Feedback to support restrictive reuse

ABSTRACT

The scheduler in a base station needs CQI information from a terminal for all reuse sets every 5 ms. to decide on which re-use set to schedule a given terminal. For MIMO users, the problem is that the CQI cannot be reconstructed for all re-use sets, using the current design. Solution: (1) For Multiple Code Word MIMO users, a MIMO VCQI connection layer message enables the base station to reconstruct the MIMO-CQI for all reuse sets on a packet-by-packet basis. This will enable dynamic scheduling (RESTRICTIVE REUSE) gains. (2) For Single Code Word users, dynamic RESTRICTIVE REUSE can be obtained by changing the CQI reporting format, and also sending a MIMO-VCQI connection layer message. (3) For Single Code Word design, quasi-static scheduling gains can be obtained by sending a MIMO-VCQI connection layer message.

REFERENCE TO CO-PENDING APPLICATIONS FOR PATENT

The present Application for Patent is related to the followingco-pending U.S. Patent Application: “Restrictive Reuse Set Management”filed Dec. 22, 2004, Attorney Docket number 040756, assigned to theassignee hereof, and expressly incorporated by reference herein.

The present Application for Patent is related to the followingco-pending U.S. Patent Application: “Restrictive Reuse For A WirelessCommunication System” filed Jun. 18, 2004, Ser. No.10/871,084, assignedto the assignee hereof, and expressly incorporated by reference herein.

BACKGROUND

I. Field

The present invention relates generally to communications and morespecifically to data transmission in a wireless multiple-accesscommunication system.

II. Background

A wireless multiple-access system can concurrently support communicationfor multiple wireless terminals on the forward and reverse links. Theforward link (or downlink) refers to the communication link from basestations to terminals, and the reverse link (or uplink) refers to thecommunication link from terminals to base stations. Multiple terminalsmay simultaneously transmit data on the reverse link and/or receive dataon the forward link. This may be achieved by multiplexing the datatransmissions on each link to be orthogonal to one another in time,frequency, and/or code domain. The orthogonality ensures that the datatransmission for each terminal does not interfere with the datatransmissions for other terminals.

A multiple-access system typically has many cells, where the term “cell”can refer to a base station and/or its coverage area depending on thecontext in which the term is used. Data transmissions for terminals inthe same cell may be sent using orthogonal multiplexing to avoid“intra-cell” interference. However, data transmissions for terminals indifferent cells may not be orthogonalized, in which case each terminalwould observe “inter-cell” interference from other cells. The inter-cellinterference may significantly degrade performance for certaindisadvantaged terminals observing high levels of interference.

To combat inter-cell interference, a wireless system may employ afrequency reuse scheme whereby not all frequency bands available in thesystem are used in each cell. For example, a system may employ a 7-cellreuse pattern and a reuse factor of K=7. For this system, the overallsystem bandwidth W is divided into seven equal frequency bands, and eachcell in a 7-cell cluster is assigned one of the seven frequency bands.Each cell uses only one frequency band, and every seventh cell reusesthe same frequency band. With this frequency reuse scheme, the samefrequency band is only reused in cells that are not adjacent to eachother, and the inter-cell interference observed in each cell is reducedrelative to the case in which all cells use the same frequency band.However, a large reuse factor represents inefficient use of theavailable system resources since each cell is able to use only afraction of the overall system bandwidth. More precisely, each cell isable to use only a reciprocal of the reuse factor, i.e., 1/K.

Active set based restricted frequency hopping (ASBR) reduces inter-cellinterference in an OFDMA based system. ASBR is a global frequencyplanning scheme that takes into account the channel and interferencemeasured by users. The key idea behind ASBR is to intelligently deployfrequency reuse for selected users based on their channel qualities. InCDMA systems, active set has been defined for each user for handoffpurposes. Sectors in the active set of a user usually contribute mostinterference to this user's reception on FL and being interfered mostseverely by this user's transmission on RL. Avoiding interference fromsectors in a user's active set is expected to reduce the interference onboth FL and RL. Simulations and analysis have shown that the frequencyreuse assignment algorithm based on a user's active set yields a 3.5 dBsignal-to-interference and noise ratio (SINR) improvement with 25%bandwidth partial loading.

There is therefore a need in the art for techniques to provide feedbackto a base station from a terminal to reduce inter-cell interference in amore efficient manner.

SUMMARY

In an aspect, a method of providing feedback to support restrictivereuse in a single-input single-output (SISO) system comprises sending aquality indicator for a non-restrictive reuse set and sending a vectoredquality indicator for reuse sets other than the non-restrictive reuseset.

In another aspect, a method of providing feedback to support restrictivereuse in a multiple code word (MCW) multiple-input multiple-output(MIMO) system comprises sending a quality indicator for anon-restrictive reuse set, and sending a vectored quality indicator forat least two reuse sets other than the non-restrictive reuse set for alllayers.

In another aspect, a method of providing feedback to support restrictivereuse in a single code word (SCW) multiple-input multiple-output (MIMO)system comprises sending a quality indicator for a non-restrictive reuseset, and sending a vectored quality indicator for all reuse sets otherthan the non-restrictive reuse set for all layers.

In yet another aspect, a method of providing feedback to supportrestrictive reuse in a single code word (SCW) multiple-inputmultiple-output (MIMO) system comprises sending a quality indicator fora reuse set with an optimum quality indicator for each layer, andsending a vectored quality indicator for all reuse sets for all layers.

In an aspect, an apparatus for wireless communications comprises meansfor sending a quality indicator for a non-restrictive reuse set, andmeans for sending a vectored quality indicator for reuse sets other thanthe non-restrictive reuse set.

In another aspect, an apparatus for wireless communications comprises acontroller operative to sending a quality indicator for anon-restrictive reuse set, and sending a vectored quality indicator forreuse sets other than the non-restrictive reuse set.

In another aspect, a controller in a wireless device operative tosending a quality indicator for a non-restrictive reuse set, and sendinga vectored quality indicator for reuse sets other than thenon-restrictive reuse set.

In yet another aspect, a readable media embodying a method for wirelesscommunications comprises sending a quality indicator for anon-restrictive reuse set, and sending a vectored quality indicator forreuse sets other than the non-restrictive reuse set.

Various aspects and embodiments of the invention are described infurther detail below.

BRIEF DESCRIPTION OF THE DRAWINGS

The features and nature of the present invention will become moreapparent from the detailed description set forth below when taken inconjunction with the drawings in which like reference charactersidentify correspondingly throughout and wherein:

FIG. 1 shows a wireless multiple-access communication system;

FIGS. 2A and 2B show a sectorized cell and its model, respectively;

FIG. 3 shows an exemplary multi-cell layout with 3-sector cells;

FIG. 4 shows three overlapping forbidden sets for three sectors;

FIGS. 5A through 5D show four unrestricted and restricted sets for asector;

FIG. 6 shows an example for forming three forbidden subband sets;

FIGS. 7A through 7D show a distribution of four users in a cluster ofseven sectors and non-interference patterns for three of the users;

FIG. 8 shows a process for allocating subbands to users with restrictivereuse;

FIG. 9 shows a block diagram of a transmitting entity; and

FIG. 10 shows a block diagram of a receiving entity.

FIG. 11 shows an embodiment for the SISO-VCQI Reporting for restrictivereuse;

FIG. 12 illustrates an embodiment of the of the MISO-VCQI reporting forrestrictive reuse;

FIG. 13 shows an embodiment of Condition Number vs. CQI EstimationError;

FIG. 14 shows a method for MIMO-VCQI reporting for restrictive reuse;

FIGS. 15 illustrates CDF of MIMO for flat-fading channel;

FIG. 16 shows MIMO-VCQI reporting for restrictive reuse; and

FIG. 17 illustrates the MISO-VCQI (static) reporting for staticrestrictive reuse and fast-CQI reporting for SCE design.

DETAILED DESCRIPTION

The word “exemplary” is used herein to mean “serving as an example,instance, or illustration.” Any embodiment or design described herein as“exemplary” is not necessarily to be construed as preferred oradvantageous over other embodiments or designs.

Techniques to efficiently avoid or reduce interference from stronginterferers in a wireless communication system are described herein. Astrong interferer to a given user u may be a base station (on theforward link) or another user (on the reverse link). User u may also bea strong interferer to other users. A strong interference entity foruser u may be a strong interferer causing high interference to user uand/or a strong interference observing high interference from or due touser u. Strong interference entities (or interferers/interferees, orsimply, interferers/ees) for each user may be identified as describedbelow. Users are allocated system resources (e.g., frequency subbands)that are orthogonal to those used by their strong interferers/ees andthus avoid interfering with one another. These techniques are called“restrictive reuse” techniques and may be used for various wirelesssystems and for both the forward and reverse links.

In an embodiment of restrictive reuse, each cell/sector is assigned (1)a set of usable subbands that may be allocated to users in thecell/sector and (2) a set of forbidden subbands that are not allocatedto the users in the cell/sector. The usable set and the forbidden setfor each cell/sector are orthogonal to one other. The usable set foreach cell/sector also overlaps the forbidden set for each neighboringcell/sector. A given user u in a cell/sector x may be allocated subbandsin the usable set for that cell/sector. If user u observes (or causes)high level of interference from (to) a neighboring cellsector y, thenuser u may be allocated subbands from a “restricted” set that containssubbands included in both the usable set for cell/sector x and theforbidden set for cell/sector y. User u would then observe (cause) nointerference from (to) cell/sector y since the subbands allocated touser u are members of the forbidden set not used by cell/sector y. Thesubband restriction may be extended to avoid interference from multipleneighboring cells/sectors.

FIG. 1 shows a wireless multiple-access communication system 100. System100 includes a number of base stations 110 that support communicationfor a number of wireless terminals 120. A base station is a station usedfor communicating with the terminals and may also be referred to as anaccess point (AP), a Node B, or some other terminology. Terminals 120are typically dispersed throughout the system, and each terminal may befixed or mobile. A terminal may also be referred to as an accessterminal (AT), mobile station, a user equipment (UE), a wirelesscommunication device, or some other terminology. Each terminal maycommunicate with one or possibly multiple base stations on the forwardand reverse links at any given moment.

Communication systems are widely deployed to provide variouscommunication services such as voice, packet data, and so on. Thesesystems may be time, frequency, and/or code division multiple-accesssystems capable of supporting communication with multiple userssimultaneously by sharing the available system resources. Examples ofsuch multiple-access systems include Code Division Multiple Access(CDMA) systems, Multiple-Carrier CDMA (MC-CDMA), Wideband CDMA (W-CDMA),High-Speed Downlink Packet Access (HSDPA), Time Division Multiple Access(TDMA) systems, Frequency Division Multiple Access (FDMA) systems, andOrthogonal Frequency Division Multiple Access (OFDMA) systems.

For a centralized architecture, a system controller 130 couples to thebase stations and provides coordination and control for these basestations. For a distributed architecture, the base stations maycommunicate with one another as needed, e.g., to serve a terminal,coordinate usage of system resources, and so on.

FIG. 2A shows a cell 210 with three sectors. Each base station providescommunication coverage for a respective geographic area. The coveragearea of each base station may be of any size and shape and is typicallydependent on various factors such as terrain, obstructions, and so on.To increase capacity, the base station coverage area may be partitionedinto three sectors 212 a, 212 b, and 212 c, which are labeled as sectors1, 2, and 3, respectively. Each sector may be defined by a respectiveantenna beam pattern, and the three beam patterns for the three sectorsmay point 120° from each other. The size and shape of each sector aregenerally dependent on the antenna beam pattern for that sector, and thesectors of the cell typically overlap at the edges. A cellsector may notbe a contiguous region, and the cell/sector edge may be quite complex.

FIG. 2B shows a simple model for sectorized cell 210. Each of the threesectors in cell 210 is modeled by an ideal hexagon that approximates theboundary of the sector. The coverage area of each base station may berepresented by a clover of three ideal hexagons centered at the basestation.

Each sector is typically served by a base transceiver subsystem (BTS).In general, the term “sector” can refer to a BTS and/or its coveragearea, depending on the context in which the term is used. For asectorized cell, the base station for that cell typically includes theBTSs for all sectors of that cell. For simplicity, in the followingdescription, the term “base station” is used generically for both afixed station that serves a cell and a fixed station that serves asector. A “serving” base station or “serving” sector is one with which aterminal communicates. The terms “terminal” and “user” are also usedinterchangeably herein.

The restrictive reuse techniques may be used for various communicationsystems. For clarity, these techniques are described for an OrthogonalFrequency Division Multiple Access (OFDMA) system that utilizesorthogonal frequency division multiplexing (OFDM). OFDM effectivelypartitions the overall system bandwidth into a number of (N) orthogonalfrequency subbands, which are also referred to as tones, sub-carriers,bins, frequency channels, and so on. Each subband is associated with arespective sub-carrier that may be modulated with data.

In the OFDMA system, multiple orthogonal “traffic” channels may bedefined whereby (1) each subband is used for only one traffic channel inany given time interval and (2) each traffic channel may be assignedzero, one, or multiple subbands in each time interval. A traffic channelmay be viewed as a convenient way of expressing an assignment ofsubbands for different time intervals. Each terminal may be assigned adifferent traffic channel. For each sector, multiple data transmissionsmay be sent simultaneously on multiple traffic channels withoutinterfering with one another.

The OFDMA system may or may not use frequency hopping (FH). Withfrequency hopping, a data transmission hops from subband to subband in apseudo-random manner, which can provide frequency diversity and otherbenefits. For a frequency hopping OFDMA (FH-OFDMA) system, each trafficchannel may be associated with a specific FH sequence that indicates theparticular subband(s) to use for that traffic channel in each timeinterval (or hop period). The FH sequences for different trafficchannels in each sector are orthogonal to one another so that no twotraffic channels use the same subband in any given hop period. The FHsequences for each sector may also be pseudo-random with respect to theFH sequences for neighboring sectors. These properties for the FHsequences minimize intra-sector interference and randomize inter-sectorinterference.

In the OFDMA system, users with different channel conditions may bedistributed throughout the system. These users may have differentcontribution and tolerance to inter-sector interference. The channelcondition for each user may be quantified by a signal quality metric,which may be defined by a signal-to-interference-and-noise ratio (SINR),a channel gain, a received pilot power, and/or some other quantitymeasured for the user's serving base station, some other measurements,or any combination thereof. A weak user has a relatively poor signalquality metric (e.g., a low SINR) for its serving base station, e.g.,due to a low channel gain for its serving base station and/or highinter-sector interference. A weak user may in general be locatedanywhere within a sector but is typically located far away from theserving base station. In general, a weak user is less tolerant tointer-sector interference, causes more interference to users in othersectors, has poor performance, and may be a bottleneck in a system thatimposes a fairness requirement.

Restrictive reuse can avoid or reduce interference observed/caused byweak users. This may be achieved by determining the likely sources ofhigh inter-sector interference (or strong interferers) and/or the likelyvictims of high inter-sector interference (or strong interferees) forthe weak users. The strong interferers may be base stations (on theforward link) and/or users (on the reverse link) in neighboring sectors.The strong interferees may be users in neighboring sectors. In any case,the weak users are allocated subbands that are orthogonal to those usedby the strong interferers/ees.

In an embodiment of restrictive reuse, each sector x is assigned ausable subband set (denoted as Ux) and a forbidden or unused subband set(denoted as Fx). The usable set contains subbands that may be allocatedto the users in the sector. The forbidden set contains subbands that arenot allocated to users in the sector. The usable set and the forbiddenset for each sector are orthogonal or disjoint in that no subband isincluded in both sets. The usable set for each sector also overlaps theforbidden set for each neighboring sector. The forbidden sets formultiple neighboring sectors may also overlap. The users in each sectormay be allocated subbands from the usable set as described below.

Restrictive reuse may be used for systems composed of unsectorized cellsas well as systems composed of sectorized cells. For clarity,restrictive reuse is described below for an exemplary system composed of3-sector cells.

FIG. 3 shows an exemplary multi-cell layout 300 with each 3-sector cellbeing modeled by a clover of three hexagons. For this cell layout, eachsector is surrounded in the first tier (or the first ring) by sectorsthat are labeled differently from that sector. Thus, each sector 1 issurrounded by six sectors 2 and 3 in the first tier, each sector 2 issurrounded by six sectors 1 and 3, and each sector 3 is surrounded bysix sectors 1 and 2.

FIG. 4 shows a Venn diagram illustrating a formation of threeoverlapping sets of subbands, labeled as F1, F2 and F3, which may beused as three forbidden subband sets. In this example, each forbiddenset overlaps with each of the other two forbidden sets (e.g., forbiddenset F1 overlaps with each of forbidden sets F2 and F3). Because of theoverlapping, an intersection set operation on any two forbidden setsyields a non-empty set. This property may be expressed as follows:F₁₂=F₁∩F₂≠Θ, F₁₃=F₁∩F₃≠Θ, and F₂₃=F₂∩F₃≠Θ,   Eq(1)

where “∩” denotes an intersection set operation;

F_(xy) is a set containing subbands that are members of both sets F_(x)and F_(y); and

Θ denotes a null/empty set.

Each of the three forbidden sets F1, F2 and F3 is a subset of a full setQ that contains all N total subbands, or F₁∩Ω, F₂∩Ω, and F₃∩Ω. Forefficient utilization of the available subbands, the three forbiddensets may also be defined such that there is no overlap over all threesets, which may be expressed as:F₁₂₃=F₁∩F₂∩F₃=Θ.   Eq (2)

The condition in equation (2) ensures that each subband is used by atleast one sector.

Three usable subband sets U1, U2 and U3 may be formed based on the threeforbidden subband sets F1, F2 and F3, respectively. Each usable set Uxmay be formed by a difference set operation between the full set Ω andforbidden set Fx, as follows:U=Ω\F₁, U₂=Ω\F₂, and U₃=Ω\F₃,   Eq (3)

where “\” denotes a difference set operation; and

U_(x) is a set containing subbands in the full set Ω that are not in setF_(x).

The three sectors in each 3-sector cell may be assigned a different pairof usable set and forbidden set. For example, sector 1 may be assignedusable set U1 and forbidden set F1, sector 2 may be assigned usable setU2 and forbidden set F2, and sector 3 may be assigned usable set U3 andforbidden set F3. Each sector is also aware of the forbidden setsassigned to neighboring sectors. Thus, sector 1 is aware of forbiddensets F2 and F3 assigned to neighboring sectors 2 and 3, sector 2 isaware of forbidden sets F1 and F3 assigned to neighboring sectors 1 and3, and sector 3 is aware of forbidden sets F1 and F2 assigned toneighboring sectors 1 and 2.

FIG. 5A shows a Venn diagram for the usable set U1 assigned to sector 1.Usable set U1 (shown by diagonal hashing) includes all of the N totalsubbands except for those in the forbidden set F1.

FIG. 5B shows a Venn diagram for a restricted usable set U1-2 (shown bycross-hashing) for sector 1. Restricted set U1-2 contains subbandsincluded in both the usable set U1 for sector 1 and the forbidden set F2for sector 2. Since the subbands in forbidden set F2 are not used bysector 2, the subbands in restricted set U1-2 are free of interferencefrom sector 2.

FIG. 5C shows a Venn diagram for a restricted usable set U1-3 (shown byvertical hashing) for sector 1. Restricted set U1-3 contains subbandsincluded in both the usable set U1 for sector 1 and the forbidden set F3for sector 3. Since the subbands in forbidden set F3 are not used bysector 3, the subbands in restricted set U1-3 are free of interferencefrom sector 3.

FIG. 5D shows a Venn diagram for a more restricted usable set U1-23(shown by solid fill) for sector 1. Restricted set U1-23 containssubbands included in all three of the usable set U1 for sector 1, theforbidden set F2 for sector 2, and the forbidden set F3 for sector 3.Since the subbands in forbidden sets F2 and F3 are not used by sectors 2and 3, respectively, the subbands in restricted set U1-23 are free ofinterference from both sectors 2 and 3.

As shown in FIGS. 5A through 5D, the restricted usable sets U1-2, U1-3and U1-23 are different subsets of the unrestricted usable set U1assigned to sector 1. Restricted usable sets U2-1, U2-3 and U2-13 may beformed for sector 2, and restricted usable sets U3-1, U3-2 and U3-12 maybe formed for sector 3 in similar manner.

Table 1 lists the various usable subband sets for the three sectors andthe manner in which these sets may be formed. The “reuse” sets in Table1 are described below. Table 1 is for illustrative purposes only. Itwould be apparent to those skilled in the art that the reuse sets arenot limited to those shown in Table 1. The reuse sets would be differentfrom that shown in Table 1 if there were, for example, more than threesectors per cell. TABLE 1 Reuse Set Usable Subband Sets Description (1)U₁ = Ω\F₁ Main/unrestricted usable set for sector 1 (1, 2) U₁₋₂ = U₁ ∩F₂ = F₂\(F₁ ∩ F₂) Restricted usable set with no interference from sector2 (1, 3) U₁₋₃ = U₁ ∩ F₃ = F₃\(F₁ ∩ F₃) Restricted usable set with nointerference from sector 3 (1, 2, 3) U₁₋₂₃ = U₁ ∩ F₂ ∩ F₃ = F₂ ∩ F₃ Morerestricted usable set with no interference from sectors 2 & 3 (2) U₂ =Ω\F₂ Main/unrestricted usable set for sector 2 (2, 1) U²⁻¹ = U₂ ∩ F₁ =F₁\(F₁ ∩ F₂) Restricted usable set with no interference from sector 1(2, 3) U₂₋₃ = U₂ ∩ F₃ = F₃\(F₂ ∩ F₃) Restricted usable set with nointerference from sector 3 (2, 1, 3) U₂₋₁₃ = U₂ ∩ F₁ ∩ F₃ = F₁ ∩ F₃ Morerestricted usable set with no interference from sectors 1 & 3 (3) U₃ =Ω\F₃ Main/unrestricted usable set for sector 3 (3, 1) U³⁻¹ = U₃ ∩ F₁ =F₁\(F₁ ∩ F₃) Restricted usable set with no interference from sector 1(3, 2) U³⁻² = U₃ ∩ F₂ = F₂\(F₂ ∩ F₃) Restricted usable set with nointerference from sector 2 (3, 1, 2) U₃₋₁₂ = U₃ ∩ F₁ ∩ F₂ = F₁ ∩ F₂ Morerestricted usable set with no interference from sectors 1 & 2

Each sector x (where x=1, 2, or 3) may allocate subbands in its usableset U_(x) to users in the sector by taking into account the users'channel conditions so that reasonably good performance may be achievedfor all users. Sector x may have weak users as well as strong users. Astrong user has a relatively good signal quality metric for its servingbase station and is typically more tolerant to higher level ofinter-sector interference. A weak user is less tolerant to inter-sectorinterference. Sector x may allocate any of the subbands in its usableset U_(x) to the strong users in the sector. Sector x may allocatesubbands in the restricted sets to the weak users in the sector. Theweak users are, in effect, restricted to certain subbands known to befree of interference from strong interfering sectors.

For example, a given user u in sector x may be allocated subbands fromusable set U_(x) for sector x. If user u is deemed to beobserving/causing high inter-sector interference from/to sector y, wherey≠x, then user u may be allocated subbands from the restricted setU_(x-y)=U_(x)∩F_(y). If user u is further deemed to be observing/causinghigh inter-sector interference from/to sector z, where z≠x and z≠y, thenuser u may be allocated subbands from the more restricted setU_(x-yz)=U_(x)∩F_(y)∩F_(z).

FIG. 6 shows an example for forming the three forbidden subband sets F1,F2 and F3. In this example, the N total subbands are partitioned into Qgroups, with each group containing 3-L subbands that are given indicesof 1 through 3L, where Q≧1 and L>1. Forbidden set F1 contains subbands1, L+1, and 2L+1 in each group. Forbidden set F2 contains subbands 1,L+2, and 2L+2 in each group. Forbidden set F3 contains subbands 2, L+1,and 2L+2 in each group. Set F12 then contains subband 1 in each group,set F13 contains subband L+1 in each group, and set F23 contains subband2L+2 in each group.

In general, each forbidden set may contain any number of subbands andany one of the N total subbands, subject to the constraints shown inequation (1) and possibly (2). To obtain frequency diversity, eachforbidden set may contain subbands taken from across the N totalsubbands. The subbands in each forbidden set may be distributed acrossthe N total subbands based on a predetermined pattern, as shown in FIG.6. Alternatively, the subbands in each forbidden set may bepseudo-randomly distributed across the N total subbands. The threeforbidden sets F1, F2 and F3 may also be defined with any amount ofoverlap. The amount of overlap may be dependent on various factors suchas, for example, the desired effective reuse factor for each sector(described below), the expected number of weak users in each sector, andso on. The three forbidden sets may overlap each other by the sameamount, as shown in FIG. 4, or by different amounts.

Each user may be associated with a “reuse” set that contains the servingsector for the user as well as strong interferers/ees, if any, for theuser. The serving sector is denoted by boldfaced and underlined text inthe reuse set. The strong interferers/ees are denoted by normal text,after the boldfaced and underlined text for the serving sector, in thereuse set. For example, a reuse set of (2, 1, 3) denotes sector 2 beingthe serving sector and sectors 1 and 3 being strong interferers/ees.

Strong interferers to a given user u on the forward link are typicallyfixed and may be specifically identified, e.g., based on pilotstransmitted by the sectors. Strong interferers to user u on the reverselink may not be easily identified by forward link measurement performedby user u and may be deduced, e.g., based on reverse link interferencemeasurement by the serving base station of user u. Strong interfereesfor user u may also be specifically identified or deduced. Stronginterferers/ees for each user may be determined in various manners.

In one embodiment, strong interferers/ees for a given user u aredetermined based on received pilot powers, as measured by user u, fordifferent sectors. Each sector may transmit a pilot on the forward linkfor various purposes such as signal detection, timing and frequencysynchronization, channel estimation, and so on. User u may search forpilots transmitted by the sectors and measure the received power of eachdetected pilot. User u may then compare the received pilot power foreach detected sector against a power threshold and add the sector to itsreuse set if the received pilot power for the sector exceeds the powerthreshold.

In another embodiment, strong interferers/ees for user u are determinedbased on an “active” set maintained by user u. The active set containsall sectors that are candidates for serving user u. A sector may beadded to the active set, e.g., if the received pilot power for thesector, as measured by user u, exceeds an add threshold (which may ormay not be equal to the power threshold described above). Each user inthe system may be required to (e.g., periodically) update its active setand to report the active set to its serving sector. The active setinformation may be readily available at the sector and may be used forrestrictive reuse.

In yet another embodiment, strong interferers/ees for user u aredetermined based on received pilot powers, as measured at differentsectors, for user u. Each user may also transmit a pilot on the reverselink for various purposes. Each sector may search for pilots transmittedby users in the system and measure the received power of each detectedpilot. Each sector may then compare the received pilot power for eachdetected user against the power threshold and inform the user's servingsector if the received pilot power exceeds the power threshold. Theserving sector for each user may then add sectors that have reportedhigh received pilot powers to that user's reuse set.

In yet another embodiment, strong interferers/ees for user u aredetermined based on a position estimate for user u. The position of useru may be estimated for various reasons (e.g., to provide locationservice to user u) and using various position determination techniques(e.g., Global Positioning System (GPS), Advanced Forward LinkTrilateration (A-FLT), and so on, which are known in the art). Thestrong interferers/ees for user u may then be determined based on theposition estimate for user u and sector/cell layout information.

Several embodiments for determining strong interferers/ees for each userhave been described above. Strong interferers/ees may also be determinedin other manners and/or based on other quantities besides received pilotpower. A good signal quality metric for determining strong interfererson the forward link is an average SINR measured at a user for a basestation, which is also called “geometry”. A good signal quality metricfor determining strong interferees on the reverse link is a channel gainmeasured at a user for a base station, since SINR measurement is notavailable at the user for the base station. A single reuse set may bemaintained for both the forward and reverse links, or separate sets maybe used for the two links. The same or different signal quality metricsmay be used to update the sectors in the reuse set for the forward andreverse links.

In general, strong interferers/ees may be specifically identified basedon direct measurements (e.g., for the forward link) or deduced based onrelated measurements, sector/cell layout, and/or other information(e.g., for the reverse link). For simplicity, the following descriptionassumes that each user is associated with a single reuse set thatcontains the serving sector and other sectors (if any) deemed to bestrong interferers/ees for the user.

In a well-designed system, a weak user should have a relatively fairsignal quality metric for at least one neighboring sector. This allowsthe weak user to be handed off from a current serving sector to aneighboring sector if necessary. Each such neighboring sector may bedeemed as a strong interferer/ee to the weak user and may be included inthe user's reuse set.

FIG. 7A shows an example distribution of four users in a cluster ofseven sectors. In this example, user 1 is located near the middle ofsector 1 and has a reuse set of (1). User 2 is located near the boundarybetween sectors 1 and 3 and has a reuse set of (1, 3). User 3 is alsolocated near the boundary between sectors 1 and 3 but has a reuse set of(3, 1). User 4 is located near the boundary of sectors 1, 2 and 3 andhas a reuse set of (1, 2, 3).

FIG. 7B shows a non-interference pattern for user 1 in FIG. 7A. User 1is allocated subbands in usable set U1 since its reuse set is (1).Because users in sector 1 are allocated orthogonal subbands, user 1 doesnot interfere with other users in sector 1. However, usable set U1 isnot orthogonal to usable sets U2 and U3 for sectors 2 and 3,respectively. Thus, user 1 observes interference from the sixneighboring sectors 2 and 3 in the first tier around sector 1. User 1typically observes interference from distant or weak interferers inthese six neighboring sectors because strong interferers (to sector1/user 1) in these neighboring sectors are allocated subbands (e.g., inrestricted sets U2-1 and U3-1) that are orthogonal to those in usableset U1. The area where other users do not interfere with user 1 is shownby cross-hashing and covers sector 1 and the edges of other sectors thatneighbor sector 1 (since the users in these neighboring sectors 2 and 3may be assigned subbands that are not used by sector 1).

FIG. 7C shows a non-interference pattern for user 2 in FIG. 7A. User 2is allocated subbands in restricted set U₁₋₃=U₁∩F₃ since its reuse setis (1, 3). Because sector 3 does not use the subbands in its forbiddenset F3, the subbands allocated to user 2 are orthogonal to the subbandsused by sector 3. Thus, user 2 does not observe any interference fromother users in sector 1 as well as users in sector 3. User 2 observesinterference from distant interferers in the three first-tierneighboring sectors 2. The area where other users do not interfere withuser 2 covers sectors 1 and 3 and the edges of sectors 2 that neighborsector 1 (for the reason noted above for FIG. 7B).

FIG. 7D shows a non-interference pattern for user 4 in FIG. 7A. User 4is allocated subbands in restricted set U₁₋₂₃=U₁∩F₂∩F₃ since its reuseset is (1, 2, 3). Because sectors 2 and 3 do not use the subbands intheir forbidden sets F2 and F3, respectively, the subbands allocated touser 4 are orthogonal to the subbands used by sectors 2 and 3. Thus,user 4 does not observe any interference from other users in sector 1 aswell as users in the six first-tier neighboring sectors 2 and 3. Thearea where other users do not interfere with user 4 covers sectors 1, 2and 3.

In FIG. 7A, users 2 and 3 are located in close proximity and would haveinterfered strongly with each other without restrictive reuse. Withrestrictive reuse, user 2 is allocated subbands in restricted setU₁₋₃=U₁∩F₃ since its reuse set is (1, 3), and user 3 is allocatedsubbands in restricted set U₃₋₁=U₃∩F₁ since its reuse set is (3, 1).Restricted sets U1-3 and U3-1 are mutually orthogonal since eachrestricted set U_(x-y) contains only subbands that are excluded from theusable set U_(y) of which the other restricted set U_(y-x) is a subset.Because users 2 and 3 are allocated subbands from orthogonal restrictedsets U1-3 and U3-1, respectively, these two users do not interfere withone another.

As shown in FIGS. 7A through 7D, the interference experienced by a userdecreases as the size of its reuse set increases. A user with a reuseset size of one (e.g., user 1 in FIG. 7B) is interfered by distantinterferers in six first-tier neighboring sectors. A user with a reuseset size of two (e.g., user 2 in FIG. 7C) is interfered by distantinterferers in three first-tier neighboring sectors. A user with a reuseset size of three is interfered by interferers in second-tier neighborsectors. In contrast, without restrictive reuse, all users in the systemwould be interfered by randomly distributed interferers from all sixfirst-tier neighboring sectors.

Restrictive reuse may be used to mitigate inter-sector interference forweak users on both the forward and reverse links. On the forward link, aweak user u in sector x may observe high inter-sector interference frombase stations for neighboring sectors that are in its reuse set. Weakuser u may be allocated subbands that are not used by these neighboringsectors and would then observe no interference from the base stationsfor these sectors. Restrictive reuse may thus directly improve the SINRsof individual weak user u.

On the reverse link, weak user u may observe high inter-sectorinterference from users in neighboring sectors that are in its reuseset. Weak user u may be allocated subbands that are not used by theseneighboring sectors and would then observe no interference from theusers in these sectors. Weak user u may also be a strong interferer tothe users in the neighboring sectors. Weak user u typically transmits ata high power level in order to improve its received SINR at its servingsector x. The high transmit power causes more interference to all usersin the neighboring sectors. By restricting weak user u to subbands notused by the neighboring sectors in the reuse set, weak user u wouldcause no interference to the users in these sectors.

When restrictive reuse is applied across the system, weak user u maybenefit from lower inter-sector interference on the reverse link even ifthe strong interferers to weak user u cannot be identified. Weak usersin neighboring sectors that have sector x in their reuse sets may bestrong interferers to weak user u as well as other users in sector x.These strong interferers may be allocated subbands that are not used bysector x and would then cause no interference to the users in sector x.User u may thus observe no inter-sector interference from these stronginterferers even though user u is not able to identify them. Restrictivereuse generally improves the SINRs of all weak users.

For both the forward and reverse links, restrictive reuse can avoid orreduce interference observed by weak users from strong interferers andthus improve the SINRs for the weak users. Restrictive reuse may reducethe variation in SINRs among users in the system. As a result, improvedcommunication coverage as well as higher overall system capacity may beachieved for the system.

FIG. 8 shows a flow diagram of a process 800 for allocating subbands tousers in a sector with restrictive reuse. Process 800 may be performedby/for each sector. Initially, strong “interference entities”, if any,for each user in the sector are identified (block 812). A stronginterference entity for a given user u may be (1) a strong interferercausing high interference to user u and/or (2) a strong interferenceobserving high interference from or due to user u. A strong interferenceentity for user u may thus be (1) a base station causing highinterference to user u on the forward link, (2) another user causinghigh interference to user u on the reverse link, (3) a base stationobserving high interference from user u on the reverse link, (4) anotheruser observing high interference from user u's serving base station onthe forward link, or (5) some other entity for which mitigation ofinterference with user u is sought. The strong interference entities maybe identified based on, e.g., received pilot powers measured by the userfor different sectors, received pilot powers measured by differentsectors for the user, and so on. The strong interference entities foreach user may be included in the user's reuse set, as described above.In any case, a restricted usable set is determined for each user with atleast one strong interference entity (block 814). The restricted set foreach user may be obtained by performing an intersection set operation onthe usable set for the user's serving sector with the forbidden set foreach strong interference entity, or U_(x-y . . .) =U_(x)∩F_(y) . . . .Each user with at least one strong interference entity is allocatedsubbands in the restricted set determined for that user (block 816).Each user without a strong interference entity is allocated remainingsubbands in the usable set for the sector (block 818). The process thenterminates.

Process 800 shows allocation of subbands to weak users with at least onestrong interference entity first, then allocation of remaining subbandsto strong users. In general, the weak and strong users may be allocatedsubbands in any order. For example, users may be allocated subbandsbased on their priority, which may be determined from various factorssuch as the SINRs achieved by the users, the data rates supported by theusers, the payload size, the type of data to be sent, the amount ofdelay already experienced by the users, outage probability, the maximumavailable transmit power, the type of data services being offered, andso on. These various factors may be given appropriate weights and usedto prioritize the users. The users may then be allocated subbands basedon their priority.

Process 800 may be performed by each sector in each scheduling interval,which may be a predetermined time interval. Each sector may sendsignaling (e.g., to all users or to only users allocated differentsubbands) to indicate the subbands allocated to each user. Process 800may also be performed (1) whenever there is a change in users in thesector (e.g., if a new user is added or a current user is removed), (2)whenever the channel conditions for the users change (e.g., whenever thereuse set for a user changes), or (3) at any time and/or due to anytriggering criterion. At any given moment, all of the subbands may notbe available for scheduling, e.g., some subbands may already be in usefor retransmissions or some other purposes.

The forbidden sets represent overhead for supporting restrictive reuse.Since the subbands in forbidden set F_(x) are not used by sector x, thepercentage of the total subbands usable by sector x, which is also theeffective reuse factor for sector x, may be given as:|U_(x)|/|Ω|=(|Ω|−|F_(x)|)/|Ω|, where |U_(x)| denotes the size of setU_(x). To reduce the amount of overhead for restrictive reuse, theforbidden sets may be defined to be as small as possible. However, thesizes of the restricted sets are dependent on the sizes of the forbiddensets. Thus, the forbidden sets may be defined based on expectedrequirements for weak users and possibly other factors.

The usable and forbidden sets may be defined in various manners. In oneembodiment, the usable and forbidden sets are defined based on globalfrequency planning for the system and remain static. Each sector isassigned a usable set and a forbidden set, forms its restricted sets asdescribed above, and thereafter uses the usable and restricted sets.This embodiment simplifies implementation for restrictive reuse sinceeach sector can act autonomously, and no signaling between neighboringsectors is required. In a second embodiment, the usable and forbiddensets may be dynamically defined based on sector loading and possiblyother factors. For example, the forbidden set for each sector may bedependent on the number of weak users in neighboring sectors, which maychange over time. A designated sector or a system entity (e.g., systemcontroller 130) may receive loading information for various sectors,define the usable and forbidden sets, and assign the sets to thesectors. This embodiment may allow for better utilization of systemresources based on the distribution of users. In yet another embodiment,the sectors may send inter-sector messages to negotiate the usable andforbidden sets.

Restrictive reuse can support handoff, which refers to the transfer of auser from a current serving base station to another base station that isdeemed better. Handoff may be performed as needed to maintain goodchannel conditions for users on the edge of sector coverage (or“sector-edge” users). Some conventional systems (e.g., a Time DivisionMultiple Access (TDMA) system) support “hard” handoff whereby a userfirst breaks away from the current serving base station and thenswitches to a new serving base station. A Code Division Multiple Access(CDMA) system supports “soft” and “softer” handoffs, which allow a userto simultaneously communicate with multiple cells (for soft handoff) ormultiple sectors (for softer handoff). Soft and softer handoffs canprovide additional mitigation against fast fading.

Restrictive reuse can reduce interference for sector-edge users, whichare good candidates for handoff. Restrictive reuse can also supporthard, soft, and softer handoffs. A sector-edge user u in sector x may beallocated subbands in the restricted set U_(x-y), which is free ofinterference from neighboring sector y. Sector-edge user u may alsocommunicate with sector y via subbands in the restricted set U_(y-x),which is free of interference from sector x. Since the restricted setsU_(x-y) and U_(y-x) are disjoint, user u may simultaneously communicatewith both sectors x and y (and with no interference from stronginterferers in both sectors) for soft or softer handoff. User u may alsoperform hard handoff from sector x to sector y. Since restricted setsU_(x-y) and U_(y-x) are absent of strong interferers from sectors y andx, respectively, the received SINR of user u may not change quite asabruptly when user u is handed off from sector x to sector y, which canensure a smooth handoff.

Power control may or may not be used in combination with restrictivereuse. Power control adjusts the transmit power for a data transmissionsuch that the received SINR for the transmission is maintained at atarget SINR, which may in turn be adjusted to achieve a particular levelof performance, e.g., 1% packet error rate (PER). Power control may beused to adjust the amount of transmit power used for a given data rate,so that interference is minimized. Power control be used for certain(e.g., fixed rate) transmissions and omitted for other (e.g., variablerate) transmissions. Full transmit power may be used for a variable ratetransmission (such as a hybrid automatic retransmission (H-ARQ), whichis continual transmission of additional redundancy information for eachpacket until the packet is decoded correctly) in order to achieve thehighest rate possible for a given channel condition.

In the above embodiment for restrictive reuse, each sector is associatedwith one usable set and one forbidden set. Some other embodiments ofrestrictive reuse are described below.

In another embodiment of restrictive reuse, each sector x is assigned anunrestricted usable subband set Ux and a “limited use” subband set Lx.The unrestricted usable set contains subbands that may be allocated toany users in the sector. The limited use set contains subbands havingcertain use restrictions such as, e.g., a lower transmit power limit.Sets Ux and Lx may be formed in the manner described above for sets Uxand Fx, respectively.

Each sector x may allocate the subbands in sets Ux and Lx by taking intoaccount the channel conditions for the users so that good performancemay be achieved for all users. The subbands in set Ux may be allocatedto any user in sector x. Weak users in sector x may be allocatedsubbands in (1) a restricted set U_(x-y)=U_(x)∩L_(y), if highinterference is observed from neighboring sector y, (2) a restricted setU_(x-z)=U_(x)∩L_(z), if high interference is observed from neighboringsector z, or (3) a restricted set U_(x-yz)=U_(x)∩L_(y)∩L_(z), if highinterference is observed from neighboring sectors y and z. Strong usersin sector x may be allocated subbands in Lx.

A strong user v in sector x has a good signal quality metric for itsserving sector x and may be allocated subbands in the limited use setLx. On the forward link, sector x may transmit at or below the lowerpower limit for set Lx to strong user v. On the reverse link, stronguser v may transmit at or below the lower power limit to serving sectorx. Good performance may be achieved for strong user v for both theforward and reverse links, even with the lower transmit power, becauseof the good signal quality metric achieved by strong user v for sectorx.

Strong user v typically has poor signal quality metrics for neighboringsectors. On the forward link, the lower transmit power used by sector xfor strong user v causes low (and typically tolerable) levels ofinterference to users in neighboring sectors. On the reverse link, thelower transmit power used by strong user v plus the lower channel gainsfor neighboring sectors result in low (and typically tolerable) levelsof interference to the users in the neighboring sectors.

In yet another embodiment of restrictive reuse, each reuse set isassociated with a sorted list of subband sets that may be used for thereuse set. Due to frequency planning restrictions, the bandwidth of somerestricted sets may be quite small, such as restricted set U1-23 whichcorresponds to reuse set (1,2,3). Suppose user u observes highinterference from sectors 2 and 3 and is assigned to reuse set (1,2,3).Although user u will experience higher SINR due to reduced interference,the bandwidth loss resulting from a restriction to a small restrictedset U1-23 may be detrimental in terms of the achievable throughput ofuser u. Hence, for users in reuse set (1,2,3), a sorted list of subbandsets with descending preference may be defined, e.g., (U1-23, [U1-2,U1-3], U1), where the subband sets within the square brackets have equalpreference. The users in reuse set (1,2,3) may then use largerbandwidth, if necessary, by using additional subband sets in the sortedlist associated with reuse set (1,2,3). For users in reuse set (1,2),the sorted list maybe (U1-2, U1, U1-3, U1-23). For users in reuse set(1), the sorted list may be (U1, [U1-2, U1-3], U1-23). The sorted listfor each reuse set may be defined to (1) reduce the amount ofinterference observed by the users in the reuse set and/or (2) reducethe amount of interference caused by the users in the reuse set.

In still yet another embodiment of restrictive reuse, each sector x isassigned multiple (M) usable sets and multiple (e.g. M) forbidden sets.The number of usable sets may or may not be equal to the number offorbidden sets. As an example, multiple (M) pairs of usable andforbidden sets may be formed, with the usable set Ux and the forbiddenset Fx in each pair being formed such that each of the N total subbandsis included in only set Ux or set Fx, e.g., Ω=U_(x)∪F_(x), where “∪”denotes a union set operation. However, in general, the M usable setsand M forbidden sets may be formed in various manners.

For example, the M usable sets may be formed such that they aresuccessively smaller subsets of the largest usable set. Each sector maythen use the smallest possible usable set based on its loading. This mayreduce the total interference to neighboring sectors when the sector ispartially loaded. This may also increase the variation in theinterference observed by neighboring sectors, which may be exploited toimprove overall system performance.

The M forbidden sets may be formed such that they are non-overlapping.The number of weaker users in each sector and their data requirementsare typically not known a priori. Each sector may utilize as manyforbidden sets for neighboring sectors as required to support its weakusers. For example, sector x may utilize subbands in more forbidden setsfor sector y to provide higher data rates to one or more weak users insector x observing high interference from sector y, or to support moreof these weak users. The sectors may coordinate usage of the forbiddensets.

In general, each sector may be assigned any number of unrestrictedusable subband sets and any number of “constrained” subband sets. Aconstrained subband set may be a forbidden subband set or a limited usesubband set. As an example, a sector may be assigned multipleconstrained subband sets. One constrained subband set may be a forbiddensubband set, and the remaining constrained subband set(s) may havedifferent transmit power limits and may be allocated to different tiersof strong users. As another example, a sector may be assigned multipleconstrained subband sets, where each constrained subband set may have adifferent transmit power limit (i.e., no forbidden set). The use ofmultiple usable and/or constrained sets for each sector may allow forbetter matching of subbands to weak users in different sectors.

For clarity, restrictive reuse has been specifically described for asystem with 3-sector cells. In general, restrictive reuse may be usedwith any reuse pattern. For a K-sector/cell reuse pattern, the forbiddenset for each sector/cell may be defined such that it overlaps with theforbidden set for each of the other K-1 sectors/cells, and may overlapwith different combinations of other forbidden sets. Each sector/cellmay form different restricted sets for different neighboring sectorsbased on its usable set and the forbidden sets for the neighboringsectors. Each sector/cell may then use the usable and restricted sets asdescribed above.

Restrictive reuse has also been described for an OFDMA system.Restrictive reuse may also be used for a TDMA system, a FrequencyDivision Multiple Access (FDMA) system, a CDMA system, a multi-carrierCDMA system, an Orthogonal Frequency Division Multiple Access (OFDMA)system, and so on. A TDMA system uses time division multiplexing (TDM),and transmissions for different users are orthogonalized by transmittingin different time intervals. An FDMA system uses frequency divisionmultiplexing (FDM), and transmissions for different users areorthogonalized by transmitting in different frequency channels orsubbands. In general, the system resources to be reused (e.g., frequencysubbands/channels, time slots, and so on) may be partitioned into usableand forbidden sets. The forbidden sets for neighboring sectors/cellsoverlap one another, as described above. Each sector may form restrictedsets based on its usable set and the forbidden sets for neighboringsectors/cells, as described above.

Restrictive reuse may be used for a Global System for MobileCommunications (GSM) system. A GSM system may operate in one or morefrequency bands. Each frequency band covers a specific range offrequencies and is divided into a number of 200 kHz radio frequency (RF)channels. Each RF channel is identified by a specific ARFCN (absoluteradio frequency channel number). For example, the GSM 900 frequency bandcovers ARFCNs 1 through 124, the GSM 1800 frequency band covers ARFCNs512 through 885, and the GSM 1900 frequency band covers ARFCNs 512through 810. Conventionally, each GSM cell is assigned a set of RFchannels and only transmits on the assigned RF channels. To reduceinter-cell interference, GSM cells located near each other are normallyassigned different sets of RF channels such that the transmissions forneighboring cells do not interfere with one another. GSM typicallyemploys a reuse factor greater than one (e.g., K=7 ).

Restrictive reuse may be used to improve efficiency and reduceinter-sector interference for a GSM system. The available RF channelsfor the GSM system may be used to form K pairs of usable and forbiddensets (e.g., K=7), and each GSM cell may be assigned one of the K setpairs. Each GSM cell may then allocate RF channels in its usable set tousers in the cell and RF channels in its restricted sets to weak users.Restrictive reuse allows each GSM cell to use a larger percentage of theavailable RF channels, and a reuse factor closer to one may be achieved.

Restrictive reuse may also be used for a multi-carrier communicationsystem that utilizes multiple “carriers” for data transmission. Eachcarrier is a sinusoidal signal that may be independently modulated withdata and is associated with a particular bandwidth. One such system is amulti-carrier IS-856 system (also called 3x-DO (data-only)) that hasmultiple 1.23 MHz carriers. Each sector/cell in the system may beallowed to use all carriers or only a subset of the carriers. Asector/cell may be forbidden to use a given carrier to avoid causinginterference on the carrier, which may allow other sectors/cells usingthis carrier to observe less (or no) interference, achieve higher SINR,and attain better performance. Alternatively, a sector/cell may beconstrained to use a lower transmit power limit on a given carrier toreduce interference on the carrier. For each sector, the constrained(forbidden or limited use) carrier(s) may be statically or dynamicallyassigned.

Each sector may assign its users to its usable carrier(s). Each sectormay also assign each user to a carrier in a manner to avoid stronginterferers/ees for the user. For example, if multiple usable carriersare available, then a user may be assigned one of the carriers havingless interference for the user (e.g., a carrier not used by a stronginterferer to the user).

The processing for data transmission and reception with restrictivereuse is dependent on system design. For clarity, exemplary transmittingand receiving entities in a frequency hopping OFDMA system for therestrictive reuse embodiment with a pair of usable and forbidden subbandsets for each sector are described below.

FIG. 9 shows a block diagram of an embodiment of a transmitting entity110 x, which may be the transmit portion of a base station or aterminal. Within transmitting entity 110 x, an encoder/modulator 914receives traffic/packet data from a data source 912 for a given user u,processes (e.g., encodes, interleaves, and modulates) the data based ona coding and modulation scheme selected for user u, and provides datasymbols, which are modulation symbols for data. Each modulation symbolis a complex value for a point in a signal constellation for theselected modulation scheme. A symbol-to-subband mapping unit 916provides the data symbols for user u onto the proper subbands determinedby an FH control, which is generated by an FH generator 940 based on thetraffic channel assigned to user u. FH generator 940 may be implementedwith look-up tables, pseudo-random number (PN) generators, and so on.Mapping unit 916 also provides pilot symbols on subbands used for pilottransmission and a signal value of zero for each subband not used forpilot or data transmission. For each OFDM symbol period, mapping unit916 provides N transmit symbols for the N total subbands, where eachtransmit symbol may be a data symbol, a pilot symbol, or a zero-signalvalue.

An OFDM modulator 920 receives N transmit symbols for each OFDM symbolperiod and generates a corresponding OFDM symbol. OFDM modulator 920typically includes an inverse fast Fourier transform (IFFT) unit and acyclic prefix generator. For each OFDM symbol period, the IFFT unittransforms the N transmit symbols to the time domain using an N-pointinverse FFT to obtain a “transformed” symbol that contains N time-domainchips. Each chip is a complex value to be transmitted in one chipperiod. The cyclic prefix generator then repeats a portion of eachtransformed symbol to form an OFDM symbol that contains N+C chips, whereC is the number of chips being repeated. The repeated portion is oftencalled a cyclic prefix and is used to combat inter-symbol interference(ISI) caused by frequency selective fading. An OFDM symbol periodcorresponds to the duration of one OFDM symbol, which is N+C chipperiods. OFDM modulator 920 provides a stream of OFDM symbols. Atransmitter unit (TMTR) 922 processes (e.g., converts to analog,filters, amplifies, and frequency upconverts) the OFDM symbol stream togenerate a modulated signal, which is transmitted from an antenna 924.

Controller 930 directs the operation at transmitting entity 110 x.Memory unit 932 provides storage for program codes and data used bycontroller 930.

FIG. 10 shows a block diagram of an embodiment of a receiving entity 120x, which may be the receive portion of a base station or a terminal. Oneor more modulated signals transmitted by one or more transmittingentities are received by an antenna 1012, and the received signal isprovided to and processed by a receiver unit (RCVR) 1014 to obtainsamples. The set of samples for one OFDM symbol period represents onereceived OFDM symbol. An OFDM demodulator (Demod) 1016 processes thesamples and provides received symbols, which are noisy estimates of thetransmit symbols sent by the transmitting entities. OFDM demodulator1016 typically includes a cyclic prefix removal unit and an FFT unit.The cyclic prefix removal unit removes the cyclic prefix in eachreceived OFDM symbol to obtain a received transformed symbol. The FFTunit transforms each received transformed symbol to the frequency domainwith an N-point FFT to obtain N received symbols for the N subbands. Asubband-to-symbol demapping unit 1018 obtains the N received symbols foreach OFDM symbol period and provides received symbols for the subbandsassigned to user u. These subbands are determined by an FH controlgenerated by an FH generator 1040 based on the traffic channel assignedto user u. A demodulator/decoder 1020 processes (e.g., demodulates,deinterleaves, and decodes) the received symbols for user u and providesdecoded data to a data sink 1022 for storage.

A controller 1030 directs the operation at receiving entity 120 x. Amemory unit 1032 provides storage for program codes and data used bycontroller 1030.

For restrictive reuse, each sector (or a scheduler in the system)selects users for data transmission, identifies the stronginterferers/ees for the selected users, determines the usable orrestricted set for each selected user based on its stronginterferers/ees (if any), and allocates subbands (or assigns trafficchannels) from the proper sets to the selected users. Each sector thenprovides each user with its assigned traffic channel, e.g., viaover-the-air signaling. The transmitting and receiving entities for eachuser then perform the appropriate processing to transmit and receivedata on the subbands indicated by the assigned traffic channel.

The restrictive reuse techniques described herein may be implemented byvarious means. For example, these techniques may be implemented inhardware, software, or a combination thereof. For a hardwareimplementation, the processing units used to identify stronginterferers/ees, determine restricted sets, allocate subbands, processdata for transmission or reception, and perform other functions relatedto restrictive reuse may be implemented within one or more applicationspecific integrated circuits (ASICs), digital signal processors (DSPs),digital signal processing devices (DSPDs), programmable logic devices(PLDs), field programmable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described herein, or a combination thereof.

For a software implementation, the restrictive reuse techniques may beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. The software codes may be storedin a memory unit (e.g., memory unit 932 in FIG. 9 or memory unit 1032 inFIG. 10) and executed by a processor (e.g., controller 930 in FIG. 9 or1030 in FIG. 10). The memory unit may be implemented within theprocessor or external to the processor.

Feedback

In an embodiment, the scheduler in the base station needs CQIinformation from the terminal, for all re-use sets about every 5 msec,to decide on which re-use set to schedule a given terminal. This is alot of feedback. To minimize this feedback, in the current design, theterminal feeds back a (slow) connection layer message to base station,indicating the VCQI (average CQI) for all re-use sets, once every few100 msec. The base station then calculates the CQI for all reuse sets ona packet by packet basis, and dynamically schedules the terminal in anappropriate re-use set.

A multiple-input multiple-output (MIMO) system utilizes multipleantennas for both transmitting and receiving. An advantage of a MIMOsystem over a single-input single-output (SISO) system is that a MIMOsystem produces a “rich” multipath because the MIMO system has Mantennas at the transmitter and M antennas at the receiver.

For MIMO users, the problem is that the CQI cannot be reconstructed forall re-use sets, using the current design. Solution: (1) For MultipleCode Word MIMO users, we propose a MIMO VCQI connection layer messagethat will enable the base station to reconstruct the MIMO-CQI for allreuse sets on a packet-by-packet basis. This will enable dynamicscheduling (restrictive reuse) gains. (2) For Single Code Word users,dynamic RESTRICTIVE REUSE can be obtained by changing the CQI reportingformat, and also sending a MIMO-VCQI connection layer message. (3) ForSingle Code Word design, quasi-static scheduling gains can be obtainedby sending a MIMO-VCQI connection layer message 2.

The CQI Value is a computed CQI value corresponding to a target sector.The number of bits is based on a CQI reporting mode and the active setsize. If the active set size is 1 and the CQI reporting mode is SISOthen the CQI Value is 4 bits. If the active set size is more than 1 andthe CQI reporting mode is SISO the CQI Value is 3 bits. If the activeset size is 1 and the CQI reporting mode is MCW-MIMO then the CQI Valueis 8 bits. If the active set size is greater than 1 and the CQIreporting mode is MCW-MIMO then the CQI Value is 6 bits.

In a current design, a SISO terminal feeds-back the CQI information fora non-restrictive re-use set (111) every 5 msec. The terminal also sendsa low-bandwidth VCQI (average CQI) connection layer message for allre-use sets about every few 100 msec. The base station can use thisinformation to calculate the CQI for all reuse sets on apacket-by-packet basis and dynamically schedule users in differentre-use sets to obtain RESTRICTIVE REUSE gains.

The question is whether such a scheme can also support MIMO users? Ifnot, what can be done to enable dynamic scheduling (RESTRICTIVE REUSEgains) for MIMO users? For MIMO users, the current VCQI feedback schemeis not sufficient to obtain RESTRICTIVE REUSE gains for MIMO users.

For MIMO-Multiple-Code-Word (MIMO-MCW) users, dynamic RESTRICTIVE REUSEgains are feasible if a MIMO-VCQI connection layer message containingthe VCQI for all layers and re-use sets are sent from the terminal to abase station.

For MIMO-Single-Code-Word (MIMO-SCW) users, dynamic RESTRICTIVE REUSEgains are feasible if (a) CQI feedback format is changed from a (6-bitCQI+2 bit-rank) to a (4-bit CQI for each possible rank) and (b)MIMO-VCQI connection layer message containing the VCQI for all ranks andre-use sets are sent from the terminal to a base station. The CQI formatchange leads to a performance loss for the (111) re-use set users, andtraded-off with the RESTRICTIVE REUSE gains for (non-111) re-use setusers.

For MIMO-SCW users, (quasi-static) RESTRICTIVE REUSE is attractive ifthe MIMO-VCQI connection layer message containing the optimum VCQI+rankfor each re-use set is sent from a terminal to a base station.

MIMO-CQI Measurement

Define the following:

M: Spatial Multiplexing Layers

H(k): M_(R)×M_(T) MIMO channel matrix at tone k

P(k): M_(T)×M spatial mapping matrix at tone k.

σ² Noise+Interference power for (non-111) reuse set.

ε²: Noise+Interference power for (non-111) reuse set.

E_(s): Transmit Symbol Energy.

The CQI for the (111) re-use set, assuming an M-layer transmission iscomputed as: $\begin{matrix}{{{CQI}_{M}( {\sigma^{2},E_{s}} )} = {{\prod\limits_{k = 1}^{N}( {1 + {{SNR}_{M}( {k,\sigma^{2},E_{s}} )}} \rbrack^{\frac{1}{N}}} - 1}} & (1)\end{matrix}$

where N is the number of OFDM tones and for an MMSE receiver, we havefor the 1st layer, $\begin{matrix}{{{SNR}_{M}( {k,\sigma^{2},E_{s}} )} = {\frac{E_{s}}{\sigma^{2}\langle \lbrack {{{P(k)}^{*}{H(k)}^{*}{H(k)}{P(k)}} + {\frac{\sigma^{2}}{E_{s}}I_{M \times M}}} \rbrack^{- 1} \rangle_{1,1}} - 1}} & (2)\end{matrix}$

For σ²≧ε², we can write the following inequalities (which will come inhandy later on) $\begin{matrix}{{{SNR}_{M}( {k,ɛ^{2},E_{s}} )} \leq {{{SNR}_{M}( {k,\sigma^{2},E_{s}} )}\frac{\sigma^{2}}{ɛ^{2}}}} & (3) \\{{{CQI}_{M}( {ɛ^{2},E_{s}} )} \leq {{{CQI}_{M}( {\sigma^{2},E_{s}} )}\frac{\sigma^{2}}{ɛ^{2}}}} & (4)\end{matrix}$

The equality is observed if at least one of the following conditions issatisfied:

The matrix H(k)P(k) has condition number κ(H(k)P(k))=1σ²=ε²

The inequality can become a loose-inequality under the followingconditions: σ²≧1 and ε²<<σ² and for large condition numbers,κ[H(k)P(k)].

For SCW design, a 6-bit${CQI}_{M}( {\sigma^{2},{\frac{M_{T}}{M}E_{s}}} )$and 2 bit rank (M) every 5 msec is fed back for the (111) re-use set.For MCW design, we feedback the pair [CQI₁(σ²E_(s)), CQI₂ (σ², E_(s))for the 1st 5 msec, and the pair [CQI₃ (σ², E_(s)), CQI₄ (σ², E_(s))]for the 2nd 5 msec, for the (111) re-use set. Each CQI is 4-bits wide.

The notation CQ_(M)(σ²) drops the dependence on “Es” term, since it isunderstood that the meaning of CQI is different for SCW and MCW.

In the current design, VCQI report is a connection layer messagecontaining the average CQI (assuming 1 layer transmission) for all there-use sets, sent every few 100 msec. We denote VCQI₁ (ε²) to be the 1layer average CQI for the (non-111) reuse set and VCQI₁ (σ²) to be the 1layer average CQI for the (111) reuse set.

The minimum packet size for RL message is 168 bits. This puts alimitation on the size of the VCQI message. It can be calculated thatthe maximum number of allowed bits per re-use set for the VCQI report is17 bits, and for RESTRICTIVE REUSE-3 (e.g. ASBR-3), the maximum numberof allowed bits per re-use set for the VCQI report is 9 bits. This isbecause for RESTRICTIVE REUSE-3, the VCQI report should includeinformation about 5 re-use sets, while for RESTRICTIVE REUSE-2 (e.g.ASBR-2), the VCQI report should include information about only 4 re-usesets.

Very low geometry users and very high geometry users are thermallimited, and hence achieve less RESTRICTIVE REUSE gain. For users withgeometry between VCQI₁(σ²)∈[3,20] dB range, 50% of users observeVCQI₁(ε²)−VCQI₁(σ²)≧3 dB gain, 30% of users observeVCQI₁(ε²)−VCQI₁(σ²)≧5 dB gain and 10% of users observe VCQI₁(ε²)−VCQI₁(σ² )≧10 dB gain.

SISO-VCQI Reporting

FIG. 11 SISO-CSQI Reporting For RESTRICTIVE REUSE-2

We can estimate the CQI for a (non-111) reuse set as: $\begin{matrix}{{{EstCQI}_{M}( ɛ^{2} )} \approx {\frac{{VCQI}_{1}( ɛ^{2} )}{{VCQI}_{1}( \sigma^{2} )}{{CQI}_{M}( \sigma^{2} )}} \approx {\frac{\sigma^{2}}{ɛ^{2}}{{CQI}_{M}( \sigma^{2} )}}} & (5)\end{matrix}$

The second approximation$\frac{{VCQI}_{1}( ɛ^{2} )}{{VCQI}_{1}( \sigma^{2} )} \approx \frac{\sigma^{2}}{ɛ^{2}}$comes from the fact that${{SNR}_{1}( {k,\sigma^{2}} )} = {{\frac{E_{s}}{\sigma^{2}}{{h(k)}}^{2}} \approx {\frac{E_{s}}{\sigma^{2}}g^{2}}}$where g² is the average channel power across all receive antennas. Thisis a good approximation since with 4-antenna receive diversity, thechannel appears flat across the frequency domain. As a result,${{CQI}_{M}( \sigma^{2} )} = {{{\prod\limits_{k = 1}^{N}\lbrack {1 + {{SNR}_{M}( {k,\sigma^{2}} )}} \rbrack^{\frac{1}{N}}} - 1} = {\frac{E_{s}}{\sigma^{2}}g^{2}}}$

The estimation error can be written as: $\begin{matrix}{\Delta_{M} = {\frac{{EstCQI}_{M}( ɛ^{2} )}{{CQI}_{M}( ɛ^{2} )} \approx {\frac{{CQI}_{M}( \sigma^{2} )}{{CQI}_{M}( ɛ^{2} )}\frac{\sigma^{2}}{ɛ^{2}}} \geq 1}} & (6)\end{matrix}$

where the last inequality follows from inequality (4).

For MCW design, we need Δ_(M)≦2 dB since the CQI granularity requiredfor the MCW design with 7 PF is 2 dB.

We now plot the CDF of Δ₄, assuming a flat-fading channel and σ²=1,E_(s)=¼, resulting in VCQI₁(σ²)=0 dB The distribution of Δ₄ is evaluatedfor VCQI₁ (ε²)={5,10,15,20} dB assuming Δ4-layer transmission.

FIG. 14 MIMO-VCQI reporting for RESTRICTIVE REUSE-2

The CQI_(M)(ε²) estimates for the (non-111) re-use sets are improved byusing MIMO-VCQI reporting.

FIG. 12 CDF for Δ₄based on VCQI₁(σ²)=0 dB and VCQI₁(ε²)={5,10,15,20} dB

We see that when VCQI₁(ε²)≦5 dB we have Δ≦2dB for 90% of the users.However, for VCQI₁(ε²)>5 dB we have Δ>2 dB for a significant percentageof users. This tells us that CQI estimation of (non-111) reuse sets forVCQI₁(ε²)−VCQ₁(σ²)>5 dB can be un-reliable and overly aggressive. Usingthis CQI estimate for rate prediction will lead to aggressive PFprediction, leading to late decoder termination statistics or packeterrors. Since MCW design mostly transmits 4 layers, aggressive PFprediction on layer 1 will lead to high latency decoding for otherlayers.

The users with Δ_(M)>2 dB have channels with high condition numbers(ill-conditioned matrices), as seen from the scatter plot below showingthe relationship between channel condition number and Δ_(M) forVCQI₁(ε²)=10 dB and VCQI₁(σ²)=0 dB. Our results are pessimistic sincefor a broadband 5 MHz channel, the condition numbers of the channelmatrices should improve considerably due to multi-path. This shouldimprove the CQI estimation performance.

FIG. 13 Condition Number vs. CQI Estimation Error (L □

for VCQI₁(ε² )=10 dB and VCQI₁ (σ²)=0 dB assuming a flat-fading channel.

The channel condition numbers improve progressively for 3 layers, 2layers and 1 layer transmission, leading to progressively improvedperformance for these layers, as shown in the figures in the Appendix.In other words, Δ₁≦Δ₂≦Δ₃≦Δ₄.

Δ₄ can be un-reliable and overly aggressive for VCQI₁(ε²) VCQI₁(σ²)>5dB.

Δ₃≦2 dB for 90% of the users for VCQI₁(ε²)−VCQI₁ (σ²)<10 dB

Δ₂≦2 dB for 90% of the users if VCQI₁(ε²)−VCQI₁ (σ² )<20 dB

Since Δ≧0 dB and Δ increases with increase in eigen-value spread of theequivalent channel and VCQI₁(ε²)−VCQI₁(σ²) gap, we can potentially applya backoff δ(λ,σ²,ε²) to the CQI estimates.${{EstCQI}_{M}( ɛ^{2} )} \approx {{\frac{\sigma^{2}}{ɛ^{2}}{{CQI}_{M}( \sigma^{2} )}} - {\delta( {\lambda,\sigma^{2},ɛ^{2}} )}}$

A coarse measure of the eigen-value spread can be obtained from the fastCQI report for layers 1,2,3 and 4. We can then potentially have a tablelook-up obtained via simulations, to read off the backoff valuesδ(λ,σ²,ε² ). Furthermore, if the user will be scheduled in a givenre-use set for multiple packets, then the back-off can be adjusted basedon the decoder termination statistics of the first few packets.

FIG. 12 illustrates the MISO-VCQI reporting for RESTRICTIVE REUSE-2,which includes the average CQI for all port-sets for layers 1,2,3,4.However as before, the CQI reporting occurs only for re-use set (111).

We can estimate the M-layer CQI for a non-111 reuse set as:$\begin{matrix}{{{{MIMOEstCQI}_{M}( ɛ^{2} )} \approx {\frac{{VCQI}_{M}( ɛ^{2} )}{{VCQI}_{M}( \sigma^{2} )}{{CQI}_{M}( \sigma^{2} )}} \leq {\frac{{VCQI}_{1}( ɛ^{2} )}{{VCQI}_{1}( \sigma^{2} )}{{CQI}_{M}( \sigma^{2} )}}} = {{EstCQI}_{M}( ɛ^{2} )}} & (5)\end{matrix}$

The estimation error can be written as:${\Delta\quad}_{M}^{MIMO} = {{\frac{{MIMOEstCQI}_{M}( ɛ^{2} )}{{CQI}_{M}( ɛ^{2} )} \leq \frac{{EstCQI}_{M}( ɛ^{2} )}{{CQI}_{M}( ɛ^{2} )}} = \Delta_{M}}$

This is hence an improvement relative to the CQI estimation errorobtained using the SISO-VCQI message. We plot the CDF of Δ_(M) ^(MIMO),assuming a flat-fading channel with VCQI₁(σ²)=0 dB andVCQI₁(ε²)={5,10,15,20} dB

FIG. 15 CDF of Δ₄ ^(MIMO) for flat-fading channel VCQI₁(σ²)=0 dB andVCQI₁(ε²)={5,10,15,20} dB, assuming a flat-fading channel.

We see that for VCQI₁(ε²)≦15 dB we have Δ₄ ^(MIMO)≦2 dB for 90% of theuse big-improvement from the case when we used SISO-VCQI message. Sincethe channel condition numbers improve progressively for 3 layers, 2layers and 1 layer transmission, we should see progressively improvedperformance for these layers. In other words, Δ₁ ^(MIMO)≦Δ₂ ^(MIMO)≦Δ₃^(MIMO)≦Δ₄ ^(MIMO). For M=3 layer transmission, simulation results showthat we have Δ₃ ^(MIMO)≦2 dB for 90% of the users even for VCQI₁(ε²)>20dB

FIG. 16 MIMO-VCQI reporting for RESTRICTIVE REUSE-3

As explained before, for RESTRICTIVE REUSE-3, the maximum number ofallowed bits per re-use set for the VCQI report is 9 bits. This isbecause for RESTRICTIVE REUSE-3, the VCQI report should includeinformation about 5 re-use sets, while for RESTRICTIVE REUSE-2, the VCQIreport should include information about only 4 re-use sets. As a result,in RESTRICTIVE REUSE-3, the VCQI message can only contain VCQIinformation for layers 1 and 4, due to lack of space in the VCQImessage.

Dynamic RESTRICTIVE REUSE for SCW-MIMO

As explained before, in SCW design, the CQI reporting only includes a 2bit rank (M) and a 6-bit, CQI_(M)(σ⁷) for the (111) reuse set. SinceCQI_(R)(σ²), R≠M is not available, we cannot estimate CQI_(R)(ε²), R≠M.In other words, the drawback is that the CQI for (non-111) reuse setcannot only be estimated for other ranks. Furthermore, the CQIquantization required is 0.5 dB for SCW since we have 32 PFs. Hence, CQIestimation errors for the non-111 reuse set need to improve to minimizecapacity loss due to aggressive rate prediction in the non-111 reuseset.

Based on the above observations and from the insights gained in section2, we can say that:

Dynamic RESTRICTIVE REUSE for SCW is feasible if we can employ aMIMO-VCQI report as shown in FIG. 4. The meaning of VCQI_(M) (σ²) isdifferent from the MCW case. In the SCW, VCQI_(M)(σ₂) corresponds to theaverage CQI for rank M transmission, for the (111) re-use set.

The CQI reporting for the (111) re-use set, now changes to a 4-bit CQIinformation for each of the 4 ranks, i.e., CQI_(M)(σ²) M={1,2,3,4},instead of a 2 bit rank (M) and a 6-bit, CQI_(M)(σ²) for the (111) reuseset. Since we only have a 4-bit CQI and not a 6-bit CQI, the drawback isthat there is (a) a potential 1.5 dB performance penalty for the usersremaining in the (111) re-use set due to coarse CQI feedback (4 bitsinstead of 6 bits), and (b) Low Doppler tolerance since CQI feedback nowspans 10 msec instead of 5 msec. On the flip-side, the benefit is thatrank & rate prediction can now operate at the transmitter andincorporate any power control changes.

Conclusion #2: Dynamic RESTRICTIVE REUSE gains for SCW is possible witha MIMO-VCQI reporting and a 4-bit CQI reporting for all ranks. Thedrawback is that the coarse quantization due to a 4-bit CQI reportingleads to performance loss for (111) re-use set users. Hence, the dynamicRESTRICTIVE REUSE gains have to be traded-off with the above performancelosses, to determine if dynamic RESTRICTIVE REUSE for SCW is desirable.

FIG. 17 illustrates the MISO-VCQI (static) reporting for staticRESTRICTIVE REUSE-2, and fast-CQI reporting for SCW design. Quasi-StaticRESTRICTIVE REUSE for MCW works as follows:

The MIMO-VCQI report from AT to the AP includes the 6-bit CQI+2 bit rankinformation for all the reuse sets.

Based on the MIMO-VCQI (static) report, the scheduler at the AP thenschedules the MIMO SCW user on one of the re-use sets.

After the MIMO SCW user is allotted a specific re-use set, the 6 bitfast CQI+2 bit rank reporting occurs for this particular re-use set.

The above process can be repeated when a fresh VCQI report arrives fromAT to the AP.

It would be apparent to those skilled in the art that a qualityindicator other than CQI may be used and that a vectored qualityindicator VCQI may be used.

The previous description of the disclosed embodiments is provided toenable any person skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without departing from thespirit or scope of the invention. Thus, the present invention is notintended to be limited to the embodiments shown herein but is to beaccorded the widest scope consistent with the principles and novelfeatures disclosed herein.

1. A method of providing feedback to support restrictive reuse in asingle-input single-output (SISO) system, comprising: sending a qualityindicator for a non-restrictive reuse set; and sending a vectoredquality indicator for reuse sets other than the non-restrictive reuseset.
 2. The method of claim 1, wherein the quality indicator is a CQIand the vectored quality indicator is a vectored CQI (VCQI).
 3. Themethod of claim 1, wherein the non-restrictive reuse set is set (111).4. The method of claim 1, wherein the quality indicator from thenon-restrictive reuse set is sent after a first period of time and thevectored quality indicator is sent after a second period of time, thesecond period of time being longer than the first period of time.
 5. Themethod of claim 4, wherein the first period of time is about 5milliseconds and the second period of time is about 100 milliseconds. 6.The method of claim 1, further comprising calculating a qualityindicator for all reuse sets based on the quality indicator for thenon-restrictive reuse set and the vectored quality indicator.
 7. Themethod of claim 6, further comprising scheduling a terminal in a reuseset based on the quality indicator, the vectored quality indicator, andthe quality indicator for all reuse sets.
 8. A method of providingfeedback to support restrictive reuse in a multiple code word (MCW)multiple-input multiple-output (MIMO) system, comprising: sending aquality indicator for a non-restrictive reuse set; and sending avectored quality indicator for at least two reuse sets other than thenon-restrictive reuse set for all layers.
 9. The method of claim 8,wherein the quality indicator is a CQI and the vectored qualityindicator is a vectored CQI (VCQI).
 10. The method of claim 8, whereinthe quality indicator from the non-restrictive reuse set is sent after afirst period of time and the vectored quality indicator is sent after asecond period of time, the second period of time being longer than thefirst period of time.
 11. The method of claim 8, further comprisingcalculating a quality indicator for all reuse sets based on the qualityindicator for the non-restrictive reuse set and the vectored qualityindicator.
 12. The method of claim 11, further comprising scheduling aterminal in a reuse set based on the quality indicator, the vectoredquality indicator, and the quality indicator for all reuse sets.
 13. Amethod of providing feedback to support restrictive reuse in a singlecode word (SCW) multiple-input multiple-output (MIMO) system,comprising: sending a quality indicator for a non-restrictive reuse set;and sending a vectored quality indicator for all reuse sets other thanthe non-restrictive reuse set for all layers.
 14. The method of claim13, wherein the quality indicator includes two bits for rank and sixbits for CQI for the non-restrictive reuse set.
 15. The method of claim14, wherein the quality indicator from the non-restrictive reuse set issent after a first period of time and the vectored quality indicator issent after a second period of time, the second period of time beinglonger than the first period of time.
 16. The method of claim 14,further comprising calculating a quality indicator for all reuse setsbased on the quality indicator for the non-restrictive reuse set and thevectored quality indicator.
 17. The method of claim 16, furthercomprising scheduling a terminal in a reuse set based on the qualityindicator, the vectored quality indicator, and the quality indicator forall reuse sets.
 18. The method of claim 13, wherein the qualityindicator includes four bits for the CQI for each rank for thenon-restrictive reuse set.
 19. A method of providing feedback to supportrestrictive reuse in a single code word (SCW) multiple-inputmultiple-output (MIMO) system, comprising: sending a quality indicatorfor a reuse set with an optimum quality indicator for each layer; andsending a vectored quality indicator for all reuse sets for all layers.20. The method of claim 19, wherein the quality indicator includes twobits for rank and six bits for CQI for the reuse set.
 21. An apparatusfor wireless communications, comprising: means for sending a qualityindicator for a non-restrictive reuse set; and means for, sending avectored quality indicator for reuse sets other than the non-restrictivereuse set.
 22. An apparatus for wireless communications, comprising acontroller operative to: sending a quality indicator for anon-restrictive reuse set; and sending a vectored quality indicator forreuse sets other than the non-restrictive reuse set.
 23. A controller ina wireless device operative to: sending a quality indicator for anon-restrictive reuse set; and sending a vectored quality indicator forreuse sets other than the non-restrictive reuse set.
 24. A readablemedia embodying a method for wireless communications, the methodcomprising: sending a quality indicator for a non-restrictive reuse set;and sending a vectored quality indicator for reuse sets other than thenon-restrictive reuse set.