Transmission Holes in Longer Transmission Intervals
20170374676 · 2017-12-28
Inventors
- Stefan Parkvall (Bromma, SE)
- Robert Baldemair (Solna, SE)
- Håkan Björkegren (Täby, SE)
- Erik Dahlman (Stockholm, SE)
- Karl Werner (Segeltorp, SE)
Cpc classification
International classification
Abstract
In an aspect, a transmitting node schedules a downlink transmission to a first UE over a first transmission interval having a predetermined length and starts the downlink transmission to the first UE in the first transmission interval. The transmitting node stops the downlink transmission to the first UE prior to an end of the first transmission interval to create a first end of a transmission hole in the downlink transmission to the first UE and resumes the downlink transmission to the first UE at a second end of the transmission hole. The transmitting node may receive an uplink transmission from a second UE or transmit a higher priority transmission, within the transmission hole.
Claims
1-26. (canceled)
27. A method in a transmitting node, comprising: scheduling a downlink transmission to a first user equipment (UE) over a first transmission interval having a predetermined length; starting the downlink transmission to the first UE in the first transmission interval; stopping the downlink transmission to the first UE prior to an end of the first transmission interval to create a first end of a transmission hole in the downlink transmission to the first UE; and resuming the downlink transmission to the first UE at a second end of the transmission hole.
28. The method of claim 27, further comprising receiving an uplink transmission from a second UE, within the transmission hole.
29. The method of claim 27, further comprising: starting a downlink transmission to a second UE in a second transmission interval having a predetermined length shorter than the predetermined length of the first transmission interval, wherein the second transmission interval at least partly overlaps the first transmission interval; and receiving an uplink transmission from the second UE in the transmission hole.
30. The method of claim 27, further comprising: starting downlink transmission to a second UE in a second transmission interval having a predetermined length shorter than the predetermined length of the first transmission interval, wherein the stopping and the resuming of the downlink transmission are performed to align the transmission hole with an end of the second transmission interval.
31. The method of claim 27, further comprising transmitting a higher priority downlink transmission to a second UE in the transmission hole.
32. The method of claim 27, wherein the first transmission interval comprises two or more subintervals of a predetermined, fixed duration.
33. The method of claim 32, further comprising: starting downlink transmission to a second UE in a second transmission interval having a predetermined length of one subinterval; and receiving an uplink transmission from the second UE in the transmission hole, wherein the transmission hole is prior to or immediately after an end of the second transmission interval.
34. The method of claim 32, wherein the stopping and the resuming of the downlink transmission are performed to create a transmission hole in the downlink transmission to the first UE in each of the two or more subintervals.
35. The method of claim 27, wherein stopping and resuming the downlink transmission to the first UE comprises holding transmission symbols of the downlink transmission for a duration of the transmission hole, and transmitting the held transmission symbols upon resuming the downlink transmission.
36. The method of claim 27, further comprising mitigating effects of the transmission hole on the downlink transmission by changing a rate matching for a data block to be transmitted, in response to determining that a transmission hole is needed, and mapping remaining data of the downlink transmission in the first transmission interval around the transmission hole.
37. The method of claim 27, further comprising sending signaling included in or associated with the downlink transmission to the first UE, the signaling indicating the presence of the transmission hole.
38. A method in a user equipment (UE), comprising: determining that a downlink transmission to the UE is scheduled for a first transmission interval having a predetermined length; beginning to receive a downlink transmission in the first transmission interval; detecting the presence of a transmission hole in the downlink transmission to the UE, prior to an end of the first transmission interval; and mitigating effects on the downlink transmission caused by the transmission hole.
39. The method of claim 38, wherein detecting the presence of a transmission hole comprises detecting the presence of the transmission hole based on a change in pilot signals or channel estimates of the downlink transmission.
40. The method of claim 38, wherein detecting the presence of a transmission hole comprises detecting the presence of the transmission hole based on signaling included in or associated with the downlink transmission.
41. The method of claim 38, wherein mitigating effects on the downlink transmission comprises changing filter settings for channel tracking.
42. The method of claim 38, wherein mitigating effects on the downlink transmission comprises changing a rate matching for a data block received in the first transmission interval, in response to detecting the presence of the transmission hole, and decoding the data block using data symbols received in the first transmission interval, before and after the transmission hole.
43. The method of claim 38, wherein mitigating effects on the downlink transmission comprises setting soft values of coded bits for channel decoding to zero, for one or more symbol times corresponding to the transmission hole.
44. A transmitting node, comprising: transceiver circuitry configured to send and receive transmissions; and processing circuitry operatively associated with the transceiver circuitry and configured to: schedule a downlink transmission to a first user equipment (UE) over a first transmission interval having a predetermined length; start the downlink transmission to the first UE in the first transmission interval; stop the downlink transmission to the first UE prior to an end of the first transmission interval to create a first end of a transmission hole in the downlink transmission to the first UE; and resume the downlink transmission to the first UE at a second end of the transmission hole.
45. The transmitting node of claim 44, wherein the processing circuitry is configured to send signaling included in or associated with the downlink transmission to the first UE, the signaling indicating the presence of the transmission hole.
46. A user equipment (UE), comprising: transceiver circuitry configured to send and receive transmissions; and processing circuitry operatively associated with the transceiver circuitry and configured to: determine that a downlink transmission to the UE is scheduled for a first transmission interval having a predetermined length; begin to receive a downlink transmission in the first transmission interval; detect the presence of a transmission hole in the downlink transmission to the UE, prior to an end of the first transmission interval; and mitigate effects on the downlink transmission caused by the transmission hole.
47. The UE of claim 46, wherein the processing circuitry is configured to detect the presence of the transmission hole based on a change in pilot signals or channel estimates of the downlink transmission.
48. The UE of claim 46, wherein the processing circuitry is configured to detect the presence of the transmission hole based on signaling included in or associated with the downlink transmission.
49. A non-transitory computer readable storage medium storing a computer program comprising program instructions for a processor in a transmitting node, wherein the program instructions are configured so as to cause the transmitting node, when the program instructions are executed by the processor, to: schedule a downlink transmission to a first user equipment (UE) over a first transmission interval having a predetermined length; start the downlink transmission to the first UE in the first transmission interval; stop the downlink transmission to the first UE prior to an end of the first transmission interval to create a first end of a transmission hole in the downlink transmission to the first UE; and resume the downlink transmission to the first UE at a second end of the transmission hole.
50. A non-transitory computer readable storage medium storing a computer program comprising program instructions for a processor in a user equipment (UE), wherein the program instructions are configured so as to cause the UE, when the program instructions are executed by the processor, to: determine that a downlink transmission to the UE is scheduled for a first transmission interval having a predetermined length; begin to receive a downlink transmission in the first transmission interval; detect the presence of a transmission hole in the downlink transmission to the UE, prior to an end of the first transmission interval; and mitigate effects on the downlink transmission caused by the transmission hole.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
DETAILED DESCRIPTION
[0032] There can be multiple terminals receiving data simultaneously, resulting in each of these terminals transmitting feedback in the uplink. In a “5G” network, UEs may have different transmission durations or transmission intervals (different bundle sizes, different subframe aggregation levels), with a transmission interval being an interval scheduled for an individual UE. For example,
[0033] It may be difficult to obtain feedback quickly from the second UE if a current downlink transmission is scheduled over a longer transmission interval for the first UE.
[0034] Restricting all UEs to have the same transmission duration would solve this problem, but result in reduced flexibility and potentially increased control signaling overhead also for UEs not requiring very short latency. To be able to receive the uplink feedback 402 from terminals using a short transmission interval (UE#2 in the example in
[0035] Accordingly, various embodiments described herein create a transmission “hole” in the scheduled transmission interval of the downlink transmission to allow for uplink feedback 502 to be received before completion of the scheduled longer transmission interval. The transmission hole will have a first end indicating the start of the hole, or gap in downlink transmission, and a second end indicating the end of the hole and the resumption of the downlink transmission. Such a transmission hole is shown in
[0036]
[0037] The network node 30 also includes processing circuitry 40 that is operatively associated with the communication interface circuit(s) 38 and/or the transceiver circuitry 36. The processing circuitry 40 comprises one or more digital processors 42, e.g., one or more microprocessors, microcontrollers, Digital Signal Processors or DSPs, Field Programmable Gate Arrays or FPGAs, Complex Programmable Logic Devices or CPLDs, Application Specific Integrated Circuits or ASICs, or any combination thereof. More generally, the processing circuitry 40 may comprise fixed circuitry, or programmable circuitry that is specially configured via the execution of program instructions implementing the functionality taught herein, or may comprise some combination of fixed and programmable circuitry. The processor(s) 42 may be multi-core.
[0038] The processing circuitry 40 also includes a memory 44. The memory 44, in some embodiments, stores one or more computer programs 46 and, optionally, configuration data 48. The memory 44 provides non-transitory storage for the computer program 46 and it may comprise one or more types of computer-readable media, such as disk storage, solid-state memory storage, or any combination thereof. By way of non-limiting example, the memory 44 may comprise any one or more of SRAM, DRAM, EEPROM, and FLASH memory, which may be in the processing circuitry 40 and/or separate from the processing circuitry 40. In general, the memory 44 comprises one or more types of computer-readable storage media providing non-transitory storage of the computer program 46 and any configuration data 48 used by the node 30.
[0039] The network node 30 is configured for creating and/or using a transmission hole in a downlink transmission. The processing circuitry 40 is configured to use the transceiver circuitry 36 to schedule a downlink transmission to a first UE over a first transmission interval having a predetermined length and start the downlink transmission to the first UE in the first transmission interval. The processing circuitry 40 is also configured to stop the downlink transmission to the first UE prior to an end of the first transmission interval to create a first end of a transmission hole in the downlink transmission to the first UE. The processing circuitry 40 is configured to resume the downlink transmission to the first UE at a second end of the transmission hole. The processing circuitry 40 may use the transceiver circuitry 36 to receive uplink transmissions from another UE within the transmission hole.
[0040] In some cases, the network node 30 is configured to perform multicarrier modulation, including using specialized digital hardware for performing Discrete Fourier Transform (DFT)/Inverse DFT (IDFT) processing.
[0041] Regardless of the implementation, the processing circuitry 40 is configured to perform operations, as described in the above embodiments. For example, the processing circuitry 40 is configured to perform method 800 illustrated by the flowchart in
[0042] The method 800 may further include receiving an uplink transmission from another UE or transmitting a higher priority downlink transmission to the UE or other UEs, within the transmission hole. In an example, the method 800 includes starting a downlink transmission to a second UE in a second transmission interval having a predetermined length shorter than the predetermined length of the first transmission interval. The second transmission interval may at least partly overlap the first transmission interval. An uplink transmission is received from the second UE in the transmission hole. In some cases, the stopping and the resuming of the downlink transmission to the first UE are performed to align the transmission hole with an end of the second transmission interval.
[0043] According to some embodiments, the base station simply stops transmitting in order to create the hole without informing the UEs. This may be considered a blind puncture. From a receiver perspective, this appears as the loss of some of the transmitted bits. If the error-correcting capabilities are sufficiently good (e.g., a low code rate) the receiver may be able to recover from this. However, in many cases this is not possible and the transmission to the first UE might be severely impacted by the hole, causing loss of data (or requiring a retransmission).
[0044] The transmitting node or base station may take action to mitigate this impact. According to some embodiments, the stopping and resuming of the downlink transmission may include holding transmission symbols of the downlink transmission for a duration of the transmission hole, and transmitting the held transmission symbols upon resuming the downlink transmission. In other embodiments, the base station mitigates effects of the transmission hole on the downlink transmission by changing a rate matching for the data block to be transmitted, in response to determining that a transmission hole is needed, and mapping remaining data of the downlink transmission in the first transmission interval around the transmission hole.
[0045] In corresponding fashion, the receiver may try to detect such a puncturing and also take action to mitigate the effects on the transmission hole.
[0046] The UE 50 communicates with a radio access network node or base station, such as the network node 30, via antennas 54 and transceiver circuitry 56. The transceiver circuitry 56 may include transmitter circuits, receiver circuits, and associated control circuits that are collectively configured to transmit and receive signals according to a radio access technology, for the purposes of providing cellular communication services.
[0047] The UE 50 also includes processing circuitry 60 that is operatively associated with the radio transceiver circuitry 56. The processing circuitry 60 comprises one or more digital processing circuits 62, e.g., one or more microprocessors, microcontrollers, Digital Signal Processors or DSPs, Field Programmable Gate Arrays or FPGAs, Complex Programmable Logic Devices or CPLDs, Application Specific Integrated Circuits or ASICs, or any mix thereof. More generally, the processing circuitry 60 may comprise fixed circuitry, or programmable circuitry that is specially adapted via the execution of program instructions implementing the functionality taught herein, or may comprise some mix of fixed and programmed circuitry. The processing circuitry 60 may be multi-core.
[0048] The processing circuitry 60 also includes a memory 64. The memory 64, in some embodiments, stores one or more computer programs 66 and, optionally, configuration data 68. The memory 64 provides non-transitory storage for the computer program 66 and it may comprise one or more types of computer-readable media, such as disk storage, solid-state memory storage, or any mix thereof. By way of non-limiting example, the memory 64 comprises any one or more of SRAM, DRAM, EEPROM, and FLASH memory, which may be in the processing circuitry 60 and/or separate from processing circuitry 60. In general, the memory 64 comprises one or more types of computer-readable storage media providing non-transitory storage of the computer program 66 and any configuration data 68 used by the user equipment 50.
[0049] The UE 50 is configured to account for effects of a transmission hole experienced in a downlink transmission to the UE. For example, the processing circuitry 60 may execute a computer program 66 stored in the memory 64 that configures the processing circuitry 60 to use transceiver circuitry 56 to determine that a downlink transmission to the UE is scheduled for a first transmission interval having a predetermined length, and to begin to receive a downlink transmission in the first transmission interval. The processing circuitry 60 is also configured to detect the presence of a transmission hole in the downlink transmission to the UE, prior to an end of the first transmission interval, and mitigate effects on the downlink transmission caused by the transmission hole.
[0050] The processing circuitry 60 of the UE 50 is also configured to perform a method, such as method 1000 of
[0051] While the UE 50 is given as an example of a receiver, and the network node 30 is given as an example of a transmitting node, the techniques could more generally be applied in any direction, between any two radio nodes.
[0052] Detection of a transmission hole may be based on monitoring channel estimates or a change in pilot signals. For example, if a new transmission replaces the original then pilot transmissions will change and channel estimates will change abruptly. A hole may be detected when pilots are not transmitted where the UE expects or because a UE to UE channel is different than an eNB to UE channel. A transmission hole may also be detected based on signaling included in or associated with the downlink transmission.
[0053] Mitigation of the effects of the transmission hole may include changing filter settings for channel tracking. Mitigation may also include changing a rate matching for the data block received in the first transmission interval, in response to detecting the presence of the transmission hole, and decoding the data block using data symbols received in the first transmission interval, before and after the transmission hole. In other cases, mitigation includes setting soft values of coded bits for channel decoding to zero, for one or more symbol times corresponding to the transmission hole.
[0054] A base station may predetermine where transmission holes may occur in a downlink transmission. In some cases, the base station leaves the last part of each downlink subinterval of the transmission interval unused even if the subinterval is part of a transmission using an aggregation of subintervals. For example, in the static transmission hole scenario shown in
[0055] In various embodiments, the first transmission interval may include two or more subintervals of a predetermined, fixed duration, e.g., where a single subinterval corresponds to the smallest interval that can be scheduled for any UEs supported by the system. Again, a subframe will be used as an example subinterval of the transmission interval, but a subinterval is not meant to be limited to a subframe. While a first transmission interval may include multiple subintervals, called subframes hereafter, or a subframe bundle, a second transmission interval for transmissions to a second UE may include only one subframe, or fewer or smaller subframes than of the first transmission interval. In some cases, the transmission hole in the first transmission interval is prior to or immediately after an end of the second transmission interval. The stopping and resuming of the downlink transmission to the first UE may be performed to align the transmission hole with an end of the second transmission interval.
[0056] According to other embodiments, semi-static holes may be used. These embodiments are an extension of the static hole embodiments. Instead of having a hole at the end of each subframe, the system can configure holes in only every second, third, fourth . . . n subframe. In other words, subframes may in general follow a (fixed or configurable) pattern. If multiple UEs are scheduled simultaneously, this would require the single-subframe transmissions to start on every second, third, fourth . . . n subframe only in order to exploit the presence of a transmission hole for the feedback.
[0057] Transmission holes may also be scheduled on a dynamic basis, as shown by
[0058]
[0059] Creating a ‘panic hole’ may, depending on the detailed transmission structure, impact the reception of data similar to blind puncturing. However, if the retransmission protocol is such that only parts of the data, e.g. the part lost due to the panic hole, needs to be retransmitted the impact may not be that severe. The panic hole may also be taken into account on both the transmitter and receiver side if it is known to both sides. To account for the panic hole, the rate matching may be changed and the remaining data mapped around the panic hole instead of simply puncturing the downlink transmission with the panic hole. Another possibility is to counteract the hole by “delaying”’ the ongoing transmission, or symbols in the transmission, by the duration of the panic hole. For example, the part of the transmission that would be transmitted in the interval [t.sub.1,t.sub.end] in absence of a hole at t.sub.1 is instead transmitted during the interval [t.sub.1+T.sub.hole, t.sub.end+T.sub.hole].
[0060] Transmission hole information, including information regarding panic holes, may be signaled on the downlink control channel. This requires that the UE monitors the downlink control channel while receiving data. The control channel may or may not be within the resources originally allocated for data.
[0061]
[0062] The method may further comprise at 1602 receiving an uplink transmission from a second UE, within the transmission hole. More particularly the method may comprise at 1600 starting a downlink transmission to a second UE in a second transmission interval having a predetermined length shorter than the predetermined length of the first transmission interval, wherein the second transmission interval at least partly overlaps the first transmission interval, and at 1602 receiving an uplink transmission from the second UE in the transmission hole. In some embodiments the method may comprise at 1600 starting downlink transmission to a second UE in a second transmission interval having a predetermined length shorter than the predetermined length of the first transmission interval, and the stopping 806 and the resuming 808 of the downlink transmission may be performed to align the transmission hole with an end of the second transmission interval. In some embodiments the first transmission interval may comprise two or more subintervals of a predetermined, fixed duration. In this case, by way of example, the second transmission interval may have a predetermined length of one subinterval, and the transmission hole may be prior to or immediately after an end of the second transmission interval.
[0063] Alternatively, the method may comprise at 1604 transmitting a higher priority downlink transmission to a second UE in the transmission hole.
[0064] In some embodiments (not shown in
[0065] In some embodiments, where the first transmission interval comprises two or more subintervals of a predetermined, fixed duration, the stopping 806 and the resuming 808 of the downlink transmission may be performed to create a transmission hole in the downlink transmission to the first UE in each of the two or more subintervals. However, other embodiments are possible, as for example discussed above.
[0066] Further, the stopping 806 and resuming 808 the downlink transmission to the first UE may comprise 1606 holding transmission symbols of the downlink transmission for a duration of the transmission hole, and 1608 transmitting the held transmission symbols upon resuming the downlink transmission. In addition, or alternatively, the method may further comprise 1610 mitigating effects of the transmission hole on the downlink transmission by changing a rate matching for the data block to be transmitted, in response to determining that a transmission hole is needed, and mapping remaining data of the downlink transmission in the first transmission interval around the transmission hole.
[0067] In preferred embodiments the method may further advantageously comprise at 1612 sending signaling included in or associated with the downlink transmission to the first UE, the signaling indicating the presence of the transmission hole. For example, the signaling may comprise transmission hole information, such as a flag or bitmap or pointer into a set of static or semi-statically configured hole patterns. The transmission hole information may be included in the scheduling assignment sent to the first UE to schedule the downlink transmission. Alternatively, the transmission hole information could, for example, be signaled on a downlink control channel.
[0068]
[0069] In some embodiments, the detecting 1006 the presence of a transmission hole may comprise detecting 1702 the presence of the transmission hole based on a change in pilot signals or channel estimates of the downlink transmission. Alternatively, the detecting 1006 the presence of a transmission hole may comprise detecting 1704 the presence of the transmission hole based on signaling included in or associated with the downlink transmission. In this case, the detecting 1704 may thus comprise receiving signaling included in or associated with the downlink transmission, the signaling indicating the presence of the transmission hole.
[0070] In some embodiments, mitigating 1008 effects on the downlink transmission may comprise 1706 changing filter settings for channel tracking. Mitigating 1008 effects on the downlink transmission may alternatively comprise 1708 changing a rate matching for the data block received in the first transmission interval, in response to detecting the presence of the transmission hole, and decoding the data block using data symbols received in the first transmission interval, before and after the transmission hole. Mitigating 1008 effects on the downlink transmission may alternatively comprise 1710 setting soft values of coded bits for channel decoding to zero, for one or more symbol times corresponding to the transmission hole. Other embodiments are possible and will occur to those skilled in the art. Thus, the UE may account for effects of the transmission hole.
[0071] As explained above with respect to
[0072] The processing circuitry 40 may advantageously further be configured to send signaling included in or associated with the downlink transmission to the first UE, the signaling indicating the presence of the transmission hole.
[0073] The processing circuitry 40 may further be configured to receive an uplink transmission from a second UE, within the transmission hole. The processing circuitry 40 may be configured to: start a downlink transmission to a second UE in a second transmission interval having a predetermined length shorter than the predetermined length of the first transmission interval, wherein the second transmission interval at least partly overlaps the first transmission interval; and receive an uplink transmission from the second UE in the transmission hole. The processing circuitry 40 may be configured to: start downlink transmission to a second UE in a second transmission interval having a predetermined length shorter than the predetermined length of the first transmission interval; and stop and resume the downlink transmission are performed to align the transmission hole with an end of the second transmission interval.
[0074] The processing circuitry 40 may alternatively be configured to transmit a higher priority downlink transmission to a second UE in the transmission hole.
[0075] In some embodiments, the processing circuitry 40 may be configured to: receive transmission hole information defining the first and second ends of the transmission hole; and stop and resume the downlink transmission according to the transmission hole information.
[0076] The first transmission interval may comprise two or more subintervals of a predetermined, fixed duration. In this case, the processing circuitry 40 may be configured to: start downlink transmission to a second UE in a second transmission interval having a predetermined length of one subinterval; and receive an uplink transmission from the second UE in the transmission hole, wherein the transmission hole is prior to or immediately after an end of the second transmission interval. The processing circuitry 40 may be configured to: receive transmission hole information defining which of the two or more subintervals of the first transmission interval will have a transmission hole; and stop and resume the downlink transmission according to the transmission hole information. The transmission hole information may be a dynamically signaled flag or bitmap. In some embodiments the processing circuitry 40 may be configured to stop and resume the downlink transmission to create a transmission hole in the downlink transmission to the first UE in each of the two or more subintervals.
[0077] In some embodiments, the processing circuitry 40 may be configured to hold transmission symbols of the downlink transmission for a duration of the transmission hole, and transmit the held transmission symbols upon resuming the downlink transmission.
[0078] In some embodiments, the processing circuitry 40 may be configured to mitigate effects of the transmission hole on the downlink transmission by changing a rate matching for the data block to be transmitted, in response to determining that a transmission hole is needed, and mapping remaining data of the downlink transmission in the first transmission interval around the transmission hole.
[0079] Further, as explained above with respect to
[0080] The processing circuitry 60 may be configured to detect the presence of the transmission hole based on a change in pilot signals or channel estimates of the downlink transmission. Alternatively, the processing circuitry 60 may be configured to detect the presence of the transmission hole based on signaling included in or associated with the downlink transmission.
[0081] The processing circuitry 60 may be configured to mitigate effects on the downlink transmission by changing filter settings for channel tracking. The processing circuitry 60 may be configured to mitigate effects on the downlink transmission by changing a rate matching for the data block received in the first transmission interval, in response to detecting the presence of the transmission hole, and decoding the data block using data symbols received in the first transmission interval, before and after the transmission hole. The processing circuitry 60 may be configured to mitigate effects on the downlink transmission by setting soft values of coded bits for channel decoding to zero, for one or more symbol times corresponding to the transmission hole.
[0082] According to some embodiments, there is further provided a computer program product comprising program instructions for a processor in a transmitting node, wherein said program instructions are configured so as to cause the transmitting node, when the program instructions are executed by the processor, to: schedule a downlink transmission to a first user equipment (UE) over a first transmission interval having a predetermined length; start the downlink transmission to the first UE in the first transmission interval; stop the downlink transmission to the first UE prior to an end of the first transmission interval to create a first end of a transmission hole in the downlink transmission to the first UE; and resume the downlink transmission to the first UE at a second end of the transmission hole.
[0083] A non-transitory computer-readable medium may comprise, stored thereupon, the computer program product.
[0084] According to some embodiments there is further provided a computer program product comprising program instructions for a processor in a user equipment (UE), wherein said program instructions are configured so as to cause the UE, when the program instructions are executed by the processor, to: determine that a downlink transmission to the UE is scheduled for a first transmission interval having a predetermined length; begin to receive a downlink transmission in the first transmission interval; detect the presence of a transmission hole in the downlink transmission to the UE, prior to an end of the first transmission interval; and mitigate effects on the downlink transmission caused by the transmission hole.
[0085] A non-transitory computer-readable medium may comprise, stored thereupon, the computer program product.
[0086] In the present disclosure, the non-limiting term radio network node or simply the network node 30 may be used. It refers to any type of network node that serves UE and/or connected to other network node or network element or any radio node from where UE receives signal. Examples of various types of radio network nodes are Node B, base station (BS), multi-standard radio (MSR) node such as MSR BS, eNode B, network controller, radio network controller (RNC), base station controller (BSC), relay, donor node controlling relay, base transceiver station (BTS), access point (AP), transmission points, transmission nodes, RRU, RRH, nodes in distributed antenna system (DAS), etc. The non-limiting terms user equipment (UE) or mobile terminal may also be used. These terms refer to any type of wireless device that communicates with a radio network node in a cellular or mobile communication system. Examples of UE are target device, device to device (D2D) UE, machine type UE or UE capable of machine-to-machine (M2M) communication, PDA, Tablet, mobile terminals, smart phone, laptop-embedded equipped (LEE), laptop-mounted equipment (LME), USB dongles, etc. It should be understood that the term mobile terminal is meant to refer to any and all of these access terminal types, some of which may be fixed in a given location. Thus, a mobile terminal is not necessarily “mobile.”
[0087] Although the techniques and apparatus described herein are expected to be used in 5G systems, terminology used in the specification of LTE systems may be used herein, for convenience. It will be understood that other names may apply to the same or similar parameters, channels, etc. It should also be appreciated that the techniques and apparatus described herein may be designed for backwards compatibility with LTE and/or other systems, but are not necessarily so. Embodiments of the presently disclosed techniques and apparatus are applicable also to single-carrier as well as to multicarrier (MC) or carrier aggregation (CA) operation of the UE.
[0088]
[0089]
[0090] Notably, modifications and other embodiments of the disclosed invention(s) will come to mind to one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention(s) is/are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of this disclosure. Although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.