Discontinuous access to unlicensed spectrum in a new radio environment

ABSTRACT

Various embodiments disclosed herein provide for facilitating a discontinuous access to unlicensed spectrum in a new radio access environment. According an embodiment, a system can comprise performing a scanning procedure that determines whether a first subband and a second subband is available for transmission. The system can further facilitate determining whether the first subband and the second subband are adjacent, wherein a first channel formed at the first subband comprising a first guard band and a second channel formed at the second subband comprising a second guard band that is adjacent to the first guard band. The system can further facilitate in response to determining that the first subband and the second subband are adjacent and available for transmission, eliminating the first guard band and the second guard band.

RELATED APPLICATION

The subject patent application is a continuation of, and claims priorityto, U.S. patent application Ser. No. 16/277,284, filed Feb. 15, 2019 andentitled “DISCONTINUOUS ACCESS TO UNLICENSED SPECTRUM IN A NEW RADIOENVIRONMENT,” the entirety of which application is hereby incorporatedby reference herein.

TECHNICAL FIELD

This disclosure relates generally to a wireless communication system ingeneral, and to a fifth generation (5G) wireless communication systemsthat utilizes licensed and unlicensed spectrum. More specifically,facilitating a discontinuous access to unlicensed spectrum.

BACKGROUND

5th generation (5G) wireless systems represent a next major phase ofmobile telecommunications standards, also called new radio (NR) access,beyond the current telecommunications standards of 4^(th) generation(4G). In addition to faster peak Internet connection speeds, 5G planningaims at higher capacity than current 4G, allowing a higher number ofmobile broadband users per area unit, and allowing consumption of higheror unlimited data quantities. This would enable a large portion of thepopulation to stream high-definition media many hours per day with theirmobile devices, when out of reach of wireless fidelity hotspots. 5Gresearch and development also aims at improved support ofmachine-to-machine communication, also known as the Internet of things,aiming at lower cost, lower battery consumption, and lower latency than4G equipment.

The above-described background relating to facilitating a discontinuousaccess to unlicensed spectrum in a new radio access environment ismerely intended to provide a contextual overview of some current issues,and is not intended to be exhaustive. Other contextual information maybecome further apparent upon review of the following detaileddescription.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the subject disclosureare described with reference to the following figures, wherein likereference numerals refer to like parts throughout the various viewsunless otherwise specified.

FIG. 1 illustrates an example wireless communication system in which anetwork node device (e.g., network node) and user equipment (UE) canimplement various aspects and embodiments of the subject disclosure

FIG. 2 illustrates an example of a NR with single serving cell in anunlicensed spectrum in accordance with various aspects and embodimentsdescribed herein.

FIG. 3 illustrates an example of a NR with single serving cell in anunlicensed spectrum in accordance with various aspects and embodimentsdescribed herein.

FIG. 4 illustrates an example of a NR with single serving cell in anunlicensed spectrum in accordance with various aspects and embodimentsdescribed herein.

FIG. 5 illustrates an example of a NR with single serving cell in anunlicensed spectrum in accordance with various aspects and embodimentsdescribed herein.

FIG. 6 illustrates an example of a NR with single serving cell in anunlicensed spectrum in accordance with various aspects and embodimentsdescribed herein.

FIG. 7 illustrates an example of a NR with single serving cell in anunlicensed spectrum in accordance with various aspects and embodimentsdescribed herein.

FIG. 8 depicts a diagram of an example, non-limiting computerimplemented method that facilitates a discontinuous access to unlicensedspectrum in a new radio access system in accordance with one or moreembodiments described herein.

FIG. 9 depicts a diagram of an example, non-limiting computerimplemented method that facilitates a discontinuous access to unlicensedspectrum in a new radio access system in accordance with one or moreembodiments described herein.

FIG. 10 illustrates an example block diagram of an example mobilehandset operable to engage in a system architecture that facilitateswireless communications according to one or more embodiments describedherein.

FIG. 11 illustrates an example block diagram of an example computeroperable to engage in a system architecture that facilitates wirelesscommunications according to one or more embodiments described herein.

DETAILED DESCRIPTION

In the following description, numerous specific details are set forth toprovide a thorough understanding of various embodiments. One skilled inthe relevant art will recognize, however, that the techniques describedherein can be practiced without one or more of the specific details, orwith other methods, components, materials, etc. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring certain aspects.

Reference throughout this specification to “one embodiment,” or “anembodiment,” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment. Thus, the appearances of the phrase “in oneembodiment,” “in one aspect,” or “in an embodiment,” in various placesthroughout this specification are not necessarily all referring to thesame embodiment. Furthermore, the particular features, structures, orcharacteristics may be combined in any suitable manner in one or moreembodiments.

As utilized herein, terms “component,” “system,” “interface,” and thelike are intended to refer to a computer-related entity, hardware,software (e.g., in execution), and/or firmware. For example, a componentcan be a processor, a process running on a processor, an object, anexecutable, a program, a storage device, and/or a computer. By way ofillustration, an application running on a server and the server can be acomponent. One or more components can reside within a process, and acomponent can be localized on one computer and/or distributed betweentwo or more computers.

Further, these components can execute from various machine-readablemedia having various data structures stored thereon. The components cancommunicate via local and/or remote processes such as in accordance witha signal having one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network, e.g., the Internet, a local areanetwork, a wide area network, etc. with other systems via the signal).

As another example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry; the electric or electronic circuitry can beoperated by a software application or a firmware application executed byone or more processors; the one or more processors can be internal orexternal to the apparatus and can execute at least a part of thesoftware or firmware application. As yet another example, a componentcan be an apparatus that provides specific functionality throughelectronic components without mechanical parts; the electroniccomponents can include one or more processors therein to executesoftware and/or firmware that confer(s), at least in part, thefunctionality of the electronic components. In an aspect, a componentcan emulate an electronic component via a virtual machine, e.g., withina cloud computing system.

The words “exemplary” and/or “demonstrative” are used herein to meanserving as an example, instance, or illustration. For the avoidance ofdoubt, the subject matter disclosed herein is not limited by suchexamples. In addition, any aspect or design described herein as“exemplary” and/or “demonstrative” is not necessarily to be construed aspreferred or advantageous over other aspects or designs, nor is it meantto preclude equivalent exemplary structures and techniques known tothose of ordinary skill in the art. Furthermore, to the extent that theterms “includes,” “has,” “contains,” and other similar words are used ineither the detailed description or the claims, such terms are intendedto be inclusive—in a manner similar to the term “comprising” as an opentransition word—without precluding any additional or other elements.

As used herein, the term “infer” or “inference” refers generally to theprocess of reasoning about, or inferring states of, the system,environment, user, and/or intent from a set of observations as capturedvia events and/or data. Captured data and events can include user data,device data, environment data, data from sensors, sensor data,application data, implicit data, explicit data, etc. Inference can beemployed to identify a specific context or action, or can generate aprobability distribution over states of interest based on aconsideration of data and events, for example.

Inference can also refer to techniques employed for composinghigher-level events from a set of events and/or data. Such inferenceresults in the construction of new events or actions from a set ofobserved events and/or stored event data, whether the events arecorrelated in close temporal proximity, and whether the events and datacome from one or several event and data sources. Various classificationschemes and/or systems (e.g., support vector machines, neural networks,expert systems, Bayesian belief networks, fuzzy logic, and data fusionengines) can be employed in connection with performing automatic and/orinferred action in connection with the disclosed subject matter.

In addition, the disclosed subject matter can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, machine-readable device, computer-readablecarrier, computer-readable media, or machine-readable media. Forexample, computer-readable media can include, but are not limited to, amagnetic storage device, e.g., hard disk; floppy disk; magneticstrip(s); an optical disk (e.g., compact disk (CD), a digital video disc(DVD), a Blu-ray Disc™ (BD)); a smart card; a flash memory device (e.g.,card, stick, key drive); and/or a virtual device that emulates a storagedevice and/or any of the above computer-readable media.

As an overview, various embodiments are described herein to facilitate adiscontinuous access to unlicensed spectrum in a new radio accessenvironment. For simplicity of explanation, the methods (or algorithms)are depicted and described as a series of acts. It is to be understoodand appreciated that the various embodiments are not limited by the actsillustrated and/or by the order of acts. For example, acts can occur invarious orders and/or concurrently, and with other acts not presented ordescribed herein. Furthermore, not all illustrated acts may be requiredto implement the methods. In addition, the methods could alternativelybe represented as a series of interrelated states via a state diagram orevents. Additionally, the methods described hereafter are capable ofbeing stored on an article of manufacture (e.g., a machine-readablestorage medium) to facilitate transporting and transferring suchmethodologies to computers. The term article of manufacture, as usedherein, is intended to encompass a computer program accessible from anycomputer-readable device, carrier, or media, including a non-transitorymachine-readable storage medium.

It should be noted that although various aspects and embodiments havebeen described herein in the context of 5G, Universal MobileTelecommunications System (UMTS), and/or Long Term Evolution (LTE), orother next generation networks, the disclosed aspects are not limited to5G, a UMTS implementation, and/or an LTE implementation as thetechniques can also be applied in 3G, 4G or LTE systems. For example,aspects or features of the disclosed embodiments can be exploited insubstantially any wireless communication technology. Such wirelesscommunication technologies can include UMTS, Code Division MultipleAccess (CDMA), Wi-Fi, Worldwide Interoperability for Microwave Access(WiMAX), General Packet Radio Service (GPRS), Enhanced GPRS, ThirdGeneration Partnership Project (3GPP), LTE, Third Generation PartnershipProject 2 (3GPP2) Ultra Mobile Broadband (UMB), High Speed Packet Access(HSPA), Evolved High Speed Packet Access (HSPA+), High-Speed DownlinkPacket Access (HSDPA), High-Speed Uplink Packet Access (HSUPA), Zigbee,or another IEEE 802.XX technology. Additionally, substantially allaspects disclosed herein can be exploited in legacy telecommunicationtechnologies.

Described herein are systems, methods, articles of manufacture, andother embodiments or implementations that can facilitate a discontinuousaccess to unlicensed spectrum in a new radio access environment.Facilitating a discontinuous access to unlicensed spectrum can beimplemented in connection with any type of device with a connection tothe communications network (e.g., a mobile handset, a computer, ahandheld device, etc.) any Internet of things (TOT) device (e.g.,toaster, coffee maker, blinds, music players, speakers, etc.), and/orany connected vehicles (cars, airplanes, space rockets, and/or other atleast partially automated vehicles (e.g., drones)). In some embodimentsthe non-limiting term user equipment (UE) is used. It can refer to anytype of wireless device that communicates with a radio network node in acellular or mobile communication system. Examples of UE are targetdevice, device to device (D2D) UE, machine type UE or UE capable ofmachine to machine (M2M) communication, PDA, Tablet, mobile terminals,smart phone, laptop embedded equipped (LEE), laptop mounted equipment(LME), USB dongles, etc. Note that the terms element, elements andantenna ports can be interchangeably used but carry the same meaning inthis disclosure. The embodiments are applicable to single carrier aswell as to multicarrier (MC) or carrier aggregation (CA) operation ofthe UE. The term carrier aggregation (CA) is also called (e.g.,interchangeably called) “multi-carrier system”, “multi-cell operation”,“multi-carrier operation”, “multi-carrier” transmission and/orreception.

In some embodiments the non-limiting term radio, network node, or simplynetwork node is used. It can refer to any type of network node thatserves UE is connected to other network nodes or network elements or anyradio node from where UE receives a signal. Examples of radio networknodes are Node B, base station (BS), multi-standard radio (MSR) nodesuch as MSR BS, eNode B, network controller, radio network controller(RNC), base station controller (BSC), relay, donor node controllingrelay, base transceiver station (BTS), access point (AP), transmissionpoints, transmission nodes, remote radio unit (RRU), remote radio head(RRH), nodes in distributed antenna system (DAS), relay device, networknode, node device, etc.

Cloud radio access networks (RAN) can enable the implementation ofconcepts such as software-defined network (SDN) and network functionvirtualization (NFV) in 5G networks. This disclosure can facilitate ageneric channel state information framework design for a 5G network.Certain embodiments of this disclosure can comprise an SDN controllerthat can control routing of traffic within the network and between thenetwork and traffic destinations. The SDN controller can be merged withthe 5G network architecture to enable service deliveries via openapplication programming interfaces (“APIs”) and move the network coretowards an all internet protocol (“IP”), cloud based, and softwaredriven telecommunications network. The SDN controller can work with, ortake the place of policy and charging rules function (“PCRF”) networkelements so that policies such as quality of service and trafficmanagement and routing can be synchronized and managed end to end.

Wireless local area networks (WLANs) have long been deployed inunlicensed spectrum bands. The IEEE 802.11 communications standard is anexample of a communications system operating in these bands. A popularimplementation thereof, for example, is WiFi. Numerous versions of theWiFi standard have been developed and deployed over the years such as802.11a/b/g/n/ac/ax. One characteristic of this evolution is the everincreasing bandwidth these communications standards can offer. Forexample, IEEE 802.11a started out with 20 MHz bandwidth whereby thelatest generation, WiFi 6 or 802.11ax, can access up to 160 MHz. Thestandards associated with WiFi (e.g., all versions) define how devicescan transmit using unlicensed spectrum. A device operating using WiFi,first listens on the portion of the subband (e.g., a subbands of 20 MHz)until there is no traffic before transmitting using that subband (e.g.,also referred to as “sensing” or “scanning”). The sensing beforetransmitting applies to transmission on both uplink and downlink.Sensing is a method for checking for energy on a given subband during atime-slot. In particular, an energy detection threshold is defined persaid LBT subband and whether the medium is occupied or idle isdetermined per LBT subband based on whether the measurement results in avalue larger or smaller than said detection threshold. If for a givensubband, the threshold is exceeded, it is considered occupied or busy;otherwise it is considered idle (e.g., available to transmit for apredefined timeframes/timeslots, for example, ten timeslots).

Due to the unlicensed or lightly licensed nature of the spectrum inquestion, devices operating in these bands must share the resources in away that ensures fair coexistence among them regardless of their radioaccess technology (RAT). This is achieved by clear channel assessment(CCA) prior to a device's transmission. This procedure is often referredto as Listen-Before-Talk (LBT) since prior to any transmission thedevice first listens whether the channel is occupied by measuring thereceived power across a predetermined bandwidth. It only commences atransmission (or talks) when said received power is below a certainthreshold thereby guaranteeing that its own transmission does not causeany harmful interference.

While new generations of each communications standard have broughtforward ever-increasing transmission bandwidths, the sensing hasremained basically unchanged. Even the latest generation of WiFi devicesstill senses on the original bandwidth of 20 MHz supported by theoriginal version 802.11a. This is because legacy devices are still inoperation such that sensing on a wide bandwidth that is occupied by anarrowband device may not trigger the medium to be occupied resulting inunwanted interference from the wideband device towards the narrowbanddevice occupying the channel. Hence, even for devices that support widebandwidths much larger than 20 MHz, the sensing is performed in units of20 MHz (described more in FIG. 2). Assume a base station is capable ofsupporting a very large bandwidth 220 with a single serving cell.According to the above, said base station may perform physical sensingfor the purpose of clear channel assessment in chunks of 20 MHz subbands(e.g., 202, 204, 206, and 208 of FIG. 2). In particular, an energydetection threshold is defined per said LBT subband and whether themedium is occupied or idle is determined per LBT subband based onwhether the measurement results in a value larger or smaller than saiddetection threshold. If for a given subband the threshold is exceeded,it is considered occupied or busy; otherwise it is considered idle.

The Long-Term Evolution (LTE) communications standard of the ThirdGeneration Partnership project (3GPP) in its Release #13 introduced afeature called LTE licensed assisted access (LTE-LAA) that allows 3GPPLTE devices to operate on unlicensed bands whereby such access iscontrolled from a licensed carrier. LTE-LAA is based on the LTE standardfor licensed carriers and makes it suitable for unlicensed spectrumthrough enhancements. LTE-LAA has further been evolved in LTE Releases14 and 15. In Release 16 a New Radio (NR) interface was specified forNR-based access to unlicensed spectrum. It has been developed in Release15 for licensed bands and has been enhanced in Rel. 16 to also operatein unlicensed spectrum. Unlike LTE-LAA, NR-U (NR-based access tounlicensed spectrum) has two flavors. A non-standalone flavor called LAAthat requires a licensed carrier and a standalone one which can bedeployed without assistance of a licensed carrier.

The state-of-the-art in LTE-LAA for wideband operation is based on thecarrier aggregation (CA) framework. Instead of operating a singleserving cell on a single wideband carrier, each LBT subband (e.g., 202,204, 206 and 208 of FIG. 2) is operated and configured as a separateserving cell or carrier. The primary cell is called the PCell and isoperated on the primary component carrier (PCC). In LAA mode, thePCell/PCC is always in licensed spectrum. The remaining cells/carriersare the secondary cells (SCells) and secondary component carriers(SCCs), respectively. The Radio Resource Control (RRC) protocol canconfigure SCells/SCCs accordingly via signaling on the PCell/PCC. SCCscan be aggregated from both licensed and unlicensed spectrum. Forexample, a device may be configured with a first plurality of componentcarriers (CCs) in licensed bands and a second plurality of componentcarriers (CCs) in unlicensed bands. Through aggregation of these CCswideband operation can be achieved, however, since each SCC has its ownSCell, wideband operation in unlicensed spectrum by means of carrieraggregation requires multiple serving cells.

NR-U supports a similar CA based framework for wideband operation inunlicensed spectrum as LTE does. In addition, NR-U supports widebandoperation in unlicensed spectrum with a single serving cell. In LAAmode, a device may still be configured with a plurality of servingcells, however, these serving cells are configured to operate cells onspectrum in both licensed and unlicensed bands. In an example, a devicemay be RRC configured with multiple serving cells in licensed bands anda single wideband serving cell in unlicensed spectrum. In other words,even though carrier aggregation is used, it is not used to aggregatecells in unlicensed spectrum. A single wideband serving cell is operatedin unlicensed spectrum and the carrier aggregation simply aggregatessaid wideband serving cell in unlicensed spectrum with additionalserving cells in licensed spectrum.

In standalone mode, no CA is needed and a single wideband serving cellcan be operated in unlicensed spectrum spanning multiple LBT subbands.

NR-U specifies a third mode called dual connectivity (DC). Similar toLAA, serving cells in both licensed and unlicensed spectrum areaggregated. However, in addition to one PCell and a single plurality ofSCells, the serving cells are split into two cell groups: a primary cellgroup (PCG) comprising the PCell and a first plurality of SCells and asecondary cell group (SCG) comprising a special primary SCell (pSCell)and a second plurality of SCells. The pSCell of the SCG functionssimilarly to the PCell of the MCG and together with the PCell, PCell andpSCell are called special cells. In the DC mode of NR-U, the MCG isoperated in licensed spectrum whereby the SCG is operated in unlicensedspectrum. Wideband operation in unlicensed spectrum can then be achievedby means of multiple CCs in the SCG where each CC spans a single LBTsubband or by means of a single wideband serving cell, i.e., the SCGonly comprises the pSCell.

It should be understood that further variations can be conceived, forexample, but not limited to, combinations where CCs span more than oneLBT subband and the SCG comprises more than one SCell at least one ofwhich spans more than one LBT subband. Generally speaking, widebandoperation is defined by at least one serving cell spanning at least twoLBT subbands regardless of SA, LAA or DC mode.

3GPP defines RF requirements based on the concept of carriers. Forexample, a spectral mask may be defined for each carrier defining howmuch power is allowed to leak from transmissions within the definedcarrier to frequencies outside the defined carrier. A popular metric forsuch out-of-band emissions (OOBE) is the Adjacent Channel Leakage Ratio(ACLR). Based on such spectral masks, filters can be designed andimplemented that ensure transmissions within a certain carrier fulfilrequirements with respect to adjacent channel leakage and out-of-bandemissions. For example, two adjacent bands may be licensed to twooperators that operate their networks in these bands independently. Aslong as all devices operating in each band fulfil specified requirementssuch as the spectral mask, no harmful interference is created among thetwo operators. Since the respective adjacent bands are licensed to eachoperator, they are static as are the filters ensuring the spectral masksare complied with.

In unlicensed spectrum, however, the situation is different. First,narrowband devices coexist with wideband devices. For example, legacydevices of an earlier communications standard may use 20 MHztransmission bandwidth whereas new devices of the latest communicationsstandard use up to 160 MHz transmission bandwidth. Secondly, due to thechannel access procedure, such legacy and new devices access the sharedchannels opportunistically. In a first time instance, a first device maytransmit with 20 MHz bandwidth and in a second time instance a seconddevice may transmit with 160 MHz bandwidth. This is exemplified in FIG.3, FIG. 4 and FIG. 5 below. In FIG. 3, a narrowband device occupiessubband 202 (e.g. 304) while subbands 204, 206 and 208 are idle. In FIG.4, a narrowband device occupies subband 208 (e.g., 404) while subbands202, 204 and 206 are idle. In FIG. 5, a narrowband device occupiessubbands 204 and 206 (e.g., 504 and 506) while subbands 202 and 208 areidle.

If the carrier aggregation framework is used whereby each subband 202,204, 206 and 208 are operated as an independent carrier with its ownserving cell, such dynamicity is not an issue because spectral masks aredefined per carrier, i.e., transmissions on an occupied carrier (LBTsubband respectively) will not leak power into adjacent idle subbandssimilar to the example of two operators using two adjacent carriers inthe example above. If, however, a single serving cell/carrier 220 isused in FIG. 3, FIG. 4 and FIG. 5, then RF leakage and blockage becomean issue because spectral masks are traditionally defined per carrier,i.e., in this case for the entire bandwidth spanning all four subbands202, 204, 206 and 208 (namely the bandwidth of the carrier 220). In someembodiments disclosure proposes apparatus and methods to allowdiscontinuous transmissions in a wideband carrier whereby the gapscreating the discontinuous transmissions in frequency domain result fromnarrowband transmitters occupying the spectrum in said gaps in anuncoordinated manner.

In some embodiments, a device can comprise a processor and a memory thatstores executable instructions that, when executed by the processor,facilitate performance of operations comprising a discontinuous accessto unlicensed spectrum in a new radio access environment. In someembodiments, apparatus and methods are disclosed to facilitate toindicate to the receiver which subbands are occupied by the intendedtransmitter and which subbands are not occupied by the intendedtransmitter. Based on this information the receiver can set its RF anddigital filters accordingly to prevent RF leakage and blockage. Theindication can be per subband or for all subbands in a singleindication. The indication can be per device or for all devicesconnected to a base station. Moreover, different scheduling schemes areproposed to allow the receiver sufficient processing time to adapt itsRF and digital filters between two indications. Wideband operation witha single serving cell or with fewer serving cells as in the case whereeach subband is a separate serving cell has the following benefits: lesssignaling overhead from the reduced number of serving cells; and lessguard bands in frequency domain because adjacent subbands that are idleno longer require guards in frequency to separate them.

According an embodiment, a system can comprise a processor and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations comprising performing ascanning procedure that determines whether a first subband and a secondsubband is available for transmission. The system can further facilitatedetermining, whether the first subband and the second subband areadjacent, wherein a first channel formed at the first subband comprisinga first guard band and a second channel formed at the second subbandcomprising a second guard band. The system can further facilitate inresponse to determining that the first subband and the second subbandare adjacent and available for transmission, eliminating the first guardband and the second guard band.

According to another embodiment, described herein is a method that cancomprise scanning, by a device comprising a processor, to determinewhether a first subband and a second subband are idle. The method canfurther comprise determining, by the device, whether the first subbandand the second subband are adjacent, wherein a first channel formedwithin the first subband comprising a first guard band and a secondchannel formed within the second subband comprising a second guard bandthat is adjacent to the first guard band. The method can furthercomprise in response to the first subband and the second subband beingdetermined to be adjacent and idle, eliminating, by the device, thefirst guard band and the second guard band.

According to yet another embodiment, machine-readable storage medium,comprising executable instructions that, when executed by a processor,facilitate performance of operations, performing a scanning procedurethat determines whether a first subband and a second subband contains anenergy level below a threshold. The machine-readable storage medium canfurther comprise determining whether the first subband and the secondsubband are adjacent, wherein a first channel formed at the firstsubband comprising a first guard band and a second channel formed at thesecond subband comprising a second guard band that is adjacent to thefirst guard band. The machine-readable storage medium can furthercomprise in response to determining that the first subband and thesecond subband are adjacent and determining that the energy level isbelow the threshold, eliminating the first guard band and the secondguard band.

These and other embodiments or implementations are described in moredetail below with reference to the drawings.

FIG. 1 illustrates a non-limiting example of a wireless communicationsystem 100 in accordance with various aspects and embodiments of thesubject disclosure. In one or more embodiments, system 100 can compriseone or more user equipment UEs 102. The non-limiting term user equipmentcan refer to any type of device that can communicate with a network nodein a cellular or mobile communication system. A UE can have one or moreantenna panels having vertical and horizontal elements. Examples of a UEcomprise a target device, device to device (D2D) UE, machine type UE orUE capable of machine to machine (M2M) communications, personal digitalassistant (PDA), tablet, mobile terminals, smart phone, laptop mountedequipment (LME), universal serial bus (USB) dongles enabled for mobilecommunications, a computer having mobile capabilities, a mobile devicesuch as cellular phone, a laptop having laptop embedded equipment (LEE,such as a mobile broadband adapter), a tablet computer having a mobilebroadband adapter, a wearable device, a virtual reality (VR) device, aheads-up display (HUD) device, a smart car, a machine-type communication(MTC) device, and the like. User equipment UE 102 can also comprise IOTdevices that communicate wirelessly.

In various embodiments, system 100 is or comprises a wirelesscommunication network serviced by one or more wireless communicationnetwork providers. In example embodiments, a UE 102 can becommunicatively coupled to the wireless communication network via anetwork node 104. The network node (e.g., network node device) cancommunicate with user equipment (UE), thus providing connectivitybetween the UE and the wider cellular network. The UE 102 can sendtransmission type recommendation data to the network node 104. Thetransmission type recommendation data can comprise a recommendation totransmit data via a closed loop MIMO mode and/or a rank-1 precoder mode.

A network node can have a cabinet and other protected enclosures, anantenna mast, and multiple antennas for performing various transmissionoperations (e.g., MIMO operations). Network nodes can serve severalcells, also called sectors, depending on the configuration and type ofantenna. In example embodiments, the UE 102 can send and/or receivecommunication data via a wireless link to the network node 104. Thedashed arrow lines from the network node 104 to the UE 102 representdownlink (DL) communications and the solid arrow lines from the UE 102to the network nodes 104 represents an uplink (UL) communication.

System 100 can further include one or more communication serviceprovider networks 106 that facilitate providing wireless communicationservices to various UEs, including UE 102, via the network node 104and/or various additional network devices (not shown) included in theone or more communication service provider networks 106. The one or morecommunication service provider networks 106 can include various types ofdisparate networks, including but not limited to: cellular networks,femto networks, picocell networks, microcell networks, internet protocol(IP) networks Wi-Fi service networks, broadband service network,enterprise networks, cloud based networks, millimeter wave networks andthe like. For example, in at least one implementation, system 100 can beor include a large scale wireless communication network that spansvarious geographic areas. According to this implementation, the one ormore communication service provider networks 106 can be or include thewireless communication network and/or various additional devices andcomponents of the wireless communication network (e.g., additionalnetwork devices and cell, additional UEs, network server devices, etc.).The network node 104 can be connected to the one or more communicationservice provider networks 106 via one or more backhaul links 108. Forexample, the one or more backhaul links 108 can comprise wired linkcomponents, such as a T1/E1 phone line, a digital subscriber line (DSL)(e.g., either synchronous or asynchronous), an asymmetric DSL (ADSL), anoptical fiber backbone, a coaxial cable, and the like. The one or morebackhaul links 108 can also include wireless link components, such asbut not limited to, line-of-sight (LOS) or non-LOS links which caninclude terrestrial air-interfaces or deep space links (e.g., satellitecommunication links for navigation).

Wireless communication system 100 can employ various cellular systems,technologies, and modulation modes to facilitate wireless radiocommunications between devices (e.g., the UE 102 and the network node104). While example embodiments might be described for 5G new radio (NR)systems, the embodiments can be applicable to any radio accesstechnology (RAT) or multi-RAT system where the UE operates usingmultiple carriers e.g. LTE FDD/TDD, GSM/GERAN, CDMA2000 etc.

For example, system 100 can operate in accordance with global system formobile communications (GSM), universal mobile telecommunications service(UMTS), long term evolution (LTE), LTE frequency division duplexing (LTEFDD, LTE time division duplexing (TDD), high speed packet access (HSPA),code division multiple access (CDMA), wideband CDMA (WCMDA), CDMA2000,time division multiple access (TDMA), frequency division multiple access(FDMA), multi-carrier code division multiple access (MC-CDMA),single-carrier code division multiple access (SC-CDMA), single-carrierFDMA (SC-FDMA), orthogonal frequency division multiplexing (OFDM),discrete Fourier transform spread OFDM (DFT-spread OFDM) single carrierFDMA (SC-FDMA), Filter bank based multi-carrier (FBMC), zero tailDFT-spread-OFDM (ZT DFT-s-OFDM), generalized frequency divisionmultiplexing (GFDM), fixed mobile convergence (FMC), universal fixedmobile convergence (UFMC), unique word OFDM (UW-OFDM), unique wordDFT-spread OFDM (UW DFT-Spread-OFDM), cyclic prefix OFDM CP-OFDM,resource-block-filtered OFDM, Wi Fi, WLAN, WiMax, and the like. However,various features and functionalities of system 100 are particularlydescribed wherein the devices (e.g., the UEs 102 and the network device104) of system 100 are configured to communicate wireless signals usingone or more multi carrier modulation schemes, wherein data symbols canbe transmitted simultaneously over multiple frequency subcarriers (e.g.,OFDM, CP-OFDM, DFT-spread OFMD, UFMC, FMBC, etc.). The embodiments areapplicable to single carrier as well as to multicarrier (MC) or carrieraggregation (CA) operation of the UE. The term carrier aggregation (CA)is also called (e.g. interchangeably called) “multi-carrier system”,“multi-cell operation”, “multi-carrier operation”, “multi-carrier”transmission and/or reception. Note that some embodiments are alsoapplicable for Multi RAB (radio bearers) on some carriers (that is dataplus speech is simultaneously scheduled).

In various embodiments, system 100 can be configured to provide andemploy 5G wireless networking features and functionalities. 5G wirelesscommunication networks are expected to fulfill the demand ofexponentially increasing data traffic and to allow people and machinesto enjoy gigabit data rates with virtually zero latency. Compared to 4G,5G supports more diverse traffic scenarios. For example, in addition tothe various types of data communication between conventional UEs (e.g.,phones, smartphones, tablets, PCs, televisions, Internet enabledtelevisions, etc.) supported by 4G networks, 5G networks can be employedto support data communication between smart cars in association withdriverless car environments, as well as machine type communications(MTCs). Considering the drastic different communication needs of thesedifferent traffic scenarios, the ability to dynamically configurewaveform parameters based on traffic scenarios while retaining thebenefits of multi carrier modulation schemes (e.g., OFDM and relatedschemes) can provide a significant contribution to the highspeed/capacity and low latency demands of 5G networks. With waveformsthat split the bandwidth into several sub-bands, different types ofservices can be accommodated in different sub-bands with the mostsuitable waveform and numerology, leading to an improved spectrumutilization for 5G networks.

To meet the demand for data centric applications, features of proposed5G networks may comprise: increased peak bit rate (e.g., 20 Gbps),larger data volume per unit area (e.g., high system spectralefficiency—for example about 3.5 times that of spectral efficiency oflong term evolution (LTE) systems), high capacity that allows moredevice connectivity both concurrently and instantaneously, lowerbattery/power consumption (which reduces energy and consumption costs),better connectivity regardless of the geographic region in which a useris located, a larger numbers of devices, lower infrastructuraldevelopment costs, and higher reliability of the communications. Thus,5G networks may allow for: data rates of several tens of megabits persecond should be supported for tens of thousands of users, 1 gigabit persecond to be offered simultaneously to tens of workers on the sameoffice floor, for example; several hundreds of thousands of simultaneousconnections to be supported for massive sensor deployments; improvedcoverage, enhanced signaling efficiency; reduced latency compared toLTE.

The upcoming 5G access network may utilize higher frequencies (e.g., >6GHz) to aid in increasing capacity. Currently, much of the millimeterwave (mmWave) spectrum, the band of spectrum between 30 GHz and 300 GHzis underutilized. The millimeter waves have shorter wavelengths thatrange from 10 millimeters to 1 millimeter, and these mmWave signalsexperience severe path loss, penetration loss, and fading. However, theshorter wavelength at mmWave frequencies also allows more antennas to bepacked in the same physical dimension, which allows for large-scalespatial multiplexing and highly directional beamforming.

Performance can be improved if both the transmitter and the receiver areequipped with multiple antennas. Multi-antenna techniques cansignificantly increase the data rates and reliability of a wirelesscommunication system. The use of multiple input multiple output (MIMO)techniques, which was introduced in the third-generation partnershipproject (3 GPP) and has been in use (including with LTE), is amulti-antenna technique that can improve the spectral efficiency oftransmissions, thereby significantly boosting the overall data carryingcapacity of wireless systems. The use of multiple-input multiple-output(MIMO) techniques can improve mmWave communications and has been widelyrecognized a potentially important component for access networksoperating in higher frequencies. MIMO can be used for achievingdiversity gain, spatial multiplexing gain and beamforming gain. Forthese reasons, MIMO systems are an important part of the 3rd and 4thgeneration wireless systems and are planned for use in 5G systems.

Referring now to FIG. 2, illustrated is an example of a NR with singleserving cell in an unlicensed spectrum 200 in accordance with variousaspects and embodiments described herein. Repetitive description of likeelements employed in other embodiments described herein is omitted forsake of brevity. In some embodiments, a user equipment (UE) isconfigured with carrier 220 (e.g., a single serving carrier/cell) andmultiple Control Resource Sets (CORESETs) and search spaces such that itmonitors for potential Physical Downlink Control Channel (PDCCH)transmissions 210, 212, 214 and 216 in each LBT subband 202, 204, 206and 208. In an Orthogonal Frequency Division Multiple Access (OFDMA)system such as the Third Generation Partnership Project (3GPP) New Radio(NR) wireless communications standard, the UE may, for example, monitorfor PDCCH transmissions per subband 210, 212, 214 and 216 according tothe above configured CORESETs and search spaces at every OFDM symbolboundary 240. Monitoring here comprises either blindly decoding PDCCHcandidates, or, alternatively, detecting the PDCCH DemodulationReference Signal (DMRS). In the latter case, the UE may only decode thePDCCH if it first detects PDCCH DMRS.

Referring now to FIG. 3, illustrated is an example of a NR with singleserving cell in an unlicensed spectrum 300 in accordance with variousaspects and embodiments described herein. Repetitive description of likeelements employed in other embodiments described herein is omitted forsake of brevity. As discussed above, a device may not transmit unlessthe subband is idle. In some embodiments, as illustrated, subband 202(e.g., at 304) and for PDCCH channel 210, is not idle. As illustrated,subbands 204, 206 and 208 are idle.

Referring now to FIG. 4, illustrated is an example of a NR with singleserving cell in an unlicensed spectrum 400 in accordance with variousaspects and embodiments described herein. Repetitive description of likeelements employed in other embodiments described herein is omitted forsake of brevity. In some embodiments, as illustrated, subband 208 (e.g.,at 404) and for PDCCH channel 216, is not idle and subbands 202, 204 and206 are idle. Thus, subbands 202, 204 and 206 may be available fortransmission by either UE or gNB for uplink or downlink.

Referring now to FIG. 5, illustrated is an example of a NR with singleserving cell in an unlicensed spectrum 500 in accordance with variousaspects and embodiments described herein. Repetitive description of likeelements employed in other embodiments described herein is omitted forsake of brevity. In some embodiments, as illustrated, subbands 204 and206 (e.g., at 504 and 506) and for PDCCH channels 212 and 214, are notidle and subbands 202 and 208 are idle. Thus, subbands 202 and 208 maybe available for transmission by either UE or gNB for uplink ordownlink.

Due to the unlicensed nature of the spectrum in consideration, atransmitter may only transmit or occupy a channel after first sensingwhether the channel is idle or busy/occupied. If the channel is foundidle, the transmitter may occupy the channel up to the maximum channeloccupancy time (MCOT). The duration for which the transmitter actuallyoccupies the channel, up to the MCOT, is called the channel occupancytime (COT).

A UE may continuously monitor for PDCCH transmissions on every OFDMsymbol (or a subset thereof). When the base station it is connected tois transmitting in its COT, a UE may receive PDCCH transmissionsscheduling Physical Downlink Shared Channel (PDSCH) transmissioncarrying data. A UE may also be indicated that a COT has started by achannel or signal common to all UEs that is transmitted at the beginningof the COT. Without limiting the embodiments herein, and solely for easeof exposition, we will assume a group common PDCCH (GC-PDCCH) canindicate to a UE the beginning of a COT, however, someone skilled in theart can conceive other means. Assumption of a GC-PDCCH thus shall not beconstrued in a limiting sense. Regardless of whether and how thebeginning of a COT is indicated to a UE, when a UE first monitors for aPDCCH or GC-PDCCH, it assumes all transmissions are contained within anLBT subband. This does not mean, all transmissions are contained withina single LBT subband, rather, each transmission is assumed to becontained within a single LBT subband as illustrated in slot 240. Thisassumption is necessary because for the first transmission of a COT, theUE does not know which LBT subbands 202, 204, 206 or 208 were detectedidle at the gNB prior to transmission.

Referring now to FIG. 6, illustrated is an example of a NR with singleserving cell in an unlicensed spectrum 600 in accordance with variousaspects and embodiments described herein. Repetitive description of likeelements employed in other embodiments described herein is omitted forsake of brevity. In some embodiments, for time slot 640 the subbands202, 204 and 208 can be detected as idle whereas subband 206 is detectedas busy at the transmitter prior to transmission.

In some embodiments, the UE sets its receive filters such that each LBTsubband is isolated from interference outside a given subband. In otherwords, bandpass filters are used whose passbands correspond to a singleLBT subband and whose stopbands cover adjacent LBT subbands. Sinceperfect rectangular filters are not practically implementable, thisrequires guards between each LBT subband which cannot be used fortransmission of signals or channels. Consequently, the PDCCH and othersignals and channels transmitted at the beginning of a COT are mapped toa region in frequency domain smaller than the size of an LBT subband.For example, the size in frequency domain of an LBT subband may be 20MHZ. Due to the passband filtering per LBT subband at the beginning of aCOT, the useful region in frequency domain in which signals and channelscan be transmitted may be 90% of that assuming a 5% guard band(discussed in FIG. 7) at each side of the LBT subband.

Given this UE behavior, when the UE first monitors for a PDCCH 210-216(or a subset thereof) or for a GC-PDCCH (or any other signal or channel)at the beginning of a COT, each transmission is perfectly isolated towithin one LBT subband and due to the per LBT subband passbandfiltering, energy of said transmission does not leak into neighboringLBT subbands that potentially may be occupied by a differenttransmitter-receiver pair and conversely, energy of transmissions fromdifferent transmitter-receiver pairs in adjacent LBT subbands does notleak into the UE's LBT subband where it tries to decode a PDCCH 210-216(or a subset thereof) or a GC-PDCCH or any other signal or channel.Usage of PDCCH and GC-PDCCH names is for example purposes and should notto be construed in a limiting sense.

Since the transmitter cannot know in advance which LBT subbands will beoccupied or busy, such a UE behavior also allows the transmitter toprepare each PDCCH, PDSCH or other signal or channel per LBT subbandregardless of which LBT subbands will actually be occupied/idle at thetime of transmission. In order to not leak energy into adjacent occupiedLBT subbands, the transmitter likewise uses passband filters to isolateLBT subbands at the beginning of a COT.

For the second slot 642 in a COT the transmitter has the duration of thefirst slot 640 to prepare a PDCCH 210-216 (or a subset thereof) or PDSCHor another signal or channel according to the actually occupied LBTsubbands in this COT. In some embodiments, in order to avoid unnecessaryguard bands between adjacent LBT subbands that are idle, the transmitterand receiver may change their behavior.

Referring now to FIG. 7, illustrated is an example of a NR system withsingle serving cell in an unlicensed spectrum 700 in accordance withvarious aspects and embodiments described herein. Repetitive descriptionof like elements employed in other embodiments described herein isomitted for sake of brevity. In some embodiments, every subband that isavailable for transmission, for example, subband 202, 204 and 208, apair of guard bands are provided, one at each edge. According to theexemplary illustration, subband 202 comprises a pair of guard bands 760and 762 located at the edge, subband 204 comprises a pair of guard bands764 and 766 located at the edge, and subband 208 comprises a pair ofguard bands 768 and 770 located at the edge. When there are two adjacentsubbands 202 and 204 available for transmission, there exists a pair ofadjacent guard bands 762 and 764. In some embodiments, the guard bandsare 760, 764, 766, 768 and 770 are placed at the edges of subbands andgenerally occupy 5% of the subband bandwidth. Thus, a total for up 10%of the bandwidth is allocated to prevent leakage. These number, however,serve as example and ought not be construed in a limiting sense.

In some embodiments, when determined that adjacent subbands 202 and 204are available for transmission, the transmitter and receiver may changetheir behavior in order to eliminate the adjacent guard bands 762 and764 for future time slots (for example 642) in order to utilize themaximum bandwidth possible. By eliminating the adjacent guard bands 762and 764 (e.g., portion 610), the bandwidth/frequency occupied by theadjacent guard bands can be utilized to transmit essential data to thereceiver, for example, but not limited to, user data, payload data,channel data, signal data (e.g., any data that a receiver can utilize).In some embodiment, eliminating the adjacent guard bands 762 and 764frees up the frequency to transmit portion of user data or any essentialinformation used by the receiver during the guard time (e.g., a portionwhere the guard band was used to prevent leakage). For example, thereceiver and transmitter may use passband filters per contiguous groupof idle LBT subbands 202 and 204 rather than per LBT subband asillustrated for the second slot 642. This eliminates the guard bands 762and 764 between subbands 202 and 204 thereby increasing spectralefficiency and throughput.

In some embodiments, the COT structure in frequency domain is indicatedto the UE explicitly. For example, a bitmap of length corresponding tothe number of LBT subbands can indicate to the UE which LBT subband isidle and occupied. For example, the n-th bit in the bitmap maycorrespond to the n-th LBT subband whereby n=1 corresponds to the LBTsubband with the lowest center frequency, n=2 corresponds to the LBTsubband with the second lowest center frequency, and so forth. If then-th bit is one, the UE sets its bandpass filter such that the n-thsubband is in its passband, otherwise, if the n-th bit is zero, the UEsets its bandpass filter such that the n-th subband is in its stopbandwhereby the passbands are continuous within a set of contiguous subbandsthat are idle. In the example in FIG. 7, the signaled bitmap would thusbe [1 0 1 1] and there would not be a guard interval in frequency domainbetween subbands 202 and 204 in the second slot 642 unlike the firstslot 640.

Such explicitly indication can happen in a group-common way using aGC-PDCCH or in a UE specific way using a PDCCH. For example, a GC-PDCCHtransmitted at the beginning of a COT in slot 640, specifically in oneor more of subbands 202, 204, 206 and 208 (PDCCH regions 210, 212, 214,216 respectively) may indicate the frequency domain structure of the COTaccording to the embodiments herein. When the UE monitors for theGC-PDCCH, it sets its bandpass filters with passbands per LBT subbandsresulting in guard bands between each LBT subband as depicted in FIG. 7in the first slot 640. Transmissions in the first slot of a COT 640 thuscannot span the entire LBT subband. After the UE decodes the GC-PDCCHand detects the beginning of COT, for subsequent slots 642 . . . in theCOT, it sets its bandpass filters according to the embodiments herein,e.g., using the bitmap in the GC-PDCCH it sets its bandpass filters suchthat passbands span contiguous sets of LBT subbands that are idlethereby avoiding unnecessary guards between adjacent idle LBT subbands.Note that the length of the COT may also be indicated in the GC-PDCCHsuch that the UE knows when to revert to per LBT subband filtering andmapping of signals and channels at the beginning of a new COT.

In some embodiments, the beginning of a COT is not indicated to the UEby a group-common channel or signal such as the GC-PDCCH. Rather, eachPDCCH scheduling a PDSCH or triggering a reference signal transmissionindicates the UE behavior in regard to filtering and mapping. In orderfor the UE to change its filtering behavior, the PDCCH and correspondingPDSCH or reference signal are separated in time. For example, a PDSCH orreference signal scheduled/triggered within the same slot uses per LBTsubband filtering/mapping whereas a PDSCH or reference signalscheduled/triggered for the next slot uses filtering/mapping accordingto the embodiments herein. This allows the UE to change its filtersbetween the scheduling/triggering PDCCH and the reception of thescheduled/triggered channel/signal.

In some embodiments, implicit signaling of the COT structure infrequency domain is used. Instead of explicitly signaling a bitmap thereceiver constructs said bitmap implicitly by the following procedure:If a signal/channel indicating the beginning of a COT isdetected/decoded in the n-th LBT subband the receiver assumes the n-thbit of the bitmap is 1. Otherwise, it assumes the n-th bit is zero.

In some embodiments, the duration of time slots 640 and 642 does notcorrespond to one slot but rather a given number of OFDM symbols.

In some embodiments, there may be a guard time between the first slotand the second slot to allow UE(s) to switch RF filtering. In someembodiments, the guard time may not contain control or data meant forthe UE. Although not shown in the figures, a guard time may be at edgeof timeslot, wherein a portion of user data is sent in the first slotand a portion is sent in the second slot and onwards after a guard time(between the first and second slot). No receiver essential informationis contained in this guard time.

In some embodiments, the explicit signaling of the bitmap either via aGC-PDCCH or PDCCH according to the embodiments herein is licenseassisted. In License Assisted Access (LAA), a UE is configured withcarriers in unlicensed spectrum and licensed spectrum. Use of licensedspectrum is exclusively, hence, the concept of LBT and LBT subbands doesnot apply. The transmitter can transmit in licensed spectrum without aCCA procedure. In LAA, the GC-PDCCH or PDCCH indicating the frequencystructure of the COT can be signaled from the licensed carrier wherebythe UE receives the indication on a first licensed carrier but appliesthe associated UE behavior (bandpass filtering, mapping ofsignals/channels, etc.) on a second carrier 220 in unlicensed spectrum.The embodiments herein are described from the downlink perspective of acellular communications system, i.e., transmitter and base station areused interchangeably. Likewise, receiver and UE are usedinterchangeably. This is for ease of exposition and ought not to beconstrued in a limiting sense.

In some embodiments, a given UE can receive at most one datatransmission per slot 640 or 642. The data is transmitted by a singlecontiguous PDSCH. Said PDSCH (e.g., 602) could be mapped to a single LBTsubband (e.g. 202) in the first slot of a COT 640, said PDSCH (e.g.,614) could be mapped to a single LBT subband (e.g. 208) in the secondslot of a COT 642, or said PDSCH (e.g., 610) could be mapped to multipleLBT subbands (e.g. 202 and 204).

In some embodiments, a given UE can receive more than one datatransmission per slot 640 or 642. The data is transmitted by a singlePDSCH which may or may not be contiguous. The single PDCCH is scheduledby a single downlink control information (DCI) transmitted using asingle PDCCH. For example, said single PDSCH may contain a plurality ofcodewords, whereby each codeword is mapped to a single set comprisingone or more contiguous LBT subbands. For example, a single PDSCHcomprising two codewords could be mapped to LBT subbands 202, 204 and208 whereby a first codeword 610 is mapped to a first set of contiguousLBT subbands 202 and 204 and whereby a second codeword 614 is mapped toa second set of contiguous LBT subbands 208.

In some embodiments, a given UE can receive more than one datatransmission per slot 640 or 642. The data is transmitted using aplurality of PDSCH. Each PDSCH is scheduled by its own separate DCIcarried by its own separate PDCCH. For example, a first PDSCH 610 istransmitted in LBT subbands 202 and 204 and is scheduled by a first DCItransmitted by a first PDCCH. A second PDSCH 614 is transmitted in LBTsubband 208 and is scheduled by a second DCI transmitted by a secondPDCCH.

In some embodiments, the COT may be shared between a gNB and one or moreUEs. A shared COT means that one transmitter imitates the COT, usuallyby means of a CCA procedure using LBT, whereas another transmitter mayalso transmit within the same COT either without using a CCA procedureby itself or, alternatively, using a modified CCA procedure fortransmitters that do not initiate COTs within which they transmit. Incase of a shared COT, a UE that has not initiated the COT but transmitswithin it, sets its filters and maps channels/signals according to theembodiments herein. For example, a UE may set its filters according tothe embodiments herein for reception from a gNB that has initiated aCOT. Within the duration of the gNB initiated COT, the duplex directionswitches from downlink to uplink making the UE the transmitter and thegNB the receiver. UE and gNB, now with reversed roles (gNB is thereceiver, UE the transmitter) continue to use the same filtering asbefore for slots 642 other than the first slot of the COT whentransmitting and receiving, respectively. A gNB may schedule a UE withina gNB initiated COT regardless of whether said UE first receives datafrom said gNB. The embodiments herein, indicating the frequency domainstructure of the COT and the associated UE behavior in regard tofiltering and mapping of channels/signals can be used by said scheduledUE for its transmission regardless of whether said UE has first receiveddata from the scheduling gNB in the same COT.

FIG. 8 depicts a diagram of an example, non-limiting computerimplemented method that facilitates a discontinuous access to unlicensedspectrum in a new radio access system in accordance with one or moreembodiments described herein. Repetitive description of like elementsemployed in other embodiments described herein is omitted for sake ofbrevity. In some examples, flow diagram 800 can be implemented byoperating environment 1100 described below. It can be appreciated thatthe operations of flow diagram 800 can be implemented in a differentorder than is depicted.

In non-limiting example embodiments, a computing device (or system)(e.g., computer 1104) is provided, the device or system comprising oneor more processors and one or more memories that stores executableinstructions that, when executed by the one or more processors, canfacilitate performance of the operations as described herein, includingthe non-limiting methods as illustrated in the flow diagrams of FIG. 8.

Operation 802 depicts scanning, by a device comprising a processor, todetermine whether a first subband and a second subband are idle (e.g.,determine is the subband is available for transmission). Operation 804depicts determining if subband is idle (e.g., available for transmissionof user defined data, channel data or signaling data), then performoperation 806. Otherwise, take no action and continue monitoring theconnection. Operation 806 depicts determining, by the device, whetherthe first subband and the second subband are adjacent, wherein a firstchannel formed within the first subband comprising a first guard bandand a second channel formed within the second subband comprising asecond guard band that is adjacent to the first guard band. Operation808 depicts in response to the first subband and the second subbandbeing determined to be adjacent and idle, eliminating, by the device,parts of the first guard bands and parts of the second guard bands(e.g., if the subbands are adjacent, then remove the parts of the guardbands that are not at the edge of the adjacent subbands and utilize bothsubbands entirely (except at the edge of the contiguous set of subbands)to transmit data instead of reserving the frequency guard band). Theadvantage is that additional bandwidth can be available to use fortransmitting various data, that is not guard data, including, but notlimited to user defined data, payload data, signaling data, channeldata.

FIG. 9 depicts a diagram of an example, non-limiting computerimplemented method that facilitates a discontinuous access to unlicensedspectrum in a new radio access system in accordance with one or moreembodiments described herein. Repetitive description of like elementsemployed in other embodiments described herein is omitted for sake ofbrevity. In some examples, flow diagram 900 can be implemented byoperating environment 1100 described below. It can be appreciated thatthe operations of flow diagram 900 can be implemented in a differentorder than is depicted.

In non-limiting example embodiments, a computing device (or system)(e.g., computer 1104) is provided, the device or system comprising oneor more processors and one or more memories that stores executableinstructions that, when executed by the one or more processors, canfacilitate performance of the operations as described herein, includingthe non-limiting methods as illustrated in the flow diagrams of FIG. 9.

Operation 902 depicts scanning, by a device comprising a processor, todetermine whether a first subband and a second subband are idle (e.g.,determine is the subband is available for transmission). Operation 904depicts determining if subband is idle (e.g., available for transmissionof user defined data, channel data or signaling data), then performoperation 906. Otherwise, take no action and continue monitoring theconnection. Operation 906 depicts determining, by the device, whetherthe first subband and the second subband are adjacent, wherein a firstchannel formed within the first subband comprising a first guard bandand a second channel formed within the second subband comprising asecond guard band that is adjacent to the first guard band. Operation908 depicts in response to the first subband and the second subbandbeing determined to be adjacent and idle, eliminating, by the device,parts of the first guard bands and parts of the second guard bands(e.g., if the subbands are adjacent, then remove the parts of the guardbands that are not at the edge of the adjacent subbands and utilize bothsubbands entirely (except at the edge of the contiguous set of subbands)to transmit data instead of reserving the frequency guard band). Theadvantage is that additional bandwidth can be available to use fortransmitting various data, that is not guard data, including, but notlimited to user defined data, payload data, signaling data, channeldata. Operation 910 depicts indicating, by the device, to a transmitterthat the first subband and the second subband are available fortransmission for a first period of time. The advantage is that allfuture communication (e.g., time slot 642 and beyond) using the twoadjacent subband will transmit data without the middle guard bands(e.g., 762 and 764).

Referring now to FIG. 10, illustrated is an example block diagram of anexample mobile handset 1000 operable to engage in a system architecturethat facilitates wireless communications according to one or moreembodiments described herein. Although a mobile handset is illustratedherein, it will be understood that other devices can be a mobile device,and that the mobile handset is merely illustrated to provide context forthe embodiments of the various embodiments described herein. Thefollowing discussion is intended to provide a brief, general descriptionof an example of a suitable environment in which the various embodimentscan be implemented. While the description includes a general context ofcomputer-executable instructions embodied on a machine-readable storagemedium, those skilled in the art will recognize that the innovation alsocan be implemented in combination with other program modules and/or as acombination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, includingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and includes both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules, orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules, or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

The handset includes a processor 1002 for controlling and processing allonboard operations and functions. A memory 1004 interfaces to theprocessor 1002 for storage of data and one or more applications 1006(e.g., a video player software, user feedback component software, etc.).Other applications can include voice recognition of predetermined voicecommands that facilitate initiation of the user feedback signals. Theapplications 1006 can be stored in the memory 1004 and/or in a firmware1008, and executed by the processor 1002 from either or both the memory1004 or/and the firmware 1008. The firmware 1008 can also store startupcode for execution in initializing the handset 1000. A communicationscomponent 1010 interfaces to the processor 1002 to facilitatewired/wireless communication with external systems, e.g., cellularnetworks, VoIP networks, and so on. Here, the communications component1010 can also include a suitable cellular transceiver 1011 (e.g., a GSMtransceiver) and/or an unlicensed transceiver 1013 (e.g., Wi-Fi, WiMax)for corresponding signal communications. The handset 1000 can be adevice such as a cellular telephone, a PDA with mobile communicationscapabilities, and messaging-centric devices. The communicationscomponent 1010 also facilitates communications reception fromterrestrial radio networks (e.g., broadcast), digital satellite radionetworks, and Internet-based radio services networks.

The handset 1000 includes a display 1012 for displaying text, images,video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 1012 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 1012 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface1014 is provided in communication with the processor 1002 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE1394) through a hardwire connection, and other serial input devices(e.g., a keyboard, keypad, and mouse). This can support updating andtroubleshooting the handset 1000, for example. Audio capabilities areprovided with an audio I/O component 1016, which can include a speakerfor the output of audio signals related to, for example, indication thatthe user pressed the proper key or key combination to initiate the userfeedback signal. The audio I/O component 1016 also facilitates the inputof audio signals through a microphone to record data and/or telephonyvoice data, and for inputting voice signals for telephone conversations.

The handset 1000 can include a slot interface 1018 for accommodating aSIC (Subscriber Identity Component) in the form factor of a cardSubscriber Identity Module (SIM) or universal SIM 1020, and interfacingthe SIM card 1020 with the processor 1002. However, it is to beappreciated that the SIM card 1020 can be manufactured into the handset1000, and updated by downloading data and software.

The handset 1000 can process IP data traffic through the communicationscomponent 1010 to accommodate IP traffic from an IP network such as, forexample, the Internet, a corporate intranet, a home network, a personarea network, etc., through an ISP or broadband cable provider. Thus,VoIP traffic can be utilized by the handset 1000 and IP-based multimediacontent can be received in either an encoded or decoded format.

A video processing component 1022 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 1022can aid in facilitating the generation, editing, and sharing of videoquotes. The handset 1000 also includes a power source 1024 in the formof batteries and/or an AC power subsystem, which power source 1024 caninterface to an external power system or charging equipment (not shown)by a power I/O component 1026.

The handset 1000 can also include a video component 1030 for processingvideo content received and, for recording and transmitting videocontent. For example, the video component 1030 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 1032 facilitates geographically locating the handset 1000. Asdescribed hereinabove, this can occur when the user initiates thefeedback signal automatically or manually. A user input component 1034facilitates the user initiating the quality feedback signal. The userinput component 1034 can also facilitate the generation, editing andsharing of video quotes. The user input component 1034 can include suchconventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touchscreen, for example.

Referring again to the applications 1006, a hysteresis component 1036facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 1038 can be provided that facilitatestriggering of the hysteresis component 1036 when the Wi-Fi transceiver1013 detects the beacon of the access point. A SIP client 1040 enablesthe handset 1000 to support SIP protocols and register the subscriberwith the SIP registrar server. The applications 1006 can also include aclient 1042 that provides at least the capability of discovery, play andstore of multimedia content, for example, music.

The handset 1000, as indicated above related to the communicationscomponent 1010, includes an indoor network radio transceiver 1013 (e.g.,Wi-Fi transceiver). This function supports the indoor radio link, suchas IEEE 802.11, for the dual-mode GSM handset 1000. The handset 1000 canaccommodate at least satellite radio services through a handset that cancombine wireless voice and digital radio chipsets into a single handhelddevice.

Referring now to FIG. 11, illustrated is an example block diagram of anexample computer 1100 operable to engage in a system architecture thatfacilitates wireless communications according to one or more embodimentsdescribed herein. The computer 1100 can provide networking andcommunication capabilities between a wired or wireless communicationnetwork and a server (e.g., Microsoft server) and/or communicationdevice. In order to provide additional context for various aspectsthereof, FIG. 11 and the following discussion are intended to provide abrief, general description of a suitable computing environment in whichthe various aspects of the innovation can be implemented to facilitatethe establishment of a transaction between an entity and a third party.While the description above is in the general context ofcomputer-executable instructions that can run on one or more computers,those skilled in the art will recognize that the innovation also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the innovation can also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media can embody computer-readable instructions, datastructures, program modules, or other structured or unstructured data ina data signal such as a modulated data signal, e.g., a carrier wave orother transport mechanism, and includes any information delivery ortransport media. The term “modulated data signal” or signals refers to asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in one or more signals. By way ofexample, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

The techniques described herein can be applied to any device or set ofdevices (machines) capable of running programs and processes. It can beunderstood, therefore, that servers including physical and/or virtualmachines, personal computers, laptops, handheld, portable and othercomputing devices and computing objects of all kinds including cellphones, tablet/slate computers, gaming/entertainment consoles and thelike are contemplated for use in connection with various implementationsincluding those exemplified herein. Accordingly, the general purposecomputing mechanism described below with reference to FIG. 11 is but oneexample of a computing device.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 11 and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe disclosed subject matter also can be implemented in combination withother program modules. Generally, program modules include routines,programs, components, data structures, etc. that perform particulartasks and/or implement particular abstract data types.

In the subject specification, terms such as “store,” “storage,” “datastore,” “data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory, by way of illustration, and not limitation, volatilememory 1120 (see below), non-volatile memory 1122 (see below), diskstorage 1124 (see below), and memory storage 1146 (see below). Further,nonvolatile memory can be included in read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable ROM (EEPROM), or flash memory. Volatile memory caninclude random access memory (RAM), which acts as external cache memory.By way of illustration and not limitation, RAM is available in manyforms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronousDRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM(ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).Additionally, the disclosed memory components of systems or methodsherein are intended to comprise, without being limited to comprising,these and any other suitable types of memory.

Moreover, it will be noted that the disclosed subject matter can bepracticed with other computer system configurations, includingsingle-processor or multiprocessor computer systems, mini-computingdevices, mainframe computers, as well as personal computers, hand-heldcomputing devices (e.g., PDA, phone, watch, tablet computers, netbookcomputers, . . . ), microprocessor-based or programmable consumer orindustrial electronics, and the like. The illustrated aspects can alsobe practiced in distributed computing environments where tasks areperformed by remote processing devices that are linked through acommunications network; however, some if not all aspects of the subjectdisclosure can be practiced on stand-alone computers. In a distributedcomputing environment, program modules can be located in both local andremote memory storage devices.

FIG. 11 illustrates a block diagram of a computing system 1100 operableto execute the disclosed systems and methods in accordance with anembodiment. Computer 1100, which can be, for example, part of thehardware of system 1120, includes a processing unit 1114, a systemmemory 1106, and a system bus 1118. System bus 1118 couples systemcomponents including, but not limited to, system memory 1106 toprocessing unit 1114. Processing unit 1114 can be any of variousavailable processors. Dual microprocessors and other multiprocessorarchitectures also can be employed as processing unit 1114.

System bus 1118 can be any of several types of bus structure(s)including a memory bus or a memory controller, a peripheral bus or anexternal bus, and/or a local bus using any variety of available busarchitectures including, but not limited to, Industrial StandardArchitecture (ISA), Micro-Channel Architecture (MSA), Extended ISA(EISA), Intelligent Drive Electronics, VESA Local Bus (VLB), PeripheralComponent Interconnect (PCI), Card Bus, Universal Serial Bus (USB),Advanced Graphics Port (AGP), Personal Computer Memory CardInternational Association bus (PCMCIA), Firewire (IEEE 1194), and SmallComputer Systems Interface (SCSI).

System memory 1106 can include volatile memory 1120 and nonvolatilememory 1122. A basic input/output system (BIOS), containing routines totransfer information between elements within computer 1100, such asduring start-up, can be stored in nonvolatile memory 1122. By way ofillustration, and not limitation, nonvolatile memory 1122 can includeROM, PROM, EPROM, EEPROM, or flash memory. Volatile memory 1120 includesRAM 1112, which acts as external cache memory. By way of illustrationand not limitation, RAM 1112 is available in many forms such as SRAM,dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM(DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), Rambusdirect RAM (RDRAM), direct Rambus dynamic RAM (DRDRAM), and Rambusdynamic RAM (RDRAM).

Computer 1100 can also include removable/non-removable,volatile/non-volatile computer storage media. FIG. 11 illustrates, forexample, disk storage 1124. Disk storage 1124 includes, but is notlimited to, devices like a magnetic disk drive, floppy disk drive, tapedrive, flash memory card, or memory stick. In addition, disk storage1124 can include storage media separately or in combination with otherstorage media including, but not limited to, an optical disk drive suchas a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive),CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive(DVD-ROM). To facilitate connection of the disk storage devices 1124 tosystem bus 1118, a removable or non-removable interface is typicallyused, such as interface 1126.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, random access memory (RAM), read only memory(ROM), electrically erasable programmable read only memory (EEPROM),flash memory or other memory technology, solid state drive (SSD) orother solid-state storage technology, compact disk read only memory (CDROM), digital versatile disk (DVD), Blu-ray disc or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices or other tangible and/or non-transitorymedia which can be used to store desired information. In this regard,the terms “tangible” or “non-transitory” herein as applied to storage,memory or computer-readable media, are to be understood to exclude onlypropagating transitory signals per se as modifiers and do not relinquishrights to all standard storage, memory or computer-readable media thatare not only propagating transitory signals per se. In an aspect,tangible media can include non-transitory media wherein the term“non-transitory” herein as may be applied to storage, memory orcomputer-readable media, is to be understood to exclude only propagatingtransitory signals per se as a modifier and does not relinquish coverageof all standard storage, memory or computer-readable media that are notonly propagating transitory signals per se. For the avoidance of doubt,the term “computer-readable storage device” is used and defined hereinto exclude transitory media. Computer-readable storage media can beaccessed by one or more local or remote computing devices, e.g., viaaccess requests, queries or other data retrieval protocols, for avariety of operations with respect to the information stored by themedium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

It can be noted that FIG. 11 describes software that acts as anintermediary between users and computer resources described in suitableoperating environment 1100. Such software includes an operating system1128. Operating system 1128, which can be stored on disk storage 1124,acts to control and allocate resources of computer 1100. Systemapplications 1130 take advantage of the management of resources byoperating system 1128 through program modules 1132 and program data 1134stored either in system memory 1106 or on disk storage 1124. It is to benoted that the disclosed subject matter can be implemented with variousoperating systems or combinations of operating systems.

A user can enter commands or information into computer 1100 throughinput device(s) 1136. As an example, a mobile device and/or portabledevice can include a user interface embodied in a touch sensitivedisplay panel allowing a user to interact with computer 1100. Inputdevices 1136 include, but are not limited to, a pointing device such asa mouse, trackball, stylus, touch pad, keyboard, microphone, joystick,game pad, satellite dish, scanner, TV tuner card, digital camera,digital video camera, web camera, cell phone, smartphone, tabletcomputer, etc. These and other input devices connect to processing unit1114 through system bus 1118 by way of interface port(s) 1138. Interfaceport(s) 1138 include, for example, a serial port, a parallel port, agame port, a universal serial bus (USB), an infrared port, a Bluetoothport, an IP port, or a logical port associated with a wireless service,etc. Output device(s) 1140 and a move use some of the same type of portsas input device(s) 1136.

Thus, for example, a USB port can be used to provide input to computer1100 and to output information from computer 1100 to an output device1140. Output adapter 1142 is provided to illustrate that there are someoutput devices 1140 like monitors, speakers, and printers, among otheroutput devices 1140, which use special adapters. Output adapters 1142include, by way of illustration and not limitation, video and soundcards that provide means of connection between output device 1140 andsystem bus 1118. It should be noted that other devices and/or systems ofdevices provide both input and output capabilities such as remotecomputer(s) 1144.

Computer 1100 can operate in a networked environment using logicalconnections to one or more remote computers, such as remote computer(s)1144. Remote computer(s) 1144 can be a personal computer, a server, arouter, a network PC, cloud storage, cloud service, a workstation, amicroprocessor based appliance, a peer device, or other common networknode and the like, and typically includes many or all of the elementsdescribed relative to computer 1100.

For purposes of brevity, only a memory storage device 1146 isillustrated with remote computer(s) 1144. Remote computer(s) 1144 islogically connected to computer 1100 through a network interface 1148and then physically connected by way of communication connection 1150.Network interface 1148 encompasses wire and/or wireless communicationnetworks such as local-area networks (LAN) and wide-area networks (WAN).LAN technologies include Fiber Distributed Data Interface (FDDI), CopperDistributed Data Interface (CDDI), Ethernet, Token Ring and the like.WAN technologies include, but are not limited to, point-to-point links,circuit-switching networks like Integrated Services Digital Networks(ISDN) and variations thereon, packet switching networks, and DigitalSubscriber Lines (DSL). As noted below, wireless technologies may beused in addition to or in place of the foregoing.

Communication connection(s) 1150 refer(s) to hardware/software employedto connect network interface 1148 to bus 1118. While communicationconnection 1150 is shown for illustrative clarity inside computer 1100,it can also be external to computer 1100. The hardware/software forconnection to network interface 1148 can include, for example, internaland external technologies such as modems, including regular telephonegrade modems, cable modems and DSL modems, ISDN adapters, and Ethernetcards.

The above description of illustrated embodiments of the subjectdisclosure, including what is described in the Abstract, is not intendedto be exhaustive or to limit the disclosed embodiments to the preciseforms disclosed. While specific embodiments and examples are describedherein for illustrative purposes, various modifications are possiblethat are considered within the scope of such embodiments and examples,as those skilled in the relevant art can recognize.

In this regard, while the disclosed subject matter has been described inconnection with various embodiments and corresponding Figures, whereapplicable, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiments for performing the same, similar, alternative, or substitutefunction of the disclosed subject matter without deviating therefrom.Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the appended claims below.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor may also be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “storage,” “datastore,” “data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

As used in this application, the terms “component,” “system,”“platform,” “layer,” “selector,” “interface,” and the like are intendedto refer to a computer-related entity or an entity related to anoperational apparatus with one or more specific functionalities, whereinthe entity can be either hardware, a combination of hardware andsoftware, software, or software in execution. As an example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration and not limitation, both anapplication running on a server and the server can be a component. Oneor more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media, device readablestorage devices, or machine readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software or firmwareapplication executed by a processor, wherein the processor can beinternal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form.

Moreover, terms like “user equipment (UE),” “mobile station,” “mobile,”“subscriber station,” “subscriber equipment,” “access terminal,”“terminal,” “handset,” and similar terminology, refer to a wirelessdevice utilized by a subscriber or user of a wireless communicationservice to receive or convey data, control, voice, video, sound, gaming,or substantially any data-stream or signaling-stream. The foregoingterms are utilized interchangeably in the subject specification andrelated drawings. Likewise, the terms “access point (AP),” “basestation,” “NodeB,” “evolved Node B (eNodeB),” “home Node B (HNB),” “homeaccess point (HAP),” “cell device,” “sector,” “cell,” “relay device,”“node,” “point,” and the like, are utilized interchangeably in thesubject application, and refer to a wireless network component orappliance that serves and receives data, control, voice, video, sound,gaming, or substantially any data-stream or signaling-stream to and froma set of subscriber stations or provider enabled devices. Data andsignaling streams can include packetized or frame-based flows.

Additionally, the terms “core-network”, “core”, “core carrier network”,“carrier-side”, or similar terms can refer to components of atelecommunications network that typically provides some or all ofaggregation, authentication, call control and switching, charging,service invocation, or gateways. Aggregation can refer to the highestlevel of aggregation in a service provider network wherein the nextlevel in the hierarchy under the core nodes is the distribution networksand then the edge networks. UEs do not normally connect directly to thecore networks of a large service provider but can be routed to the coreby way of a switch or radio area network. Authentication can refer todeterminations regarding whether the user requesting a service from thetelecom network is authorized to do so within this network or not. Callcontrol and switching can refer determinations related to the futurecourse of a call stream across carrier equipment based on the callsignal processing. Charging can be related to the collation andprocessing of charging data generated by various network nodes. Twocommon types of charging mechanisms found in present day networks can beprepaid charging and postpaid charging. Service invocation can occurbased on some explicit action (e.g. call transfer) or implicitly (e.g.,call waiting). It is to be noted that service “execution” may or may notbe a core network functionality as third party network/nodes may takepart in actual service execution. A gateway can be present in the corenetwork to access other networks. Gateway functionality can be dependenton the type of the interface with another network.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,”“prosumer,” “agent,” and the like are employed interchangeablythroughout the subject specification, unless context warrants particulardistinction(s) among the terms. It should be appreciated that such termscan refer to human entities or automated components (e.g., supportedthrough artificial intelligence, as through a capacity to makeinferences based on complex mathematical formalisms), that can providesimulated vision, sound recognition and so forth.

Aspects, features, or advantages of the subject matter can be exploitedin substantially any, or any, wired, broadcast, wirelesstelecommunication, radio technology or network, or combinations thereof.Non-limiting examples of such technologies or networks include Geocasttechnology; broadcast technologies (e.g., sub-Hz, ELF, VLF, LF, MF, HF,VHF, UHF, SHF, THz broadcasts, etc.); Ethernet; X.25; powerline-typenetworking (e.g., PowerLine AV Ethernet, etc.); femto-cell technology;Wi-Fi; Worldwide Interoperability for Microwave Access (WiMAX); EnhancedGeneral Packet Radio Service (Enhanced GPRS); Third GenerationPartnership Project (3GPP or 3G) Long Term Evolution (LTE); 3GPPUniversal Mobile Telecommunications System (UMTS) or 3GPP UMTS; ThirdGeneration Partnership Project 2 (3GPP2) Ultra Mobile Broadband (UMB);High Speed Packet Access (HSPA); High Speed Downlink Packet Access(HSDPA); High Speed Uplink Packet Access (HSUPA); GSM Enhanced DataRates for GSM Evolution (EDGE) Radio Access Network (RAN) or GERAN; UMTSTerrestrial Radio Access Network (UTRAN); or LTE Advanced.

What has been described above includes examples of systems and methodsillustrative of the disclosed subject matter. It is, of course, notpossible to describe every combination of components or methods herein.One of ordinary skill in the art may recognize that many furthercombinations and permutations of the disclosure are possible.Furthermore, to the extent that the terms “includes,” “has,”“possesses,” and the like are used in the detailed description, claims,appendices and drawings such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

Performing aggregation above the RLC makes it possible to perform therouting and aggregation at the same protocol sublayer. Thus, additionalpossibilities in terms of taking into account routing information whileperforming bearer aggregation can be used to facilitate a more efficientsystem. Additionally, it also reduces the impact on standards for lowerprotocol stack layers. Similarly, the benefits of performing aggregationbelow the RLC are that it can reduce the demand for LCID space extensionwhen trying to support 1:1 mapping of UE bearers to backhaul channels.

While the various embodiments are susceptible to various modificationsand alternative constructions, certain illustrated implementationsthereof are shown in the drawings and have been described above indetail. It should be understood, however, that there is no intention tolimit the various embodiments to the specific forms disclosed, but onthe contrary, the intention is to cover all modifications, alternativeconstructions, and equivalents falling within the spirit and scope ofthe various embodiments.

In addition to the various implementations described herein, it is to beunderstood that other similar implementations can be used ormodifications and additions can be made to the describedimplementation(s) for performing the same or equivalent function of thecorresponding implementation(s) without deviating therefrom. Stillfurther, multiple processing chips or multiple devices can share theperformance of one or more functions described herein, and similarly,storage can be effected across a plurality of devices. Accordingly, theinvention is not to be limited to any single implementation, but ratheris to be construed in breadth, spirit and scope in accordance with theappended claims.

What is claimed is:
 1. A system, comprising: a processor; and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: determiningwhether a first subband and a second subband are adjacent, wherein afirst channel formed at the first subband comprises a first guard bandand a second channel formed at the second subband comprises a secondguard band that is adjacent to the first guard band; and in response tothe determining indicating that the first subband and the second subbandare adjacent, eliminating first parts of the first guard band and secondparts of the second guard band.
 2. The system of claim 1, wherein theoperations further comprise: performing a scanning procedure thatdetermines whether the first subband and the second subband areavailable for transmission; and transmitting an indication to notify areceiver that the first subband and the second subband are available fortransmission for a first period of time.
 3. The system of claim 1,wherein the operations further comprise: detecting an energy at thefirst subband; determining whether the energy is below a threshold; andin response to the determining that the energy is below the threshold,performing a scanning procedure.
 4. The system of claim 1, wherein thefirst guard band is allocated a first frequency bandwidth and the secondguard band is allocated a second frequency bandwidth.
 5. The system ofclaim 1, wherein the operations further comprise: transmitting dataselected from a first data group using frequency allocated to the firstparts of the first guard band and the second parts of the second guardband.
 6. The system of claim 5, wherein the first data group comprisestransmit data and signal data.
 7. The system of claim 1, wherein theeliminating the first parts of the first guard band and the second partsof the second guard band comprises adjusting band-pass filtersassociated with the first guard band and the second guard band.
 8. Thesystem of claim 1, wherein the eliminating the first parts of the firstguard band and the second parts of the second guard band comprisesreallocating a portion of frequency associated with the first guard bandand the second guard band to user channel data.
 9. The system of claim1, wherein the eliminating the first parts of the first guard band andthe second parts of the second guard band comprises reallocating aportion of frequency associated with the first guard band and the secondguard band to user signaling data.
 10. The system of claim 1, whereinthe operations further comprise: transmitting user data using the firstsubband and the second subband, wherein the user data comprises at leastin part data required by a receiver.
 11. A method, comprising:determining, by a device comprising a processor, whether a first subbandand a second subband are adjacent and idle, wherein a first channelformed within the first subband comprises a first guard band and asecond channel formed within the second subband comprises a second guardband that is adjacent to the first guard band; and in response to thefirst subband and the second subband being determined to be adjacent andidle, eliminating, by the device, first parts of the first guard bandand second parts of the second guard band.
 12. The method of claim 11,further comprising: scanning, by the device, to determine whether thefirst subband and the second subband are idle, wherein the scanningcomprises detecting an energy level on the first channel and determiningthat the first subband is idle in response to the energy level beingdetermined to be below a threshold.
 13. The method of claim 11, furthercomprising: indicating, by the device, to a transmitter that the firstsubband and the second subband are available for transmission for afirst period of time.
 14. The method of claim 11, further comprising:transmitting, by the device, a group of data selected from a first datagroup using a portion of frequencies allocated to the first parts of thefirst guard band and the second parts of the second guard band.
 15. Themethod of claim 11, wherein the eliminating the first parts of the firstguard band and the second parts of the second guard band comprisesreallocating a portion of frequencies associated with the first guardband and the second guard band to user channel data.
 16. The method ofclaim 11, wherein the eliminating the first parts of the first guardband and the second parts of the second guard band comprisesreallocating a portion of frequencies associated with the first guardband and the second guard band to user signaling data.
 17. The method ofclaim 11, wherein the eliminating the first parts of the first guardband and the second parts of the second guard band comprises adjustingband-pass filters associated with the first guard band and the secondguard band.
 18. The method of claim 11, further comprising:transmitting, by the device, a portion of user data after a guard time,wherein the guard time does not contain information applicable to areceiver.
 19. A machine-readable storage medium, comprising executableinstructions that, when executed by a processor, facilitate performanceof operations, comprising: determining whether a first subband and asecond subband are adjacent, wherein a first channel formed within thefirst subband comprises a first guard band and a second channel formedwithin the second subband comprises a second guard band that is adjacentto the first guard band; and in response to the determining indicatingthat the first subband and the second subband are adjacent, eliminatinga first portion of the first guard band and a second portion of thesecond guard band.
 20. The machine-readable storage medium of claim 19,wherein the operations further comprising: scanning to determine whetherthe first subband and the second subband contains an energy level belowa threshold; and transmitting a group of data selected from a firstgroup using a frequency portion allocated to the first guard band andthe second guard band.