receiver sharing a frequency channel with other coordinated users as part of a Distributed Spectrum Interference Management System (DSIMS) to mitigate or eliminate such interference as a part of a Distributed Spectrum Interference Management System (DSIMS) network. Each Local Public or Private Spectrum Sharing Wireless Communications System (105, 107,109) houses a Local Secure Distributed Spectrum Interference Management System Database (106, 108, 110) containing information about the components and properties of the individual systems which participate in spectrum sharing.
[0061] Referring to
[0062] Once the Master DSIMS Policy Management Controller (PMC) receives an interference assessment request 201 from a Local DSIMS Policy Management Controller issued by a particular Local Spectrum Sharing Wireless Communication System, the DSIMS PMC launches a data collection process 202 to update the DSIMS Master Database with all relevant data from all Local Spectrum Sharing Wireless Communication Systems that are connected to the DSIMS system. After the DSIMS Master Database update, the Master DSIMS PMC analyzes the data based on the appropriate policy management algorithms to rank order all candidate Local DSIMS PMC Systems 203 that may constitute potential interferers relative to the Local DSIMS PMC request. Once the rank order list is established, the Master DSIMS PMC compares interference data based on the appropriate policy management, analytics, and machine learning algorithms from the rank order list arranged in ascending order 204 with Local DSIMS PMC interference assessment requests received from the Local Spectrum Sharing Wireless Communication System that is experiencing unacceptable interference. This process continues 205 until the Local Spectrum Sharing Wireless Communication System that is causing the interference is identified. Once the Local Spectrum Sharing Wireless Communication System that is causing the interference is identified, control is transferred to 206 from the Master DSIMS PMC to the Local DSIMS PMC of the Local Spectrum Sharing Wireless Communication System that is experiencing the high levels of interference to utilize the Blank Burst and Reverse Blank Burst method to resolve the high level of interference or coordinate/balance the level of interference between the two Local Spectrum Sharing Wireless Communication Systems.
[0063] Referring to
[0064]
[0065] Victim system controller 413, part of base station 412, orchestrates operation of the system's receiver 414 and transmitter 415. Victim system controller 413 connects to the Blank Burst Coordinator 410 and hence to the Internet 407 and to Distributed Spectrum Interference Management System Database 408 which is part of DSIMS 409. If victim receiver 414 experiences interference, 414 uses the victim system controller 413 and Blank Burst Coordinator 410 to access information in database 408 to discover one or more transmitter instances which may be contributing interference. Having selected a candidate transmitter, 413 obtains the Internet address of the potential interfering transmitter and establishes a secure link via the Internet 407. The link is used to convey Blank Burst protocol information necessary to set up, execute, and interpret the Blank Burst to disclose whether interference is present at the victim receiver 414 from transmitter 405.
[0066]
[0067]
[0068] At block 608, the first block 609 of properties of a candidate interfering transmitter is fetched. At 610, the propagation loss between a candidate transmitter and the victim receiver is calculated using the topographic/obstruction data and propagation model previously downloaded. At block 611, the amount of excess noise from the candidate interfering transmitter is calculated. At block 612 the excess noise calculation is stored. At block 613 a decision is reached as to whether all candidate transmitter noise calculations have been stored. If not, execution proceeds to block 508, after which steps 609, 610, 611, and 612 are repeated. At block 613, the decision is then made to check if all noise calculations have been stored. If yes, execution moves to block 614 where the excess noise estimates with their companion transmitter entries and properties are stored in an ordered table with the highest estimated excess noise estimate first. At block 615, the data for the first entry in the transmitter table (which is the entry assigned the highest estimated excess noise contribution) is retrieved and the corresponding Uniform Resource Locator (URL) is used to open a secure link using the Internet.
[0069] At block 616 the Blank Burst Coordinator sends the information block 617 to the i.sup.th transmitter Blank Burst Coordinator to set up the Blank Burst event. Block 618 persists until the Blank Burst Coordinator at the transmitter returns a confirmation that the event has been scheduled. At 619, the victim Blank Burst Coordinator prepares the victim receiver to record the pre-Blank Burst, Blank Burst, and post-Blank Burst signal strength at the scheduled event time. The noise reduction during the Blank Burst Interval (501 on
[0070] Referring to
[0071]
[0072]
[0073]
[0074] At block 1008, the block 1009 of properties of a candidate interfering transmitter is retrieved. At 1010, the propagation loss between the new candidate transmitter and the victim receiver is calculated using the topographic/obstruction data and propagation model previously downloaded. At block 1011, the estimated propagation loss between the new prospective interfering transmitter and the incumbent receiver is calculated. At block 1012 the excess noise calculation derived from the new transmitter's power level and the propagation loss is stored. At block 1013 a decision is reached as to whether all candidate transmitter excess noise calculations have been stored. If not, execution proceeds to block 1008, after which steps 1009, 1010, 1011, and 1012 are repeated. At block 1013, the decision is again made to determine if all noise calculations have been stored. If the answer at block 1013 is yes, the process moves to block 1014 where the excess noise estimates with their companion receiver entries and properties are stored in an ordered table ranking the highest estimated noise first. At block 1015, data associated with the first entry in the transmitter table (highest estimated excess noise contribution) is retrieved and the corresponding URL is used to open a secure link to the incumbent Blank Burst Coordinator using the Internet.
[0075] At block 1016, the new transmitter's Blank Burst Coordinator sends the information block 1017 to the i.sup.th receiver Blank Burst Coordinator to set up a Reverse Blank Burst event. Block 1018 persists until the Blank Burst Coordinator at the receiver returns a confirmation that the event has been scheduled. At block 1019, the incumbent Blank Burst Coordinator prepares the receiver via the System Controller to record the pre-Reverse Blank Burst, Reverse Blank Burst, and post-Reverse Blank Burst signal strength at the scheduled event time. The noise increase during the Reverse Blank Burst Interval (in block 901 on
[0076] If all incumbent receiver Reverse Blank Burst requests have been measured at block 1023, the noise increase measurements indicating remediation are flagged. If block 1022 indicates there are more candidate incumbent receivers that require Reverse Blank Burst measurement, the process moves to block 1015 where the steps are repeated until all candidate receivers have been measured using the Reverse Blank Burst process. The process proceeds to block 1023 is reached when relevant excess noise increases for one or more incumbent receivers are isolated for interference mitigation. Such mitigation may involve reduction of new transmitter power level, adjustment of antenna pattern, null steering or other adjustments to transmitter operation. If the rule base allows, power level adjustments can also be conducted automatically.
[0077]
[0078]
[0079]
[0080]
[0081] The Mobile Blank Burst Coordinator negotiates with the Reverse Blank Burst Coordinator at the base station to initiate a Blank Burst of its own transmitter. This is used to allow the mobile receiver to determine the strength of an incumbent base station's signal compared to the host base station's signal. The comparison allows the mobile unit to determine if an incumbent base station might be an interference victim. The Blank Burst is then followed by scheduling of a Reverse Blank Burst event with the most probable incumbent base station. The Mobile Reverse Blank Burst Coordinator requests the home base station's Reverse Blank Burst Coordinator to contact the candidate incumbent's Blank Burst Coordinator 1412 via a secure link through the Internet 1411. To accomplish this addressing function, the home base station's Blank Burst Coordinator accesses the Distributed Spectrum Interference Management System (DSIMS) 1410 with Database 1409. The candidate incumbent's antenna 1413 is connected to its system base station 1414 consisting of System Controller 1415, Receiver 1416 and Transmitter 1417. The controller is connected to the incumbent's Blank Burst Coordinator and hence to the Internet 1411.
[0082]
[0083] During the burst, the difference between pre- and post-Blank Burst signal strength is measured in block 1503. If the signal during the Blank Burst interval is comparable, within a predetermined margin, to the signal from the home base station before and after the Blank Burst, it is assumed that the reciprocal nature of the signal during the Burst may indicate the potential for interference at the incumbent receiver. If the signal decision at block 1504 indicates that the levels are not comparable, the process terminates. If there is sufficient signal to warrant continuation of the process, the process advances to block 1506, where the mobile application requests that the home base station identify the incumbent base station most likely to experience interference due to its proximity to the mobile's geographical location.
[0084] The home base station schedules a Reverse Blank Burst at block 1507 with the incumbent base station and confirms the Burst with the mobile. At the scheduled time, the mobile transmits the Reverse Blank Burst at block 1508. The incumbent receiver will have recorded the signal strength during the pre- and post-Reverse Blank Burst as well as during the Burst itself. It has also sent the signal level to the home base station at 1509 which is hence sent to the mobile. If the signal at the incumbent receiver during the Reverse Blank Burst at decision block 1510 is large enough to constitute meaningful interference, the process continues at Block 1511. Otherwise, the process terminates at Block 1510.
[0085] At block 1511, the application in the mobile unit checks whether the home base station has sent a modified (reduced) power setting to the mobile unit through its native power control function (if it exists). If so, the process terminates. If no at block 1511, block 1512 sets the power level of the mobile's transmitter autonomously and stores it. In block 1513 the application notifies the home base station that the power level has been set autonomously. If the mobile unit's geographical location changes (e.g. the mobile changes from fixed operation to a new location), the process flow moves to Block 1502 to restart the Reverse Blank Burst process. This ensures that the mobile's new location does not result in a return of interference to the incumbent base station. If the location of the mobile unit has not changed, the process continues in the loop formed by blocks 1514 and 1513 to ensure that the power level of the transmitter is maintained at the lower level to reduce interference.