MULTI-BAND INTERFERENCE SUPPRESSIONFIELDEmbodiments of the present disclosure generally relate to the field of communications, and in particular, to devices, methods, apparatuses and computer readable storage media of multi-band interference suppression.
BACKGROUNDIn the fifth generation (5G) , the Non Standard Alone (NSA) technology requires that user equipment (UE) will at least support two modes including a Long Term Evolution (LTE) mode and a New Radio (NR) mode. In 5G-LTE dual connectivity, when the LTE and NR modes operate at the UE at the same time, the interferences will occur within the UE. For example, the mutual interferences of a LTE transceiver and a 5G NR transceiver simultaneously operating in the UE may occur in many frequency bands. Therefore, the sensitivity of the transceivers may be regressed, and even these frequency bands cannot be applied in a communication network.
The frequency band of 3.3 GHz-4.2 GHz (hereinafter referred to as 3.5 GHz band) is a deployment band of 5G. Typically, the second harmonic or third harmonic generated by a low-frequency signal for example in LTE Band 3 (B3) may cause severe interferences, which may also be caused by the second-order intermodulation or third-order intermodulation of the signal and the like.
One conventional approach for suppressing the interferences is to use independent antenna structures for the LTE and 5G NR transceivers. The independent antennas can only reduce the conducted interferences of a main receiving link, but they cannot reduce the interferences of an auxiliary receiving link. Some harmonic suppression filters may also be used for the interference elimination. However, neither discrete antennas nor harmonic suppression filters can completely eliminate the second harmonic interference from LTE Band 3 (B3) to 5G 3.5 GHz, for example. As a result, the interferences caused by a Printed Circuit Board (PCB) leakage may lead to the severe regression of terminal sensitivity.
In the 3rd Generation Partnership Project (3GPP) specifications, such as 3GPP TS 37.340, it is required that for Evolved Universal Terrestrial Radio Access (EUTRA) NR Dual Connectivity (EN-DC) operation, a master node (MN) and a secondary node (SN) may coordinate their UL and DL radio resources in semi-static manner. In this case, the UE is allowed to use only one transmitter (1Tx) even with poorly isolated PCBs in overlapping bands, for example.
SUMMARY
In general, example embodiments of the present disclosure provide devices, methods, apparatuses and computer readable storage media of multi-band interference suppression in dual connectivity, for example.
In a first aspect, a first network device is provided, comprising at least one processor and at least one memory including computer program code. The at least one memory and the computer program code are configured to, with the at least one processor, cause the first network device to receive, from a second network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and a terminal device in dual connection with the first and second network devices. The first network device is further caused to in response to receiving the request, continuously reduce the number of jammer resource units allocated for the first communication until an event occurs. The event comprises at least one of: a request for coordination scheduling by the first and second network devices being received from the terminal device, and the number of jammer resource units being below a threshold number.
In a second aspect, a second network device is provided, comprising at least one processor and at least one memory including computer program code. The at least one memory and the computer program code are configured to, with the at least one processor, cause the second network device to determine that at least one jammer resource unit is allocated for a second communication between the second network device and a terminal device in dual connectivity with a first network device and the second network device. The second network device is further caused to if the second communication is degraded, continuously reduce a modulation order for the second communication until the modulation order is below a threshold order. Then, the second network device is caused to send, to the first network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and the terminal device.
In a third aspect, a terminal device is provided, comprising at least one processor and at least one memory including computer program code. The at least one memory and the computer program code are configured to, with the at least one processor, cause the terminal device in dual connectivity with a first network device and a second network device to determine that a second communication with the second network device is degraded and a modulation order for the second communication is below a threshold order. The terminal device is further caused to detect continuous decreasing of a number of jammer resource units allocated for a first communication with the first network device. Then, the terminal device is caused to determine an action to be performed. The action comprises sending, to the first network device, a request for coordination scheduling by the first and second network devices, or performing the first communication with the first network device using non-jammer resource units in a first set of resources allocated by the first network device for the first communication.
In a fourth aspect, a method is provided. In the method, a first network device receives, from a second network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and a terminal device in dual connection with the first and second network devices. In response to receiving the request, the first network device continuously reduces the number of jammer resource units allocated for the first communication until an event occurs. The event comprises at least one of: a request for coordination scheduling by the first and second network devices being received from the terminal device, and the number of jammer resource units being below a threshold number.
In a fifth aspect, a method is provided. In the method, a second network device determines that at least one jammer resource unit is allocated for a second communication between the second network device and a terminal device in dual connectivity with a first network device and the second network device. If the second communication is degraded, the second network device continuously decreases a modulation order for the second communication until the modulation order is below a threshold order. Then, the second network device sends, to the first network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and the terminal device.
In a sixth aspect, a method is provided. In the method, a terminal device is in dual connectivity with a first network device and a second network device. The terminal device determines that a second communication with the second network device is degraded and a modulation order for the second communication is below a threshold order. The terminal device detects continuous decreasing of a number of jammer resource units allocated for a first communication with the first network device. Then, the terminal device determines an action to be performed. The action comprises sending, to the first network device, a request for coordination scheduling by the first and second network devices, or performing the first communication with the first network device using non-jammer resource units in a first set of resources allocated by the first network device for the first communication.
In a seventh aspect, there is provided an apparatus comprising means for performing the method according to the fourth, fifth or sixth aspect.
In an eighth aspect, there is provided a computer readable storage medium that stores a computer program thereon. The computer program, when executed by a processor of a device, causes the device to perform the method according to the fourth, fifth or sixth aspect.
It is to be understood that the summary section is not intended to identify key or essential features of embodiments of the present disclosure, nor is it intended to be used to limit the scope of the present disclosure. Other features of the present disclosure will become easily comprehensible through the following description.
BRIEF DESCRIPTION OF THE DRAWINGSSome example embodiments will now be described with reference to the accompanying drawings, where:
FIG. 1 illustrates an example environment in which embodiments of the present disclosure can be implemented;
FIG. 2 illustrates a signaling flow between the two network devices and the terminal device according to some example embodiments of the present disclosure;
FIG. 3 illustrates a signaling flow between the two network devices and the terminal device according to some other example embodiments of the present disclosure;
FIG. 4 illustrates a flowchart of an example method according to some example embodiments of the present disclosure;
FIG. 5 illustrates a flowchart of an example method according to some other example embodiments of the present disclosure;
FIG. 6 illustrates a flowchart of an example method according to yet some other example embodiments of the present disclosure; and
FIG. 7 illustrates a simplified block diagram of a device that is suitable for implementing embodiments of the present disclosure.
Throughout the drawings, the same or similar reference numerals represent the same or similar element.
DETAILED DESCRIPTIONPrinciple of the present disclosure will now be described with reference to some example embodiments. It is to be understood that these embodiments are described only for the purpose of illustration and help those skilled in the art to understand and implement the present disclosure, without suggesting any limitation as to the scope of the disclosure. The disclosure described herein can be implemented in various manners other than the ones described below.
In the following description and claims, unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skills in the art to which this disclosure belongs.
As used herein, the term “network device” refers to a device via which services can be provided to a terminal device in a communication network. Examples of the network device include a relay, an access point (AP) , a transmission point (TRP) , a node B (NodeB or NB) , an evolved NodeB (eNodeB or eNB) , a New Radio (NR) NodeB (gNB) , a Remote Radio Module (RRU) , a radio header (RH) , a remote radio head (RRH) , a low power node such as a femto, a pico, and the like. As another example, the network device may be a unit or functionality within a network entity. By way of example, the network device may include a central unit (CU) and a distributed unit (DU) within a gNB.
As used herein, the term “terminal device” or “user equipment” (UE) refers to any terminal device capable of wireless communications with each other or with the base station. The communications may involve transmitting and/or receiving wireless signals using electromagnetic signals, radio waves, infrared signals, and/or other types of signals suitable for conveying information over air. In some example embodiments, the UE may be configured to transmit and/or receive information without direct human interaction. For example, the UE may transmit information to the network device on predetermined schedules, when triggered by an internal or external event, or in response to requests from the network side.
Examples of the UE include, but are not limited to, user equipment (UE) such as smart phones, wireless-enabled tablet computers, laptop-embedded equipment (LEE) , laptop-mounted equipment (LME) , and/or wireless customer-premises equipment (CPE) . For the purpose of discussion, some example embodiments will be described with reference to UEs as examples of the terminal devices, and the terms “terminal device” and “user equipment” (UE) may be used interchangeably in the context of the present disclosure.
As used herein, the term “resource unit” refers to a base unit for resource scheduling. The resource unit may have any suitable size or comprise any suitable number of resources such as time and/or frequency resources. As an example, the resource unit may comprise a Physical Resource Block (PRB) .
As used herein, the term “jammer resource unit” refers to a resource unit that may cause interferences such as harmonic interferences or intermodulation interferences in dual-connectivity communication of a terminal device. For example, the jammer resource unit may comprise a resource unit available to both the network devices in dual connectivity with the terminal device in the DC operation.
As used herein, the term “circuitry” may refer to one or more or all of the following:
(a) hardware-only circuit implementations (such as implementations in only analog and/or digital circuitry) and
(b) combinations of hardware circuits and software, such as (as applicable) : (i) a combination of analog and/or digital hardware circuit (s) with software/firmware and (ii) any portions of hardware processor (s) with software (including digital signal processor (s) ) , software, and memory (ies) that work together to cause an apparatus, such as a mobile phone or server, to perform various functions) and
(c) hardware circuit (s) and or processor (s) , such as a microprocessor (s) or a portion of a microprocessor (s) , that requires software (e.g., firmware) for operation, but the software may not be present when it is not needed for operation.
This definition of circuitry applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in a server, a cellular network device, or other computing or network device.
As used herein, the singular forms “a” , “an” , and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. The term “includes” and its variants are to be read as open terms that mean “includes, but is not limited to” . The term “based on” is to be read as “based at least in part on” . The term “one embodiment” and “an embodiment” are to be read as “at least one embodiment” . The term “another embodiment” is to be read as “at least one other embodiment” . Other definitions, explicit and implicit, may be included below.
As used herein, the terms “first” , “second” and the like may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term “and/or” includes any and all combinations of one or more of the listed terms.
Considering 5G product maturity, deployment cost and existing LTE/future 5G coverage, NAS networking is widely used in the deployment of a 5G network. In the DC operation, the interference and throughput is a big issue. Taking the mutual interference of LTE B3 and 5G 3.5 GHz at the UE as an example, the second harmonic of LTE B3 in uplink will cause the second harmonic interferences to 5G 3.5 GHz in downlink. In addition, there are higher order intermodulation interferences such as fourth-order intermodulation and fifth-order intermodulation interferences.
A conventional approach to reduce the interference is to limit the transmit power of the UE in LTE and 5G. The inventor notices that the reduction of the transmission power of the UE will affect the received signal strength at the network side. Another conventional approach is to increase the PCB isolation in UE design as much as possible. For example, wiring and devices that may generate the mutual interferences should be placed far to increase isolation, and shields can be added for key components to reduce the radiation interference. Moreover, harmonic filters may be used to suppress the harmonic interferences. The increase of the PCB isolation or the use of harmonic filter may possibly reduce the interference, which, however, will cause significant increase of cost and design complexity at the UE.
In the 3GPP specifications such as 3GPP TS 37.340, it is specified that X2-AP signaling specific to and associated with the UE is used in a semi-static time and frequency pattern to indicate an intended reception/transmission on an LTE UL carrier and an NR DL carrier at non-overlapping frequencies. As another example, in order to dynamically avoid the generation of harmonic interferences, a LTE evolved (eNB) and a NR NodeB (gNR) may coordinate the UE DC Radio Bearer (RB) scheduling without UE associated signaling. The coordination may be implemented on Medium Access Control (MAC) packet schedulers in the eNB and the gNB. During the frequency domain scheduling, the use of the interference frequency combination should be avoided through dynamic Physical Resource Block (PRB) allocation for the UE.
However, the inventor notices that since PRBs on overlapping frequencies cannot be used by the 5G-EN DC UE in serving transmission time intervals (TTIs) , the LTE UL and 5G DL throughput will be severally affected at the UE.
Example embodiments of the present disclosure present a scheme for suppressing interferences between communications of two network devices and a terminal device in DC with the two network devices. The scheme involves three episodes where the first episode reduces a modulation order such as a modulation order (MCS) for one communication with one network device to improve the success probability of decoding with a low-order modulation. In the second episode, the decreasing number of jammer resource units such as physical resource blocks (PRBs) is allocated or granted by the other network device to the other communication. In the third episode, there are two options for the terminal device to select. The terminal device can request coordination scheduling by the two network devices or perform the communication with the other network device on non-jammer resource units of the resource units allocated or granted.
In this way, the first two episodes provide network assisted interference suppression, and the terminal device can decide preferred interference elimination approach in the last episode. As such, harmonic interferences on the jammer resource units can be suppressed and eliminated effectively and efficiently.
FIG. 1 shows an example environment 100 in which embodiments of the present disclosure can be implemented. The environment 100, which is a part of a communication network, comprises two network devices 105 and 110 and a terminal device 115. For the purpose of discussion, the two network devices 105 and 110 will be referred to as a first network device 105 and a second network device 110, respectively.
It is to be understood that two network devices and one terminal device are shown in the environment 100 only for the purpose of illustration, without suggesting any limitation. Any suitable numbers of network devices and terminal devices may be included in the environment 100.
The terminal device 115 is in dual connectivity with the first and second network devices 105 and 110. As shown, the terminal device 115 performs a communication 120 (referred to as a first communication 120) with the first network device 105 and perform a communication 125 (referred to as a second communication 125) with the second network device 110. Either of the two communications 120 and 125 may be uplink or downlink communication. In the environment 100, the terminal device 115 can also communicate with a further terminal device (not shown) directly or via the first network device 105 and/or the second network device 110.
The communications in the environment 100 may follow any suitable communication standards or protocols such as Universal Mobile Telecommunications System (UMTS) , long term evolution (LTE) , LTE-Advanced (LTE-A) , the fifth generation (5G) NR, Wireless Fidelity (Wi-Fi) and Worldwide Interoperability for Microwave Access (WiMAX) standards, and employs any suitable communication technologies, including, for example, Multiple-Input Multiple-Output (MIMO) , Orthogonal Frequency Division Multiplexing (OFDM) , time division multiplexing (TDM) , frequency division multiplexing (FDM) , code division multiplexing (CDM) , Bluetooth, ZigBee, machine type communication (MTC) , enhanced mobile broadband (eMBB) , massive machine type communication (mMTC) , ultra-reliable low latency communication (URLLC) , Carrier Aggregation (CA) , Dual Connection (DC) , New Radio Unlicensed (NR-U) and V2X technologies.
The first and second network devices 105 and 110 may follow any suitable standards or protocols. In some example embodiments, the first network device 105 may be implemented by an eNB in a LTE network, and the second network device 110 may be implemented by a gNB in a 5G NR network. In some other example embodiments, the first and second network devices 105 and 110 may be respectively implemented by a primary or master node and a secondary node in the dual-connectivity with the terminal device 115. In some other example embodiments, the first and second network devices 105 and 110 may be implemented by different units or functions within a network entity, such as a central unit (CU) and a distributed unit (DU) with a gNB.
In various example embodiments of the present disclosure, resources such as time and/or frequency resources available to the first and second network devices 105 and 110 are partially overlapping. In the context of the present disclosure, resource units included in the overlapping resources are referred to as jammer resource units. If a jammer resource unit is used by both the first and second network devices 105 and 110 for the communications 120 and 125 with the terminal device 115, interferences such as harmonic interferences and intermodulation interferences between the two communications 120 and 125 may induced at the terminal device 115.
FIG. 2 shows a signaling flow 200 between the two network devices 105 and 110 and the terminal device 115 for suppressing the interferences between the two communications 120 and 125 according to some example embodiments of the present disclosure.
As shown, the first network device 105 and the terminal device 115 perform (205) the first communication 120. At the same time, the second network device 110 and the terminal device 115 perform (210) the second communication 125. As an example, the first communication 120 may be an uplink communication from the terminal device 115 to the first network device 105. The second communication 125 may be a downlink communication from the second network device 110 to the terminal device 115.
The second network device 110 determines (215) that at least one jammer resource unit (for example, at least one jammer PRB) is allocated to the second communication 125. In some example embodiments, the second network device 110 may be aware of a plurality of jammer resource units that are available to both the first and second network devices 105 and 110. Accordingly, the second network device 110 can determine that whether any one of the jammer resource units has been allocated for the second communication 125.
The second network device 110 may obtain the plurality of jammer resource units in any suitable way. As an example, the second network device 110 may receive an indication of the plurality of jammer resource units from the first network device 105. The indication may be received from the first network device 105 in any suitable opportunity. In the example embodiments where the first and second network devices 105 and 110 are implemented by an eNB and a gNB, respectively, jammer resource unit bitmap as the indication may be received by the second network device 110 from the first network device 105 during 5G-ENB DC Radio Block (RB) setup. For example, the second network device 110 may receive a SGNB MODIFICATION REQUEST message from the first network device 105 which contains the indication of the plurality of jammer resource units. It is also possible that the indication is transported via other X2 Application Protocol (AP) signaling.
If the second communication 120 is degraded, the second network device 110 continuously reduces (220) a modulation order for the second communication until the modulation order is below a threshold order. For example, the MCS level for the second communication may be continuously decreasing unit the MSC level is below a threshold level. The second network device 110 may determine the degradation of the second communication 125 in any suitable approach. For example, in the case that the second communication 125 is a downlink communication, if the second network device 110 detects one or more non-acknowledgements (NACKs) to the second communication 125 from the terminal device 115, the second network device 110 may determine that the second communication 125 is degraded.
In some example embodiments, the second network device 110 may determine whether a degradation level of the second communication 125 is below a threshold level. As an example, the threshold level may be represented by a certain number of NACKs. If the certain number of NACKs are detected, the second network device 110 may determine that the second communication 125 has fallen down below a certain degradation level.
In some example embodiments, the determination of the degrading of the second communication 125 may be implemented before determining whether a jammer resource unit has been allocated for the second communication 125. For example, if the second network device 110 determines that the second communication 125 is degraded, the second network device 110 determines whether one or more jammer resource units have been allocated for the second communication 125.
When the second communication 125 is degraded, the second network device 110 continuously reduces the modulation order for the second communication 125 to avoid the inferences and improve the success probability of decoding. For example, in the case that 256-Quadrature Amplitude Modulation (QAM) is used for the second communication 125, the second network device 110 may first decrease 256-QAM to 64-QAM. If the second communication 125 is still degraded, the second network device 110 continuously decreases 64-QAM to 16-QAM and so on until a certain lower-order modulation such as a Quadrature Phase Shift Keying (QPSK) modulation is used. The threshold modulation to end up the decreasing of the modulation order may be set or configured depending on the specific implementations. It is also possible that the modulation order is decreased to a 2-step or 3-step lower order. For example, 256-QAM may be decreased to 16-QAM directly.
If the second network device 110 determines that the second communication 125 is still degraded after the lower-order threshold modulation is applied, the second network device 110 sends (225) a request to the first network device 105 to reduce the number of jammer resource units to be allocated for the first communication 120 between the first network device 105 and the terminal device 110.
After receiving the request, the first network device 105 continuously reduces (230) the number of jammer resource units allocated for the first communication 120. For example, the first network device 105 may reallocate resource units for the first communication 120. The reallocated resource units include the decreased number of jammer resource units. The decreasing of the number of jammer resource may be continuously performed until the number of jammer resource units is below a threshold number such as zero or any other numbers depending on the specific implementations.
At the same time, the terminal device 115 monitors (235) a resource grant for the first communication 120 from the first network device 105 to determine whether the number of jammer resource units allocated for the first communication 120 is continuously decreased. In some example embodiments, the terminal device 115 may be aware of the jammer resource units available to both the first and second network devices 105 and 110. For example, the terminal device 115 may receive an indication of the plurality of jammer resource units from the first network device 105 in a handover (HO) command message, for example, during the DC RB setup. Accordingly, the terminal device 115 may determine which ones of the jammer resource units are allocated for the first communication 120 and whether the number of the allocated jammer resource units is decreased.
If the number of jammer resource units is continuously decreased and the second communication 125 is still degraded after the used modulation order is below the threshold order, the terminal device 115 determines (240) an action to be performed. One option of the action is that the terminal device 115 may send (245) , to the first network device 105, a request for coordination scheduling by the first and second network devices 105 and 110. In some example embodiments, the reception of the request may be an event for the first network device 105 to end up the decreasing of the number of jammer resource allocated to the first communication 120.
The request for the coordination scheduling may be sent by the terminal device 115 when the second communication 125 is still degraded after a certain number of transmission time intervals (TTIs) are elapsed. In some example embodiments, the request may be sent in a buffer status report (BSR) message. For example, the request may be sent via a new flag of the BSR.
After receiving the request for the coordination scheduling, the first network device 105 may send (250) to the second network device 110 an indication of a set (referred to as a first set) of resource units allocated for the first communication 120. In addition to the indication of the allocated resource units, the first network device 105 may also send an indication of grant time and other scheduling information.
The indication or other scheduling information may be sent in any suitable signaling such as control-plane (CP) and user-plane (UP) signaling. In some example embodiments, in order to fasten the communication between the first and second network devices 105 and 110, a UP tunnel is established between a MAC layer of the first network device 105 and a MAC layer of the second network device 110. The request is sent by the second network device 110 to the first network device 105 via the UP tunnel.
For the UP tunnel, an existing UP frame protocol defined in the 3GPP specifications such as 3GPP TS 38.425 may be reused. As an example, the UP tunnel may comprise a General Packet Radio Service Tunneling Protocol user-plane (GTP-U) tunnel. An existing message containing assistance or additional information or even a new message may be used for sending the scheduling information over the UP tunnel. For example, a message, up to 1018 octets, may be transferred in a dedicated NR radio access network (RAN) container in the GTP packet header. In some example embodiments, new PDUs may be needed in the NR UP frame protocol. It is also possible that a new frame protocol is used for the UP tunnel.
The UP protocol may be employed to enable flow control for single-bearer user data transferred in the GTP-U tunnel over interfaces related to the first and second network devices 105 and 110. For example, in the EN-DC operation, the interfaces may comprise an X2 interface between two eNBs, an Xn interface between a gNB and an eNB, and an F1 interface between a central unit (CU) and a distributed unit (DU) of a gNB. Through the tunnel, an assisting network device may be connected with a network device hosting a Packet Data Convergence Protocol (PDCP) entity in DC.
The UP tunnel may be established upon setup of an interface associated with at least one of the two network devices 105 and 110. As another example the UP tunnel may be set up during bearer addition. The UP tunnel may be unrelated to any bearer or UE. With this tunnel connecting MAC entities of the two network devices 105 and 110 in the DC operation, the UP protocol can therefore be directly used for event communications between the two network devices 105 and 110.
Practically, in the example embodiments where the first and second network devices 105 and 110 are respectively implemented by an eNB and a gNB, when the X2/Xn is about to be set up (either from the eNB or the gNB side) , the CU of the gNB may request a new tunnel endpoint IP (TEID) from the DU of gNB using F1AP CP signaling. Once the TEID is allocated at the DU, the CU will provide the TEID to the eNB, and the eNB in turn will provide the CU with its TEID for this DU. The CU will forward the eNB’s TEID to the DU. Then, the direct fast communication between the eNB and the DU of the gNB is possible. In this case, TEID may need to be exchanged during X2/Xn setup and modification procedures, and they may also have to be fetched over F1. If a change of the TEID is needed at either side, the appropriate modification procedure can be employed.
For the purpose of backward compatibility, in some example embodiments, the UP tunnel may be used per user/bearer only. In this case, a proprietary link may be prioritized for transmission of the scheduling information. In order to further improve system performance, communication over the existing tunnel is kept until the first message over the new UP tunnel arrives. In some example embodiments, the scheduling information may be duplicated. In this case, if the scheduling information transferred over the UP tunnel is lost, the affects may be reduced in the following TTI.
In some example embodiments, the request to reduce the number of jammer resource units allocated for the first communication 120 may also be sent via the UP tunnel from the second network device 110 to the first network device 105. As such, the information exchange between the two network devices 105 and 110 may be further fastened.
Alternatively or in addition, the UP tunnel may not be used. In some example embodiments, the indication of the allocated resource units or other scheduling information may be forwarded via packet data convergence protocol (PDCP) layers between the network devices 105 and 110. For example, at the first network device 105, a MAC entity may forward the indication or scheduling information to a PDCP entity. The PDCP entity of the first network device 105 then sends the indication or scheduling information to a PDCP entity of the second network device 110 via an X2-U interface. At the second network device 110, the indication or scheduling information is further forwarded from a PDCP layer to a MAC layer. Such forwarding via the PDCP layers may also reduce the latency.
After the second network device 110 receives the indication of the first set of resource units allocated for the first communication 120, the second network device 110 may allocate (255) a set (referred to as a second set) of resource units for the second communication 125. The second set of resource units excludes the jammer resource unit (s) in the first set of resource units.
The sending (245) of the request for the coordination scheduling and the sending (250) of the indication of the first set of resource units are optional. As another option, the terminal device 115 may determine (240) to perform the first communication 105 using non-jammer resource units in the first set of resources allocated by the first network device 105 for the first communication 120. In this case, the terminal device 115 will autonomously not perform the first communication 120 on jammer resource units although these resource units are allocated or granted by the first network device 105. Accordingly, the first network device 105 also uses the non-jammer resource units for the first communication 120.
In some example embodiments, the first network device 105 may detect the transmission from the terminal device 115 both using all the allocated resource units in the first set of resources and using the non-jammer resource units in the first set of resources. For example, at the first network device 105, an uplink PHY channelizer may receive two granted patterns of resource units (such as PRBs) from a MAC packet scheduler, where one pattern indicates all granted PRBs and the other pattern indicates non-jammer PRBs. All granted resource units may be first used for channel estimation and decoding. If the decoding is failed, the PHY channelizer may then perform the channel estimation using non-jammer resource units to avoid decoding failure or error due to a low signal-to-noise (SNR) ratio.
FIG. 3 shows a signaling flow 300 between the two network devices and the terminal device according to some example embodiments of the present disclosure.
In this example, the first network device 105 in FIG. 1 is implemented by an eNB 305 in LTE, the second network device 110 in FIG. 1 is implemented by a gNB 310 in 5G, and the terminal device 115 in FIG. 1 is implemented by a UE 315. The first communication 120 is implemented by LTE Physical Uplink Shared Channel (PUSCH) transmission, and the second communication 125 is implemented by 5G Physical Downlink Shared Channel (PDSCH) transmission.
As shown, the eNB 305 sends (320) an X2 SETUP REQUEST message to the gNB 310 with a request for a GTP U-Plane signaling tunnel. The gNB 310 sends (322) an X2 SETUP RESPONSE message to the eNB 305.
During the 5G-ENB DC RB setup of the UE 315, the eNB 305 may signal jammer resource units (such as PRBs) information to the gNB 310. As shown, the eNB 305 sends (324) a SGNB MODIFICATION REQUEST message to the gNB 310 using X2 AP signaling. The SGNB MODIFICATION REQUEST message contains jammer PRB bitmap to indicate the locations of the jammer PRBs. The gNB 310 sends (326) a SGNB MODIFICATION REQUEST ACKNOWLEDGE message to the eNB 305.
The eNB 305 may also signal the jammer PRB information to the UE 315 via a HO command message. As shown, the eNB 305 sends (328) a RRC Connection Reconfiguration (Handover Command) message to the UE 315, which contains the jammer PRB bitmap to indicate the jammer PRBs. The UE 315 sends (330) a RRC Connection Reconfiguration Complete message to the eNB 305. The eNB 305 sends (332) a SGNB RECONFIGURATION COMPLETE message to the gNB 310. As a result, after the DC RB is set up, all parties are aware of jammer PRBs.
The UE 315 starts (334) data transmission on the DC RB. Meanwhile, the gNB 310 detects (336) that PDSCH transmission to the UE 310 is non-acknowledged (NACKed) and LTE jammer PRB is used for the PDSCH transmission. For example, the gNB 310 such as its MAC entity shall check if allocated PRBs can be interfered by jammer PRBs. The gNB 310 reduces (338) a PDSCH modulation order instead of a MCS index continuously when the next PDSCH scheduling is at the same situation. The PDSCH modulation order reduction ends up (340) when the QPSK modulation is used.
It’s possible that the gNB 310 still detect NACK to PDSCH transmission after the low-order modulation is applied such as QPSK. In this situation, the gNB 310 signals (342) the eNB 305 to request jammer PRB reduction on LTE PUSCH using UP fast signalling, for example. The eNB 305 reduces (344) allocated PUSCH jammer PRBs. At the same time, the UE 315 determines (346) that the QPSK modulation is applied to 5G PDSCH and it needs to monitor granted LTE PUSCH PRBs. Then, the UE 315 monitors (348) the number of jammer PRBs in the LTE PUSCH transmission.
The jammer PUSCH PRBs granted by the eNB 305 is continuously decreasing, but decoding errors for the 5G PDSCH transmission still occur. After a certain TTIs, if the UE 315 determines (350) that jammer PUSCH PRBs are granted to the LTE PUSCH, there are two options for the UE 315 to eliminate the interferences between LTE PUSCH and 5G PDSCH.
In Option 1, the UE 315 sends (352) a LTE BSR message to the eNB 305. The BSR message includes an ELIMINATING HARMONIC INTERFERENCE Request bit to request 5G-ENB coordination scheduling. After the coordination scheduling request in the BSR message is received, the eNB 305 sends (354) a LTE UL grant to the UE 315. The eNB 305 sends (356) LTE PUSCH granted PRB bitmap to the gNB 310 to inform LTE UL grant time and granted PUSCH PRB frequency to the 5G gNB 310. The granted PRB bitmap may be transferred via the UP tunnel.
Considering that LTE PUSCH transmission will occur when 4 milliseconds later than LTE UL grant transmission, the gNB 310 performs (358) PDSCH PRB allocation to avoid the harmonic interference. For example, the gNB 310 may allocate PRBs in non-multiplied frequencies to PDSCH at high-band DL packet scheduler at that time of LTE PUSCH transmission.
In Option 2, when the UE 315 determines that the jammer PUSCH PRBs granted by the eNB 305 is continuously decreasing for certain TTIs however the decoding for 5G PDSCH still failed, the UE 310 will not use the jammer PRB to perform PUSCH transmission although the jammer PRB is granted by the eNB 305. As shown, after the UE 315 receives (360) a LTE UL grant from the eNB 305, the UE 315 performs (362) PUSCH transmission on non-jammer PRBs of the PRBs indicated in the LTE UL Grant. Accordingly, the eNB 305 may use both all the granted PRBs and the non-jammer PRBs for channel estimation and further decoding. For example, two granted patterns of granted PRBs may be indicated from a MAC Packet Scheduler to an uplink PHY channelizer in the eNB 305, including, one for all the granted PRBs and the other for the non-jammer PRBs. In the case that the decoding is failed on all granted PRBs, the PHY channelizer may perform channel estimation on non-jammer PRBs to avoid the decoding error due to the low SNR.
FIG. 4 shows a flowchart of an example method 400 according to some example embodiments of the present disclosure. The method 400 can be implemented by the first network device 105 as shown in FIG. 1. For the purpose of discussion, the method 400 will be described with reference to FIG. 1.
At block 405, the first network device 105 receives a request from the second network device 110 to reduce the number of jammer resource units to be allocated for the first communication 120. At block 410, in response to receiving the request, the first network device 105 continuously reduces the number of jammer resource units allocated for the first communication 120 until an event occurs. The event comprises that the number of jammer resource units is below a threshold number. The event also comprises that a request for coordination scheduling by the first and second network devices 105 and 110 is received from the terminal device 115 or that the number of jammer resource units is below a threshold number. In some example embodiments, the request for the coordination scheduling may be received by the first network device 105 from the terminal device 115 in a BSR message.
In some example embodiments, after the request for the coordination scheduling is received from the terminal device 115, the first network device 105 may send, to the second network device 110, an indication of the first set of resource units allocated for the first communication 120. In some example embodiments, the indication of the first set of resource units may be sent via a user-plane tunnel between a MAC layer of the first network device 105 and a MAC layer of the second network device 110. In some example embodiments, the request to reduce the number of jammer resource units may also be received via the UP tunnel by the first network device 105 from the second network device 110.
In some example embodiments, the UP tunnel may be established by the first network device 105 with the second network device 110 upon setup of an interface associated with at least one of the first and second network devices 105 and 110. In some example embodiments, the UP tunnel comprises a GTP-U tunnel.
In some example embodiments, the first network device 105 may send an indication of the plurality of jammer resource units to the second network device 110 in a SGNB modification request message. In some example embodiments, the first network device 105 may send an indication of the plurality of jammer resource units to the terminal device 115 in a handover command message. In this way, all the devices involved in the DC may be aware of the jammer resource units.
FIG. 5 shows a flowchart of an example method 500 according to some example embodiments of the present disclosure. The method 500 can be implemented by the second network device 110 as shown in FIG. 1. For the purpose of discussion, the method 500 will be described with reference to FIG. 1.
At block 505, the second network device 110 determines that at least one jammer resource unit is allocated for the second communication 125. At block 510, if the second communication 125 is degraded, the second network device 110 continuously reduces a modulation order for the second communication 125 until the modulation order is below a threshold order. At block 515, the second network device 110 sends a request to the first network device 105 to reduce the number of jammer resource units to be allocated for the first communication 120.
In some example embodiments, the request is sent via the UP tunnel. The UP tunnel may be established by the second network device 110 with the first network device 105 upon setup of an interface associated with at least one of the first and second network devices 105 and 110. The UP tunnel may comprise, but not limited to, a GTP-U tunnel.
In some example embodiments, the second network device 110 may receive, from the first network device 105, an indication of the plurality of jammer resource units in a SGNB modification request message. Based on the received indication, the second network device 110 may determine that the at least one of the plurality of jammer resource units is allocated for the second communication 125.
In some example embodiments, the second network device 110 may receive, from the first network device 105, an indication of the first set of resource units allocated for the first communication 120. The indication may be also received via the UP tunnel. The second network device 110 may determine that at least one jammer resource unit is included in the first set of resource units. Then, the second network device 110 may allocate the second set of resource units for the second communication 125. The second set of resource units excludes the at least one jammer resource unit in the first set of resource units.
FIG. 6 shows a flowchart of an example method 600 according to some example embodiments of the present disclosure. The method 600 can be implemented by the terminal device 115 as shown in FIG. 1. For the purpose of discussion, the method 600 will be described with reference to FIG. 1.
At block 605, the terminal device 115 determines that the second communication 125 is degraded and a modulation order for the second communication 125 is below a threshold order. At block 610, the terminal device 115 detects continuous decreasing of the number of jammer resource units allocated for the first communication 120. At block 615, the terminal device 115 determines an action to be performed. The action comprises sending, to the first network device 105, a request for coordination scheduling by the first and second network devices 105 and 110. In some example embodiments, the request may be sent in a BSR message.
In some example embodiments, the terminal device 115 receives an indication of the plurality of jammer resource units from the first network device 105 in a handover command message.
All operations and features as described above with reference to FIGS. 1-3 are likewise applicable to the methods 400-600 and have similar effects. For the purpose of simplification, the details will be omitted.
FIG. 7 is a simplified block diagram of a device 700 that is suitable for implementing embodiments of the present disclosure. The device 700 can be implemented at the first network device 105, the second network device 110 or the terminal device 115 as shown in FIG. 1.
As shown, the device 700 includes a processor 710, a memory 720 coupled to the processor 710, a communication module 730 coupled to the processor 710, and a communication interface (not shown) coupled to the communication module 730. The memory 720 stores at least a program 740. The communication module 730 is for bidirectional communications, for example, via multiple antennas. The communication interface may represent any interface that is necessary for communication.
The program 740 is assumed to include program instructions that, when executed by the associated processor 710, enable the device 700 to operate in accordance with the embodiments of the present disclosure, as discussed herein with reference to FIGS. 2 to 5. The embodiments herein may be implemented by computer software executable by the processor 710 of the device 700, or by hardware, or by a combination of software and hardware. The processor 710 may be configured to implement various embodiments of the present disclosure.
The memory 720 may be of any type suitable to the local technical network and may be implemented using any suitable data storage technology, such as a non-transitory computer readable storage medium, semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memory and removable memory, as non-limiting examples. While only one memory 720 is shown in the device 700, there may be several physically distinct memory modules in the device 700. The processor 710 may be of any type suitable to the local technical network, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples. The device 700 may have multiple processors, such as an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
When the device 700 acts as the first network device 105 or a part of the first network device 105, the processor 710 and the communication module 730 may cooperate to implement the method 400 as described above with reference to FIG. 4. When the device 700 acts as the second network device 110 or a part of the second network device 110, the processor 710 and the communication module 730 may cooperate to implement the method 500 as described above with reference to FIG. 5. When the device 700 acts as the terminal device 115 or a part of the terminal device 115, the processor 710 and the communication module 730 may cooperate to implement the method 600 as described above with reference to FIG. 6.
All operations and features as described above with reference to FIGS. 1 to 6 are likewise applicable to the device 700 and have similar effects. For the purpose of simplification, the details will be omitted.
Generally, various embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device. While various aspects of embodiments of the present disclosure are illustrated and described as block diagrams, flowcharts, or using some other pictorial representations, it is to be understood that the block, apparatus, system, technique or method described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
The present disclosure also provides at least one computer program product tangibly stored on a non-transitory computer readable storage medium. The computer program product includes computer-executable instructions, such as those included in program modules, being executed in a device on a target real or virtual processor, to carry out the methods 400-600 as described above with reference to FIGS. 4-6. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, or the like that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or split between program modules as desired in various embodiments. Machine-executable instructions for program modules may be executed within a local or distributed device. In a distributed device, program modules may be located in both local and remote storage media.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowcharts and/or block diagrams to be implemented. The program code may execute entirely on a machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present disclosure, the computer program codes or related data may be carried by any suitable carrier to enable the device, apparatus or processor to perform various processes and operations as described above. Examples of the carrier include a signal, computer readable media and the like.
The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable medium may include but not limited to an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of the computer readable storage medium would include an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM) , a read-only memory (ROM) , an erasable programmable read-only memory (EPROM or Flash memory) , an optical fiber, a portable compact disc read-only memory (CD-ROM) , Digital Versatile Disc (DVD) , an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are contained in the above discussions, these should not be construed as limitations on the scope of the present disclosure, but rather as descriptions of features that may be specific to particular embodiments. Certain features that are described in the context of separate embodiments may also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment may also be implemented in multiple embodiments separately or in any suitable sub-combination.
Although the present disclosure has been described in languages specific to structural features and/or methodological acts, it is to be understood that the present disclosure defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
Various embodiments of the techniques have been described. In addition to or as an alternative to the above, the following examples are described. The features described in any of the following examples may be utilized with any of the other examples described herein.
In some aspects, a first network device comprises: at least one processor; and at least one memory including computer program code; the at least one memory and the computer program code configured to, with the at least one processor, cause the first network device to: receive, from a second network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and a terminal device in dual connection with the first and second network devices; and in response to receiving the request, continuously reduce the number of jammer resource units allocated for the first communication until an event occurs, the event comprising at least one of: a request for coordination scheduling by the first and second network devices being received from the terminal device, and the number of jammer resource units being below a threshold number.
In some example embodiments, the first network device is further caused to: in response to receiving the request for the coordination scheduling from the terminal device, send, to the second network device, an indication of a first set of resource units allocated for the first communication.
In some example embodiments, the indication of the first set of resource units is sent to the second network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device.
In some example embodiments, the first network device is caused to receive the request to reduce the number of jammer resource units by: receiving the request from the second network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device
In some example embodiments, the first network device is further caused to: establish the user-plane tunnel with the second network device upon setup of an interface associated with at least one of the first and second network devices.
In some example embodiments, the user-plane tunnel comprises a General Packet Radio Service Tunneling Protocol user-plane tunnel.
In some example embodiments, the number of jammer resource units are included in a plurality of jammer resource units, and the first network device is further caused to: send an indication of the plurality of jammer resource units to the second network device in a SGNB modification request message.
In some example embodiments, the first network device is further caused to: send an indication of the plurality of jammer resource units to the terminal device in a handover command message.
In some example embodiments, the request for the coordination scheduling is received from the terminal device in a buffer status report message.
In some aspects, a second network device comprises: at least one processor; and at least one memory including computer program code; the at least one memory and the computer program code configured to, with the at least one processor, cause the second network device to: determine that at least one jammer resource unit is allocated for a second communication between the second network device and a terminal device in dual connectivity with a first network device and the second network device; if the second communication is degraded, continuously reduce a modulation order for the second communication until the modulation order is below a threshold order; and send, to the first network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and the terminal device.
In some example embodiments, the at least one jammer resource unit is included in a plurality of jammer resource units, and the second network device is caused to determine that the at least one jammer resource unit is allocated for the second communication by: receiving, from the first network device, an indication of the plurality of jammer resource units in a SGNB modification request message; and determining, based on the received indication, that the at least one of the plurality of jammer resource units is allocated for the second communication.
In some example embodiments, the second network device is caused to send the request to the first network device by: sending the request to the first network device via a user-plane tunnel between a medium access control layer of the second network device and a medium access control layer of the first network device.
In some example embodiments, the second network device is further caused to: receive, from the first network device, an indication of a first set of resource units allocated for the first communication; determine that at least one jammer resource unit is included in the first set of resource units; and allocate a second set of resource units for the second communication, the second set of resource units excluding the at least one jammer resource unit in the first set of resource units.
In some example embodiments, the indication of the first set of resource units is received from the first network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device.
In some example embodiments, the second network device is further caused to: establish the user-plane tunnel with the first network device upon setup of an interface associated with at least one of the first and second network devices.
In some example embodiments, the user-plane tunnel comprises a General Packet Radio Service Tunneling Protocol user-plane tunnel.
In some aspects, a terminal device comprises: at least one processor; and at least one memory including computer program code; the at least one memory and the computer program code configured to, with the at least one processor, cause the terminal device in dual connectivity with a first network device and a second network device to: determine that a second communication with the second network device is degraded and a modulation order for the second communication is below a threshold order; detect continuous decreasing of a number of jammer resource units allocated for a first communication with the first network device; and determine an action to be performed, the action comprising: sending, to the first network device, a request for coordination scheduling by the first and second network devices, or performing the first communication with the first network device using non-jammer resource units in a first set of resources allocated by the first network device for the first communication.
In some example embodiments, the request is sent to the first network device in a buffer status report message.
In some example embodiments, the number of jammer resource units are included in a plurality of jammer resource units, and the terminal device is further caused to: receive an indication of the plurality of jammer resource units from the first network device in a handover command message.
In some aspects, a method implemented by a first network device comprises: receiving, from a second network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and a terminal device in dual connection with the first and second network devices; and in response to receiving the request, continuously reducing the number of jammer resource units allocated for the first communication until an event occurs, the event comprising at least one of: a request for coordination scheduling by the first and second network devices being received from the terminal device, and the number of jammer resource units being below a threshold number.
In some example embodiments, the method further comprises: in response to receiving the request for the coordination scheduling from the terminal device, sending, to the second network device, an indication of a first set of resource units allocated for the first communication.
In some example embodiments, the indication of the first set of resource units is sent to the second network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device.
In some example embodiments, receiving the request to reduce the number of jammer resource units comprises: receiving the request from the second network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device
In some example embodiments, the method further comprises: establishing the user-plane tunnel with the second network device upon setup of an interface associated with at least one of the first and second network devices.
In some example embodiments, the user-plane tunnel comprises a General Packet Radio Service Tunneling Protocol user-plane tunnel.
In some example embodiments, the number of jammer resource units are included in a plurality of jammer resource units, and the method further comprises: sending an indication of the plurality of jammer resource units to the second network device in a SGNB modification request message.
In some example embodiments, the method further comprises: sending an indication of the plurality of jammer resource units to the terminal device in a handover command message.
In some example embodiments, the request for the coordination scheduling is received from the terminal device in a buffer status report message.
In some aspects, a method implemented by a second network device comprises: determining that at least one jammer resource unit is allocated for a second communication between the second network device and a terminal device in dual connectivity with a first network device and the second network device; if the second communication is degraded, continuously reducing a modulation order for the second communication until the modulation order is below a threshold order; and sending, to the first network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and the terminal device.
In some example embodiments, the at least one jammer resource unit is included in a plurality of jammer resource units, and determining that the at least one jammer resource unit is allocated for the second communication comprises: receiving, from the first network device, an indication of the plurality of jammer resource units in a SGNB modification request message; and determining, based on the received indication, that the at least one of the plurality of jammer resource units is allocated for the second communication.
In some example embodiments, sending the request to the first network device comprises: sending the request to the first network device via a user-plane tunnel between a medium access control layer of the second network device and a medium access control layer of the first network device.
In some example embodiments, the method further comprises: receiving, from the first network device, an indication of a first set of resource units allocated for the first communication; determining that at least one jammer resource unit is included in the first set of resource units; and allocating a second set of resource units for the second communication, the second set of resource units excluding the at least one jammer resource unit in the first set of resource units.
In some example embodiments, the indication of the first set of resource units is received from the first network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device.
In some example embodiments, the method further comprises: establishing the user-plane tunnel with the first network device upon setup of an interface associated with at least one of the first and second network devices.
In some example embodiments, the user-plane tunnel comprises a General Packet Radio Service Tunneling Protocol user-plane tunnel.
In some aspects, a method implemented by a terminal device in dual connectivity with a first network device and a second network device comprises: determining that a second communication with the second network device is degraded and a modulation order for the second communication is below a threshold order; detecting continuous decreasing of a number of jammer resource units allocated for a first communication with the first network device; and determining an action to be performed, the action comprising: sending, to the first network device, a request for coordination scheduling by the first and second network devices, or performing the first communication with the first network device using non-jammer resource units in a first set of resources allocated by the first network device for the first communication.
In some example embodiments, the request is sent to the first network device in a buffer status report message.
In some example embodiments, the number of jammer resource units are included in a plurality of jammer resource units, and the method further comprises: receiving an indication of the plurality of jammer resource units from the first network device in a handover command message.
In some aspects, an apparatus comprises: means for receiving, by a first network device, from a second network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and a terminal device in dual connection with the first and second network devices; and means for in response to receiving the request, continuously reducing the number of jammer resource units allocated for the first communication until an event occurs, the event comprising at least one of: a request for coordination scheduling by the first and second network devices being received from the terminal device, and the number of jammer resource units being below a threshold number.
In some example embodiments, the apparatus further comprises: means for in response to receiving the request for the coordination scheduling from the terminal device, sending, to the second network device, an indication of a first set of resource units allocated for the first communication.
In some example embodiments, the indication of the first set of resource units is sent to the second network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device.
In some example embodiments, means for receiving the request to reduce the number of jammer resource units comprises: receiving the request from the second network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device
In some example embodiments, the apparatus further comprises: means for establishing the user-plane tunnel with the second network device upon setup of an interface associated with at least one of the first and second network devices.
In some example embodiments, the user-plane tunnel comprises a General Packet Radio Service Tunneling Protocol user-plane tunnel.
In some example embodiments, the number of jammer resource units are included in a plurality of jammer resource units, and the apparatus further comprises: means for sending an indication of the plurality of jammer resource units to the second network device in a SGNB modification request message.
In some example embodiments, the apparatus further comprises: means for sending an indication of the plurality of jammer resource units to the terminal device in a handover command message.
In some example embodiments, the request for the coordination scheduling is received from the terminal device in a buffer status report message.
In some aspects, an apparatus comprises: means for determining, by a second network device, that at least one jammer resource unit is allocated for a second communication between the second network device and a terminal device in dual connectivity with a first network device and the second network device; means for if the second communication is degraded, continuously reducing a modulation order for the second communication until the modulation order is below a threshold order; and means for sending, to the first network device, a request to reduce a number of jammer resource units to be allocated for a first communication between the first network device and the terminal device.
In some example embodiments, the at least one jammer resource unit is included in a plurality of jammer resource units, and the means for determining that the at least one jammer resource unit is allocated for the second communication comprises: means for receiving, from the first network device, an indication of the plurality of jammer resource units in a SGNB modification request message; and means for determining, based on the received indication, that the at least one of the plurality of jammer resource units is allocated for the second communication.
In some example embodiments, the means for sending the request to the first network device comprises: means for sending the request to the first network device via a user-plane tunnel between a medium access control layer of the second network device and a medium access control layer of the first network device.
In some example embodiments, the apparatus further comprises: means for receiving, from the first network device, an indication of a first set of resource units allocated for the first communication; means for determining that at least one jammer resource unit is included in the first set of resource units; and means for allocating a second set of resource units for the second communication, the second set of resource units excluding the at least one jammer resource unit in the first set of resource units.
In some example embodiments, the indication of the first set of resource units is received from the first network device via a user-plane tunnel between a medium access control layer of the first network device and a medium access control layer of the second network device.
In some example embodiments, the apparatus further comprises: means for establishing the user-plane tunnel with the first network device upon setup of an interface associated with at least one of the first and second network devices.
In some example embodiments, the user-plane tunnel comprises a General Packet Radio Service Tunneling Protocol user-plane tunnel.
In some aspects, an apparatus comprises: means for determining, by a terminal device in dual connectivity with a first network device and a second network device, that a second communication with the second network device is degraded and a modulation order for the second communication is below a threshold order; means for detecting continuous decreasing of a number of jammer resource units allocated for a first communication with the first network device; and means for determining an action to be performed, the action comprising: sending, to the first network device, a request for coordination scheduling by the first and second network devices, or performing the first communication with the first network device using non-jammer resource units in a first set of resources allocated by the first network device for the first communication.
In some example embodiments, the request is sent to the first network device in a buffer status report message.
In some example embodiments, the number of jammer resource units are included in a plurality of jammer resource units, and the apparatus further comprises: means for receiving an indication of the plurality of jammer resource units from the first network device in a handover command message.
In some aspects, a computer readable storage medium comprises program instructions stored thereon, the instructions, when executed by a processor of a device, causing the device to perform the method according to some example embodiments of the present disclosure.