Transmission power modulation to facilitate in-device coexistence between wireless communication technologies

ABSTRACT

A method of modulating transmission power to facilitate in-device coexistence between wireless communication technologies is provided. The method can include determining a scheduled time period during which data is received by a device via a first wireless communication technology. The method can further include reducing a transmission power of a transmission from the device via a second wireless communication technology to a threshold level prior to the scheduled time period and controlling the transmission power so that the transmission power does not exceed the threshold level during the scheduled time period. The method can additionally include, subsequent to the time period, increasing the transmission power to a level exceeding the threshold level.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.13/628,013, filed Sep. 26, 2012, entitled, “TRANSMISSION POWERMODULATION TO FACILITATE IN-DEVICE COEXISTENCE BETWEEN WIRELESSCOMMUNICATION TECHNOLOGIES”, which is herein incorporated by referencein its entirety.

FIELD

The described embodiments relate generally to wireless communicationsand more particularly to transmission power modulation to facilitatein-device coexistence between wireless communication technologies.

BACKGROUND

Many wireless communication devices support multiple wirelesscommunication technologies and may concurrently communicate via multiplewireless communication technologies. In many instances, wirelesscommunication technologies used by a device use channel bands that mayinterfere with each other. In such instances, energy from a band used byone technology can leak into a band used by another technology. Thisenergy leakage can raise the noise floor and cause a problem known asdesense. In many instances, desense can negatively impact the use ofcertain channel bands and, in severe cases, can render certain channelbands unusable. Accordingly, interference that can result in desenseposes a problem for in-device coexistence of multiple wirelesscommunication technologies.

A particularly troublesome desense problem can result in a scenario inwhich a device emits a transmission via a first wireless communicationtechnology, referred to as an aggressor technology, while the device isreceiving data via a second wireless communication technology, referredto as a victim technology. Data receipt by the victim technology can bedamaged by the aggressor transmission, particularly in instances inwhich the aggressor technology uses a relatively high transmissionpower. In this regard, received packet errors, or even completedeafening of the victim technology receiver can result from theinterference that can be caused by the aggressor technologytransmission. For example transmission of a cellular signal by a deviceat a time when a Bluetooth signal is received can deafen the Bluetoothreceiver, causing errors and, in some cases, complete loss of theBluetooth connection.

SUMMARY

Some embodiments disclosed herein reduce the occurrence of channelinterference, including adjacent channel interference, blockerinterference, out-of-band emissions, and harmonic interference. In thisregard, some example embodiments provide for transmission powermodulation of transmissions by an aggressor wireless technology during atime period in which data is received via a victim technology.Additionally or alternatively, some example embodiments provide forincreasing a linearity of a power amplifier applied to a transmissionvia an aggressor wireless technology during a time period in which datais received via a victim technology. Accordingly, such embodimentsfacilitate in-device coexistence between wireless communicationtechnologies. Devices implementing various embodiments disclosed hereincan experience reduced loss and corruption of received data due toreduced interference, and thus a reduced occurrence of desense. Further,devices sending data to a device implementing an embodiment disclosedherein can experience benefits due to a reduction in lost data and,consequently, reduced retransmission of data.

In a first embodiment, a method is provided. The method of the firstembodiment can include determining a scheduled time period during whichdata is received by a device via a first wireless communicationtechnology; reducing a transmission power of a transmission from thedevice via a second wireless communication technology to a thresholdlevel prior to the scheduled time period and controlling thetransmission power during the scheduled time period so that thetransmission power does not exceed the threshold level; and subsequentto the scheduled time period, increasing the transmission power to alevel exceeding the threshold level.

In a second embodiment, an apparatus is provided. The apparatus of thesecond embodiment can include a first transceiver configured to emittransmissions via a first wireless communication technology andprocessing circuitry coupled to the first wireless transceiver. Theprocessing circuitry can be configured to determine a scheduled timeperiod during which data is received by a second wireless transceivervia a second wireless communication technology; reduce a transmissionpower of a transmission emitted by the first wireless transceiver priorto the scheduled time period and control the transmission power duringthe scheduled time period so that the transmission power does not exceedthe threshold level; and subsequent to the scheduled time period,increase the transmission power to a level exceeding the thresholdlevel.

In a third embodiment, a computer program product is provided. Thecomputer program product of the third embodiment can include at leastone non-transitory computer readable storage medium having program codestored thereon. The program code can include program code fordetermining a scheduled time period during which data is received by adevice via a first wireless communication technology; program code forreducing a transmission power of a transmission from the device via asecond wireless communication technology to a threshold level prior tothe scheduled time period and controlling the transmission power duringthe scheduled time period so that the transmission power does not exceedthe threshold level; and program code for, subsequent to the scheduledtime period, increasing the transmission power to a level exceeding thethreshold level.

In a fourth embodiment, an apparatus is provided that can include meansfor determining a scheduled time period during which data is received bya device via a first wireless communication technology; means forreducing a transmission power of a transmission from the device via asecond wireless communication technology to a threshold level prior tothe scheduled time period and controlling the transmission power duringthe scheduled time period so that the transmission power does not exceedthe threshold level; and means for, subsequent to the scheduled timeperiod, increasing the transmission power to a level exceeding thethreshold level.

In a fifth embodiment, a method is provided. The method of the fifthembodiment can include determining a scheduled time period during whichdata is received by a device via a first wireless communicationtechnology; determining that a transmission power of a transmission fromthe device via a second wireless communication technology should bereduced to a threshold level during the scheduled time period so thattransmission via the second wireless communication technology does notinhibit data reception via the first wireless communication technologyduring the scheduled time period; and sending a message including anindication of the scheduled time period to a control module for thesecond wireless communication technology in advance of the scheduledtime period to request that the control module reduce the transmissionpower to the threshold level prior to the scheduled time period andcontrol the transmission power so that it does not exceed the thresholdlevel during the scheduled time period.

In a sixth embodiment, an apparatus is provided. The apparatus of thesixth embodiment can include a first transceiver configured to receivedata via a first wireless communication technology and processingcircuitry coupled to the first wireless transceiver. The processingcircuitry can be configured to determine a scheduled time period duringwhich data is received by the first wireless transceiver; determine thata transmission power of a transmission by a second wireless transceivervia a second wireless communication technology should be reduced to athreshold level during the scheduled time period so that transmission bythe second wireless transceiver does not inhibit data reception via thefirst wireless communication technology during the scheduled timeperiod; and send a message to a control module configured to control thesecond wireless transceiver, the message including an indication of thescheduled time period to request that the control module reduce thetransmission power to the threshold level prior to the scheduled timeperiod and control the transmission power so that it does not exceed thethreshold level during the scheduled time period.

In a seventh embodiment, a computer program product is provided. Thecomputer program product of the seventh embodiment can include at leastone non-transitory computer readable storage medium having program codestored thereon. The program code can include program code fordetermining a scheduled time period during which data is received by adevice via a first wireless communication technology; program code fordetermining that a transmission power of a transmission from the devicevia a second wireless communication technology should be reduced to athreshold level during the scheduled time period so that transmissionvia the second wireless communication technology does not inhibit datareception via the first wireless communication technology during thescheduled time period; and program code for sending a message includingan indication of the scheduled time period to a control module for thesecond wireless communication technology in advance of the scheduledtime period to request that the control module reduce the transmissionpower to the threshold level prior to the scheduled time period andcontrol the transmission power so that it does not exceed the thresholdlevel during the scheduled time period.

In an eighth embodiment, an apparatus is provided that can include meansfor determining a scheduled time period during which data is received bya device via a first wireless communication technology; means fordetermining that a transmission power of a transmission from the devicevia a second wireless communication technology should be reduced to athreshold level during the scheduled time period so that transmissionvia the second wireless communication technology does not inhibit datareception via the first wireless communication technology during thescheduled time period; and means for sending a message including anindication of the scheduled time period to a control module for thesecond wireless communication technology in advance of the scheduledtime period to request that the control module reduce the transmissionpower to the threshold level prior to the scheduled time period andcontrol the transmission power so that it does not exceed the thresholdlevel during the scheduled time period.

In a ninth embodiment, an apparatus is provided that can include firstcontrol circuitry for a first wireless communication technology; secondcontrol circuitry for a second wireless communication technology; and aninterface configured to enable communication between the first controlcircuitry and the second control circuitry. The first control circuitrycan be configured to determine a scheduled time period during which datais received by a device via a first wireless communication technologyand send a message over the interface to the second control circuitry torequest that the second control circuitry reduce a transmission power ofa transmission via the second wireless communication technology to athreshold level during the scheduled time period. The second controlcircuitry can be configured to receive the message sent over theinterface by the first control circuitry and, in response to themessage, to reduce the transmission power to the threshold level priorto the scheduled time period and control the transmission power duringthe scheduled time period so that the transmission power does not exceedthe threshold level.

In a tenth embodiment, a method is provided. The method of the tenthembodiment can include determining a scheduled time period during whichdata is received by a device via a first wireless communicationtechnology; and adjusting an operational parameter of a power amplifierapplied to a cellular transmission from the device to increase alinearity of the power amplifier during the scheduled time period.

In an eleventh embodiment, an apparatus is provided. The apparatus ofthe eleventh embodiment can include a first transceiver configured toemit transmissions via a first wireless communication technology andprocessing circuitry coupled to the first wireless transceiver. Theprocessing circuitry can be configured to determine a scheduled timeperiod during which data is received by a second wireless transceivervia a second wireless communication technology; and adjust anoperational parameter of a power amplifier applied to a cellulartransmission from the device to increase a linearity of the poweramplifier during the scheduled time period.

In a twelfth embodiment, a computer program product is provided. Thecomputer program product of the twelfth embodiment can include at leastone non-transitory computer readable storage medium having program codestored thereon. The program code can include program code fordetermining a scheduled time period during which data is received by adevice via a first wireless communication technology; and program codefor adjusting an operational parameter of a power amplifier applied to acellular transmission from the device to increase a linearity of thepower amplifier during the scheduled time period.

In a thirteenth embodiment, an apparatus is provided that can includemeans for determining a scheduled time period during which data isreceived by a device via a first wireless communication technology; andmeans for adjusting an operational parameter of a power amplifierapplied to a cellular transmission from the device to increase alinearity of the power amplifier during the scheduled time period.

In a fourteenth embodiment, a method is provided. The method of thefourteenth embodiment can include determining a scheduled time periodduring which data is received by a device via a first wirelesscommunication technology; determining that a linearity of a poweramplifier applied to a transmission from the device via a secondwireless communication technology should be increased during thescheduled time period so that transmission via the second wirelesscommunication technology does not inhibit data reception via the firstwireless communication technology during the scheduled time period; andsending a message including an indication of the scheduled time periodto a control module for the second wireless communication technology inadvance of the scheduled time period to request that the control moduleincrease the linearity of the power amplifier during the scheduled timeperiod.

In a fifteenth embodiment, an apparatus is provided. The apparatus ofthe fifteenth embodiment can include a first transceiver configured toreceive data via a first wireless communication technology andprocessing circuitry coupled to the first wireless transceiver. Theprocessing circuitry can be configured to determine a scheduled timeperiod during which data is received by the first wireless transceiver;determine that a linearity of a power amplifier applied to atransmission from the device via a second wireless communicationtechnology should be increased during the scheduled time period so thattransmission via the second wireless communication technology does notinhibit data reception via the first wireless communication technologyduring the scheduled time period; and send a message to a control moduleconfigured to control the second wireless transceiver, the messageincluding an indication of the scheduled time period to request that thecontrol module increase the linearity of the power amplifier during thescheduled time period.

In a sixteenth embodiment, a computer program product is provided. Thecomputer program product of the sixteenth embodiment can include atleast one non-transitory computer readable storage medium having programcode stored thereon. The program code can include program code fordetermining a scheduled time period during which data is received by adevice via a first wireless communication technology; program code fordetermining that a linearity of a power amplifier applied to atransmission from the device via a second wireless communicationtechnology should be increased during the scheduled time period so thattransmission via the second wireless communication technology does notinhibit data reception via the first wireless communication technologyduring the scheduled time period; and program code for sending a messageincluding an indication of the scheduled time period to a control modulefor the second wireless communication technology in advance of thescheduled time period to request that the control module increase thelinearity of the power amplifier during the scheduled time period.

In a seventeenth embodiment, an apparatus is provided that can includemeans for determining a scheduled time period during which data isreceived by a device via a first wireless communication technology;means for determining that a linearity of a power amplifier applied to atransmission from the device via a second wireless communicationtechnology should be increased during the scheduled time period so thattransmission via the second wireless communication technology does notinhibit data reception via the first wireless communication technologyduring the scheduled time period; and means for sending a messageincluding an indication of the scheduled time period to a control modulefor the second wireless communication technology in advance of thescheduled time period to request that the control module increase thelinearity of the power amplifier during the scheduled time period.

In an eighteenth embodiment, an apparatus is provided that can includefirst control circuitry for a first wireless communication technology;second control circuitry for a second wireless communication technology;and an interface configured to enable communication between the firstcontrol circuitry and the second control circuitry. The first controlcircuitry can be configured to determine a scheduled time period duringwhich data is received by a device via a first wireless communicationtechnology and send a message over the interface to the second controlcircuitry to request that the second control circuitry increase alinearity of a power amplifier applied to a transmission via the secondwireless communication technology during the scheduled time period. Thesecond control circuitry can be configured to receive the message sentover the interface by the first control circuitry and, in response tothe message, to adjust an operational parameter of the power amplifierto increase the linearity of the power amplifier during the scheduledtime period.

The above summary is provided merely for purposes of summarizing someexample embodiments so as to provide a basic understanding of someaspects of the disclosure. Accordingly, it will be appreciated that theabove described example embodiments are merely examples and should notbe construed to narrow the scope or spirit of the disclosure in any way.Other embodiments, aspects, and advantages will become apparent from thefollowing detailed description taken in conjunction with theaccompanying drawings which illustrate, by way of example, theprinciples of the described embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

The described embodiments and the advantages thereof may best beunderstood by reference to the following description taken inconjunction with the accompanying drawings. These drawings are notnecessarily drawn to scale, and in no way limit any changes in form anddetail that may be made to the described embodiments by one skilled inthe art without departing from the spirit and scope of the describedembodiments.

FIG. 1 illustrates a prior art time domain view of an in-devicecoexistence problem between wireless communication technologies that canbe addressed by various example embodiments.

FIG. 2 illustrates an example time domain view of transmission powermodulation to facilitate in-device coexistence between wirelesscommunication technologies in accordance with some example embodiments.

FIG. 3 illustrates an example transmission power waveform in accordancewith some example embodiments.

FIG. 4 illustrates a block diagram of a mobile communication device inaccordance with some example embodiments.

FIG. 5 illustrates interfaced chipsets configured to facilitatein-device coexistence between wireless communication technologies inaccordance with some example embodiments.

FIG. 6 illustrates an example system in which some example embodimentscan be implemented to facilitate in-device coexistence between wirelesscommunication technologies.

FIG. 7 illustrates a flowchart according to an example method forperforming transmission power modulation to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments.

FIG. 8 illustrates a flowchart according to another example method forperforming transmission power modulation to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments.

FIG. 9 illustrates a flowchart according to an example method forenabling performance of transmission power modulation to facilitatein-device coexistence between wireless communication technologiesaccording to some example embodiments.

FIG. 10 illustrates a flowchart according to a further example methodfor performing transmission power modulation to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments.

FIG. 11 illustrates examples of current biasing to achieve increasedlinearity of a power amplifier according to some example embodiments.

FIG. 12 illustrates a flowchart according to an example method forincreasing linearity of a power amplifier to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments.

FIG. 13 illustrates a flowchart according to another example method forincreasing linearity of a power amplifier to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments.

FIG. 14 illustrates a flowchart according to an example method forenabling increasing linearity of a power amplifier to facilitatein-device coexistence between wireless communication technologiesaccording to some example embodiments.

FIG. 15 illustrates a flowchart according to a further example methodfor increasing linearity of a power amplifier to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments.

FIG. 16 illustrates a flowchart according to an example method forincreasing linearity of a power amplifier and performing transmissionpower modulation to facilitate in-device coexistence between wirelesscommunication technologies according to some example embodiments.

DETAILED DESCRIPTION

Representative applications of systems, methods, apparatuses, andcomputer program products according to the instant specification aredescribed in this section. These examples are being provided solely toadd context and aid in the understanding of the described embodiments.It will thus be apparent to one skilled in the art that the describedembodiments may be practiced without some or all of these specificdetails. In other instances, well known process steps have not beendescribed in detail in order to avoid unnecessarily obscuring thedescribed embodiments. Other applications are possible, such that thefollowing examples should not be taken as limiting.

In the following detailed description, references are made to theaccompanying drawings, which form a part of the description and in whichare shown, by way of illustration, specific embodiments in accordancewith the described embodiments. Although these embodiments are describedin sufficient detail to enable one skilled in the art to practice thedescribed embodiments, it is understood that these examples are notlimiting; such that other embodiments may be used, and changes may bemade without departing from the spirit and scope of the describedembodiments.

Some example embodiments address an in-device coexistence problembetween wireless communication technologies. More particularly, someexample embodiments described further herein address a situation inwhich a transmission is emitted by a device via an aggressor technologywhile the device is to receive data via a victim technology. In suchsituations, the aggressor technology transmissions can inhibit datareception via the victim technology, potentially resulting in receiveddata errors, or in extreme cases, even completely deafening the victimtechnology receiver. For example, victim technology data reception cansuffer from blocker interference in which the victim technology receivercan capture a high-power signal from an aggressor technologytransmission that can desense the victim signal. As another example,victim technology data reception can suffer from interference fromout-of-band (OOB) emissions in which an aggressor technologytransmission can be in a band adjacent to nearby the victim technologyband and the aggressor technology transmission can leak power into thevictim technology band, thus raising the noise floor for the victimtechnology data reception. As a further example, victim technology datareception can suffer from interference from harmonics in which anaggressor technology transmission can result in harmonics fromnon-linear behavior placing an interfering power into the victimtechnology band. Various example embodiments disclosed herein anddescribed further herein below can reduce the effects of blockerinterference, OOB interference, and harmonics interference.

FIG. 1 illustrates a prior art time domain view of an in-devicecoexistence problem in which transmissions are emitted via an aggressortechnology while data is received by a victim technology that can beaddressed by various example embodiments. In this regard, FIG. 1illustrates a time domain sequence of reception (“R”) and transmission(“T”) periods for an aggressor technology and a victim technology thatcan be implemented on a mobile communication device and/or on otherdevice configured to engage in wireless communications via multiplewireless communication technologies. It may be seen in FIG. 1 that datareception 102 is scheduled to occur between time t₁ and time t₂.However, as illustrated a transmission 104 via the aggressor technologyoccurs during a portion of the time period between t₁ and t₂. As such,the data reception 102 can be damaged, as indicated by the cross-hatchedpattern on the illustration of data reception 102. Similarly, datareception 106 can also be damaged, as the transmission 108 via theaggressor technology overlaps the entirety of the time period between t₃and t₄ during which the data reception 106 occurs. However, datareception 114 may proceed uninhibited, as the transmission 110 via theaggressor technology does not overlap the time period between t₅ and t₆during which the data reception 106 occurs.

Concurrent transmissions via multiple wireless communicationtechnologies can, in many instances, proceed without damaging receptionvia desense. Thus, for example, overlapping transmissions 110 and 112can proceed without interference damaging either transmission. Further,in the example scenario illustrated in FIG. 1, the transmission power oftransmissions via the aggressor technology can be much greater than thetransmission power of transmissions via the victim technology. Thus,while transmissions via the aggressor technology can inhibit concurrentreception via the victim technology, transmissions via the victimtechnology may not impact a concurrent reception via the aggressortechnology. Thus, for example, while the transmission 116 via the victimtechnology overlaps the reception 118 via the aggressor technology, thereception 118 may not be inhibited by the transmission 116.

The example illustrated in FIG. 1 illustrates a common problem when adevice communicates concurrently via cellular communications and a lowerpowered communication technology utilizing an industrial, scientific,and medical (ISM) band, such as Bluetooth. In such scenarios, thecellular transmissions can be much stronger than the Bluetoothtransmissions. Accordingly, Bluetooth transmissions may notsignificantly impact cellular reception. However, cellular transmissionscan prevent reception of Bluetooth packets.

In many instances, receptions via a victim technology are scheduled, andit may not be possible to shift scheduled reception intervals aroundtransmissions via an aggressor technology. Similarly, the timing oftransmissions via an aggressor technology can be fixed according to aschedule. For example, in instances in which the aggressor technology isa cellular communications technology, the timing of cellulartransmissions by a device can be set by the cellular base station, whichmay not have any knowledge of scheduled reception periods for Bluetoothor other potential victim technology. Accordingly, collisions betweencellular transmissions and victim technology reception periods, such asdata reception periods 102 and 106 illustrated in the example of FIG. 1can result.

Several example embodiments described herein can address the problemillustrated in and described with respect to FIG. 1. In this regard,some example embodiments provide for determining a scheduled time periodduring which data is received via a victim technology and reduce atransmission power of a transmission via an aggressor technology suchthat it does not exceed a threshold level during the scheduled timeperiod. The threshold level can be chosen such that the transmission viathe aggressor technology does not inhibit concurrent data reception viathe victim technology. In this regard, the threshold level can be chosensuch that the transmission via the aggressor technology does notintroduce errors in data received via the victim technology, preventreception of data via the victim technology, or otherwise damage datareception via the victim technology. Further, the threshold level can bea transmission power level that is still sufficient to supportsuccessful transmission via the aggressor technology.

In this regard, it may not be necessary to eliminate desense energy toprotect the data received via the victim technology. Instead, it can besufficient to decrease the desense energy below an acceptable threshold,such as may determined by the applicable specification, packet type,and/or other factors, which will be discussed further herein. Further,the presence of desense is due largely to second order nonlinearities inthe aggressor technology transmit chain. Thus, when the aggressortransmission power is reduced by some amount, the unwanted adjacent bandpower can reduced by a significantly larger amount (due to the nonlinearrelationship). As such, a relatively modest reduction in aggressortechnology transmission power can enable successful reception via thevictim technology by preventing victim technology desense that can becaused by blocker interference and OOB interference.

In some example embodiments, the transmission power of the aggressortransmission can be reduced to the threshold level prior to thescheduled time period during which a data reception is to occur via thevictim technology. Subsequent to the time period, if transmission viathe aggressor technology is still occurring, the transmission power canbe increased back to a level exceeding the threshold level. As such,reception via the victim technology can proceed without being damaged bythe aggressor transmission, which can also proceed as scheduled.

FIG. 2 illustrates an example time domain view of transmission powermodulation to facilitate in-device coexistence between wirelesscommunication technologies in accordance with some example embodiments.In this regard, FIG. 2 illustrates an example application of someexample embodiments to the example scenario illustrated in FIG. 1. Asillustrated in FIG. 2, a threshold level 202 is defined that is lessthan the full transmission power of the aggressor technology. Thethreshold level 202 can be any transmission power level at whichaggressor transmissions do not inhibit concurrent data reception via thevictim technology, but that is still sufficient to support successfultransmission via the aggressor technology.

The transmission power of the aggressor transmission 204 can be reducedto the threshold level 202 prior to time t₁ when the reception 206 viathe victim technology is scheduled to begin. It will be appreciated thatthe illustration in FIG. 2 is provided by way of example, and not by wayof limitation. In this regard, there is no limit to how far in advanceof t₁ that the transmission power is reduced to the threshold level 202or the rate at which the transmission power is reduced. Accordingly, itwill be appreciated that the rate and timing of power modulation canvary in different implementations so long as the transmission power isreduced to the threshold level 202 in advance of t₁.

The transmission power of the aggressor transmission 204 can becontrolled during the reception 206 such that it does not exceed thethreshold level 202. In this regard, the transmission power during thereception 206 can, for example, be controlled such that the transmissionpower remains substantially constant at threshold level 202.Alternatively, the transmission power can vary during the reception 206,but can be constrained so that it does not exceed threshold level. Asthe transmission 204 concludes prior to time t₁ when the reception 206concludes, the transmission power of the aggressor transmission 204 canbe controlled to not exceed the threshold level 202 from prior to timet₁ until conclusion of the aggressor transmission 204.

As the aggressor transmission 208 coincides with the data reception 210,the transmission power of the transmission 208 can be reduced to thethreshold level 202 prior to time t₃ when the reception 210 via thevictim technology is scheduled to begin. The transmission power of theaggressor transmission 204 can be controlled during the reception 210such that it does not exceed the threshold level 202. As the aggressortransmission 208 continues following time t₄ when the reception 210concludes, the transmission power of the transmission 208 can beincreased to a level exceeding the threshold level 202 following t₄. Thetransmission power can, for example, be increased to the same level aswas used prior to the transmission power being reduced in advance of t₃.However, it will be appreciated that in instances in which thetransmission power of a transmission 208 is increased subsequent to t₃,it can be increased to any level, including a level different from thatused prior to the transmission power being reduced in advance of t₃. Itwill be further appreciated that at the illustration in FIG. 2 isprovided by way of example, and not by way of limitation. As such, itwill be noted that the timing and rate of the increase in transmissionpower following t₄ can vary in different implementations.

Aggressor transmission 212 does not coincide with a victim technologyreception period. As such, a transmission power exceeding thresholdlevel 202 can be used for the duration of aggressor transmission 212.

FIG. 3 illustrates an example transmission power waveform in accordancewith some example embodiments. In this regard, FIG. 3 illustrates anexample modulation of transmission power of an aggressor transmission inresponse to an overlapping reception period for a victim technology inaccordance with some example embodiments. For example, the transmissionpower waveform of FIG. 3 can be applied to the transmission power ofaggressor transmission 208 illustrated in FIG. 2.

As illustrated in FIG. 3, the transmission power can be reduced from anunmodulated power level 302 to a threshold power level 304 in advance oftime t₁, which can coincide with the start of a reception period for avictim technology. It will be appreciated that the illustration in FIG.3 is provided by way of example, and not by way of limitation. In thisregard, there is no limit to how far in advance of t₁ that thetransmission power is reduced to the threshold power level 304 or therate at which the transmission power is reduced. Accordingly, it will beappreciated that the rate and timing of power modulation can vary indifferent implementations so long as the transmission power is reducedto the threshold level 304 in advance of t₁. After reduction to thethreshold power level 304, the transmission power can be controlled suchthat it does not exceed the threshold power level 304 until after timet₂, which can coincide with the conclusion of the reception period forthe victim technology. After t₂, the transmission power can be increasedto a level exceeding the threshold power level 304, and can, forexample, be returned to the unmodulated power level 302. It will beappreciated that the timing, rate, and level of transmission powerincrease illustrate din FIG. 3 following t₂ is illustrated by way ofexample, and not by way of limitation.

Some example embodiments provide for increasing power amplifierlinearity in addition to or in alternative to transmission powermodulation in order to facilitate in-device coexistence between wirelesscommunication technologies. In this regard, such example embodimentsprovide for adjusting an operational parameter of a power amplifierapplied to a transmission emitted via an aggressor technology toincrease a linearity of the power amplifier during a scheduled timeperiod in which data is received by a victim technology. For example,some such example embodiments provide for adjusting a bias currentapplied to the power amplifier in order to increase linearity. Byincreasing linearity of a power amplifier during a victim technologyreception period, victim technology desense that can be caused by OOBinterference and harmonics interference can be prevented.

Having now introduced aspects of various embodiments, severalembodiments will now be described in more detail. Referring now to FIG.4, FIG. 4 illustrates a block diagram of a mobile communication device400 in accordance with some example embodiments. The mobilecommunication device 400 can be any device capable of communicating viamultiple wireless communication technologies. By way of non-limitingexample, the mobile communication device 400 can be a mobile phone,tablet computing device, laptop computer, or other computing deviceadapted to communicate via multiple wireless communication technologies.It will be appreciated that the components, devices or elementsillustrated in and described with respect to FIG. 4 below may not bemandatory and thus some may be omitted in certain embodiments.Additionally, some embodiments can include further or differentcomponents, devices or elements beyond those illustrated in anddescribed with respect to FIG. 4.

In some example embodiments, the mobile communication device 400 caninclude processing circuitry 410 that is configurable to perform actionsin accordance with one or more example embodiments disclosed herein. Inthis regard, the processing circuitry 410 can be configured to performand/or control performance of one or more functionalities of the mobilecommunication device 400 in accordance with various example embodiments,and thus can provide means for performing functionalities of the mobilecommunication device 400 in accordance with various example embodiments.The processing circuitry 410 may be configured to perform dataprocessing, application execution and/or other processing and managementservices according to one or more example embodiments. In someembodiments, the mobile communication device 400 or a portion(s) orcomponent(s) thereof, such as the processing circuitry 410, can includeone or more chips, or one or more chipsets. The processing circuitry 410and/or one or more further components of the mobile communication device400 can therefore, in some instances, be configured to implement anembodiment on a single chip or chipset.

In some example embodiments, the processing circuitry 410 can include aprocessor 412 and, in some embodiments, such as that illustrated in FIG.2, can further include memory 414. The processing circuitry 410 can bein communication with or otherwise control an aggressor technologytransceiver 416, victim technology transceiver 418, aggressor technologycontrol module 420, and/or victim technology control module 422.

The processor 412 can be embodied in a variety of forms. For example,the processor 412 can be embodied as various processing means such as amicroprocessor, a coprocessor, a controller or various other computingor processing devices including integrated circuits such as, forexample, an ASIC (application specific integrated circuit), an FPGA(field programmable gate array), some combination thereof, or the like.Although illustrated as a single processor, it will be appreciated thatthe processor 412 can comprise a plurality of processors. The pluralityof processors can be in operative communication with each other and canbe collectively configured to perform one or more functionalities of themobile communication device 400 as described herein. In some exampleembodiments, the processor 412 can be configured to execute instructionsthat can be stored in the memory 414 or that can be otherwise accessibleto the processor 412. As such, whether configured by hardware or by acombination of hardware and software, the processor 412 capable ofperforming operations according to various embodiments while configuredaccordingly.

In some example embodiments, the memory 414 can include one or morememory devices. Memory 414 can include fixed and/or removable memorydevices. In some embodiments, the memory 414 can provide anon-transitory computer-readable storage medium that can store computerprogram instructions that can be executed by the processor 412. In thisregard, the memory 414 can be configured to store information, data,applications, instructions and/or the like for enabling the mobilecommunication device 400 to carry out various functions in accordancewith one or more example embodiments. In some embodiments, the memory414 can be in communication with one or more of the processor 412,aggressor technology transceiver 416, victim technology transceiver 418,aggressor technology control module 420, or victim technology controlmodule 422 via a bus(es) for passing information among components of themobile communication device 400.

The mobile communication device 400 can further include a plurality oftransceivers. Each such transceiver can be configured to enable themobile communication device 400 to communicate via a particular wirelesscommunication technology. In the example of FIG. 4, an aggressortechnology transceiver 416 and victim technology transceiver 418 areillustrated. The aggressor technology transceiver 416 and victimtechnology transceiver 418 can each support any wireless communicationtechnology. Transmissions via an aggressor technology supported by theaggressor technology transceiver 416 at a power level exceeding athreshold level defined in accordance with various embodiments thatoverlap with data reception via a victim technology supported by thevictim technology transceiver 418 can impact the data reception via thevictim technology. In some example embodiments, the aggressor technologytransceiver 416 can be a cellular transceiver. For example, theaggressor technology transceiver 416 can be configured to supportcommunication via a Long Term Evolution (LTE) cellular communicationtechnology, a Universal Mobile Telecommunications System (UMTS) cellularcommunication technology, a Global System for Mobile Communications(GSM) cellular communication technology, a Code Division Multiple Access(CDMA) cellular communication technology, or a CDMA 2000 cellularcommunication technology, and/or the like. In some example embodiments,the victim technology transceiver can be a transceiver supporting acommunications technology using an ISM band, such as Bluetooth, Zigbee,or other wireless personal area network (PAN) technology; Wi-Fi or otherwireless local area network (LAN) communication technology; or otherwireless communication technology using an ISM band. It will beappreciated, however, that embodiments are not limited to facilitatingcellular and ISM band coexistence, as some embodiments can facilitatein-device coexistence between any two disparate wireless communicationtechnologies. For example, in some embodiments, the aggressor technologytransceiver 416 can support a first cellular communication technologyand the victim technology transceiver 418 can support a second cellularcommunication technology. As a further alternative example, in someembodiments, the aggressor technology transceiver 416 can support afirst wireless communication technology using an ISM band and the victimtechnology transceiver 418 can support a second wireless communicationtechnology using an ISM band.

The mobile communication device 400 can further include aggressortechnology control module 420, which can be configured to interface withand/or otherwise control operation of the aggressor technologytransceiver 416. The aggressor technology control module 420 can beembodied as various means, such as circuitry, hardware, a computerprogram product comprising computer readable program instructions storedon a computer readable medium (for example, the memory 414) and executedby a processing device (for example, the processor 412), or somecombination thereof. In some embodiments, the processor 412 (or theprocessing circuitry 410) can include, or otherwise control theaggressor technology control module 420.

The mobile communication device 400 can additionally include victimtechnology control module 422, which can be configured to interface withand/or otherwise control operation of the victim technology transceiver418. The victim technology control module 422 can be embodied as variousmeans, such as circuitry, hardware, a computer program productcomprising computer readable program instructions stored on a computerreadable medium (for example, the memory 414) and executed by aprocessing device (for example, the processor 412), or some combinationthereof. In some embodiments, the processor 412 (or the processingcircuitry 410) can include, or otherwise control the victim technologycontrol module 422.

In some example embodiments, the aggressor technology control module 420and victim technology control module 422 can be configured tocommunicate with each other via an interface 424. In this regard, theinterface 424 can enable the victim technology control module 422 tosend a message to the aggressor technology control module that caninclude an indication of a scheduled time period during which data isreceived by the victim technology transceiver 418 so that the aggressortechnology control module 420 can reduce a transmission power of atransmission via the aggressor technology transceiver 416 and/orincrease a linearity of a power amplifier(s) applied to the transmissionsuch that the transmission does not inhibit data reception by the victimtechnology transceiver 418. In some example embodiments, the interface424 can be a direct interface between the aggressor technology controlmodule 420 and victim technology control module 422. However, it will beappreciated that embodiments are not so limited. In this regard, theinterface 424 can be an interface having a route through one or oreother modules or components of the mobile communication device 400(potentially including one or more modules or components that are notillustrated in FIG. 4). For example, the interface 424 can interface theaggressor technology control module 420 and victim technology controlmodule 422 indirectly via the processing circuitry 410. In some exampleembodiments in which the victim technology is Bluetooth, the interface424 can be implemented as a Wireless Coexistence Interface 2 (WCI-2)interface, which can be extended in accordance with one or moreembodiments to support a message from the victim technology controlmodule 422 to the aggressor technology control module 420 including anindication of a time period during which data is received via the victimtechnology.

As discussed, in some example embodiments, the components illustrated inFIG. 4 can form one or more chipsets. FIG. 5 illustrates interfacedchipsets configured to facilitate in-device coexistence between wirelesscommunication technologies in accordance with some such exampleembodiments. In the example of FIG. 5, an aggressor technology chipset502 can include aggressor technology transceiver 504, aggressortechnology control module 506, and interface component 508. Aggressortechnology transceiver 504 can, for example, be an embodiment ofaggressor technology transceiver 416. Aggressor technology controlmodule 506 can, for example, be an embodiment of aggressor technologycontrol module 420. The interface component 508 can enable coupling ofthe aggressor technology chipset 502 to the victim technology chipset512 via interface 520 between the aggressor technology chipset 502 andthe victim technology chipset 512. The interface 520 can, for example,be an embodiment of the interface 424. The aggressor technology chipset502 can be a chipset configured to support communication via aparticular wireless communication technology, which can be implementedon, or otherwise operably coupled to a computing device, such as themobile communication device 400, to enable the computing device toengage in wireless communications via the wireless communicationtechnology supported by the aggressor technology chipset 502. Thus, forexample, in embodiments in which the aggressor technology chipset 502comprises a cellular chipset, the aggressor technology chipset 502 canenable a device to engage in cellular communications when implemented onthe device.

The victim technology chipset 512 can include victim technologytransceiver 514, victim technology control module 516, and interfacecomponent 518. Victim technology transceiver 514 can, for example, be anembodiment of victim technology transceiver 418. Victim technologycontrol module 516 can, for example, be an embodiment of victimtechnology control module 422. The interface component 518 can enablecoupling of the victim technology chipset 512 to the aggressortechnology chipset 502 via interface 520. The victim technology chipset512 can be a chipset configured to support communication via aparticular wireless communication technology, which can be implementedon, or otherwise operably coupled to a computing device, such as themobile communication device 400, to enable the computing device toengage in wireless communications via the wireless communicationtechnology supported by the victim technology chipset 512. Thus, forexample, in embodiments in which the victim technology chipset 512comprises a Bluetooth chipset, the aggressor technology chipset 502 canenable a device to engage in Bluetooth communications when implementedon the device.

It will be appreciated that embodiments other than those in separatechipsets are used for the aggressor technology and the victim technologyare contemplated within the scope of the disclosure. For example, insome example embodiments, both the aggressor technology and the victimtechnology can be supported by the same chip or chipset. In suchembodiments, the both the aggressor technology control module 420 andvictim technology control module 422 can be co-located on a single chipor chipset. Thus, for example, some example embodiments can beimplemented on a single chip or chipset configured to provide bothcellular and Bluetooth communication functionality.

FIG. 6 illustrates an example system 600 in which some exampleembodiments can be implemented to facilitate in-device coexistencebetween wireless communication technologies. The system 600 can includea mobile communication device 602, which can, for example, be anembodiment of mobile communication device 400. In some exampleembodiments, the mobile communication device 602 can include aggressortechnology chipset 502 and victim technology chipset 512. The mobilecommunication device 602 can be configured to engage in cellularcommunications, which can be supported by a base transceiver station604. For example, the mobile communication device 602 can be configuredto engage in communication via a Long Term Evolution (LTE) cellularcommunication technology, a Universal Mobile Telecommunications System(UMTS) cellular communication technology, a Global System for MobileCommunications (GSM) cellular communication technology, a Code DivisionMultiple Access (CDMA) cellular communication technology, or a CDMA 2000cellular communication technology, and/or other cellular communicationtechnology. The mobile communication device 602 can be furtherconfigured to engage in communications via an ISM band technology. Thus,for example, the mobile communication device 602 can engage in wirelesscommunications with a device 608 via an ISM band network 606. Forexample, in embodiments in which the ISM band network 606 is a Bluetoothnetwork, the device 608 can be a Bluetooth headset or other Bluetoothdevice that can be interfaced with a mobile communication device.

In context of the system 600, various embodiments, including at leastsome of those described further herein below can be implemented on themobile communication device 602 to control the transmission power ofcellular transmissions sent by the mobile communication device 602 tothe base transceiver station 604 during periods in which the mobilecommunication device 602 is scheduled to receive data sent by the device608 via the ISM band network 606 so that data receipt via the ISM bandtechnology is not impacted by the cellular transmissions. Additionallyor alternatively, at least some embodiments described herein below canbe implemented on the mobile communication device 602 to increaselinearity of a power amplifier(s) applied to a cellular transmissionsent by the mobile communication device 602 to the base transceiverstation 604 during periods in which the mobile communication device 602is scheduled to receive data sent by the device 608 via the ISM bandnetwork 606 so that data receipt via the ISM band technology is notimpacted by the cellular transmissions. It will be appreciated, however,that system 600 is provided merely by way of example. In this regard, aspreviously noted, some example embodiments facilitate in-device wirelesscommunication technology coexistence scenarios other than cellular andISM band coexistence.

Having now described example devices and components that can implementvarious embodiments disclosed herein and an example system in which someexample embodiments can be implemented, several example embodiments willbe described in additional detail with reference to the componentsdescribed in FIGS. 4 and 5. Further, some example embodiments will bedescribed by way of example with respect to the system 600 illustratedin FIG. 6.

The victim technology control module 422 of some example embodiments canbe configured to determine one or more scheduled time periods duringwhich data is received via the victim technology and for which actionshould be taken to reduce interference from transmissions via theaggressor technology. In this regard, for example, the victim technologycontrol module 422 of some such example embodiments can be configured todetermine one or more scheduled time periods during which data isreceived via the victim technology and for which a transmission powerassociated with a transmission via the aggressor technology should bereduced. Additionally or alternatively, the victim technology controlmodule 422 of some such example embodiments can be configured todetermine one or more scheduled time periods during which data isreceived via the victim technology and for which linearity of a poweramplifier(s) that can be applied to a transmission via the aggressortechnology should be increased. The scheduled time periods can bededicated time slots or other periods during which data is scheduled tobe received via the victim technology. The scheduled time periods can,for example, be negotiated between the mobile communication device 400and another device with which the mobile communication device 400 can becommunicating via the victim technology, such as by way of non-limitingexample, the device 608. In some embodiments, communication via thevictim technology can include communication over a synchronousconnection using synchronized scheduled time slots. For example, inembodiments in which the victim technology is Bluetooth, communicationcan be over a synchronous connection oriented (SCO) link or an enhancedSCO (eSCO) link having a set of reserved timeslots scheduled for datareception. Accordingly, the victim technology control module 422 can beconfigured to determine a scheduled time slot during which data isreceived via the victim technology based on a known schedule that can beestablished upon link setup, negotiated with another device, and/or thelike.

The victim technology control module 422 can be further configured toformat a message including an indication of a scheduled time period(s)during which data is received via the victim technology. In this regard,the message can indicate a period(s) for which a transmission powerassociated with a transmission via the aggressor technology should bereduced and/or for which a linearity of a power amplifier(s) that can beapplied to a transmission via the aggressor technology should beincreased. The indication of a scheduled time period can be anyinformation that can enable the aggressor technology control module 420to identify a starting time and an ending time of a victim technologyreception period. By way of non-limiting example, the indication caninclude a start time, an offset from a present time indicating when areception period is to begin, an end time of the reception period, aduration of a reception period, a time slot identifier, and/or otherinformation to enable the aggressor technology control module 420 toidentify a time period indicated in the message. The victim technologycontrol module 422 can be further configured to send the message to theaggressor technology control module 420 via the interface 424. In thisregard, the message can be sent to request that the aggressor technologycontrol module 420 reduce the transmission power to the threshold levelprior to the scheduled time period(s) and control the transmission powerso that it does not exceed the threshold level during the scheduled timeperiod(s). Additionally or alternatively, the message can be sent torequest that the aggressor technology control module 420 increase alinearity of a power amplifier(s) that can be applied to an aggressortechnology transmission during the scheduled time period(s)

In some example embodiments, a message may only contain an indication ofa single scheduled time period. In this regard, in such exampleembodiments, a message can, for example, be formatted and sent by thevictim technology control module 422 in advance of each scheduled timeperiod for which the aggressor technology transmission power needs to bereduced and/or for which power amplifier linearity needs to beincreased. Additionally or alternatively, in some example embodiments,the victim technology control module 422 can format and send a messageincluding an indication of a plurality of scheduled time periods forwhich the aggressor technology transmission power needs to be reducedand/or for which power amplifier linearity needs to be increased. Inthis regard, the victim technology control module 422 may be aware inadvance of a plurality of scheduled time periods during which data isreceived and for which the aggressor technology transmission power needsto be reduced and/or for which power amplifier linearity needs to beincreased, and can format and send a single message to the aggressortechnology control module 420 that indicates each of the plurality ofscheduled time periods. Accordingly, processing and signaling overheadcan be reduced in such embodiments by using a single message to notifythe aggressor technology control module 420 of multiple scheduled timeperiods. As an example, in some instances, a schedule can be negotiatedor assigned during setup of a communication link using the victimtechnology. In such instances, the victim technology control module 422can send a message notifying the aggressor technology control module 420of known scheduled time periods during which data is received via thevictim technology and for which the victim technology transmission powershould be reduced and/or for which power amplifier linearity should beincreased during or following setup of the victim technologycommunication link on the basis of the known schedule.

The aggressor technology control module 420 can be configured to receivea message sent by the victim technology control module 422 via theinterface 424. The aggressor technology control module 420 can befurther configured to determine a scheduled time period(s) during whichdata is received via the victim technology on the basis of indication(s)included in a received message. In response to the message, theaggressor technology control module 420 can reduce the transmissionpower of an aggressor technology transmission that may be emitted by theaggressor technology transceiver to a threshold level prior to ascheduled time period indicated in the message and control thetransmission power during the scheduled time period so that thetransmission power does not exceed the threshold level. If transmissionvia the aggressor technology is still ongoing following conclusion ofthe scheduled time period, the aggressor technology control module 420can be further configured to increase the transmission power to a levelexceeding the threshold level subsequent to the scheduled time period.

The reduction and control of the transmission power to enable receipt ofdata via the victim technology during a scheduled time period can, forexample, be performed in a manner similar to that illustrated in anddescribed with respect to FIGS. 2 and 3. In some example embodiments,such as that illustrated in FIG. 6 in which the aggressor technology isa cellular technology, the reduction and control of the transmissionpower can, for example, take into account a power control loopconfiguration of the base transceiver station 604.

The threshold level to which transmission power is reduced can beimplementation specific on the basis of the implementation of the mobilecommunication device 400. In this regard, the threshold level may varyon the basis of filters that may be used for the victim technologyand/or for the aggressor technology, a proximity and arrangement of theaggressor technology transceiver 416 and victim technology transceiver418. In some example embodiments, the threshold level can vary on thebasis of actual channel conditions, such as particular channelassignments, packet types, use profile, use case etc, and/or the like.Accordingly, variety of factors can be considered in order to determinethe threshold level that is appropriate to a particular deviceimplementation and channel scenario. In some example embodiments, suchas those in which the threshold level is dependent solely upon channelimplementation, the threshold level can be set and provisioned by adevice manufacturer, network service provider, or the like. Inembodiments in which a threshold level can vary on the basis of channelconditions, the aggressor technology control module and/or victimtechnology control module 422 can be configured to calculate thethreshold level on the basis of existing channel conditions. Suchcalculation can additionally take into account a design implementationof the mobile communication device 400, such as filters that may be usedfor the victim technology and/or for the aggressor technology, aproximity and arrangement of the aggressor technology transceiver 416and victim technology transceiver 418, and/or other deign factors thatcan influence the threshold level.

As such, it will be appreciated that the actual threshold level can varywith implementation and, in some embodiments, can vary on the basis ofexperienced channel conditions, link configuration, and/or the like.However, regardless of the particular implementation, the thresholdlevel can be a power level at which transmission via the aggressortechnology does not inhibit concurrent data reception via the victimtechnology.

The aggressor technology control module 420 can be configured to use anyof a variety of methods to control the transmission power. By way ofexample, in some embodiments, a lookup table may store one or moretransmission power curves specifying a power modulation curve for aparticular time period duration. The aggressor technology control module420 can accordingly be configured in such embodiments to look up anappropriate modulation curve for a given time period during which datais received via the victim technology and can apply the modulationcurve. Additionally or alternatively, in some example embodiments, a lowpass filter can be used to reduce the transmission power. As a furtherexample, in some embodiments, the aggressor technology control module420 can use a series of commands to step down transmission power and, iftransmission power is increased subsequent to conclusion of a victimreception time period, to step up the transmission power. As yet anotherexample, the aggressor technology control module 420 of some embodimentscan be configured to utilize a response time of a digitally controlledpower supply to control the transmission power.

In some example embodiments, transmission power of the aggressortechnology can be reduced each time period during which data is receivedvia the victim technology. Alternatively, in some example embodiments,transmission power can be selectively reduced such that transmissionpower is not reduced for each reception period during which data isreceived via the victim technology. In such embodiments, the victimtechnology control module 422 can selectively determine for a scheduledtime period in which data is received via the victim technology whetherthe transmission power should be reduced. If the victim technologycontrol module 422 determines that transmission power should not bereduced for the scheduled time period, the victim technology controlmodule 422 can determine to not send a message to the aggressortechnology control module 420 that includes an indication of thescheduled time period.

As an example of selective reduction of transmission power for a subsetof scheduled time periods in which data is received via the victimtechnology, the victim technology control module 422 can be configuredin some example embodiments to determine whether data to be receivedsatisfies a threshold priority criterion. If the data received in aparticular time period does not satisfy the threshold prioritycriterion, then the victim technology control module 422 can determinethat the transmission power should not be reduced for that time period.For example, in some example embodiments, control messages, such asmessages relating to connection configuration or link management, can beprioritized over other non-control messages. Accordingly, in suchembodiments, if the victim technology control module 422 determines thata control message is received in a time period, the victim technologycontrol module 422 can determine that transmission power of theaggressor technology should be reduced for that time period. However, ifdata received in a time period is a non-control message (e.g., a simpledata message), the victim technology control module 422 may determinethat the non-control message does not satisfy a threshold prioritycriterion and that transmission power of the aggressor technology shouldnot be reduced for that time period. Control messages can, for example,provide for connection control, including, by way of non-limitingexample, connection establishment, connection detachment, time slotconfiguration, power control, adaptive frequency hopping, channelquality driven data rate change (CQDDR), quality of service control,data rate control, role switching, and/or the like. As a furtherexample, control messages can provide for security measures, such as, byway of non-limiting example, authentication, pairing, link keyestablishment, encryption configuration, and/or the like. In embodimentsin which the victim technology is Bluetooth, a control message caninclude Link Manger Protocol (LMP) messages. If an LMP message isreceived in a time period, then transmission power of an aggressortechnology transmission can be reduced. However, transmission power maynot be reduced for reception of data other than LMP messages.

FIG. 7 illustrates a flowchart according to an example method forperforming transmission power modulation to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments. Operation 710 can include determining ascheduled time period during which data is received via a first wirelesscommunication technology. One or more of processing circuitry 410,processor 412, memory 414, aggressor technology control module 420,victim technology control module 422, aggressor technology chipset 502,and victim technology chipset 512 can, for example, provide means forperforming operation 710. Operation 720 can include reducing atransmission power of a transmission via a second wireless communicationtechnology to a threshold level prior to the scheduled time period.Operation 730 can include controlling the transmission power during thescheduled time period so that the transmission power does not exceed thethreshold level. Operation 740 can include, subsequent to the scheduledtime period, increasing the transmission power to a level exceeding thethreshold level. One or more of processing circuitry 410, processor 412,memory 414, aggressor technology transceiver 416, aggressor technologycontrol module 420, and aggressor technology chipset 502 can, forexample, provide means for performing operations 720-740.

FIG. 8 illustrates a flowchart according to another example method forperforming transmission power modulation to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments. Operation 810 can include receiving, via aninterface (e.g., interface 424), a message sent by a control module fora first wireless communication technology that includes an indication ofa scheduled time period during which data is received via the firstwireless communication technology. One or more of processing circuitry410, processor 412, memory 414, aggressor technology control module 420,and aggressor technology chipset 502 can, for example, provide means forperforming operation 810. Operation 820 can include, in response to themessage, reducing a transmission power of a transmission via a secondwireless communication technology to a threshold level prior to thescheduled time period. Operation 830 can include controlling thetransmission power during the scheduled time period so that thetransmission power does not exceed the threshold level. Operation 840can include, subsequent to the scheduled time period, increasing thetransmission power to a level exceeding the threshold level. One or moreof processing circuitry 410, processor 412, memory 414, aggressortechnology transceiver 416, aggressor technology control module 420, andaggressor technology chipset 502 can, for example, provide means forperforming operations 820-840.

FIG. 9 illustrates a flowchart according to an example method forenabling performance of transmission power modulation to facilitatein-device coexistence between wireless communication technologiesaccording to some example embodiments. Operation 910 can includedetermining a scheduled time period during which data is received via afirst wireless communication technology. Operation 920 can includedetermining that transmission power of a transmission via a secondwireless communication technology should be reduced to a threshold levelduring the scheduled time period. Operation 930 can include sending amessage (e.g., via interface 424) including an indication of the timeperiod to a control module for the second wireless communicationtechnology (e.g., aggressor technology control module 420 or aggressortechnology chipset 502) so that the control module can reduce thetransmission power to the threshold level prior to the scheduled timeperiod. One or more of processing circuitry 410, processor 412, memory414, victim technology control module 422, and victim technology chipset512 can, for example, provide means for performing operations 910-930.

FIG. 10 illustrates a flowchart according to a further example methodfor performing transmission power modulation to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments. Operation 1010 can include determining ascheduled time period during which data is received via a first wirelesscommunication technology. Operation 1020 can include determining whetherdata to be received satisfies a threshold priority criterion. One ormore of processing circuitry 410, processor 412, memory 414, victimtechnology control module 422, and victim technology chipset 512 can,for example, provide means for performing operations 1010-1020.

In an instance in which it is determined at operation 1020 that the datato be received does satisfy a threshold priority criterion, the methodcan further include one or more of operations 1030-1050. Operation 1030can include reducing a transmission power of a transmission via a secondwireless communication technology to a threshold level prior to thescheduled time period. Operation 1040 can include controlling thetransmission power during the scheduled time period so that thetransmission power does not exceed the threshold level. Operation 1050can include, subsequent to the scheduled time period, increasing thetransmission power to a level exceeding the threshold level. One or moreof processing circuitry 410, processor 412, memory 414, aggressortechnology transceiver 416, aggressor technology control module 420, andaggressor technology chipset 502 can, for example, provide means forperforming operations 1030-1050.

If, however, it is determined at operation 1020 that the data to bereceived does not satisfy a threshold priority criterion, the method canfurther include operation 1060. Operation 1060 can include determiningto not reduce transmission power during the scheduled time period. Oneor more of processing circuitry 410, processor 412, memory 414, victimtechnology control module 422, and victim technology chipset 512 can,for example, provide means for performing operation 1060.

In some example embodiments, the aggressor technology control module 420can be configured to adjust an operational parameter of a poweramplifier(s) applied to an aggressor technology transmission to increasea linearity of the power amplifier(s) during a scheduled time periodindicated in a message sent by the victim technology control module 422.In such example embodiments, power amplifier linearity can be increasedin addition to or in lieu of performance of transmission powermodulation. Adjustment of the operational parameter of a power amplifiercan, for example, include adjusting a bias current that can be appliedto a power amplifier in order to increase the linearity of the poweramplifier.

FIG. 11 illustrates examples of current biasing to achieve increasedlinearity of a power amplifier according to some example embodiments. Inthis regard, FIG. 11 illustrates a graph output signal versus inputsignal of an example power amplifier for four example bias currentsranging from a lowest relative bias current 1108 to a highest relativebias current 1114. For each given bias current, a power amplifier canoperate in three given ranges 1102-1106. The range 1102 is a linearrange in which a relatively low input signal is applied to the poweramplifier. Power consumption in the range 1102 can be relatively high,but OOB interference to the victim technology can be relatively low. Therange 1104 can be a non-linear range, which can offer relatively lowpower consumption, but at the expense of relatively high OOBinterference to the victim technology. Range 1106 can be anon-operational range for the example power amplifier. Thus, poweramplifier linearity can be increased with application of a higher biascurrent, but at the expense of greater power consumption.

During periods in which data is not being received via the victimtechnology in situations in which a target transmission power operatingpoint is to be achieved, the example power amplifier of FIG. 11 can beoperated so as to reduce power consumption. In this regard, a biascurrent as low as possible to meet the target transmission poweroperating point can be used. For example, the power amplifier can beoperated in the range 1104 using the bias current 1110 during suchperiods.

In some example embodiments, bias current can be increased during ascheduled time period in which data is received via the victimtechnology to achieve increased power amplifier linearity. In thisregard, an OOB emission mask and/or harmonic energy constraints can bemet by reducing the bias current to increase power amplifier linearity.With reference to FIG. 11, a power amplifier can be operated in therange 1102 using the bias current 1112 or bias current 1114 during ascheduled period in which data is received via the victim technology,even at the expense of higher power consumption.

In some example embodiments, adjustment of a bias current can beperformed in accordance with a power consumption constraint. Thus, forexample, a bias current may not be increased to a highest level due to apower consumption constraint that can limit a bias current level toavoid excessive power consumption. As an example, the bias current 1112can be used rather than the bias current 1114 even though greaterlinearity can be achieved using the bias current 1114 in situations inwhich usage of the bias current 1114 would exceed a power consumptionconstraint. In some such example embodiments, a power amplifier can alsobe operated to ensure that a regulatory emissions mask is met. Further,in some such example embodiments, a power amplifier can be operated tocomply with constraints, such as OOB emissions constraints, that can beimposed by a regulatory body, such as the Federal CommunicationsCommission (FCC).

In some example embodiments, multiple power amplifiers, such as a chainof power amplifiers can be applied to an aggressor technologytransmission. In such example embodiments, an operational parameter ofeach of a plurality of power amplifiers can be adjusted to achieveincreased linearity of multiple power amplifiers during a scheduledperiod in which data is received via the victim technology.

In some example embodiments, an operational parameter of a poweramplifier can be adjusted from an initial state, such as a defaultstate, at a point prior to a scheduled time period. Following thescheduled time period, the operational parameter can be returned to theinitial state. Thus, using the example of FIG. 11, the bias current canbe increased from the bias current 1110 to the bias current 1112 or biascurrent 1114 prior to, or at the start of, a scheduled time period inwhich data is received via the victim technology, and can be returned tothe bias current 1110 at, or following, conclusion of the scheduled timeperiod.

In some example embodiments, power amplifier linearity can be increasedeach time period during which data is received via the victimtechnology. Alternatively, in some example embodiments, power amplifierlinearity can be selectively increased such that power amplifierlinearity is not increased for each reception period during which datais received via the victim technology. In such embodiments, the victimtechnology control module 422 can selectively determine for a scheduledtime period in which data is received via the victim technology whetherthe power amplifier linearity should be increased. If the victimtechnology control module 422 determines that power amplifier linearityshould not be increased for the scheduled time period, the victimtechnology control module 422 can determine to not send a message to theaggressor technology control module 420 that includes an indication ofthe scheduled time period.

As an example of selective increase of power amplifier linearity for asubset of scheduled time periods in which data is received via thevictim technology, the victim technology control module 422 can beconfigured in some example embodiments to determine whether data to bereceived satisfies a threshold priority criterion. If the data receivedin a particular time period does not satisfy the threshold prioritycriterion, then the victim technology control module 422 can determinethat power amplifier linearity should not be increased for that timeperiod. For example, in some example embodiments, control messages, suchas messages relating to connection configuration or link management, canbe prioritized over other non-control messages. Accordingly, in suchembodiments, if the victim technology control module 422 determines thata control message is received in a time period, the victim technologycontrol module 422 can determine that power amplifier linearity shouldbe increased for that time period. However, if data received in a timeperiod is a non-control message (e.g., a simple data message), thevictim technology control module 422 may determine that the non-controlmessage does not satisfy a threshold priority criterion and that poweramplifier linearity should not be increased for that time period.Control messages can, for example, provide for connection control,including, by way of non-limiting example, connection establishment,connection detachment, time slot configuration, power control, adaptivefrequency hopping, channel quality driven data rate change (CQDDR),quality of service control, data rate control, role switching, and/orthe like. As a further example, control messages can provide forsecurity measures, such as, by way of non-limiting example,authentication, pairing, link key establishment, encryptionconfiguration, and/or the like. In embodiments in which the victimtechnology is Bluetooth, a control message can include Link MangerProtocol (LMP) messages. If an LMP message is received in a time period,then power amplifier linearity can be increased. However, poweramplifier linearity may not be increased for reception of data otherthan LMP messages.

FIG. 12 illustrates a flowchart according to an example method forincreasing linearity of a power amplifier to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments. Operation 1210 can include determining ascheduled time period during which data is received via a first wirelesscommunication technology. One or more of processing circuitry 410,processor 412, memory 414, aggressor technology control module 420,victim technology control module 422, aggressor technology chipset 502,and victim technology chipset 512 can, for example, provide means forperforming operation 1210. Operation 1220 can include adjusting anoperational parameter of a power amplifier applied to a transmission viaa second wireless communication technology to increase a linearity ofthe power amplifier during the scheduled time period. In some exampleembodiments, the method of FIG. 12 can further include operation 1230,which can include restoring the operational parameter of the poweramplifier to a previous state following conclusion of the scheduled timeperiod. In this regard, the operational parameter can be restored to aninitial state, such as a default state, that was used prior to theadjustment of operation 1220. One or more of processing circuitry 410,processor 412, memory 414, aggressor technology control module 420, andaggressor technology chipset 502 can, for example, provide means forperforming operations 1220-1230.

FIG. 13 illustrates a flowchart according to another example method forincreasing linearity of a power amplifier to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments. Operation 1310 can include receiving, via aninterface (e.g., interface 424), a message sent by a control module fora first wireless communication technology that includes an indication ofa scheduled time period during which data is received via the firstwireless communication technology. Operation 1320 can include, inresponse to the message, adjusting an operational parameter of a poweramplifier applied to a transmission via a second wireless communicationtechnology to increase a linearity of the power amplifier during thescheduled time period. In some example embodiments, the method of FIG.13 can further include operation 1330, which can include restoring theoperational parameter of the power amplifier to a previous statefollowing conclusion of the scheduled time period. In this regard, theoperational parameter can be restored to an initial state, such as adefault state, that was used prior to the adjustment of operation 1320.One or more of processing circuitry 410, processor 412, memory 414,aggressor technology control module 420, and aggressor technologychipset 502 can, for example, provide means for performing operations1310-1330.

FIG. 14 illustrates a flowchart according to an example method forenabling increasing linearity of a power amplifier to facilitatein-device coexistence between wireless communication technologiesaccording to some example embodiments. Operation 1410 can includedetermining a scheduled time period during which data is received via afirst wireless communication technology. Operation 1420 can includedetermining that a linearity of a power amplifier applied to atransmission from the device via a second wireless communicationtechnology should be increased during the scheduled time period.Operation 1430 can include sending a message (e.g., via interface 424)including an indication of the time period to a control module for thesecond wireless communication technology (e.g., aggressor technologycontrol module 420 or aggressor technology chipset 502) so that thecontrol module can increase the linearity of the power amplifier duringthe scheduled time period. One or more of processing circuitry 410,processor 412, memory 414, victim technology control module 422, andvictim technology chipset 512 can, for example, provide means forperforming operations 1410-1430.

FIG. 15 illustrates a flowchart according to a further example methodfor increasing linearity of a power amplifier to facilitate in-devicecoexistence between wireless communication technologies according tosome example embodiments. Operation 1510 can include determining ascheduled time period during which data is received via a first wirelesscommunication technology. Operation 1520 can include determining whetherdata to be received satisfies a threshold priority criterion. One ormore of processing circuitry 410, processor 412, memory 414, victimtechnology control module 422, and victim technology chipset 512 can,for example, provide means for performing operations 1510-1520.

In an instance in which it is determined at operation 1520 that the datato be received does satisfy a threshold priority criterion, the methodcan proceed to operation 1530, which can include adjusting anoperational parameter of a power amplifier applied to a transmission viaa second wireless communication technology to increase a linearity ofthe power amplifier during the scheduled time period. In some exampleembodiments, the method of FIG. 15 can further include operation 1540,which can include restoring the operational parameter of the poweramplifier to a previous state following conclusion of the scheduled timeperiod. In this regard, the operational parameter can be restored to aninitial state, such as a default state, that was used prior to theadjustment of operation 1530. One or more of processing circuitry 410,processor 412, memory 414, aggressor technology transceiver 416,aggressor technology control module 420, and aggressor technologychipset 502 can, for example, provide means for performing operations1530-1540.

If, however, it is determined at operation 1520 that the data to bereceived does not satisfy the threshold priority criterion, the methodcan proceed to operation 1550 rather than performing operation 1530.Operation 1550 can include determining to not increase the linearity ofthe power amplifier during the scheduled time period.

FIG. 16 illustrates a flowchart according to an example method forincreasing linearity of a power amplifier and performing transmissionpower modulation to facilitate in-device coexistence between wirelesscommunication technologies according to some example embodiments.Operation 1610 can include determining a scheduled time period duringwhich data is received via a first wireless communication technology.One or more of processing circuitry 410, processor 412, memory 414,aggressor technology control module 420, victim technology controlmodule 422, aggressor technology chipset 502, and victim technologychipset 512 can, for example, provide means for performing operation1610. Operation 1620 can include adjusting an operational parameter of apower amplifier applied to a transmission via a second wirelesscommunication technology to increase a linearity of the power amplifierduring the scheduled time period. One or more of processing circuitry410, processor 412, memory 414, aggressor technology control module 420,and aggressor technology chipset 502 can, for example, provide means forperforming operation 1620. Operation 1630 can include reducing atransmission power of a transmission via the second wirelesscommunication technology so that the transmission power does not exceeda threshold level during the scheduled time period. One or more ofprocessing circuitry 410, processor 412, memory 414, aggressortechnology transceiver 416, aggressor technology control module 420, andaggressor technology chipset 502 can, for example, provide means forperforming operation 1630.

The various aspects, embodiments, implementations or features of thedescribed embodiments can be used separately or in any combination.Various aspects of the described embodiments can be implemented bysoftware, hardware or a combination of hardware and software. Thedescribed embodiments can also be embodied as computer readable code ona computer readable medium for controlling manufacturing operations oras computer readable code on a computer readable medium for controllinga manufacturing line. The computer readable medium is any data storagedevice that can store data which can thereafter be read by a computersystem. Examples of the computer readable medium include read-onlymemory, random-access memory, CD-ROMs, HDDs, DVDs, magnetic tape, andoptical data storage devices. The computer readable medium can also bedistributed over network-coupled computer systems so that the computerreadable code is stored and executed in a distributed fashion.

The foregoing description, for purposes of explanation, used specificnomenclature to provide a thorough understanding of the describedembodiments. However, it will be apparent to one skilled in the art thatthe specific details are not required in order to practice the describedembodiments. Thus, the foregoing descriptions of specific embodimentsare presented for purposes of illustration and description. They are notintended to be exhaustive or to limit the described embodiments to theprecise forms disclosed. It will be apparent to one of ordinary skill inthe art that many modifications and variations are possible in view ofthe above teachings.

What is claimed is:
 1. An apparatus comprising: first control circuitrycommunicatively coupled to a first wireless transceiver; second controlcircuitry communicatively coupled to the first control circuitry and toa second wireless transceiver, wherein the first control circuitry isconfigured to: determine a scheduled time period during which the firstwireless transceiver is scheduled to receive data, and send a message tothe second control circuitry requesting that the second controlcircuitry reduce, prior to the scheduled time period, a transmissionpower of the second wireless transceiver such that the transmissionpower is below a threshold level during the scheduled time period whenthe data is scheduled to be received by the first wireless transceiver.2. The apparatus of claim 1, wherein the first wireless transceiver andthe second wireless transceiver are configured to communicate overdifferent wireless connections.
 3. The apparatus of claim 1, wherein thesecond control circuitry is configured to: allow the transmission powerof the second wireless transceiver to exceed the threshold level afterthe scheduled time period.
 4. The apparatus of claim 1, furthercomprising: an interface configured to connect the first controlcircuitry and the second control circuitry, wherein the first controlcircuitry is configured to send the message to the second controlcircuitry via the interface.
 5. The apparatus of claim 1, wherein thetransmission power is reduced at a predetermined time period before thescheduled time period.
 6. The apparatus of claim 1, wherein the secondcontrol circuitry is configured to reduce the transmission power of thesecond wireless transceiver before and during the scheduled time periodwhen the data comprises a control message.
 7. The apparatus of claim 6,wherein the second control circuitry is further configured to allow thetransmission power of the transmission by the second wirelesstransceiver to exceed the threshold level before and during thescheduled time period when the data does not comprise the controlmessage.
 8. The apparatus of claim 1, wherein the first controlcircuitry or the second control circuitry is further configured todetermine the threshold level based on one or more measurements ofcommunication channel conditions.
 9. The apparatus of claim 1, whereinthe first control circuitry or the second control circuitry is furtherconfigured to determine the threshold level based on a proximity of thefirst wireless transceiver with respect to the second wirelesstransceiver.
 10. The apparatus of claim 1, wherein the apparatus isimplemented in a mobile communication device.
 11. A method ofcontrolling transmission power in a wireless device, the methodcomprising: by the wireless device: determining a scheduled time periodduring which the wireless device receives data via a first wirelesstransceiver of the wireless device; and reducing, prior to the scheduledtime period, a transmission power of a second wireless transceiver ofthe wireless device below a threshold level such that the transmissionpower does not exceed the threshold level during the scheduled timeperiod when the data is scheduled to be received by the first wirelesstransceiver.
 12. The method of claim 11, further comprising: allowingthe transmission power of the second wireless transceiver to exceed thethreshold level before and during the scheduled time period when thedata does not comprise a control message.
 13. The method of claim 12,wherein the control message includes at least one of a connectionconfiguration message or a link management message.
 14. The method ofclaim 11, wherein the transmission power of the second wirelesscommunication technology is reduced during a predetermined time intervalbefore the scheduled time period.
 15. The method of claim 14, furthercomprising, after the scheduled time period, allowing the transmissionpower of the second wireless communication technology to exceed thethreshold level.
 16. The method of claim 11, wherein the threshold levelis set by a device manufacturer of the wireless device or a networkservice provider that provides wireless service to the wireless devicevia the second wireless transceiver.
 17. A non-transitory machinereadable medium storing instructions that, when executed by one or moreprocessors in a wireless device, cause the wireless device to performsteps that include: determining a scheduled time period during which afirst wireless transceiver of the wireless device is scheduled toreceive data; communicating a message to a control module of thewireless device, the message providing an indication of the scheduledtime period and a request to reduce, prior to the scheduled time period,a transmission power of a second wireless transceiver of the wirelessdevice such that the transmission power is below a threshold levelduring the scheduled time period; and reducing the transmission power ofthe second wireless transceiver prior to the scheduled time period. 18.The non-transitory machine readable medium of claim 17, wherein thecontrol module reduces the transmission power of the second wirelesstransceiver based on a look-up table that specifies a power modulationcurve to use during the scheduled time period.
 19. The non-transitorymachine readable medium of claim 17, wherein the transmission power ofthe second wireless transceiver is reduced at least in part by modifyinga low pass filter of the second wireless transceiver.
 20. Thenon-transitory machine readable medium of claim 17, wherein the controlmodule controls the transmission power of the second wirelesstransceiver by adjusting a response time of a digitally controlled powersupply of the wireless device.