METHOD FOR MITIGATING PASSIVE INTERMODULATION AND AN APPARATUS THEREFOR
20230071619 · 2023-03-09
Assignee
Inventors
- Fanggang WANG (Beijing, CN)
- Haiying Cao (Beijing, CN)
- Yu Liu (Beijing, CN)
- Peng Liu (Beijing, CN)
- Vijay VENKATESWARAN (Västerås, SE)
- Bo AI (Beijing, CN)
Cpc classification
H04B1/525
ELECTRICITY
International classification
Abstract
There is provided mechanisms for mitigating passive intermodulation in a first network node, wherein said PIM is caused by radio signals transmitted from at least an adjacent network node. The method is performed by a control device. The method comprises receiving at least an uplink radio signal and down-converting the received UL radio signal to a UL baseband signal. The method applies a cyclic redundancy check, CRC, to detected information bits of the received UL baseband signal, wherein in response to determining by the CRC that the UL baseband signal is detected correctly, directly output the detected information bits. The method comprises in response to determining by the CRC that the UL baseband signal is incorrectly detected, determining a residual signal of the received UL baseband signal applying a blind signal identification scheme on the residual signal of the UL baseband signal to obtain an estimate for a modeled PIM signal. The method comprises subtracting the estimated modelled PIM signal from the received UL baseband signal as in the first step and updating the received UL baseband signal in an iterative process until CRC is detected correctly or until number of iterations exceeds a predetermined threshold.
Claims
1. A method for mitigating passive intermodulation, PIM, in a first network node, wherein said PIM is caused by radio signals transmitted from at least an adjacent network node, the method being performed by a control device, the method comprising the steps: i) receiving at least an uplink, UL, radio signal comprising disturbance and desired signals and down-converting the received UL radio signal to a UL baseband signal, wherein the received UL baseband signal comprises detected information bits; ii) applying a cyclic redundancy check, CRC, on the detected information bits of the received UL baseband signal, wherein iii) in response to determining by the CRC that the UL baseband signal is detected correctly, directly output the detected information bits, and, iv) in response to determining by the CRC that the UL baseband signal is incorrectly detected, determining a residual signal of the received UL baseband signal; v) applying a blind signal identification scheme on the residual signal of the UL baseband signal to obtain an estimate for a modeled PIM signal; and vi) subtracting the estimated modelled PIM signal from the received UL baseband signal as in step i) and updating the received UL baseband signal in an iterative process until CRC is detected correctly or until number of iterations exceeds a predetermined threshold.
2. The method according to claim 1, wherein determining the residual signal comprises: transforming the incorrectly detected information bits of the received UL baseband signal to symbols and subtracting the symbols from the received UL baseband signal.
3. The method according to claim 1, wherein the blind signal identification comprises a maximum likelihood estimation, MLE, of the residual signal.
4. The method according to claim 1, wherein the blind signal identification comprises a maximum a posteriori probability (MAP) estimation or machine learning algorithms of the residual signal.
5. The method according to claim 3, wherein the MLE comprises estimating parameters, patterns and intermodulation products of the PIM from the residual signal of the baseband UL signal to obtain the estimate of the PIM modelled signal.
6. The method according to claim 5, wherein the parameters and patterns of the PIM comprises at least one of: carrier frequency, modulation format, coding patterns, control channel parameters and information bits of the disturbance.
7. The method according to claim 1, wherein the received UL baseband signal is synchronized with radio signals of the first network node before applying the CRC.
8. The method according to claim 1, wherein PIM is caused by known radio signals from the first network node and unknown radio signals from the at least one adjacent network node.
9. The method according to claim 1, wherein PIM is caused by unknown radio signals from the at least one adjacent network nodes.
10. A control device for mitigating passive intermodulation, PIM, in a first network node, wherein said PIM is caused by radio signals transmitted from at least an adjacent network node, the control device being configured to: i) receive at least an uplink, UL, radio signal comprising disturbance and desired signals and down-converting the received UL radio signal to a UL baseband signal, wherein the received UL baseband signal comprises detected information bits; ii) apply a cyclic redundancy check, CRC, to the detected information bits of the received UL baseband signal, wherein the control device is configured iii) in response to determining by the CRC that the UL baseband signal is detected correctly, directly output the detected information bits, and, iv) in response to determining by the CRC that the UL baseband signal is incorrectly detected, determining a residual signal of the received UL baseband signal; v) apply a blind signal identification scheme on the residual signal of the UL baseband signal to obtain an estimate for a modeled PIM signal; and vi) subtract the estimated modelled PIM signal from the received UL baseband signal as in i) and updating the received UL baseband signal in an iterative process until CRC is detected correctly or until number of iterations exceeds a predetermined threshold.
11. The control device according to claim 10, wherein to determining the residual signal comprises: transforming the incorrectly detected information bits of the received UL baseband signal to symbols and subtracting the symbols from the received UL baseband signal.
12. The control device according to claim 10, wherein the blind signal identification comprises a maximum likelihood estimation, MLE, of the residual signal.
13. The control device according to claim 10, wherein the blind signal identification comprises a maximum a posteriori probability (MAP) estimation or machine learning algorithms of the residual signal.
14. The control device according to claim 12, wherein the MLE comprises estimating parameters, patterns and intermodulation products of the PIM from the residual signal of the baseband UL signal to obtain the estimate of the PIM modelled signal.
15. The control device according to claim 14, wherein the parameters and patterns of the PIM comprises at least one of: carrier frequency, modulation format, coding patterns, control channel parameters and information bits of the disturbance.
16. The control device according to claim 10, wherein the received UL baseband signal is synchronized with radio signals of the first network node before applying the CRC.
17. The control device according to claim 10, wherein PIM is caused by known radio signals from the first network node and unknown signals from the at least one adjacent network node.
18. The control device according to claim 10, wherein PIM is caused by unknown radio signals from the at least one adjacent network node.
19. A control device for mitigating passive intermodulation, PIM, in a first network node, wherein said PIM is caused by radio signals transmitted from at least an adjacent network node, the control device comprising processing circuitry, the processing circuitry being configured to cause the control device to: i) receive at least an uplink, UL, radio signal comprising disturbance and desired signals and down-converting the received UL radio signal to a UL baseband signal, wherein the received UL signal comprises detected information bits; ii) apply a cyclic redundancy check, CRC, to the detected information bits of the received UL baseband signal, wherein the control device is configured iii) in response to determining by the CRC that the UL baseband signal is detected correctly, directly output the detected information bits, and, iv) in response to determining by the CRC that the UL baseband signal is incorrectly detected, determining a residual signal of the received UL baseband signal; v) apply a blind signal identification scheme on the residual signal of the UL baseband signal to obtain an estimate for a modeled PIM signal; and vi) subtract the estimated modelled PIM signal from the received UL baseband signal as in i) and updating the received UL baseband signal in an iterative process until CRC is detected correctly or until number of iterations exceeds a predetermined threshold.
20.-21. (canceled)
22. A computer program product comprising a non-transitory computer-readable storage medium storing a computer program comprising instructions which, when executed by a computer, cause the computer to perform the method of claim 1.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0030] The embodiments, together with further objects and advantages thereof, may best be understood by making reference to the following description taken together with the accompanying drawings, in which
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
DETAILED DESCRIPTION
[0040] The inventive concept will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the inventive concept are shown. This inventive concept may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art.
[0041] Throughout the drawings, the same reference designations are used for similar or corresponding elements. Any step or feature illustrated by dashed lines should be regarded as optional.
[0042]
[0043] The communications network 100 comprises a control node 200 (control device) configured to control a radio base station 140 that provides network access to at least one terminal device 160 in a radio access network 110, thus enabling the terminal device 160 to communicate over a wireless link 150. The radio access network 110 is operatively connected to a core network 120. The core network 120 is in turn operatively connected to a service network 130, such as the Internet. The terminal device 160 is thereby enabled to, via the network node, access services of, and exchange data with, the service network 130.
[0044] Some examples of radio base stations 140 are radio access network nodes, radio base stations, base transceiver stations, Node Bs, evolved Node Bs (e Node Bs), g Node Bs, access points, access nodes, transmission and reception points, and backhaul nodes. Some examples of terminal devices 160 are wireless devices, mobile stations, mobile phones, handsets, wireless local loop phones, user equipment (UE), smartphones, laptop computers, tablet computers, network equipped sensors, network equipped vehicles, and so-called Internet of Things devices.
[0045] The control node 200 might comprise, be collocated with, integrated with, or be in operational communications with, the radio base stations 140. The control node may herein also be called a control device. The base stations may herein also be called network nodes.
[0046] With reference to an embodiment shown in
[0047] The embodiments disclosed herein employ a solution to mitigate passive intermodulation when the downlink is unknown.
[0048] At least some of the embodiments disclosed herein relate to mechanisms for ensuring that PIM can be mitigated. The embodiments disclosed herein in particular relate to mechanisms based on applying a CRC and a blind signal identification scheme in an iterative process until CRC is detected or the number of iterations exceed a predetermined threshold.
[0049] In order to obtain such mechanisms, there is provided a control device 200 for mitigating the PIM, a method performed by the control device 200, a computer program product comprising code, for example in the form of a computer program, that when run on a control device 200, causes the control device 200 to perform the method.
[0050]
[0051] The flowchart describes the steps performed by the control device.
[0052] S201: The control device receives or obtains at least an UL radio signal comprising disturbance and desired signals and down-converts the received UL radio signal to a UL baseband signal. The received UL baseband signal comprises detected information bits. The word “detected” may herein mean that we use the received signal to determine the transmitted information bits at the baseband.
[0053] S202: The control device 200 applies a cyclic redundancy check, CRC, to the detected information bits of the received UL baseband signal. In this step, it determines whether the information bits are detected correctly or incorrectly. The received UL baseband signal may be synchronized with radio signals of the first network node before applying the CRC.
[0054] The following steps continues in two different ways depending on whether the bits are detected correctly or incorrectly.
[0055] S204: In response to determining by the CRC that the UL baseband signal is detected correctly, the control device directly output the detected information bits (S204). It is correctly detected when CRC=0. In other words, if the CRC determines that the UL baseband is correctly detected, it directly outputs the detected information bits and the process is finished. Herein the term “baseband” means the frequency baseband.
[0056] S205: In response to determining by the CRC that the UL baseband signal is incorrectly detected, the control device determines a residual signal of the received UL baseband signal (S205). It is incorrectly detected when CRC #0. In other words, if the CRC determines that the UL baseband is incorrectly detected it determines a residual signal of the received UL baseband signal. The determination of the residual signal of the received UL baseband signal may comprise transforming the incorrectly detected information bits of the received UL baseband signal to symbols and subtracting the symbols from the received UL baseband signal.
[0057] S206: The control device applies a blind signal identification scheme on the residual signal of the UL baseband signal to obtain an estimate for a modeled PIM signal.
[0058] S207: The control device subtracts the estimated modelled PIM signal from the received UL baseband signal as in step S201 and updates the received UL baseband signal in an iterative process until CRC is detected correctly or until number of iterations exceeds a predetermined threshold.
[0059] According to an aspect, the blind identification scheme may comprise a maximum likelihood estimation (MLE) of the residual signal. However, it may alternatively be a maximum a posteriori probability (MAP) estimation or machine learning algorithms of the residual signal.
[0060] In some aspects, the MLE may comprise estimating parameters, patterns and intermodulation products of the PIM from the residual signal of the baseband UL signal to obtain the estimate of the PIM modelled signal. The parameters and patterns of the PIM may comprise at least one of: carrier frequency, modulation format, coding patterns, control channel parameters and information bits of the disturbance. It may also comprise a propagation delay.
[0061] In some aspects the PIM may be caused by known DL radio signals from the first network node and unknown DL radio signals from the least the one adjacent network node. Alternatively, it may be that PIM is being only caused from unknown DL radio signals of the adjacent network node.
[0062] The word “adjacent” is herein meaning network nodes that are physically. This may also be called a rough separation of the PIM interference signal {circumflex over (v)}.sup.(t). The residual signal may herein in a non-limiting example comprise of PIM interference, noise and other interferences. Then the detected information bits are encoded and modulated to the modulated symbols, and represent the PIM signal as {circumflex over (v)}.sup.(t)
{circumflex over (v)}.sup.(t)=x.sub.c.sup.(t)−{î.sub.c.sup.(t)}=s.sub.PIM.sup.(t)+ω (4)
where M.sub.c denotes the encoding and modulating process of the uplink signal x.sub.c.sup.(t).
[0063] In the third step, to determine the unknown DL signals that cause PIM and lead to the additional performance degradation and to cancel the PIM signal s.sub.PIM.sup.(t) from the received baseband signal x.sub.c, a blind signal identification module 304 is first designed. It is noted that the PIM distortion s.sub.PIM.sup.(t) in formula (2) is produced by the known DL communication signal s.sub.a from base-station A and the unknown interference signal s.sub.b from base-station B. Thus, there is a need to estimate the carrier frequency, the unknown DL channel h.sub.b, and the propagation delay τ, identify the modulation and coding pattern, determine the transmitted symbols of the unknown s.sub.b. Then the unknown signal s.sub.b and the PIM distortion s.sub.PIM.sup.(t) in formula (2) can be determined. This is repeated for different DL signal combinations. Actually, it is not possible to determine the parameters, the modulation and coding pattern, and the information bits of s.sub.b directly. However, the base-station can still determine the patterns which s.sub.b may use. In other words, the base-station knows the candidates set of the interference signal θ=1, 2, . . . , P. Then, based on the hypothesis testing theory, the likelihood estimates L.sub.θ are calculated for the P candidates. Thus, a blind signal identification module 304 is designed that may be configured to classify the modulation format of s.sub.b, and determine the transmitted information bits. The likelihood estimates L.sub.θ in the iteration t is written as
where
and μ.sub.m is the constellation point in the modulation format θ, M is the modulation order of θ.
[0064] The final decision of the adopted modulation {circumflex over (θ)} is made by
{circumflex over (θ)}.sup.(t)=arg max.sub.θL.sub.θ.sup.(t) (8)
[0065] In the fourth step, the PIM regeneration module 303 is configured to recreate the PIM interference utilizing the parameters and patterns in the third step. Then ρ.sub.{circumflex over (θ)},m.sup.(t)(n) is defined as the posterior probability of the nth modulated symbol which maps to the mth constellation point in the modulation format {circumflex over (θ)} in the iteration t, ρ.sub.{circumflex over (θ)},m.sup.(t)(n) and given by
[0066] Then, the determined ŝ.sub.b.sup.(t)(n) can be expressed as
ŝ.sub.b.sup.(t)(n)=Σ.sub.m=1.sup.Mρ.sub.θ,m.sup.(t)(n)μ.sub.m (10)
[0067] The PIM inference ŝ.sub.PIM,m.sup.(t) may be determined and recreated utilizing (10), which can be expressed as
ŝ.sub.PIM,m.sup.(t)(n)=Σ.sub.l=-L.sub.
[0068] Then, the received baseband signal cancels the PIM interference and performs the signal detection again 302. The updated received signal after PIM cancellation in the iteration t+1 is given by
x.sub.c.sup.(t+1)=x.sub.c.sup.(t)−ŝ.sub.PIM,m.sup.(t) (12)
[0069] To enhance the PIM cancellation and data detection performance, the overall process may be performed in an iterative manner. The overall scheme may be exploited to the single antenna system but may also be extended to a multiple antenna system. Moreover, if the PIM inference is caused by the UL signals which are both unknown at base-station A, i.e., s.sub.a and s.sub.b are both unknown, the proposed PIM cancellation method works in a similar way. In such case, the candidates are expanded to a set from θ=1, 2, . . . , P to θ=1, 2, P×K, where P and K is the number of the possible candidates of s.sub.a, and s.sub.b. The PIM cancellation process is similar to the case with known s.sub.a and unknown s.sub.b.
[0070] An embodiment of the PIM cancellation method is also shown in
[0071]
[0072]
[0073]
The adopted modulation format of x.sub.c and s.sub.a at the base-station A is quadrature phase shift keying (QPSK).
[0074] In
[0075] In
[0076] In this way the proposed embodiments described herein, successively improves the UL signal quality using an iterative cancellation process. The blind signal identification module can detect the DL signals resulting in PIM without any prior information. The blind signal identification module can handle PIM caused by unknown DL signals from other radio vendors or a mix of these signals with DL signals from our own radio. Then, the iterative cancellation process can further cancel the PIM interference and enhance the data detection performance in an iterative manner. It is especially not known before how to consider the PIM cancellation issue when the prior information of DL signals resulting in PIM are unknown at the base stations, such as the PIM caused by radios from other vendors/operators or even malicious users. This kind of PIM interference problem is very common in practical communication systems, and therefore it is in dire need of an efficient solution. Further, the proposed approach has the advantage of not requiring any extra hardware, such as a wideband receiver which is very expensive, and thus the total added cost will be minimum. Thus, with these embodiments disclosed herein, it solves the PIM detection and cancellation problem, in which the PIM results from unknown DL signals or intermodulation products that arise from own signals and own network node and unknown DL signals from other vendors or just unknown DL signals that arise from other vendors with adjacent network nodes. Some DL signals might not even be part of the same network. The proposed inventive concept is a novel blind identification scheme to detect this PIM interference, which can estimate the parameters, i.e. carrier frequency, identify the patterns including the modulation and channel coding, and detect the information bits of the unknown DL signals resulting in PIM. It is an innovative cancellation process disclosed to cancel the PIM interference, that further successively enhance the data detection performance in an iterative manner.
[0077]
[0078] The control device 200 may be provided as a standalone device or as a part of at least one further device. For example, the control device 200 may be provided in a node of a radio access network or in a node of a core network. Alternatively, functionality of the control device 200 may be distributed between at least two devices, or nodes. These at least two nodes, or devices, may either be part of the same network part (such as the radio access network or the core network) or may be spread between at least two such network parts. In general terms, instructions that are required to be performed in real time may be performed in a device, or node, operatively closer to the cell than instructions that are not required to be performed in real time. In this respect, at least part of the control device 200 may reside in the radio access network, such as in the radio access network node, for cases when embodiments as disclosed herein are performed in real time. Thus, a first portion of the instructions performed by the control device 200 may be executed in a first device, and a second portion of the instructions performed by the control device 200 may be executed in a second device; the herein disclosed embodiments are not limited to any particular number of devices on which the instructions performed by the control device 200 may be executed. Hence, the methods according to the herein disclosed embodiments are suitable to be performed by a control device 200 residing in a cloud computational environment. Therefore, although a single processing circuitry 210 is illustrated in
[0079]
[0080] In this example of
[0081] The inventive concept has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the inventive concept, as defined by the appended patent claims.