Coordination method for time domain interference in hybrid network
A technology of time-domain interference coordination and coordination methods, applied in electrical components, wireless communication, multi-frequency code systems, etc., to achieve the effect of utilizing system time-frequency resources and reducing interference
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] From the exchange of subframe information between the base station of the interfered cell and the base station of the interfered cell, to the exchange of subframe and subband information between the two base stations, the utilization of resources by the base station of the interfered cell has been greatly improved. But from image 3 It can also be seen that since the base station of the interfered cell does not know the length information of the PDCCH in subframe N+1 of the base station of the interfered cell, in order to protect the reception of the PDCCH by the victim user, it can only be avoided according to the maximum possible length of 3 OFDM symbols of the PDCCH.
[0023] This embodiment provides a time-domain interference coordination method in a hybrid network. The details of the method are as follows: in addition to exchanging the subframe number and subband information between the base station of the interfered cell and the base station of the interfered cell,...
Embodiment 2
[0025] This embodiment provides another time-domain interference coordination method in a hybrid network: between the base station of the interfered cell and the base station of the interfered cell, in addition to exchanging the subframe number and subband information, the subframe control information part of the resource to be protected is exchanged. position information, so that the base station of the interfering cell can just vacate the resource corresponding to the resource to be protected in the subframe control information part, so as to protect the reception of the PDCCH by the victim user.
[0026] like Figure 5 As shown, when the base station of the interfered cell knows the position of the resource to be protected in the control information part of the subframe N+1 (the network cable filling part of the subframe N+1 in the figure), the base station of the interfered cell can vacate it to protect the victim user For the reception of PDCCH and PDSCH ( Figure 5 In t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 