Wireless channel monitoring, acquisition, and alignment

ABSTRACT

A system includes multiple techniques of implementing listen before talk functionality to provide multiple mobile communication devices connectivity with a wireless base station.

BACKGROUND

In general, a conventional listen before talk (a.k.a., LBT) protocolincludes monitoring a wireless channel or narrow bandwidth beforeinitiating wireless transmissions from a respective wireless station.

For example, if a power level of wireless communications in a monitoredbandwidth is below a threshold value, the corresponding wireless stationassumes that the monitored bandwidth is not being used by other devicesin which case the corresponding wireless station then communicates overthe available bandwidth during the respective acquired channel occupancytime.

Thus, conventional LBT techniques can be used by a radio device todetermine that a network that is free for use by the monitoring wirelessstation implementing the listen before talk procedure.

In the 5 GHz and 6 GHz unlicensed spectrum, a node accessing a channelhas to perform listen-before-talk (LBT) over either a fixed shortduration, or over a longer and random duration. Such an LBT mechanismenhances coexistence among nodes attempting to transmit on the samechannel of the unlicensed spectrum.

It is note that implementing listen before talk techniques also adds tothe channel access delay, and the overall delay budget of being able tocommunicate a data payload.

Conventional LBT categories vary based on the listen interval orback-off time that is required to access a channel. For example,so-called LBT Cat2 (Category 2) requires a fixed duration of time of 25μs, while LBT Cat4 (Category 4) requires a listen interval with a valuethat is randomly drawn from a range of (Lmin, Lmax) where the values ofLmin/Lmax are specified by regulators or standardization bodies.

If a device (node) performing LBT, for a given back-off interval,detects no signal stronger than a respective energy detect threshold(EDT), the device assumes the channel is available for access.

In 3GPP NR (New Radio), bandwidth part (BWP) operation is described astransmission/reception of signals in a portion of bandwidth, where oneor more of such portions can be configured by a gNB (gnodeB) forrespective UE (User Equipment).

In the baseline NR specification, a gNB may define any portion of theavailable bandwidth to be a so-called BWP (BandWidth Part). However, inNR-U (New Radio—Unlicensed), due to regulatory requirement for channelsensing and LBT across a 20 MHz portion of the channel, it is moreefficient if the BWPs are defined as multiples of 20 MHz.

BRIEF DESCRIPTION OF EMBODIMENTS

This disclosure includes the observation that conventional techniques ofimplementing shared use of wireless bandwidth suffer from deficiencies.For example, conventional techniques of monitoring the overall powerlevel in a wireless network environment only indicate usage of theparticular wireless channel and not what type of device or protocol isused by currently transmitting devices.

To access a BWP, a wireless communication device/gNB/UE has to performchannel sensing and an LBT (Listen Before Talk) procedure. A gNB mayconfigure multiple BWPs and assign each UE to one (or more) of theconfigured BWPs. This way, the gNB (wireless base station) may serve aset of UEs in one BWP and serve another set of UEs in another BWP. Thefirst and second sets of UEs may be independent or disjoint sets.

In order to enhance a successful channel access in an unlicensedspectrum, an NR-U (New Radio—Unlicensed) gNB may attempt to accessmultiple BWPs (bandwidth parts) at the same time. However, due topresence of various competing co-channel devices in each BWP, asuccessful channel access (after a successful completion of one of theLBT categories) is not deterministic.

Hence, it may occur with conventional techniques that a gNB attempts toaccess two BWPs at the same time, but it does not succeed to access bothat the same time. For example, the gNB accesses BWP1 (first bandwidth)first and after some time, e.g., two slots, it succeeds to access BWP2(second bandwidth).

In this disclosure, methods to access multiple BWPs are described to:

-   -   enhance the chance of a successful channel access and        simultaneous usage of bandwidth and/or multiple bandwidth parts    -   temporally align user equipment (mobile communication devices)        to reduce the difficulty of a gNB to transmit wireless        communications on one BWP and receive wireless communications on        another bandwidth portion (a.k.a., bandwidth part).    -   support medium (wireless channel) sharing amongst multiple        different mobile communication devices (user equipment) while        accessing a BWP

First Embodiments

Embodiments herein provide improved monitoring of a shared wirelessspectrum (such as wireless channel, wireless bandwidth, etc.) and use ofsame. In one embodiment, the wireless base station aligns use of firstwireless bandwidth and second wireless bandwidth to simultaneously (suchas in the same time slot) communicate in an uplink direction from one ormore mobile communication devices to the wireless base station.Embodiments herein also support aligning communications in a downlinkdirection from the wireless base station over different wirelesschannels (bandwidth or bandwidth parts) to different mobilecommunication devices.

More specifically, one embodiment herein includes a wireless basestation. The wireless base station monitors, via first and second listenbefore talk operations, both a first bandwidth and a second bandwidth totransmit wireless communications in a network environment. Based on themonitoring, the wireless base station receives access rights to use thefirst bandwidth prior to receiving access rights to use the secondbandwidth. Via communication of one or more wireless messages over thefirst bandwidth, the wireless base station temporally (i.e., in the timedomain) aligns use of the first bandwidth and the second bandwidth suchas to communicate in the same direction in a given time slot.

In one embodiment, the wireless base station uses (communicates over)the first wireless bandwidth to prevent another wireless station fromacquiring and using the first wireless bandwidth while the wireless basestation continues to implement a respective listen before talk procedureand acquire the second wireless bandwidth. Eventually, the wireless basestation acquires the second bandwidth and efficiently uses both thefirst bandwidth and the second bandwidth to support wirelessconnectivity amongst multiple wireless stations.

In accordance with further embodiments, the wireless message from thewireless base station (such as connection management resource) over thebandwidth to the mobile communication device is a grant of use messageindicating grant of use of the first bandwidth to the first mobilecommunication device. The wireless base station communicates the grantof use message to the first mobile communication device over a wirelesscommunication link. In one embodiment, the wireless base stationcommunicates the grant of use message to the first mobile communicationdevice in a window of time between a time of the wireless base stationreceiving the access rights to use the first bandwidth and the wirelessbase station receiving the access rights to use the second bandwidth.

In accordance with further example embodiments, the grant of use of thefirst bandwidth by the first mobile communication device (in the firsttime slot) prevents a competing wireless station from obtaining accessrights to the first bandwidth in the window of time (such as first timeslot).

In accordance with still further example embodiments, the wireless basestation or (other suitable management entity) assigns the firstbandwidth (such as first bandwidth part) for use by a first set ofmobile communication devices in communication with the wireless basestation, the first set of mobile communication devices includes thefirst mobile communication device. Additionally, the wireless basestation (other suitable management entity) assigns the second bandwidth(such as second bandwidth part) for use by a second set of mobilecommunication devices in communication with the wireless base station.

In further example embodiments, the wireless message from the wirelessbase station to the mobile communication device indicates a grant of useof the first bandwidth to the mobile communication device. In oneembodiment, the wireless base station communicates the wireless messagein with first time slot from the wireless base station to the firstmobile communication device over a wireless communication link; thewireless message indicates allocation of the first bandwidth(configuration grant) to the first mobile communication device tocommunicate in an uplink direction from the mobile communication deviceto the wireless base station. Additionally, the wireless base stationdoes not yet have access rights to use the second bandwidth in the firsttime slot.

In a second time slot following the first time slot, via wirelesscommunication of a revoke grant message from the wireless base stationover the first bandwidth to the mobile communication device (wirelessstation), the wireless base station revokes the grant of use of thefirst wireless bandwidth to the first mobile communication device asindicated by the previously sent wireless message. Communications in thefirst time slot prevents another wireless station from acquiring thefirst bandwidth (first wireless channel). In one embodiment, the revokedgrant of use indicates deallocation of a prior channel grant such asthat the first bandwidth from the first mobile communication device tocommunicate in an uplink direction from the mobile communication deviceto the wireless base station. In accordance with further exampleembodiments, the wireless base station has access rights to use both thefirst bandwidth and the second bandwidth in the second time slot.

In one embodiment, the wireless system as described herein isimplemented in an NR-U wireless communication system.

Further embodiments herein include, via the wireless base station,communicating the wireless message from a wireless base station over acontrol channel monitored by multiple mobile communication devices thatshares use of the first bandwidth.

Note further that embodiments herein are useful over conventionaltechniques of wireless stations competing for use of available wirelessbandwidth. For example, the operations performed by the wireless basestation (i.e., connection management resource) enables the wireless basestation to align uplink communications in the same time slots withoutlosing an acquired wireless channel, increasing efficiency and overalluse of limited available wireless bandwidth.

Second Embodiments

Further embodiments herein provide improved monitoring of a sharedwireless spectrum (such as wireless channel, wireless bandwidth, etc.)and more efficient use of same.

More specifically, embodiments herein include communication managementhardware associated with a wireless (base) station. During operation,the communication management hardware associated with the wireless basestation monitors a first bandwidth to acquire corresponding accessrights via implementation of a first listen before talk functionassigned a first listen before talk time duration. The communicationmanagement hardware also monitors a second bandwidth to acquirecorresponding access rights via implementation of a second listen beforetalk function assigned a second listen before talk time duration. In oneembodiment, the communication management hardware acquires access rightsto both the first bandwidth and the second bandwidth in response todetecting that wireless signals in both the first bandwidth and thesecond bandwidth are below respective energy threshold levels during thefirst listen before talk time duration.

In accordance with further example embodiments, the first listen beforetalk time duration is less than the second listen before talk timeduration.

In still further example embodiments, the respective threshold levelsimplemented by the first listen before talk function and the secondlisten before talk function include a first wireless energy thresholdlevel and a second wireless energy threshold level. The first wirelessenergy threshold level is used by the first listen before talk functionto monitor availability the first bandwidth. The second wireless energythreshold level is used by the second listen before talk function tomonitor availability of the second bandwidth.

In one embodiment, the second wireless energy threshold level associatedwith monitoring the second wireless bandwidth is lower (less) than thefirst wireless energy threshold level associated with monitoring thefirst wireless bandwidth.

In accordance with further example embodiments, acquiring access rightsto both the first bandwidth and the second bandwidth is dependent, atleast in part, upon a bandwidth separation between the first bandwidthand the second bandwidth.

In yet further example embodiments, the first bandwidth is a firstcomponent carrier; the second bandwidth is a second component carrier.Acquisition of the access rights to both the first bandwidth and thesecond bandwidth includes carrier aggregation of the first componentcarrier and the second component carrier by the respective wirelessstation to communicate in the wireless network environment.

In still further example embodiments, the spacing between a centercarrier frequency of the first bandwidth and a center carrier frequencythe second bandwidth is greater than a predetermined threshold valuesuch as 100 MHz, 200 MHz, 300 MHz, etc. In other words, the spacing canbe any suitable threshold value. In one embodiment, acquisition of theaccess rights to both the first bandwidth and the second bandwidthincludes communicating a message indicating acquisition of the firstbandwidth from a first listen before talk function that monitors thefirst bandwidth to a second listen before talk function that monitorsthe second bandwidth.

In still further example embodiments, acquisition of the access rightsby the communication management hardware associated with the wirelessbase station includes, via the first listen before talk function,producing a first signal indicative of a first wireless power (energy)level of receiving communications in the first bandwidth. The firstlisten before talk function compares the first signal to a firstthreshold level to determine availability of the first wirelessbandwidth. Further embodiments herein include, via the second listenbefore talk function, producing a second signal indicative of a secondwireless power (energy) level of receiving communications in the secondbandwidth. The second listen before talk function compares the secondsignal to a second threshold level.

In accordance with further example embodiments, the level/threshold thata second listen before talk function uses to monitor usage of a secondbandwidth part can be configured to depend on the status of the firstlisten before talk function monitoring the first bandwidth part. Forexample, if the first listen before talk function detects presence of awireless signal in the first bandwidth part, then the second listenbefore talk function compares the received signal with the same firstenergy detect threshold level that was implemented by the first listenbefore talk function. If the first listen before talk function detects asignal in the monitored channel (such as first bandwidth part) having asignal strength that is lower than a first threshold level, the firstLBT function is granted use of the channel; in such an instance, becausethe first listen before talk function is granted use of first bandwidthpart, the second listen before talk function implements an alternativeenergy detect level, such as a second energy detect threshold levelinstead of the first energy detection threshold level, to determine theavailability of the second bandwidth part (channel). In one embodiment,the second listen before talk function switches over to implementing ahigher energy detection level in response to the first listen beforetalk function acquiring the first bandwidth part. Thus, granted use orcurrent use of a first bandwidth part can cause a change to the energydetect threshold level implemented to monitor the second bandwidth part.The benefit of raising the energy detect threshold level for the secondlisten before talk function as previously discussed is to make it easierfor the wireless base station to acquire simultaneous use of the firstby way of and the second bandwidth part to support functions asdiscussed herein.

In accordance with further example embodiments, acquisition of therights to the first bandwidth includes: via the first listen before talkfunction, detecting that a magnitude of the first signal is less thanthe first threshold level (energy detect level) for the first timeduration. Acquisition of the second rights to use the second bandwidthincludes: via the second listen before talk function: detecting that amagnitude of the second signal is less than the second threshold level(energy detect level) for the first time duration.

Note further that embodiments herein are useful over conventionaltechniques of wireless stations competing for use of available wirelessbandwidth. For example, the operations performed by the communicationmanagement hardware (such as associated with a respective wireless basestation) enables increased efficiency and overall use of limitedavailable wireless bandwidth.

Third Embodiments

Further embodiments herein provide improved sharing of wirelessbandwidth amongst multiple mobile communication devices viaimplementation of novel listen before talk functionality.

More specifically, embodiments herein include communication managementhardware such as in a wireless station. During operation, thecommunication management hardware receives notification of a wirelesschannel scheduled for shared use amongst multiple mobile communicationdevices. A first mobile communication device (wireless station)implements a first listen before talk function to acquire use of aportion of the shared wireless channel. For example, via implementationof a first listen before talk function, the first mobile communicationdevice acquires use of a first time slot of the wireless channelscheduled for shared use. The connection management resource associatedwith a second mobile communication device fails to acquire use of thefirst time slot because it detects use of the first time slot of thewireless channel by the first mobile communication device. The secondmobile communication device attempts to acquire use of another time slotof the allocated bandwidth. For example, the second mobile communicationdevice monitors, via a second listen before talk function, for non-useof a second time slot of the wireless channel to acquire use of thesecond time slot amongst the multiple mobile communication devices.Thus, if the first mobile communication device or other one or moremobile communication devices do not acquire and/or use the second timeslot, the second mobile communication device acquires and uses thesecond time slot.

In accordance with further example embodiments, the second listen beforetalk function implements a shorter listen before talk interval than thefirst listen before talk function. Thus, the first mobile communicationdevice acquires the first time slot via the first listen before talkfunction. In one embodiment, the second listen before talk function is amore lenient (such as implements more lenient parameters such as ashorter listen interval, higher or stronger energy detect thresholdlevel, etc.) listen before talk protocol than the first listen beforetalk function.

Further embodiments herein include, via the communication managementhardware, and subsequent to acquiring the second time slot via thesecond listen before talk function, utilize the second time slot towirelessly communicate data over a communication link from a secondwireless communication device to a wireless base station.

Yet further embodiments herein include, via the communication managementhardware, implementing the second listen before talk function at asecond mobile communication device of the multiple mobile communicationdevices to acquire a second time slot in response to detecting that amagnitude of wireless energy associated with use of the first time slotby the first mobile communication device is above a wireless energythreshold level. In further example embodiments, the communicationmanagement hardware of the second mobile communication device implementsthe first listen before talk function in the first time slot prior toimplementing the second listen before talk function in the second timeslot. However, the first mobile communication device implements ashorter listen before talk interval time than the second mobilecommunication device in the first time slot and therefore acquires thefirst time slot of the shared wireless channel before the second mobilecommunication device is able to acquire the first time slot.

In still further example embodiments, the wireless channel scheduled foruse by the multiple mobile communication devices includes a first set oftimeslots interleaved amongst a second set of timeslots. A first set ofmobile communication devices is assigned to share use of the first setof timeslots; the second set of timeslots is scheduled for shared use bya second set of mobile communication devices.

Further embodiments herein include, via the communication managementhardware, receiving the notification of allocated bandwidth as awireless communication from a wireless base station that controls use ofthe shared wireless channel. In one embodiment, the second mobilecommunication device receives the notification from the wireless basestation prior to the second mobile communication device monitoring useof the wireless channel.

In still further embodiments, the first mobile communication deviceacquires use of the first time slot via implementation of the firstlisten before talk function. In one embodiment, acquisition of the firsttime slot results in acquisition of the second time slot as well.However, as previously discussed, if the second mobile communicationdevice detects that the second time slot acquired by the first mobilecommunication device is not used by the first mobile communicationdevice or other mobile communication device, the second mobilecommunication device acquires use of the second time slot to communicatewith the wireless base station.

In yet further example embodiments, a gap between the first time slotand the second time slot of the shared wireless bandwidth is below apredetermined time threshold value. In such an instance, because the gapis below a predetermined time threshold value, the second mobilecommunication device can acquire the second time slot via implementationof the second listen before talk function instead of the first listenbefore talk function.

Still further embodiments herein include, via the communicationmanagement hardware implementing the second listen before talk function,detecting that the first time slot is used by a member of the mobilecommunication devices allocated use of the wireless channel.

Note that any of the resources as discussed herein can include one ormore wireless stations, computerized devices, mobile communicationdevices, sensors, servers, base stations, network nodes, wirelesscommunication equipment, communication management systems, monitors,controllers, workstations, user equipment, handheld or laptop computers,or the like to carry out and/or support any or all of the methodoperations disclosed herein. In other words, one or more computerizeddevices or processors can be programmed and/or configured to operate asexplained herein to carry out the different embodiments as describedherein.

Yet other embodiments herein include software programs to perform thesteps and operations summarized above and disclosed in detail below. Onesuch embodiment comprises a computer program product including anon-transitory computer-readable storage medium (i.e., any computerreadable hardware storage medium) on which software instructions areencoded for subsequent execution. The instructions, when executed in acomputerized device (hardware) having a processor, program and/or causethe processor (hardware) to perform the operations disclosed herein.Such arrangements are typically provided as software, code,instructions, and/or other data (e.g., data structures) arranged orencoded on a non-transitory computer readable storage medium such as anoptical medium (e.g., CD-ROM), floppy disk, hard disk, memory stick,memory device, etc., or other medium such as firmware in one or moreROM, RAM, PROM, etc., or as an Application Specific Integrated Circuit(ASIC), etc. The software or firmware or other such configurations canbe installed onto a computerized device to cause the computerized deviceto perform the techniques explained herein.

Accordingly, embodiments herein are directed to a method, system,computer program product, etc., that supports operations as discussedherein.

One embodiment includes a computer readable hardware storage mediumand/or system having instructions stored thereon. The instructions, whenexecuted by the computer processor hardware, cause the computerprocessor hardware (such as one or more co-located or disparatelyprocessor devices or hardware) to: monitor, via listen before talkoperations, both a first bandwidth and a second bandwidth to transmitwireless communications in a network environment; receive access rightsto use the first bandwidth prior to receiving access rights to use thesecond bandwidth, and temporally align use of the first bandwidth andthe second bandwidth via communication of a wireless message over thefirst bandwidth.

Another embodiment herein includes a computer readable hardware storagemedium and/or system having instructions stored thereon. Theinstructions, when executed by the computer processor hardware, causethe computer processor hardware (such as one or more co-located ordisparately processor devices or hardware) to: monitor a first bandwidthfor access rights via a first listen before talk function specifying afirst listen before talk time duration; monitor a second bandwidth foraccess rights via a second listen before talk function specifying asecond listen before talk time duration; and acquire access rights toboth the first bandwidth and the second bandwidth in response todetecting that a strength of corresponding monitored wireless signalsreceived in both the first bandwidth and the second bandwidth are belowrespective energy threshold levels during the first listen before talktime duration.

Another embodiment herein includes a computer readable hardware storagemedium and/or system having instructions stored thereon. Theinstructions, when executed by the computer processor hardware, causethe computer processor hardware (such as one or more co-located ordisparately processor devices or hardware) to: receive notification of awireless channel scheduled for shared use amongst multiple mobilecommunication devices; detect use of a first time slot of the wirelesschannel, the first time slot acquired via a first listen before talkfunction implemented by a first mobile communication device; andmonitor, via a second listen before talk function, for non-use of asecond time slot of the wireless bandwidth to acquire use of the secondtime slot amongst the multiple mobile communication devices.

The ordering of the steps above has been added for clarity sake. Notethat any of the processing steps as discussed herein can be performed inany suitable order.

Other embodiments of the present disclosure include software programsand/or respective hardware to perform any of the method embodiment stepsand operations summarized above and disclosed in detail below.

It is to be understood that the system, method, apparatus, instructionson computer readable storage media, etc., as discussed herein also canbe embodied strictly as a software program, firmware, as a hybrid ofsoftware, hardware and/or firmware, or as hardware alone such as withina processor (hardware or software), or within an operating system or awithin a software application.

As discussed herein, techniques herein are well suited for use in thefield of wireless communications. However, it should be noted thatembodiments herein are not limited to use in such applications and thatthe techniques discussed herein are well suited for other applicationsas well.

Additionally, note that although each of the different features,techniques, configurations, etc., herein may be discussed in differentplaces of this disclosure, it is intended, where suitable, that each ofthe concepts can optionally be executed independently of each other orin combination with each other. Accordingly, the one or more presentinventions as described herein can be embodied and viewed in manydifferent ways.

Also, note that this preliminary discussion of embodiments herein (BRIEFDESCRIPTION OF EMBODIMENTS) purposefully does not specify everyembodiment and/or incrementally novel aspect of the present disclosureor claimed invention(s). Instead, this brief description only presentsgeneral embodiments and corresponding points of novelty overconventional techniques. For additional details and/or possibleperspectives (permutations) of the invention(s), the reader is directedto the Detailed Description section (which is a summary of embodiments)and corresponding figures of the present disclosure as further discussedbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an example diagram illustrating monitoring of a networkenvironment for wireless communications via implementation of multipleindependent listen before talk functions (LBT1 and LBT2) according toembodiments herein.

FIG. 2 is an example diagram illustrating implementation of multiplelisten before talk back off times, acquisition of multiple channels, andtime slot synchronization of using multiple wireless channels accordingto embodiments herein.

FIG. 3 is an example diagram illustrating conveyance of communicationsin different timeslots according to embodiments herein.

FIG. 4 is an example diagram illustrating transmission of communicationsover a first wireless channel and continued implementation of listenbefore talk (LBT2) operations to acquire a second wireless channelaccording to embodiments herein.

FIG. 5 is an example diagram illustrating transmission of communicationsover a first wireless channel and implementation of continued listenbefore talk operations to acquire a second wireless channel according toembodiments herein.

FIG. 6 is an example diagram illustrating transmission of communicationsover multiple listen before talk acquired wireless channels according toembodiments herein.

FIG. 7 is an example diagram illustrating synchronized transmission ofscheduling communications over multiple acquired wireless channelsaccording to embodiments herein.

FIG. 8 is an example diagram illustrating simultaneous receipt of uplinkcommunications in a time slot over multiple acquired wireless channelsaccording to embodiments herein.

FIG. 9 is an example diagram illustrating example computer hardware andsoftware operable to execute one or more operations according toembodiments herein.

FIG. 10 is an example diagram illustrating a method according toembodiments herein.

FIG. 11 is an example diagram illustrating monitoring of a networkenvironment for wireless communications via implementation of multipleindependent listen before talk functions (LBT1 and LBT2) according toembodiments herein.

FIG. 12 is an example diagram illustrating spacing of multiple monitoredbandwidths according to embodiments herein.

FIG. 13 is an example diagram illustrating monitoring of energyassociated with multiple bandwidths and comparison of same to respectivethreshold levels according to embodiments herein.

FIG. 14 is an example diagram illustrating monitoring of energyassociated with multiple bandwidths and comparison of same to respectivethreshold levels according to embodiments herein.

FIG. 15 is an example diagram illustrating example computer hardware andsoftware operable to execute one or more operations according toembodiments herein.

FIG. 16 is an example diagram illustrating a method according toembodiments herein.

FIG. 17 is an example diagram illustrating allocation of wirelesschannel resources (such as one or more timeslots) of respectivebandwidth for use by a set of mobile communication devices according toembodiments herein.

FIG. 18 is an example diagram illustrating acquisition and use ofavailable time slots in an allocated wireless channel according toembodiments herein.

FIG. 19 is an example diagram illustrating acquisition and use ofavailable time slots amongst multiple mobile communication devicesaccording to embodiments herein.

FIG. 20 is an example diagram illustrating allocation of wirelesschannel resources (such as one or more timeslots) for use by multiplesets of mobile communication devices according to embodiments herein.

FIG. 21 is an example diagram illustrating acquisition and use ofavailable time slots amongst multiple mobile communication devicesaccording to embodiments herein.

FIG. 22 is an example diagram illustrating acquisition and use ofavailable time slots amongst multiple mobile communication devicesaccording to embodiments herein.

FIG. 23 is an example diagram illustrating example computer hardware andsoftware operable to execute one or more operations according toembodiments herein.

FIG. 24 is an example diagram illustrating a method according toembodiments herein.

The foregoing and other objects, features, and advantages of theinvention will be apparent from the following more particulardescription of preferred embodiments herein, as illustrated in theaccompanying drawings in which like reference characters refer to thesame parts throughout the different views. The drawings are notnecessarily to scale, with emphasis instead being placed uponillustrating the embodiments, principles, concepts, etc.

DESCRIPTION OF EMBODIMENTS

Embodiments herein include a wireless base station. The wireless basestation monitors, via multiple listen before talk functions, both afirst bandwidth and a second bandwidth to transmit wirelesscommunications in a network environment. Based on the monitoring, thewireless base station acquires access rights to use the first bandwidthprior to receiving access rights to use the second bandwidth. Viacommunication of a wireless message over the first bandwidth, thewireless base station temporally aligns use of the first bandwidth andthe second bandwidth to facilitate simultaneous conveyance ofcommunications in a downlink or uplink direction. In one embodiment, thetemporal alignment (e.g., alignment in the time domain) and synchronoususe of the different wireless channels (in an uplink and/or downlinkdirection) in the same time slot supports more efficient use of anavailable wireless spectrum.

Now, with reference to the drawings, FIG. 1 is an example diagramillustrating monitoring of a network environment for wirelesscommunications according to embodiments herein.

As shown in this example embodiment, wireless network environment 100includes network 190 (such as remote network), wireless base station131, wireless base station 132, wireless base station 133, wireless basestation 134, etc. Wireless base station 131 includes a connectionmanagement resource 141 (a.k.a., a communication management resource) toperform processing operations associated with the wireless base station131.

Network environment 100 further includes multiple sets of mobilecommunication devices such as mobile communication devices 150, set ofmobile communication devices 160, etc.

In this example embodiment, the set of mobile communication devices 150includes mobile communication device 151 (a.k.a., user equipment #1 orwireless station #1), mobile communication device 152 (a.k.a., userequipment #2 or wireless station #2), mobile communication device 153(a.k.a., user equipment #3 or wireless station #3), etc. The set ofmobile communication devices 160 includes mobile communication device161 (a.k.a., user equipment #5 or wireless station #5), mobilecommunication device 162 (a.k.a., user equipment #6 or wireless station#6), etc.

In one nonlimiting example embodiment, each of the mobile communicationdevices is operated by a respective user. Each mobile communicationdevice includes a respective display screen to display one or moreimages for viewing by the respective user based on received data over awireless communication link from the wireless base station 131 (such asa gNodeB). Via one or more wireless communication links 127, thewireless base station 131 provides the mobile communication devices 150access to remote network 190; via one or more wireless communicationlinks 128, the wireless base station 131 provides the mobilecommunication devices 160 access to remote network 190; and so on.

Wireless base station 131 includes one or more sets of antenna hardwareto communicate with communication devices over respective wirelesscommunication links. For example, the wireless base station 131 usesbandwidth BWP1 (first bandwidth) to communicate over first antennahardware 171 of wireless base station 131 with the multiplecommunication devices UE1, UE2, UE3, etc., over wireless communicationlinks 127; wireless base station 131 uses bandwidth BWP2 (secondbandwidth) to communicate over second antenna hardware 172 of wirelessbase station 131 with the multiple communication devices UE5, UE6, etc.,over wireless communication links 128; and so on.

Wireless base station 131 and corresponding connection managementresource 141 is in communication with the first mobile communicationdevice 151 via a first wireless communication link of the multiplewireless communication links 127; wireless base station 131 andcorresponding connection management resource 141 is in communicationwith the first mobile communication device 151 via a first wirelesscommunication link of multiple wireless links 127; wireless base station131 and corresponding connection management resource 141 is incommunication with the second mobile communication device 152 via asecond wireless communication link of the wireless communication links127; wireless base station 131 and corresponding connection managementresource 141 is in communication with the third mobile communicationdevice 153 via a third wireless communication link of the wirelesscommunication links 127; and so on.

Wireless base station 131 and corresponding connection managementresource 141 is in communication with the first mobile communicationdevice 161 via a first wireless communication link of wirelesscommunication links 128; wireless base station 131 and correspondingconnection management resource 141 is in communication with the secondmobile communication device 162 via a second wireless communication linkof wireless communication links 128; and so on.

Note that the resources as described herein such as wireless basestation 131, connection management resource 141, mobile communicationdevices, etc., can be implemented via hardware, executed software, or acombination of hardware and executed software.

More specifically, connection management resource 141 (a.k.a., wirelessbase station 131) can be implemented as communication (connection)manager hardware, executed communication (connection) manager software,or a combination of communication manager hardware and executedcommunication manager software; wireless base station 131 can beimplemented as wireless base station hardware, executed wireless basestation software, or a combination of wireless base station hardware andexecuted wireless base station software; mobile communication device 151can be implemented as mobile communication device hardware, executedmobile communication device software, or a combination of mobilecommunication device hardware and executed mobile communication devicesoftware; and so on.

As further discussed herein, the wireless base station 131 andcorresponding connection management resource 141 support wirelesscommunication with the mobile communication devices via any suitablewireless communication protocol such as one or more of WiFi™, LTE (LongTerm Evolution), LAA (Licensed Assisted Access), NR (New Radio), NR-U(New Radio Unlicensed), etc., in the same or different bandwidth. Incertain instances, the wireless stations share use of the same wirelessbandwidth (such as one or more wireless channels) to conveycommunications to one or more intended recipient.

In operation #1 of FIG. 1, to support wireless connectivity with thedifferent sets of mobile communication devices 150 and 160, via theconnection management resource 140, the wireless base station 131simultaneously implements a first listen before talk procedure (LBT1) toacquire rights to using bandwidth BWP1 (such as bandwidth part #1) and asecond listen before talk procedure (LBT2) to acquire rights to usingbandwidth BWP2 (such as bandwidth part #2).

Thus, in one embodiment, the wireless base station 131 and correspondingconnection management resource 141 monitors, via the multiple listenbefore talk operations (such as listen before talk operations LBT1 andlisten before talk operations LBT2), both a first bandwidth (such asfirst bandwidth part, wireless channel, etc.) and a second bandwidth(such as second bandwidth part, wireless channel, etc.) to transmitwireless communications in the network environment 100.

As further discussed herein, based on the monitoring, the wireless basestation 131 initially receives access rights to use the first bandwidthBWP1 prior to receiving access rights to use the second bandwidth BWP2.

Via communication of one or more wireless messages over the firstbandwidth BWP1, the wireless base station 131 temporally aligns use ofthe first bandwidth BWP1 and the second bandwidth BWP2. For example, inone embodiment, the wireless base station 131 communicates over thefirst wireless bandwidth BWP1 to prevent another wireless station innetwork environment 100 from acquiring and using the first wirelessbandwidth BWP1 while the wireless base station 131 continues to performlisten before talk procedure LBT2 to acquire the second wirelessbandwidth. Eventually, the wireless base station 131 acquires the secondbandwidth BWP2 and efficiently uses both the first bandwidth BWP1 andthe second bandwidth BWP2 to support wireless connectivity andcommunications with sets of mobile communication devices 150, 160, etc.,amongst the multiple wireless stations.

FIG. 2 is an example diagram illustrating implementation of multipleback off times, acquisition of multiple channels, and synchronization ofusing multiple wireless channels according to embodiments herein.

In this example embodiment, assume that the connection managementresource 141 of wireless base station 131 needs to acquire use ofmultiple wireless channels such as bandwidth BWP1 (such as a firstwireless channel) and bandwidth BWP2 (such as a second wireless channel)in order to communicate with both sets of mobile communication devices150 and 160.

At time T1, the connection management resource 141 implements one ormore listen before talk protocols (functions) to acquire rights to usebandwidth BWP1 and bandwidth BWP2.

For example, at or around time T1, via a first listen before talkprocedure LBT1, assume that the connection management resource 141 ofthe wireless base station 131 monitors the bandwidth BWP1 (such as afirst wireless channel) and detects a wireless energy level in the firstwireless channel BWP1 as being above a threshold value, indicatinglikely use of the first wireless channel by another one or more wirelessstations in the network environment 100.

Further, at or around time T1, via a second listen before talk procedureLBT2, assume that the connection management resource 141 of the wirelessbase station 131 monitors the bandwidth BWP2 (such as a second wirelesschannel) and detects a wireless energy level in the second wirelesschannel as being above a threshold value indicating likely use of thesecond wireless channel by another one or more wireless stations in thenetwork environment 100.

In such an instance, at or around time T1, the connection managementresource 141 of the wireless base station 131 is unable to acquireeither bandwidth BWP1 or bandwidth BWP2 to communicate with the mobilecommunication devices at time T1.

Based on detecting use of desired bandwidth BWP1 and BWP2, theconnection management resource 141 of the wireless base station 131implements a random or fixed back-off time (interval) to before checkinguse of the respective bandwidth again.

For example, after back-off time #1 with respect to time T1, theconnection management resource 141 of wireless base station 131 monitorsa level of wireless energy received at first antenna hardware 171 of thewireless base station 131 again. In response to detecting that theenergy level of wireless signals received by the antenna hardware 171 isbelow a threshold value, indicating non-use of the first wirelesschannel or bandwidth BWP1, the connection management resource 141acquires use of the first wireless channel (BWP1).

In one embodiment, the back-off time #2 implemented by listen beforetalk procedure LBT2 is greater than back-off time #1 implemented bylisten before talk LBT1.

In time slots TS1 and TS2, the connection management resource 141 of thewireless base station 131 transmits respective communications 211 and212 from the first antenna 171 of the wireless base station 131 to oneor more mobile communication devices in set 150.

As further shown, the connection management resource 141 of the wirelessbase station 131 implements a random or fixed back-off time (interval)#2 before checking use of the respective bandwidth BWP2 again. Forexample, after back-off time #2 with respect to time T1 (or other timevalue), at time T4, the connection management resource 141 of wirelessbase station 131 implements antenna hardware 172 to monitor a level ofwireless energy received at a second antenna of the wireless basestation 131.

At time T4, in response to detecting that the wireless energy level atthe second antenna hardware 172 in the second bandwidth BWP2 of thewireless base station 131 is below a threshold value, indicating non-useof the second wireless channel BWP2 by other wireless stations in thenetwork environment 100, the connection management resource 141 acquiresuse of the second wireless channel (BWP2) as well. Thus, at time T4, theconnection management resource 141 of the wireless base station 131 hasaccess rights to wireless bandwidth BWP1 and wireless bandwidth BWP2.

After acquiring both bandwidth BWP1 and bandwidth BWP2, the connectionmanagement resource 141 of the wireless base station 131 communicatesover both bandwidth BWP1 and bandwidth BWP2 to the mobile communicationdevices such as in time slot TS3.

For example, in time slot TS3, the connection management resource 141 ofthe wireless base station 131 transmits wireless communications 213 fromthe first antenna over the bandwidth BWP1 to the first set of mobiledevices 150; the connection management resource 141 of the wireless basestation 131 transmits communications 221 from the second antenna overbandwidth BWP2 to the second set of mobile devices 160.

In time slot TS4, the connection management resource 141 of the wirelessbase station 131 transmits wireless communications 214 from the firstantenna 171 over the bandwidth BWP1 to the first set of mobile devices150; the connection management resource 141 of the wireless base station131 transmits communications 222 from the second antenna hardware 172over bandwidth BWP2 to the second set of mobile devices 160.

In time slot TS5, the connection management resource 141 of the wirelessbase station 131 receives wireless communications 215 over antennahardware 171 and the bandwidth BWP1 from the first set of mobile devices150; the connection management resource 141 of the wireless base station131 receives communications 223 over antenna hardware 172 and bandwidthBWP2 from the second set of mobile devices 150.

In this manner, via transmission of wireless communications 211 andcommunications 212 in timeslots TS1 and TS2 from antenna hardware 171,the wireless base station 131 prevents another wireless station in thenetwork environment 100 from acquiring the bandwidth BWP1 while thewireless base station 131 continues to pursue acquisition of rights touse the second bandwidth BWP2.

FIG. 3 is an example diagram illustrating conveyance of communicationsin different timeslots according to embodiments herein.

In this example embodiment, the wireless base station 131 transmitscommunications 211, 212, 213, and 214 from antenna hardware 171 to thefirst set of mobile communication devices 150. The wireless base station131 transmits communications 221, 222, and 223 from antenna hardware 171to the first set of mobile communication devices 150.

In time slot TS1, the connection management resource 141 of the wirelessbase station 131 transmits the downlink communications 211 such asincluding one or more PDSCH (Physical Downlink Shared Channel) messagesfrom antenna hardware 171.

In time slot TS2, from antenna hardware 171, the connection managementresource 141 of the wireless base station 131 transmits downlinkcommunications such as including a first PDCCH message to mobilecommunication device 151 (UE1); the first PDCCH message schedulescommunications (PUCCH communications) in the uplink from the mobilecommunication device 151 (UE1) to the wireless base station 131 in timeslot TS3.

In time slot TS2, from antenna hardware 171, the connection managementresource 141 of the wireless base station 131 transmits downlinkcommunications such as including a second PDCCH message to mobilecommunication device 152 (UE2); the second PDCCH message schedulescommunications (PUSCH communications) in the uplink from the mobilecommunication device 152 (UE2) to the wireless base station 131 in timeslot TS3.

In time slot TS2, from antenna hardware 171, the connection managementresource 141 of the wireless base station 131 transmits downlinkcommunications such as including a third PDCCH message to mobilecommunication device 153 (UE3); the third PDCCH message schedulescommunications (PUSCH communications) in the uplink from the mobilecommunication device 153 (UE3) to the wireless base station 131 in timeslot TS3.

In time slot TS3, the connection management resource 141 of the wirelessbase station 131 transmits a cancelation message 321 to the mobilecommunication devices 151, 152, and 153. The cancelation message 321(such as DCI CI) cancels: i) the grant of uplink bandwidth PUCCHassociated with mobile communication device 151 (UE1) in time slot TS3;ii) the grant of uplink bandwidth PUSCH associated with mobilecommunication device 152 (UE2) in time slot TS3; iii) the grant ofuplink bandwidth PUSCH associated with mobile communication device 153(UE3) in time slot TS3.

Thus, the cancelation message 321 in communication 213 causes the mobilecommunication device 151 to cancel its PUCCH communications associatedwith UE1 in time slot TS3; the cancelation message 321 in communication213 causes the mobile communication device 152 to cancel its PUSCHcommunications associated with UE2 in time slot TS3; the cancelationmessage 321 in communication 213 causes the mobile communication device153 to cancel its PUSCH communications associated with UE3 in time slotTS3. None of the mobile communication devices 151, 152, and 153communicate in the uplink direction to the wireless base station 131 intime slot TS3.

Further, in time slot TS3, the connection management resource 141 of thewireless base station 131 communicates a PDSCH message viacommunications 221 wirelessly transmitted from antenna hardware 172. Aspreviously discussed, management resource of the wireless base station131 transmits communications 213 in time slot TS3.

In one embodiment, note that the antenna hardware 171 and antennahardware 172 is a single set of antenna hardware that supports receptionand/or transmission of wireless signals. For example, communication overBWP1 and BWP2 likely happen via the same antenna hardware. This appliesto all references made to antenna hardware 171 and 172 (such as a singleor shared antenna system).

In time slot TS4, during rescheduling, the connection managementresource 141 of the wireless base station 131 transmits downlinkcommunications 214 such as including a first PDCCH message from antennahardware 171 to mobile communication device 151 (UE1); the first PDCCHmessage schedules communications (PUCCH communications) in the uplinkfrom the mobile communication device 151 (UE1) to the wireless basestation 131 in time slot TS5.

In time slot TS4, the connection management resource 141 of the wirelessbase station 131 transmits downlink communications 214 such as includinga second PDCCH message to mobile communication device 152 (UE2); thesecond PDCCH message schedules communications (PUSCH communications) inthe uplink from the mobile communication device 152 (UE2) to thewireless base station 131 in time slot TS5.

In time slot TS4, the connection management resource 141 of the wirelessbase station 131 transmits downlink communications such as including athird PDCCH message to mobile communication device 153 (UE3); the thirdPDCCH message schedules communications (PUSCH communications) in theuplink from the mobile communication device 153 (UE3) to the wirelessbase station 131 in time slot TS5.

In time slot TS5, the connection management resource 141 of the wirelessbase station 131 receives wireless communications 215 over bandwidthBWP1 at antenna hardware 171 from the mobile communication devicesincluding: i) a corresponding PUCCH message from the mobilecommunication device 151 (UE1); ii) a corresponding PUSCH message fromthe mobile communication device 152 (UE2); iii) a corresponding PUSCHmessage from the mobile communication device 153 (UE3).

In time slot TS5, the connection management resource 141 of the wirelessbase station 131 receives wireless communications 223 over bandwidthBWP2 at antenna hardware 172 from the mobile communication devicesincluding a corresponding PUCCH message from the mobile communicationdevice 155 (UE5.

Thus, wireless base station 131 and corresponding connection managementresource 141 temporally align use of the first bandwidth BWP1 and thesecond bandwidth BWP2 via communication of wireless communications 212and 213 over the bandwidth BWP1 such that both the sets of mobilecommunication devices 150 and 160 communicate in an uplink direction tothe wireless base station 131 in the time slot TS5.

In accordance with further example embodiments, the wireless basestation 131 such as gNB (gNodeB) is configured and operates multipleBWPs (such as BWP1 and BWP2), and UEs with a single active BWP. Thewireless base station 131 or other suitable entity assigns a first BWP1to support communications with the first set of mobile communicationdevices 150; the wireless base station 131 or other suitable entityassigns BWP2 to the support communications with the second set of mobilecommunication devices 152.

When attempting to acquire (access) BWP1 and BWP2, the connectionmanagement resource 141 of the wireless base station 131 starts LBTprocedures such as via Category-4 (Cat4) listen before talk that has arandom waiting (back-off) time. In one embodiment, as previouslydiscussed, the listen before talk LBT1 time of acquiring for BWP1 isachieved earlier than the second listen before talk LBT2. The channeloccupancy time for bandwidth BWP1 starts at time T1, otherwise there isa chance other nearby wireless nodes to acquire the bandwidth BWP1.

The channel occupancy time for LBT2 and corresponding use of bandwidthBWP2 starts at time T3.

Note that it is possible that the LBT for BWP2 fails first, but succeedslater (e.g. due to presence of a short WiFi™ frame).

Based on implementing different listen before talk procedures LBT1 andLBT2, the alignment of downlink and uplink resources in BWP1 and BWP2may be difficult due to an unavoidable random waiting time in accessingmultiple BWPs and/or due to independent wireless activities in the twoBWPs which are likely across various 20 MHz sub-bands.

This could lead to situations where the wireless base station 131 plansfor downlink transmissions (i.e., communications) in a slot while it hadalready planned for uplink transmissions (by one or more UEs) in anotherBWP. The uplink transmissions maybe PUCCH (HARQ feedback scheduled a fewslots ahead, or other UCI transmissions), sounding RS (SRS), or PUSCH(dynamic or configured grant).

As described herein, to address the issue of acquiring the channels(BWP1 and BWP2) at different times, the wireless base station 131 can beconfigured to cancel previously scheduled uplink transmissions (i.e.,communications) in one or more slots in a given acquired BWP. To do so,the wireless base station 131 informs a set of UEs or all mobilecommunication devices in a given BWP group (such as set 150, set 160,etc.) to cancel the planned transmission for one or more slots. Thewireless base station 131 carries the instruction for uplink (UL)cancellation indication (CI) in an existing/new DCI (Downlink ControlInformation) command. The behavior of the UE after receiving the UL CIdepends on the type of UL transmission it was going to do.

In one embodiment, the UL cancellation indication DCI may be carried ina GC-PDCCH message where each of the mobile communication devices in aset are configured to monitor. The DCI message in communication 213specifies whether in the current and/or next several slots ULtransmission shall be cancelled. In one embodiment, the DCI message isencoded with a new RNTI (Radio Network Temporary Identifier), where UEsmay be configured to monitor same before initiating any ULcommunications from the user equipment to the wireless base station 131.

In accordance with further example embodiments, if a UE, that isscheduled to send HARQ feedback in the current/next slot(s) in itsconfigured active BWP, detects the DCI cancelation message 321, the userequipment cancels transmitting the PUCCH communications in the uplink.In one embodiment, the corresponding UE receiving the cancel messagestarts a timer and expects that the wireless base station 131 schedulesthe next HARQ feedback transmission in the current or next COT beforeexpiry of the timer. The UE waits for a HARQ-pull DCI message for thepending HARQ feedback, or drops it and releases the HARQ ID if the timerexpires.

In still further example embodiments, if a UE, that is scheduled to sendUCI in the current/next slot(s) in its configured active BWP, detectsthe DCI message, that user equipment cancels transmitting thecorresponding PUCCH (uplink) communications. In one embodiment, the UEexpects that the wireless base station 131 schedules the cancelled UCIin the current or next COT (Channel Occupancy Time). The UE may updateUCI content if necessary.

In yet further example embodiments, if a UE, that is scheduled for PUSCHtransmission in the current/next slot(s) in its assigned active BWP,detects the DCI message (cancelation message 321), that user equipmentcancels the PUSCH communications. The UE then expects that the wirelessbase station 131 will reschedule PUSCH communications in the current ornext COT.

If a UE, that is scheduled for SRS transmission in the current/nextslot(s) in its configured active BWP, detects the DCI message, that userequipment cancels the SRS transmission.

If a UE is about to send a scheduling request (SR) in a configuredPUCCH, and has detected DCI (cancel message 321), then that UE cancelsthe transmission of the SR and starts a timer. The UE does not send anew SR unless the timer has expired (wireless base station 131 may notget to schedule the PUSCH for the UE right after the CI).

Presence of the DCI message (321) in a slot automatically cancels anyConfigured Grant resources within the slot for that user equipment, andin the subsequent slots if the DCI message indicates so. Hence, if a UE(that prepares for transmission of communications to the wireless basestation 131 in an upcoming CG resource) receives the DCI CI (cancel)message, the UE may attempt for an upcoming CG after the canceledperiod, and the UE may hold its LBT back-off timer value. Alternatively,the UE may re-initiate its backoff timer.

FIG. 4 is an example diagram illustrating transmission of communicationsover a first wireless channel and implementation of listen before talkoperations to acquire a second wireless channel according to embodimentsherein.

As previously discussed, at time T1, the connection management resource141 acquires use of the bandwidth BWP1. In time slot TS1, the connectionmanagement resource 141 of the wireless base station 131 transmitswireless downlink communications 211 from antenna hardware 171 of thewireless base station 131 to one or more mobile communication devices inthe set of mobile communication devices 150.

The wireless base station 131 has not yet acquired use of the wirelessbandwidth BWP2 in time slot TS1 and awaits expiration of back off time#2.

FIG. 5 is an example diagram illustrating transmission of communicationsover a first wireless channel and implementation of listen before talkoperations to acquire a second wireless channel according to embodimentsherein.

In time slot TS2, via communications 212, the connection managementresource 141 of the wireless base station 131 transmits wirelessdownlink communications 212 from antenna hardware 171 of the wirelessbase station 131 to one or more mobile communication devices in the setof mobile communication devices 150.

The wireless base station 131 has not yet acquired use of the wirelessbandwidth BWP2 in time slot TS2 and awaits expiration of back off time#2.

FIG. 6 is an example diagram illustrating transmission of communicationsover multiple acquired wireless channels according to embodimentsherein.

As previously discussed, at time T3, via the listen before talkprocedure LBT2, the connection management resource 141 acquires use ofthe bandwidth BWP2. For example, the wireless base station 131 monitorspresence of wireless signals in bandwidth BWP2 via antenna hardware 172and determines that the received wireless signals are below a listenbefore talk threshold value. In such an instance, the wireless basestation 131 acquires the bandwidth BWP2.

In time slot TS3, the connection management resource 141 of the wirelessbase station 131 transmits wireless downlink communications 213 (such ascancelation message 321 canceling PUCCH associated with UE1, cancelingPUSCH associated with UE2, and canceling PUSCH associated with UE3) fromthe wireless base station 131 over acquired bandwidth BWP1 and antennahardware 171 to one or more mobile communication devices in the set ofmobile communication devices 150.

In time slot TS3, the connection management resource 141 of the wirelessbase station 131 also transmits wireless downlink communications 221from the wireless base station 131 over acquired bandwidth BWP2 andantenna hardware 172 to one or more mobile communication devices in theset of mobile communication devices 160.

FIG. 7 is an example diagram illustrating simultaneous receipt of uplinkcommunications over multiple acquired wireless channels according toembodiments herein.

In time slot TS4, the connection management resource 141 of the wirelessbase station 131 transmits wireless downlink communications 214(scheduling uplink communications in time slot TS5 from UE1, UE2, andUE3) from the antenna hardware 171 of the wireless base station 131 overacquired bandwidth BWP1 to one or more mobile communication devices inthe set of mobile communication devices 150.

In time slot TS4, the connection management resource 141 of the wirelessbase station 131 also transmits wireless downlink communications 222(scheduling uplink communications in time slot TS5 from UE5) from theantenna hardware 172 of the wireless base station 131 over acquiredbandwidth BWP2 to one or more mobile communication devices in the set ofmobile communication devices 160.

FIG. 8 is an example diagram illustrating synchronized transmission ofscheduling communications over multiple acquired wireless channelsaccording to embodiments herein.

In time slot TS5, the connection management resource 141 of the wirelessbase station 131 receives scheduled wireless uplink communications 215at antenna hardware 171 of the wireless base station 131 over acquiredbandwidth BWP1 from mobile communication devices UE1, UE2, and UE3 inthe set of mobile communication devices 150. Thus, the mobilecommunication devices UE1, UE2, and UE3 shares use of the time slot TS5.

In time slot TS5, the connection management resource 141 of the wirelessbase station 131 also receives wireless uplink communications 223 atantenna hardware 172 of the wireless base station 131 over acquiredbandwidth BWP2 from mobile communication device UE5.

FIG. 9 is an example block diagram of a computer system for implementingany of the operations as previously discussed according to embodimentsherein.

Any of the resources (such as communication manager resource 141,wireless base station 131, mobile communication device 151, mobilecommunication device 152, mobile communication device 161, etc.) asdiscussed herein can be configured to include computer processorhardware and/or corresponding executable instructions to carry out thedifferent operations as discussed herein.

As shown, computer system 950 of the present example includesinterconnect 911 coupling computer readable storage media 912 such as anon-transitory type of media (which can be any suitable type of hardwarestorage medium in which digital information can be stored and orretrieved), a processor 913 (computer processor hardware), I/O interface914, and a communications interface 917.

I/O interface(s) 914 supports connectivity to repository 980 and inputresource 992.

Computer readable storage medium 912 can be any hardware storage devicesuch as memory, optical storage, hard drive, floppy disk, etc. In oneembodiment, the computer readable storage medium 912 stores instructionsand/or data.

As shown, computer readable storage media 912 can be encoded withcommunication manager application 140-1 (e.g., including instructions)in a respective wireless station to carry out any of the operations asdiscussed herein.

During operation of one embodiment, processor 913 accesses computerreadable storage media 912 via the use of interconnect 911 in order tolaunch, run, execute, interpret or otherwise perform the instructions incommunication manager application 140-1 stored on computer readablestorage medium 912. Execution of the communication manager application140-1 produces communication manager process 140-2 to carry out any ofthe operations and/or processes as discussed herein.

Those skilled in the art will understand that the computer system 950can include other processes and/or software and hardware components,such as an operating system that controls allocation and use of hardwareresources to execute communication manager application 140-1.

In accordance with different embodiments, note that computer system mayreside in any of various types of devices, including, but not limitedto, a mobile computer, a personal computer system, a wireless device, awireless access point, a base station, phone device, desktop computer,laptop, notebook, netbook computer, mainframe computer system, handheldcomputer, workstation, network computer, application server, storagedevice, a consumer electronics device such as a camera, camcorder, settop box, mobile device, video game console, handheld video game device,a peripheral device such as a switch, modem, router, set-top box,content management device, handheld remote control device, any type ofcomputing or electronic device, etc. The computer system 950 may resideat any location or can be included in any suitable resource in anynetwork environment to implement functionality as discussed herein.

Functionality supported by the different resources will now be discussedvia the flowchart in FIG. 10. Note that the steps in the flowchartsbelow can be executed in any suitable order.

FIG. 10 is a flowchart 1000 illustrating an example method according toembodiments herein. Note that there will be some overlap with respect toconcepts as discussed above.

In processing operation 1010, the wireless base station 131 (viacommunication management resource 141) monitors, via listen before talkoperations LBT1 and LBT2, both a first bandwidth (BWP1) and a secondbandwidth (BWP2) to transmit wireless communications in a networkenvironment 100.

In processing operation 1020, the wireless base station 131 (viacommunication management resource 141) receives access rights to use thefirst bandwidth (BWP1) prior to receiving access rights to use thesecond bandwidth (BWP2).

In processing operation 1030, the wireless base station 131 (viacommunication management resource 141) temporally aligns use of thefirst bandwidth BWP1 and the second bandwidth BWP2 via communication ofwireless communications or messages (such as downlink communications211, 212, 213, etc.) over the bandwidth BWP1.

Second Embodiments

Embodiments herein include communication management hardware associatedwith a wireless base station. The communication management hardwaremonitors a first bandwidth to acquire access rights via a first listenbefore talk function implementing a first listen before talk timeduration. The communication management hardware also monitors a secondbandwidth to acquire access rights via a second listen before talkfunction implementing a second listen before talk time duration. In oneembodiment, the communication management hardware acquires access rightsto both the first bandwidth and the second bandwidth in response todetecting that wireless signals in both the first bandwidth and thesecond bandwidth are below respective energy threshold levels during thefirst listen before talk time duration.

Now, with reference to the drawings, FIG. 11 is an example diagramillustrating monitoring of a network environment for wirelesscommunications via implementation of multiple independent listen beforetalk functions (LBT1 and LBT2) according to embodiments herein. Notethat any of the wireless communication devices (such as wireless basestation 131, wireless base station 132, . . . , mobile communicationdevice 151, mobile communication device 152, . . . ) in the networkenvironment 100 can be configured to implement the multiple listenbefore talk functions as described herein.

As shown in this example embodiment, network environment 100 includesnetwork 190 (such as remote network), wireless base station 131,wireless base station 132, wireless base station 133, wireless basestation 134, etc. In this example embodiment, the wireless base station131 includes a communication manager 1140 (a.k.a., a communicationmanagement resource such as communication management hardware and orcommunication management software) to perform processing operationsassociated with the wireless base station 131.

Network environment 100 further includes multiple sets of mobilecommunication devices such as mobile communication devices 150, set ofmobile communication devices 160, etc.

In this example embodiment, the set of mobile communication devices 150includes mobile communication device 151 (a.k.a., UE1 or wirelessstation #1), mobile communication device 152 (a.k.a., UE2 or wirelessstation #2), mobile communication device 153 (a.k.a., UE3 or wirelessstation #3), etc.

The set of mobile communication devices 160 includes mobilecommunication device 161 (a.k.a., UE5 or wireless station #5), mobilecommunication device 162 (a.k.a., UE6 or wireless station #6), etc.

In one nonlimiting example embodiment, each of the mobile communicationdevices is operated by a respective user. Each mobile communicationdevice includes a respective display screen to display one or moreimages for viewing by the respective user based on received data over arespective wireless communication link extending between the mobilecommunication device and the wireless base station 131 (such as a gNodeBor other suitable entity).

Via the one or more wireless communication links 127, the wireless basestation 131 provides each of the mobile communication devices 150 accessto remote network 190; via one or more wireless communication links 128,the wireless base station 131 provides the mobile communication devices160 access to remote network 190; and so on.

Wireless base station 131 includes one or more sets of antenna hardwareto communicate with communication devices over respective wirelesscommunication links. For example, the wireless base station 131 usesbandwidth BWP1 (such as first bandwidth, wireless channel, etc.) tocommunicate (wirelessly receive and transmit) over first antennahardware 171 of wireless base station 131 with the multiplecommunication devices UE1, UE2, UE3, etc., over wireless communicationlinks 127; wireless base station 131 uses bandwidth BWP2 (such as secondbandwidth, wireless channel, etc.) to communicate (wirelessly receiveand transmit) over second antenna hardware 172 of wireless base station131 with the multiple communication devices UE5, UE6, etc., overwireless communication links 128; and so on.

As further shown, wireless base station 131 and correspondingcommunication manager 1140 is in communication with the first mobilecommunication device 151 via a first wireless communication link of themultiple wireless communication links 127; wireless base station 131 andcorresponding communication manager 1140 is in communication with thefirst mobile communication device 151 via a first wireless communicationlink of multiple wireless links 127; wireless base station 131 andcorresponding communication manager 1140 is in communication with thesecond mobile communication device 152 via a second wirelesscommunication link of the wireless communication links 127; wirelessbase station 131 and corresponding communication manager 1140 is incommunication with the third mobile communication device 153 via a thirdwireless communication link of the wireless communication links 127; andso on.

Wireless base station 131 and corresponding communication manager 1140is in communication with the first mobile communication device 161 via afirst wireless communication link of wireless communication links 128;wireless base station 131 and corresponding communication manager 1140is in communication with the second mobile communication device 162 viaa second wireless communication link of wireless communication links128; and so on.

Note that the resources as described herein such as wireless basestation 131, communication manager 1140, mobile communication devices,etc., can be implemented via hardware, executed software, or acombination of hardware and executed software.

More specifically, communication manager 1140 (a.k.a., wireless basestation 131) can be implemented as communication (connection) managerhardware, executed communication (connection) manager software, or acombination of communication manager hardware and executed communicationmanager software; wireless base station 131 can be implemented aswireless base station hardware, executed wireless base station software,or a combination of wireless base station hardware and executed wirelessbase station software; mobile communication device 151 can beimplemented as mobile communication device hardware, executed mobilecommunication device software, or a combination of mobile communicationdevice hardware and executed mobile communication device software; andso on.

The wireless base station 131 and corresponding communication manager1140 support wireless communications with the mobile communicationdevices via any suitable wireless communication protocol such as one ormore of WiFi™, LTE (Long Term Evolution), LAA (Licensed AssistedAccess), NR (New Radio), NR-U (New Radio Unlicensed), etc., in the sameor different bandwidth. In certain instances, the wireless stationsshare use of the same wireless bandwidth (such as one or more wirelesschannels or bandwidth) to convey wireless communications to one or moreintended recipient.

In operation #1 of FIG. 11, to support wireless connectivity with thedifferent sets of mobile communication devices 150 and 160, via theconnection management resource 1140, the wireless base station 131simultaneously implements first listen before talk function 1141 (LBT1)to acquire rights to use bandwidth BWP1 (such as bandwidth part #1) anda second listen before talk function 1142 procedure (LBT2) to acquirerights to use bandwidth BWP2 (such as bandwidth part #2).

Thus, in one embodiment, the wireless base station 131 and correspondingcommunication manager 1140 monitors, via the multiple listen before talkfunctions (such as listen before talk function 1141 or LBT1 and secondlisten before talk function 1142 such as LBT2), both a first bandwidth(such as first bandwidth part, wireless channel, etc.) and a secondbandwidth (such as second bandwidth part, wireless channel, etc.) totransmit wireless communications in the network environment 100.

In this example embodiment, during operation, via the listen before talkfunction 1141, the communication manager 1140 hardware associated withthe wireless base station 131 monitors a first bandwidth to acquirecorresponding access rights in bandwidth BWP1 using monitor parameters1151. The first listen before talk function 1141 implements a firstlisten before talk time duration 1151-1.

Via the second listen before talk function 1142, the communicationmanager 1140 also monitors a second bandwidth BWP2 to acquirecorresponding access rights in bandwidth BWP2 using monitor parameters1152. The listen before talk function 1142 implements a second listenbefore talk time duration 1152-1.

In one embodiment, the first listen before talk time duration 1151-1 isless than the second listen before talk time duration 1152-1.

In still further example embodiments, and as further discussed herein,the communication manager 1140 acquires access rights to both the firstbandwidth BWP1 and the second bandwidth BWP2 in response to detectingthat wireless signals in both the first bandwidth BWP1 and the secondbandwidth BWP2 are below respective energy threshold levels (such asenergy threshold level 1151-2 and energy threshold level 1152-2) duringthe first listen before talk time duration associated with the listenbefore talk function 1141. Additional details of acquiring access rightsis shown in the following FIGS. and corresponding text.

FIG. 12 is an example diagram illustrating spacing of multiple monitoredbandwidths according to embodiments herein.

In this example embodiment, assume that the bandwidth BWP1 has a centercarrier frequency of CF1 and that the bandwidth BWP2 as a center carrierfrequency of CF2. The value X represents a spacing between the carrierfrequency CF1 and carrier frequency CF2. Gap 1220 represents a spacingbetween bandwidth BWP1 and bandwidth BWP2.

Note that the value X varies depending on the embodiment. In oneembodiment, the spacing value X between a center carrier frequency CF1of the first bandwidth BWP1 and a center carrier frequency CF2 of thesecond bandwidth BWP2 is greater than a predetermined threshold valuesuch as 200 MHz, 300 MHz, 500 MHz, etc., or any other suitable value.

In accordance with further example embodiments, acquiring access rightsto both the first bandwidth BWP1 and the second bandwidth BWP2 isdependent, at least in part, upon a bandwidth separation between thefirst bandwidth and the second bandwidth. For example, the firstbandwidth BWP1 may belong to the 5 GHz spectrum; second bandwidth BWP2may belong to the 6 GHz spectrum. Each of the different listen beforetalk functions 1141, 1142, etc., implemented one of multiple listenbefore talk protocols such as Cat2, Cat4, etc.

FIG. 13 is an example diagram illustrating monitoring of energyassociated with multiple bandwidths and comparison to respectivethreshold levels according to embodiments herein.

In still further example embodiments, acquisition of the bandwidthrights by the communication manager 1140 associated with the wirelessbase station 131 includes: via the first listen before talk function1141, monitoring the network environment 100 for wireless signals in thefirst bandwidth BWP1 starting at time T101. In one embodiment, based onwireless energy detected by the first antenna hardware 171, the listenbefore talk function 1141 produces signal S-BWP1 indicative of a firstwireless power (energy) level of receiving communications in the firstmonitored bandwidth BWP1. The listen before talk function 1141 comparesthe signal S-BWP1 over time duration 1151-1 to the first threshold level1151-2 (a.k.a., TL1).

Additionally, based on wireless energy detected by the second antennahardware 172 (which may be the same as antenna hardware 171), the listenbefore talk function 1142 produces signal S-BWP2 indicative of a secondwireless power (energy) level of receiving wireless communications inthe second bandwidth BWP2 starting at time T101 or other random timebefore or after time T101. The listen before talk function 1142 comparesthe signal S-BWP2 over time duration 1152-1 to the second thresholdlevel 1152-2 (such as threshold level TL1).

In accordance with further example embodiments, acquisition of therights to use the first bandwidth BWP1 and bandwidth BWP2 includes: i)via the first listen before talk function 1141, detecting that amagnitude of the first signal S-BWP1 is less than the threshold levelTL1 (energy detect level 1151-2) for the entire LBT1 time duration1151-2 (such as time between T101 and T102); and ii) via the secondlisten before talk function 1142, detecting that a magnitude of thesecond signal S-BWP2 is less than the threshold level TL1 (energy detectlevel 1152-2) for the entire LBT1 time duration 1151-1 (instead of timeduration 1152-1).

Thus, in this example embodiment, the wireless base station 131 acquiresuse of the bandwidth BWP1 and bandwidth BWP2 at or around time T102(associated with the shorter time duration 1151-1) instead of at timeT103 corresponding to the longer time duration 1152-1.

Note that the magnitude of the energy threshold levels can be set to anysuitable value depending on the embodiment. By way of non-limitingexample embodiment, in one embodiment, the energy threshold level 1151-2is equal to −72 dBm; the energy threshold level 1152-2 is equal to −72dBm.

Thus, the respective threshold levels implemented by the first listenbefore talk function 1141 and the second listen before talk function1142 include a first wireless energy threshold level 1151-2 (TL1) and asecond wireless energy threshold level 1152-2 (TL1). In this exampleembodiment, the magnitude of the energy threshold levels 1151-2 and1152-2 are the same. As discussed below, the energy threshold levelsapplied by each of the listen before talk functions can vary.

Referring again to FIG. 11 (or FIG. 1), in one embodiment, acquisitionof the rights to use both the first bandwidth BWP1 and the secondbandwidth BWP2 results in communicating a message indicating acquisitionof the first bandwidth from the first listen before talk function 1141(component carrier monitor) that monitors the first bandwidth BWP1 to asecond listen before talk function 1142 (component carrier monitor) thatmonitors the second bandwidth BWP2. Such notification (such asacquisition of a wireless channel) can be configured to trigger thesecond listen before talk function 1142 to change the remaining amountof time that the listen before talk function 1142 is to monitor thewireless signal S-BWP2 to be below a threshold level 1152-2 in order toacquire the wireless channel BWP2. The remaining amount of listen beforetalk end time can be changed to a final time duration end value ofanywhere between time T102 and time T103. As further discussed below,embodiments herein include monitoring the respective energy detectthreshold level of the second listen before talk function 1142 inresponse to detecting a condition in which the first listen before talkfunction 1141 acquires the wireless channel BWP1.

FIG. 14 is an example diagram illustrating monitoring of energyassociated with multiple bandwidths and comparison to respectivethreshold levels according to embodiments herein.

In one embodiment, note that the energy detection threshold levelsimplemented by each of the listen before talk function 1141 and 1142 mayinitially be the same threshold level setting such as threshold levelTL1. However, depending on the outcome of the listen before talkfunction 1141 associated with bandwidth part BWP1, such as a successfulaccess to the BWP1 channel, the second listen before talk function 1142implements a different energy detect threshold level TL2 (such as lesssensitive setting). Thus, the listen before talk function 1141 andlisten before talk function 1142 may initially be the same thresholdlevel TL1, but eventually implement different threshold levels asdiscussed below.

As an example, the level/threshold that the second listen before talkfunction 1142 uses to monitor usage of a second bandwidth part BWP2depends on the status of the first listen before talk function 1141monitoring the first bandwidth part BWP1.

More specifically, if the first listen before talk function 1141 detectspresence of a signal S-BWP1 in the first bandwidth part above thethreshold level TL1, then the second listen before talk function 1142compares the received signal S-BWP2 with the same first energy detectthreshold level TL1 that was implemented by the first listen before talkfunction 1141. However, if the first listen before talk function 1141detects a signal S-BWP1 in the monitored channel (such as firstbandwidth part) that is lower than the first threshold level TL1(a.k.a., level 1152-1) for the time duration 1151-1, the first LBTfunction 1141 is granted use of the channel BWP1; in such an instance,in one embodiment, because the first listen before talk function 1141acquires use of the first bandwidth part BWP1 such as at or around timeT112 and thereafter, the second listen before talk function 1142switches to implementing an alternative energy detect level, such as asecond energy detect threshold level TL2 (a higher energy detectthreshold level) instead of the first energy detection threshold levelTL1, to determine the availability of the second bandwidth part BWP2(channel).

In other words, at or around time T112, assume that the listen beforetalk function 1141 obtains the channel BWP1. The granted use or currentuse of a first bandwidth part BWP1 to the wireless station 131 causes achange to the energy detect threshold level implemented by the secondlisten before talk function 1142 at or around time T112 to monitor thesecond bandwidth part BWP2.

For example, in response to detecting that the first listen before talkfunction 1141 obtains rights to use channel BWP1, the listen before talkfunction 1142 increases the energy detect threshold level from thresholdlevel TL1 (such as −82 dBm or other suitable value) to a higherthreshold level TL2 (such as −72 dBm or other suitable value). If thesignal S-BWP2 as monitored by the listen before talk function 1142remains below the raised threshold level TL2 for the final duration(such as between T112 and T113) of the listen before talk duration LBT2(1152-1), the listen before talk function 1142 acquires the channel BWP2for use as well. Conversely, if the signal S-BWP2 is greater than thethreshold level TL2 any time between time T112 and time T113, the listenbefore talk function 1142 does not acquire the use of the channel BWP2.

In still further example embodiments, note that embodiments hereininclude implementing a combination of energy detect threshold leveladjustment and listen before talk time duration adjustment. For example,in response to detecting that the first listen before talk function 1141acquires the wireless channel BWP1 such as at or around time T112, thefinal end time of the listen before talk time duration 1152-1 can beshortened to any time value between T112 and T113. As previouslydiscussed, the energy detect threshold level can be raised to a higherenergy detect threshold level. If the second listen before talk function1142 detects that the signal S-BWP2 remains below the variable thresholdlevel and duration a full duration of the variable listen before talktime duration, the second listen before talk function 1142 acquires useof the wireless channel BWP2.

Additionally, as previously discussed, note again that the first listenbefore talk function 1141 and the second listen before talk function1142 do not always start monitoring signal levels for channelacquisition at the same time.

Note that the magnitudes of the energy threshold levels can be anysuitable values. For example, in one embodiment, the energy thresholdlevel 1152-1 is equal to −82 dBm; the energy threshold level 1152-2 isinitially equal to a value such as −82 dBm, but is later changed toanother threshold level such as −72 dBm, in response to detectingacquisition of the wireless channel BWP1 by the wireless station 131.

In a similar manner as previously discussed, acquisition of thebandwidth usage rights by the communication manager 1140 includes: viathe first listen before talk function 1141, monitoring the networkenvironment 100 for wireless signals in the first bandwidth BWP1. In oneembodiment, based on wireless energy detected by the first antennahardware 171 monitoring the bandwidth BWP1, the listen before talkfunction 1141 produces signal S-BWP1 indicative of a first wirelessenergy level of receiving communications in the first bandwidth BWP1.The listen before talk function 1141 compares the signal S-BWP1 to thefirst threshold level 1152-1 (TL1) to determine availability of thebandwidth BWP1.

Based on wireless energy detected by the second antenna hardware 172,the listen before talk function 1142 produces signal S-BWP2 indicativeof a second wireless energy level of receiving communications in thesecond bandwidth BWP2. The listen before talk function 1142 compares thesignal S-BWP2 to the second threshold level 1152-2 (such as initiallyTL1).

In accordance with further example embodiments, acquisition of therights to use the first bandwidth BWP1 and bandwidth BWP2 includes: i)via the first listen before talk function 1141, detecting that amagnitude of the first signal S-BWP1 is less than the threshold levelTL1 (energy detect level 1152-1) for the entire LBT1 time duration1151-1 (such as between time T111 and time T112); and ii) via the secondlisten before talk function 1142, detecting that a magnitude of thesecond signal S-BWP2 is less than the threshold level TL2 (energy detectlevel 1152-2, where TL1>TL2) for the entire LBT1 time duration 1151-1(such as time between T111 and T112) instead of full time duration1152-2 (such as between time T111 and time T113).

As previously discussed, the embodiments as described herein can beimplemented in any suitable environment. Note that in the 5 GHz and 6GHz unlicensed spectrum, channel access is specified per 20 MHzchannels. In this unlicensed spectrum, each bandwidth (BWP) may bedefined as a contiguous portion of the spectrum (such as gap 1220 inFIG. 12 being equal to zero or near zero) with bandwidth of 20 MHz (ormultiple of 20 MHz). Hence, when accessing multiple bandwidths (such asBWP1 and BWP2), which are potentially non-contiguous BWPs (i.e., spacedapart from each other as shown in FIG. 12, such as X>a predeterminedthreshold value such as 300 MHz or other suitable value), thecommunication manager 1140 implements listen before talk functions 1141and 1142.

Some listen before talk regulators specify the type of LBT category tobe used when a respective communication device (such as wireless basestation 131) accesses multiple channels at the same time. For instance,policies require channel access of each 20 MHz via LBT Cat4 (randomlisten interval time), unless the channel has a frequency separation X(some predetermined amount) or gap 1220 less than a threshold with aprimary channel that LBT Cat4 is invoked for, in which case, LBT Cat2 isinvoked.

In one embodiment, as previously discussed, if a wireless base station131 (such as gNB) attempts to simultaneously access multiple BWPs withan LBT type Cat4 (each has a different random listen interval), there isa chance that LBT function (procedure) may be successful only on asubset of the BWPs being acquired. As previously discussed, to enhancechannel access across all of the BWPs, a wireless base station 131 (suchas gNB) may use LBT Cat4 when monitoring BWP1 (such as via listen beforetalk function 1141) and a different LBT category (such as via listenbefore talk function 1142) when monitoring another BWP2.

In further example embodiments, the listen before talk function 1141 ofthe wireless base station 131 implements LBT Cat4 (random back off timeor listen interval such as between 10 to 40 microseconds) on each of thelisten before talk monitoring functions 1141 and 1142. As soon as theassociated back-off timer for the LBT of one BWP expires (indicating asuccessful LBT Cat4 access), in a manner as previously discussed, thewireless base station 131 acquires all the monitored BWPssimultaneously, pending no signal stronger than the EDT (threshold levelTL1 or TL2) is detected in each of the monitored bandwidth parts. Thisis equivalent that the LBT category for the remaining BWPs (while notCat4) has a back-off time longer than the back-off time of LBT Cat2(fixed listen interval time of 25 microseconds).

Carrier Aggregation

Note that embodiments herein can be extended to channel access incarrier aggregation (CA) use cases. For example, in LTE (Long TermEvolution) networks and NR (New Radio) networks, carrier aggregationrefers to aggregation of multiple component carriers (CC) where aneNB/gNB (a.k.a., wireless station) transmits or receives wirelesssignals across the component carriers. Similarly, a UE that isconfigured to operate in multiple component carriers, transmits orreceives wireless signals across the two or more component carriers.

Note that in carrier aggregation, a respective MAC processing layer andPHY processing layer of each component carrier is independent of MAC/PHYof another component carrier (while there is synchronization among PHYof multiple CCs).

Note further that carrier aggregation is also possible across multiplecomponent carriers, where all of the component carriers belong to a sameunlicensed band, e.g. 5 GHz, or the multiple component carriers maybelong to two or more unlicensed bands in which a first componentcarrier CC1 may be implemented via 5 GHz bandwidth while a secondcomponent carrier CC2 may be implemented via 6 GHz bandwidth.

For sake of better coexistence with other RATs (Radio AccessTechnologies) using the same unlicensed band, the different carriercomponents in 5 GHz and 6 GHz unlicensed bands have bandwidth of aninteger multiple of 20 MHz. For channel access and transmission in eachunlicensed component carrier, a respective LBT function needs to beinvoked.

Performing LBT Cat4 in each component carrier is the most conservativechannel access and offers best coexistence. However, it would also leadto more time/spectrum waste since long and often listen intervals foreach component carrier has to be performed. If a wireless base station(such as gNB) implementing carrier aggregation attempts to accessmultiple component carriers with LBT Cat4 (such as implementation oflisten before talk function 1141 to acquire bandwidth BWP1 andimplementation of listen before talk function 1142 to acquire bandwidthBWP2), in a manner as previously discussed, there is a chance that LBTprocedure may be successful only on a subset of the component carriers.To enhance channel access, a wireless base station (gNB) may beconfigured to use LBT Cat4 on a first component carrier (such asassociated with listen before talk function 1141) and a different LBTfunction (such as CAT2 or listen before talk function 1142) on anothercomponent carrier.

In one embodiment, a wireless station (such as gNB/UE) implementingcarrier aggregation starts LBT Cat4 on one or more CCs. As soon as theassociated back-off timer for the LBT of one CC expires (indicating asuccessful LBT Cat4 access), the gNB accesses the other componentcarriers simultaneously in a manner as previously discussed, assumingthat no signal stronger than the EDT threshold level is detected in eachof the other CCs. Effectively, this is equivalent that the LBT categoryfor the remaining component carriers has a back-off time longer than theback-off time of LBT Cat2.

In yet further example embodiments, the first bandwidth of one or morefrequency blocks represents a first component carrier component; thesecond bandwidth of one or more frequency blocks represents a secondcarrier component. Acquisition of the access rights to both the firstbandwidth and the second bandwidth includes carrier aggregation of thefirst component carrier and the second component.

Note that, due to some independent processing in one component carrierversus another component carrier, the method for which one componentcarrier infers that the LBT has been successful in another CC may beleft for implementation.

More specifically, an implementation signaling between the PHY/MACprocessing entity of multiple CCs may be configured to carry arespective LBT-success signal associated with a listen before talkmonitoring function. In one embodiment, the signaling amongst multiplecomponent carriers includes information such as: channel/sub-band indexthat the CC operates at, LBT success status, etc.

In another implementation, a respective LBT mechanism (such as listenbefore talk function 1141, listen before talk function 1152, etc.) maybe enhanced to infer that a detected signal that exceeds a secondthreshold EDT2 is in fact from a component carrier of the same device,hence indicating a successful LBT procedure in an adjacent componentcarrier. In one embodiment, a very high threshold level EDT2 may beimplemented to detect a very close transmission, e.g. −30 dBm.

In accordance with further example embodiments, in a manner aspreviously discussed, the LBT function in a component carrier, such ascomponent carrier CC1, initiates a back-off interval (e.g. based on LBTCat4) and starts sensing the channel for any detected signal during aback-off interval (the listen interval). Component carrier CC1 continuessensing the channel given no signal above the corresponding thresholdlevel (such as EDT) is detected. While waiting for the respective LBTinterval to expire, if a signal larger than threshold level (such asEDT2) is detected, it may be inferred that the detected signal is from anearby component carrier such as component carrier CC0, (indicating asuccessful LBT in CC0). In such an instance, component carrier CC1 maystart transmission. Note that for this implementation it is assumed thatCC1 has an auxiliary receiver for channel sensing in the same sub-bandthat CC0 operates.

FIG. 15 is an example block diagram of a computer system forimplementing any of the operations as previously discussed according toembodiments herein.

Any of the resources (such as communication manager 1140, listen beforetalk function 1141, listen before talk function 1142, wireless basestation 131, mobile communication device 151, mobile communicationdevice 152, mobile communication device 161, etc.) as discussed hereincan be configured to include computer processor hardware and/orcorresponding executable instructions to carry out the differentoperations as discussed herein.

As shown, computer system 1550 of the present example includesinterconnect 1511 coupling computer readable storage media 1512 such asa non-transitory type of media (which can be any suitable type ofhardware storage medium in which digital information can be stored andor retrieved), a processor 1513 (computer processor hardware), I/Ointerface 1514, and a communications interface 1517.

I/O interface(s) 1514 supports connectivity to repository 1580 and inputresource 1592.

Computer readable storage medium 1512 can be any hardware storage devicesuch as memory, optical storage, hard drive, floppy disk, etc. In oneembodiment, the computer readable storage medium 1512 storesinstructions and/or data.

As shown, computer readable storage media 1512 can be encoded withcommunication manager application 1140-1 (e.g., including instructions)in a respective wireless station to carry out any of the operations asdiscussed herein.

During operation of one embodiment, processor 1513 accesses computerreadable storage media 1512 via the use of interconnect 1511 in order tolaunch, run, execute, interpret or otherwise perform the instructions incommunication manager application 1140-1 stored on computer readablestorage medium 1512. Execution of the communication manager application1140-1 produces communication manager process 1140-2 to carry out any ofthe operations and/or processes as discussed herein.

Those skilled in the art will understand that the computer system 1550can include other processes and/or software and hardware components,such as an operating system that controls allocation and use of hardwareresources to execute communication manager application 1140-1.

In accordance with different embodiments, note that computer system mayreside in any of various types of devices, including, but not limitedto, a mobile computer, a personal computer system, a wireless device, awireless access point, a base station, phone device, desktop computer,laptop, notebook, netbook computer, mainframe computer system, handheldcomputer, workstation, network computer, application server, storagedevice, a consumer electronics device such as a camera, camcorder, settop box, mobile device, video game console, handheld video game device,a peripheral device such as a switch, modem, router, set-top box,content management device, handheld remote control device, any type ofcomputing or electronic device, etc. The computer system 1550 may resideat any location or can be included in any suitable resource in anynetwork environment to implement functionality as discussed herein.

Functionality supported by the different resources will now be discussedvia the flowchart in FIG. 16. Note that the steps in the flowchartsbelow can be executed in any suitable order.

FIG. 16 is a flowchart 1600 illustrating an example method according toembodiments herein. Note that there will be some overlap with respect toconcepts as discussed above.

In processing operation 1610, via the first listen before talk function1141, the communication manager 1140 (such as communication managementhardware or communication management software) associated with wirelessbase station 131 monitors a first bandwidth (such as BWP1) to obtainrespective access rights. The first listen before talk function 1141implements a first listen before talk time duration to acquire thebandwidth BWP1.

In processing operation 1620, via the first listen before talk function1142, the communication manager 1140 (such as communication managementhardware or communication management software) associated with wirelessbase station 131 monitors a second bandwidth (such as BWP2) to obtainrespective access rights. The second listen before talk function 1142implements a second listen before talk time duration to acquire thebandwidth BWP2.

In processing operation 1630, the communication management hardwareassociated with wireless base station 131 acquires access rights to boththe first bandwidth and the second bandwidth in response to detectingthat a strength of corresponding monitored wireless signals received inboth the first bandwidth and the second bandwidth are below respectiveenergy threshold levels (such as TL1 and TL1, or TL1 and TL2) during thefirst listen before talk time duration (such as LBT1 time duration).

Third Embodiments

Embodiments herein include communication management hardware. Duringoperation, each of multiple instance of the communication managementhardware (such as associated with each respective mobile communicationdevice) receives notification of a wireless channel scheduled for shareduse amongst multiple mobile communication devices. A first mobilecommunication device (and corresponding communication managementhardware) implements a first listen before talk function to acquire useof a portion (such as first time slot) of the shared wireless channel.For example, via implementation of a first listen before talk function,the first mobile communication device acquires use of a first time slotof the wireless channel scheduled for shared use. The communicationmanagement hardware associated with the second mobile communicationdevice fails to acquire use of the first time slot because it detectsuse of the first time slot of the wireless channel by the first mobilecommunication device. Thereafter, the second mobile communication devicemonitors, via a second listen before talk function implemented by thecommunication management hardware, for non-use of a second time slot ofthe wireless channel to acquire use of the second time slot amongst themultiple mobile communication devices. If the first mobile communicationdevice (or other mobile communication devices or wireless stations) donot use the second time slot in the allocated wireless channel, thesecond mobile communication device acquires the second time slot andcommunicates data in an uplink direction from the second mobilecommunication device to the wireless base station.

Now, more specifically, FIG. 17 is an example diagram illustrating ofwireless channel resources (such as one or more timeslots) for use by aset of mobile communication devices according to embodiments herein.

As shown in this example embodiment, wireless network environment 100includes network 190 (such as remote network such as the Internet),wireless base station 131, wireless base station 132, wireless basestation 133, wireless base station 134, etc. Wireless base station 131includes a communication management resource 1741 (a.k.a., communicationmanagement hardware and/or software) to perform processing operationsassociated with the wireless base station 131.

Network environment 100 further includes set of mobile communicationdevices 150.

In this example embodiment, the set of mobile communication devices 150includes mobile communication device 151 (a.k.a., user equipment #1 orwireless station #1), mobile communication device 152 (a.k.a., userequipment #2 or wireless station #2), mobile communication device 153(a.k.a., user equipment #3 or wireless station #3), etc.

In one nonlimiting example embodiment, each of the mobile communicationdevices in the set 150 is operated by a respective user. Each mobilecommunication device includes a respective display screen on which todisplay one or more images for viewing by the respective user based onreceived data over a respective wireless communication link from thewireless base station 131. For example, via one or more wirelesscommunication links 127, the wireless base station 131 provides themobile communication devices 150 access to remote network 190.

Wireless base station 131 includes one or more sets of antenna hardwareto communicate with communication devices over respective wirelesscommunication links. For example, the wireless base station 131 usesbandwidth BWP1 (such as first bandwidth) or other bandwidth tocommunicate over first antenna hardware 171 of wireless base station 131with the multiple communication devices UE1, UE2, UE3, etc., overwireless communication links 127.

In one embodiment, wireless base station 131 and correspondingcommunication management resource 1741 is in communication with thefirst mobile communication device 151 via a first wireless communicationlink of the multiple wireless communication links 127; wireless basestation 131 and corresponding communication management resource 1741 isin communication with the first mobile communication device 152 via asecond wireless communication link of the multiple wireless links 127;wireless base station 131 and corresponding connection managementresource 141 is in communication with the third mobile communicationdevice 153 via a third wireless communication link of the wirelesscommunication links 127; and so on.

Note that the resources as described herein such as wireless basestation 131, communication management resource 1741, mobilecommunication devices, etc., can be implemented via hardware, executedsoftware, or a combination of hardware and executed software.

More specifically, communication management resource 1741 (a.k.a.,wireless base station 131) can be implemented as communication(connection) management hardware, executed communication (connection)management software, or a combination of communication managementhardware and executed communication management software; wireless basestation 131 can be implemented as wireless base station hardware,executed wireless base station software, or a combination of wirelessbase station hardware and executed wireless base station software; eachmobile communication device (a.k.a., user equipment) can be implementedas mobile communication device hardware, executed mobile communicationdevice software, or a combination of mobile communication devicehardware and executed mobile communication device software; and so on.

As further discussed herein, the wireless base station 131 andcorresponding communication management resource 1741 support wirelesscommunication with the mobile communication devices via any suitablewireless communication protocol such as one or more of WiFi™, LTE (LongTerm Evolution), LAA (Licensed Assisted Access), NR (New Radio), NR-U(New Radio Unlicensed), etc., in the same or different bandwidth. Incertain instances, the wireless stations share use of the same wirelessbandwidth (such as one or more wireless channels) to conveycommunications to one or more intended recipients in remote network 190.

As described herein, based on acquisition of wireless resources in anysuitable manner, the wireless base station 131 initially receives accessrights to use the first bandwidth BWP1 and assign use of same to the setof mobile communication devices 150.

As further shown in this example embodiment, via communications 1720,communication management resource 1741 associated with the wireless basestation 131 assigns use of multiple wireless resources (such astimeslots 1701, 1702, 1703, 1704, 1705, 1706, etc.) associated withbandwidth BWP1 for shared use by the set of mobile communication devices150 to communicate in the uplink to the wireless base station 131. Asfurther discussed below, the mobile communication devices in the set 150can be configured to compete with each other to acquire and use therespective timeslots associated with the wireless bandwidth BWP1.

In one embodiment, each of the mobile communication devices receives thenotification (such as via communications 1720) of assigned wirelesscommunication resources from wireless base station 131 or other suitableentity that controls use of the shared wireless channel.

Each of the mobile communication devices includes a respectivecommunication management resource to support wireless communications.For example, mobile communication device 151 includes communicationmanagement resource 1771 to execute multiple different listen beforetalk functions 1761 (such as a first listen before talk function, secondlisten before talk function, etc.); mobile communication device 152includes communication management resource 1772 to execute multipledifferent listen before talk functions 1762 (such as a first listenbefore talk function, second listen before talk function, etc.); mobilecommunication device 153 includes communication management resource 1773to execute multiple different listen before talk functions 1763 (such asa first listen before talk function, second listen before talk function,etc.).

In one embodiment, the first listen before talk function (such as LBT1)is a first listen before talk protocol such as CAT 4 or other suitableprotocol; the second listen before talk function (such as LBT2) is asecond listen before talk protocol such as CAT 2 or other suitableprotocol; and so on.

As further discussed below, one embodiment herein includeschannel/medium sharing between NR-U UEs (such as mobile communicationdevices 151, 152, 153, etc.), in which a (first) UE initiates an uplink(UL) transmission after performing a Listen before talk protocol such aslisten before talk function Cat 4. In one embodiment, the first mobilecommunication device 151 uses the first time slot 1701 to supportwireless communications; thereafter, the set of resources (such as otherunused timeslots) may be used by other members of the set of mobilecommunication devices 150 depending on availability.

In one nonlimiting example embodiment, to enable UE medium sharing,instead of contention among UEs, the following changes with respect toR16 can be implemented.

For example, a wireless base station 131 (such as gNB) configures two ormore CG Resources (CGR) such as timeslots across the same BWPs (orsub-bands), where the first CGR starts one or more OFDM symbol(s)earlier than the subsequent CGRs. CGR1 (such as a first time slot of thebandwidth BWP1) is accessed by a first mobile communication device 151using LBT CAT4 back-off interval time duration. CGR2 (such as a secondtime slot of bandwidth BWP2), is accessed by a second (guest) UE, usingLBT Cat2 back-off interval time duration.

In one embodiment, in order to reduce collisions amongst the mobilecommunication devices using the same timeslots, a UE may be allowed toaccess either of the CGRs, but not both. Hence, the first UE thattransmits in the first CGR1 (wireless resource such as first time slot)does not attempt to transmit in CGR2 (wireless resource such as secondtime slot). All mobile communication devices (configured to use CGR1 andCGR2) that have failed to access the first CGR1, may attempt to accessand transmit in CGR2 if they acquire CGR2 with a respective appropriateLBT.

In accordance with further example embodiments, a mobile communicationdevice that attempts to access the first CGR may not have its back-offtimer interval reach zero in order to be allowed to access the firstCGR. If the mobile communication device detects the first CGR isaccessed (by another UE), then the UE may attempt to access thesubsequent CGRs as a guest UE (and with LBT Cat2).

In one embodiment, the method to detect if another UE has accessed thefirst CGR is implementation-based, and may include comparing the energyinformation such as RSSI (Received Signal Strength Indicator) or RSRP(Reference Signal Received Power) of the monitored bandwidth BWP1 to oneor more threshold levels. Additionally, or alternatively, embodimentsherein include detecting use of a respective time slot via detectingpresence reference signals such as DM-RS (Demodulation Reference Signal)or other suitable information. In one embodiment, DM-RS refers to ademodulation reference signal transmitted by respective user equipment.It is used by a receiver for radio channel estimation for demodulationof the associated physical channel.

In accordance with further example embodiments, the mobile communicationdevice performs LBT Cat2 before the next CGR and if successful, the UEtransmits in the next CGR.

To enhance coexistence, a guest mobile communication device may attemptto use CAT2 only if the detected RSSI/RSRP during the first CGR (timeslot) is larger than a configurable threshold. By setting the thresholdto a larger value, a wireless base station (such as gNB) ensures thatmobile communication devices in close proximity share the channel.

In one embodiment, channel sharing amongst multiple different instancesof user equipment includes implementing the following rules: i) themaximum duration should be less than maximum COT (Channel OccupancyTime) or MCOT duration, ii) the number of UEs that can share the channelwith the first UE may be limited, iii) the gap between transmission ofthe first UE and that of the 2nd UE (with LBT CAT2) may be subject to amax value.

More specific examples of sharing use of the bandwidth BWP1 arediscussed below.

FIG. 18 is an example diagram illustrating acquisition and use ofavailable time slots amongst multiple mobile communication devicesaccording to embodiments herein.

As previously discussed, the communication management resource 1741allocates use of the wireless channel BWP1 and corresponding timeslots(or configured grant resources) by the multiple mobile communicationdevices 151, 152, 153, etc.

Assume in this example embodiment that at least the mobile communicationdevice 151 and 152 desires to acquire use of the first time slot 1701(such as first configured grant resource) associated with bandwidth BWP1to communicate in an uplink direction to the wireless base station 131.

In such an instance, each of the mobile communication devices initiallyimplements a first listen before talk function LBT1 to attempt toacquire the first time slot and communicate in an uplink direction tothe wireless base station 131.

More specifically, at time T1, the first mobile communication device 151(UE1) implements LB T1 and time duration TD1-1 (listen before talk timeinterval) to acquire use of the time slot 1701; at time T1, the secondmobile communication device 152 (UE2) implements LB T1 and time durationTD2-1 (listen before talk time interval) to acquire use of the time slot1701; and so on.

In one embodiment, the time duration used by the respective mobilecommunication device is a random time duration value. The listen beforetalk function LBT1 associated with the mobile communication device 151generates a first random listen before talk interval time durationTD1-1; The listen before talk function LBT1 associated with the mobilecommunication device 152 generates a second random listen before talkinterval time duration TD2-1;

In this example embodiment, the time duration TD1-1 is a shorterduration with respect to the time duration TD2-1.

Each of the mobile communication devices 151, 152, etc., attempting toacquire the time slot 1701 monitors for presence of wireless energy inthe bandwidth BWP1 prior to acquisition.

In this example embodiment, assume that the energy signal 1860represents a respective energy level associated with the bandwidth BWP1in the network environment 100 over time. Each of the mobilecommunication devices 151, 152, 153, etc., monitors a magnitude of theenergy. The amount of energy in the bandwidth BWP1 detected by each ofthe mobile communication devices is approximately equal to energy signal1860, more or less as the actual energy at each location may vary.

Because the time duration TD1-1 is less than time duration TD2-1, themobile communication device 151 detects that the detected energy levelof wireless energy in the bandwidth BWP1 is less than the energythreshold level 1750 for an appropriate amount of time to acquire use ofthe first time slot of the allocated bandwidth BWP1. At around time T11,because the first mobile communication device 151 (UE1) acquires thewireless bandwidth BWP1 in time slot 1701, the mobile communicationdevice 151 transmits communication 1801 in time slot 1701 in an uplinkdirection from the mobile communication device 151 to the wireless basestation 131. As shown, at time T11, this causes the energy signal 1860to increase above the threshold level 1750.

As previously discussed, the mobile communication device 152 (UE2) alsomonitors the energy present in the bandwidth BWP1. Because the timeduration TD2-1 is greater than time duration TD1-1, between time T11 andT12, the mobile communication device 152 detects that the energyassociated with the bandwidth BWP1 is greater than the threshold level1750. The detection of the energy above the threshold level 1750notifies the mobile communication device 152 that another mobilecommunication device in the set of mobile communication devices 150sharing use of the allocated time slots associated with bandwidth BWP1has acquired intro uses the time slot 1701. In such an instance, themobile communication device 152 does not transmit wirelesscommunications in an uplink direction to the wireless base station 131in time slot 1701 between time T11 and time T2.

However, at time T2, the mobile communication device 151 discontinuesusing the wireless bandwidth BWP1.

The mobile communication device 152 (UE2) and potentially one or moreother mobile communication devices monitor the energy present in thebandwidth BWP1 after time T2 to acquire use of the wireless bandwidthBWP1.

In this example embodiment, the mobile communication device 152 (UE2)implements a second listen before talk function LBT2 (such as instead ofthe first listen before talk function LBT1) to acquire the time slot1702. Because the mobile communication device 151 discontinues use ofthe bandwidth BWP1 to communicate with the wireless base station 131 attime T2, the mobile communication device 152 detects that the energylevel of wireless communications in bandwidth BWP1 is less than thethreshold level 1750 for the entire time duration TD2-2. The detectionof the energy below the threshold level 1750 notifies the mobilecommunication device 152 that no other mobile communication device inthe set of mobile communication devices 150 is using the bandwidth BWP1.In such an instance, the mobile communication device 152 acquires thetime slot 1701 and transmits wireless communications 1802 in an uplinkdirection to the wireless base station 131 in time slot 1702 betweentime T21 and time T3.

As further shown, the mobile communication device 152 also wirelesslytransmits communications 1803 in time slot 1703 to the wireless basestation 131. In one embodiment, the mobile communication device 152 doesnot need to perform another listen before talk function after acquiringthe wireless bandwidth BWP1 (in time slot 1702) after time T2.

Alternatively, note that each of the mobile communication device in theset 150 may need to implement a listen before talk function at thebeginning of each time slot to acquire a respective time slot prior touse.

Thus, during operation, the communication management hardware of mobilecommunication devices receives notification of a wireless channel BWP1scheduled for shared use amongst multiple mobile communication devices.As previously discussed, a first mobile communication device 151implements a first listen before talk function LBT1 to acquire use of aportion (such as time slot 1701) of the shared wireless channel. Forexample, via implementation of a first listen before talk function, thefirst mobile communication device 151 acquires use of time slot 1701 ofthe wireless channel BWP1 scheduled for shared use. The connectionmanagement resource associated with the second mobile communicationdevice 152 fails to acquire use of the first time slot 1701 and detectsuse of the first time slot of the wireless channel by the first mobilecommunication device 151.

In one embodiment, via the mobile communication device 152 implementingthe first listen before talk function LBT1 detects that the first timeslot 1701 is used by a member of the mobile communication devices (setof mobile communication devices 150) allocated use of the wirelesschannel BWP1.

The second mobile communication device 152 further monitors, via asecond listen before talk function LBT2, for non-use of the second timeslot 1702 of the wireless channel BWP1 to acquire use of the second timeslot 1702 amongst the multiple mobile communication devices. Thus, sincethe first mobile communication device 151 does not use the second timeslot 1702 to communicate in the uplink to the wireless base station 131,the second mobile communication device 152 is able to use the secondtime slot 1702 to communicate over a respective wireless communicationlink with the wireless base station 131.

In accordance with further example embodiments, the second listen beforetalk function (such as LBT2) implements a shorter listen before talkinterval (time duration TD2-2) than the first listen before talkfunction LBT1 (such as time duration TD2-1). Thus, as previouslydiscussed, the mobile communication device 151 acquires the first timeslot 1701 via the first listen before talk function LBT1. The secondlisten before talk function LBT2 is a more lenient (such as shorterlisten before talk duration, higher threshold level 1750, etc.) listenbefore talk protocol than the first listen before talk function.

In one embodiment, via the respective communication management hardwareassociated with the mobile communication devices, the mobilecommunication device 152 implements the second listen before talkfunction in response to detecting that a magnitude of wireless energyassociated with use of the first time slot 1701 by the first mobilecommunication device 151 is above a wireless energy threshold level1750.

In further example embodiments, the communication management hardwareassociated with the mobile communication device 152 implements the firstlisten before talk function in the first time slot 1701 prior toimplementing the second listen before talk function in the second timeslot 1702. However, as previously discussed, the first mobilecommunication device 151 implemented a shorter listen before talkinterval time (such as time duration TD1-1) than the second mobilecommunication device 152 (time duration TD2-1) in the first time slot1702 and therefore acquired the first time slot 1701 of the sharedwireless channel (BWP1) before the second mobile communication device152 was able to acquire the first time slot 1701.

In yet further example embodiments, a gap between the first time slot1701 and the second time slot 1702 is below a predetermined timethreshold value. In such an instance, because the gap is below apredetermined time threshold value, the second mobile communicationdevice 152 can acquire the second time slot 1702 via implementation ofthe second listen before talk function LBT2 instead of the first listenbefore talk function LBT1.

In still further embodiments, the first mobile communication device 151acquires use of the first time slot 1701 via implementation of the firstlisten before talk function LBT1. In one embodiment, acquisition of thefirst time slot 1701 results in acquisition of the second time slot 1702as well. However, as previously discussed, if the second mobilecommunication device 152 detects that the second time slot 1701 acquiredby the first mobile communication device 151 is not used by the firstmobile communication device 151 or other mobile communication device, ina manner as previously discussed, the second mobile communication device152 acquires use of the second time slot 1702 to communicate with thewireless base station 131.

FIG. 19 is an example diagram illustrating acquisition of available timeslots in the allocated wireless channel resources amongst multiplemobile communication devices according to embodiments herein.

As previously discussed, the communication management resource 1741allocates use of the wireless channel BWP1 by the multiple mobilecommunication devices 151, 152, 153, etc., via communications 1720.

Assume in this example embodiment that at least the mobile communicationdevice 151 and 152 desires to acquire use of the first time slot 1701(such as first configured grant resource) associated with bandwidth BWP1to communicate in an uplink direction to the wireless base station 131.

In this example embodiment, each of the mobile communication devicesinitially implements a first listen before talk function LBT1 to attemptto acquire the first time slot and communicate in an uplink direction tothe wireless base station 131.

More specifically, at time T1, the first mobile communication device 151(UE1) implements LBT1 and time duration TD1-1 to acquire use of the timeslot 1701; at time T1, the second mobile communication device 152 (UE2)implements LBT1 and time duration TD2-1 to acquire use of the time slot1701; and so on.

In one embodiment, the time duration used by the respective mobilecommunication device is a random time duration value generated by eachrespective listen before talk function. In this example embodiment, thetime duration TD1-1 is a shorter duration with respect to the timeduration TD2-1.

Each of the mobile communication devices 151, 152, etc., attempting toacquire the time slot 1701 monitors for presence of wireless energy inthe bandwidth BWP1 prior to acquisition. In this example embodiment,assume that the energy signal 1860 represents a respective energy levelassociated with the bandwidth BWP1 in the network environment 100 overtime. Each of the mobile communication devices 151, 152, 153, etc.,monitors the wireless energy with respective antenna hardware of themobile communication device. The amount of energy in the bandwidth BWP1detected by each of the mobile communication devices is approximatelyequal to energy signal 1860, more or less, as the actual energy at eachlocation of the mobile communication devices may vary.

Because the time duration TD1-1 is less than time duration TD2-1, themobile communication device 151 detects that the detected energy levelof wireless energy in the bandwidth BWP1 is less than the energythreshold level 1750 for an appropriate amount of time to acquire use ofthe first time slot of the allocated bandwidth BWP1. At around time T11,because the first mobile communication device 151 (UE1) acquires thewireless bandwidth BWP1 in time slot 1701, the mobile communicationdevice 151 transmits communication 1801 in time slot 1701 in an uplinkdirection from the mobile communication device 151 to the wireless basestation 131. As shown, at time T11, the transmission of wirelesscommunications 1801 from mobile communication device 151 causes theenergy signal 1860 to increase above the threshold level 1750.

As previously discussed, the mobile communication device 152 (UE2) alsomonitors the energy present in the bandwidth BWP1. Because the timeduration TD2-1 is greater than time duration TD 1-1, at or around timeT11 to T12, the mobile communication device 152 detects that the energyassociated with the bandwidth BWP1 is greater than the threshold level1750. The detection of the energy above the threshold level 1750notifies the mobile communication device 152 that another mobilecommunication device (mobile communication device 151 in this example)in the set of mobile communication devices 150 has acquired use and isusing of the time slot 1701.

In such an instance, the mobile communication device 152 does nottransmit wireless communications in an uplink direction to the wirelessbase station 131 in time slot 1701 between time T11 and time T2 becausethe time slot is not available.

In this example embodiment, at time T2, the mobile communication device151 continues using the wireless bandwidth BWP1 in time slot 1702.

The mobile communication device 152 (UE2) and potentially one or moreother mobile communication devices monitor the energy present in thebandwidth BWP1 at or around time T2 to acquire use of the wirelessbandwidth BWP1. In this example embodiment, the mobile communicationdevice 152 (UE2) implements a second listen before talk function LBT2 toacquire the time slot 1702.

Because the mobile communication device 151 continues use of thebandwidth BWP1 to communicate with the wireless base station 131 at timeT2 and in time slot 1702, the mobile communication device 152 detectsthat the energy level of wireless communications in bandwidth BWP1 isgreater than the threshold level 1750 during the time duration TD2-2.The detection of the energy above the threshold level 1750 by the mobilecommunication device 152 notifies the mobile communication device 152that another mobile communication device in the set of mobilecommunication devices 150 is using the bandwidth BWP1. In such aninstance, the mobile communication device 152 does not acquire thebandwidth BWP1 and does not transmit wireless communications in anuplink direction to the wireless base station 131 in time slot 1702between time T21 and time T3.

As further shown, the mobile communication device 151 also wirelesslytransmits communications 1802 in time slot 1702 to the wireless basestation 131. In one embodiment, the mobile communication device 151 doesnot need to perform another listen before talk function after acquiringthe wireless bandwidth BWP1 after time T2 because the mobilecommunication device 151 acquired the bandwidth BWP1 via the listenbefore talk function at or around time T1.

The mobile communication device 152 (UE2) and potentially one or moreother mobile communication devices monitor the energy present in thebandwidth BWP1 after time T3. In this example embodiment, the mobilecommunication device 152 (UE2) implements a second listen before talkfunction LBT2 to acquire the time slot 1703 if available. Because themobile communication device 151 discontinues use of the bandwidth BWP1to communicate with the wireless base station 131 at time T3, the mobilecommunication device 152 detects that the energy level of wirelesscommunications in bandwidth BWP1 is less than the threshold level 1750for the entire time duration TD2-3.

The time duration for each listen before talk function LBT2 is a fixedor random value.

The detection of the energy below the threshold level 1750 by the mobilecommunication device 152 notifies the mobile communication device 152that no other mobile communication device in the set of mobilecommunication devices in the set 150 is using the bandwidth BWP1. Insuch an instance, the mobile communication device 152 transmits wirelesscommunications 1803 in an uplink direction to the wireless base station131 in time slot 1703 between time T31 and time T4.

As further shown, the mobile communication device 152 also wirelesslytransmits communications 1803 in time slot 1703 to the wireless basestation 131.

FIG. 20 is an example diagram illustrating shared use of wirelesschannel resources (such as one or more timeslots) by a set of mobilecommunication devices according to embodiments herein.

In one embodiment, as shown in FIG. 20, the wireless channel BWP1scheduled for use by the multiple mobile communication devices includesa first set of timeslots 2010-1, 2010-2, 2010-3, etc., interleavedamongst a second set of timeslots 2010-A, 2010-B, 2010-C, etc.

In this example embodiment, a first set of mobile communication devices150 including mobile communication device 151, mobile communicationdevice 152, mobile communication device 153, etc., is assigned shareduse of the first set of timeslots 2010-1, 2010-2, 2010-3, etc. Thesecond set of timeslots is scheduled for shared use by a second set ofmobile communication devices 160 including mobile communication device161, 162, etc.

Wireless communications 2031 from the wireless base station 131 notifyeach member in the first set of mobile communication devices thattimeslots 2010-1, 2010-2, 2010-3, etc., are available to the firstmobile communication devices 151, 152, 153, etc. Wireless communications2032 from the wireless base station 131 notify each member in the secondset of mobile communication devices that timeslots 2010-A, 2010-B,2010-C, etc., are available to the second mobile communication devices161, 162, etc.

FIG. 21 is an example diagram illustrating acquisition of available timeslots in the allocated wireless channel resources amongst multiplemobile communication devices according to embodiments herein.

In this embodiment, in a similar manner as previously discussed, each ofthe mobile communication devices competes for use of the availablewireless time slots in the allocated wireless bandwidth BWP1. However,in this example embodiment, the members of the first set of mobilecommunication devices 151, 152, 153, etc., compete for use of time slots2010; the members of the second set of mobile communication devices 161,162, etc., compete for use of time slots 2020.

More specifically, in a similar manner as previously discussed, mobilecommunication device 151 acquires use of time slot 2020-1 before mobilecommunication device 152. Mobile communication device 151 transmitscommunications 2101 in time slot 2020-1 to the wireless base station 131over a respective wireless communication link.

Mobile communication device 152 acquires use of time slot 2020-2 beforeany other mobile communication device. Mobile communication device 152transmits communications 2102 in time slot 2020-2 to the wireless basestation 131 over a respective wireless communication link.

Mobile communication device 152 continues to use time slot 2020-3 tocommunicate data via communications 2103 in an uplink direction from themobile communication device 152 to the wireless base station 131.

FIG. 22 is an example diagram illustrating acquisition of available timeslots in the allocated wireless channel resources amongst multiplemobile communication devices according to embodiments herein.

In this embodiment, in a similar manner as previously discussed, each ofthe mobile communication devices competes for use of the availablewireless time slots in the allocated wireless bandwidth BWP1. However,in this example embodiment, the members of the first set of mobilecommunication devices 151, 152, 153, etc., compete for use of time slots2020-1, 2020-2, 2020-3, etc.; the members of the second set of mobilecommunication devices 161, 162, etc., compete for use of time slots2020-A, 2020-B, 2020-C, etc.

More specifically, in a similar manner as previously discussed, mobilecommunication device 151 acquires use of time slot 2020-1 before mobilecommunication device 152. Mobile communication device 151 transmitscommunications 2101 in time slot 2020-1 to the wireless base station 131over a respective wireless communication link.

Mobile communication device 151 continues to use time slot 2020-2.Mobile communication device 151 transmits communications 2102 in timeslot 2020-2 to the wireless base station 131 over a respective wirelesscommunication link. Mobile communication device 152 detects use of thewireless channel via listen before talk LBT2 at the beginning of timeslot 2020-2.

Mobile communication device 151 continues to use time slot 2020-2 tocommunicate data in an uplink direction from the mobile communicationdevice 151 to the wireless base station 131. In such an instance, themobile communication device 152 is unable to acquire and use the timeslot 2020-2.

Via implementation of listen before talk function LBT2, the mobilecommunication device 152 acquires use of time slot 2020-3 before anyother mobile communication device 152 and transmits communications 2103in time slot 2020-3 to the wireless base station 131 over a respectivewireless communication link.

FIG. 23 is an example block diagram of a computer system forimplementing any of the operations as previously discussed according toembodiments herein. Any of the resources (such as communication manager1741, listen before talk functions 1761, 1762, 1763, wireless basestation 131, mobile communication device 151, mobile communicationdevice 152, mobile communication device 161, communication managementresources 1771, 1772, 1773, etc.) as discussed herein can be configuredto include computer processor hardware and/or corresponding executableinstructions to carry out the different operations as discussed herein.

As shown, computer system 2350 of the present example includesinterconnect 2311 coupling computer readable storage media 2312 such asa non-transitory type of media (which can be any suitable type ofhardware storage medium in which digital information can be stored andor retrieved), a processor 2313 (computer processor hardware), I/Ointerface 2314, and a communications interface 2317. I/O interface(s)2314 supports connectivity to repository 2380 and input resource 2392.

Computer readable storage medium 2312 can be any hardware storage devicesuch as memory, optical storage, hard drive, floppy disk, etc. In oneembodiment, the computer readable storage medium 2312 storesinstructions and/or data.

As shown, computer readable storage media 2312 can be encoded withcommunication manager application 1740-1 (e.g., including instructions)in a respective wireless station (such as each of the mobilecommunication devices 151, 152, 153, etc., 161, 162, etc.) to carry outany of the operations as discussed herein.

During operation of one embodiment, processor 2313 accesses computerreadable storage media 2312 via the use of interconnect 2311 in order tolaunch, run, execute, interpret or otherwise perform the instructions incommunication manager application 1740-1 stored on computer readablestorage medium 2312. Execution of the communication manager application1140-1 produces communication manager process 1740-2 to carry out any ofthe operations and/or processes as discussed herein.

Those skilled in the art will understand that the computer system 2350can include other processes and/or software and hardware components,such as an operating system that controls allocation and use of hardwareresources to execute communication manager application 1740-1.

In accordance with different embodiments, note that computer system mayreside in any of various types of devices, including, but not limitedto, a mobile computer, a personal computer system, a wireless device, awireless access point, a base station, phone device, desktop computer,laptop, notebook, netbook computer, mainframe computer system, handheldcomputer, workstation, network computer, application server, storagedevice, a consumer electronics device such as a camera, camcorder, settop box, mobile device, video game console, handheld video game device,a peripheral device such as a switch, modem, router, set-top box,content management device, handheld remote control device, any type ofcomputing or electronic device, etc. The computer system 2350 may resideat any location or can be included in any suitable resource in anynetwork environment to implement functionality as discussed herein.

Functionality supported by the different resources will now be discussedvia the flowchart in FIG. 24. Note that the steps in the flowchartsbelow can be executed in any suitable order.

FIG. 24 is a flowchart 2400 illustrating an example method according toembodiments herein. Note that there will be some overlap with respect toconcepts as discussed above.

In processing operation 2410, each of the communication managementresources 1771, 1772, 1773, etc., associated with mobile communicationdevices receives notification of a wireless channel (such as bandwidthBWP1) scheduled for shared use amongst multiple mobile communicationdevices in the set of mobile communication devices 150.

In processing operation 2420, the mobile communication device 152 (UE2)detects use of a first time slot 1701 of the wireless channel. Themobile communication device 151 (UE1) acquires the first time slot 1701via implementing a first listen before talk function (listen before talkfunction #1).

In processing operation 2430, via a second listen before talk function(listen before talk function #2), the mobile communication device 152monitors for non-use of a second time slot 1702 of the wireless channelto acquire use of the second time slot 1702 amongst the multiple mobilecommunication devices 151, 152, 153, etc.

Note again that techniques herein are well suited to facilitateacquisition and shared use of multiple wireless channels and wirelesschannel resources (such as timeslots) in a network environment such asvia multiple listen before talk functions. However, it should be notedthat embodiments herein are not limited to use in such applications andthat the techniques discussed herein are well suited for otherapplications as well.

Based on the description set forth herein, numerous specific detailshave been set forth to provide a thorough understanding of claimedsubject matter. However, it will be understood by those skilled in theart that claimed subject matter may be practiced without these specificdetails. In other instances, methods, apparatuses, systems, etc., thatwould be known by one of ordinary skill have not been described indetail so as not to obscure claimed subject matter. Some portions of thedetailed description have been presented in terms of algorithms orsymbolic representations of operations on data bits or binary digitalsignals stored within a computing system memory, such as a computermemory. These algorithmic descriptions or representations are examplesof techniques used by those of ordinary skill in the data processingarts to convey the substance of their work to others skilled in the art.An algorithm as described herein, and generally, is considered to be aself-consistent sequence of operations or similar processing leading toa desired result. In this context, operations or processing involvephysical manipulation of physical quantities. Typically, although notnecessarily, such quantities may take the form of electrical or magneticsignals capable of being stored, transferred, combined, compared orotherwise manipulated. It has been convenient at times, principally forreasons of common usage, to refer to such signals as bits, data, values,elements, symbols, characters, terms, numbers, numerals or the like. Itshould be understood, however, that all of these and similar terms areto be associated with appropriate physical quantities and are merelyconvenient labels. Unless specifically stated otherwise, as apparentfrom the following discussion, it is appreciated that throughout thisspecification discussions utilizing terms such as “processing,”“computing,” “calculating,” “determining” or the like refer to actionsor processes of a computing platform, such as a computer or a similarelectronic computing device, that manipulates or transforms datarepresented as physical electronic or magnetic quantities withinmemories, registers, or other information storage devices, transmissiondevices, or display devices of the computing platform.

While this invention has been particularly shown and described withreferences to preferred embodiments thereof, it will be understood bythose skilled in the art that various changes in form and details may bemade therein without departing from the spirit and scope of the presentapplication as defined by the appended claims. Such variations areintended to be covered by the scope of this present application. Assuch, the foregoing description of embodiments of the presentapplication is not intended to be limiting. Rather, any limitations tothe invention are presented in the following claims.

1. A method comprising: monitoring, via listen before talk operations,both a first bandwidth and a second bandwidth to transmit wirelesscommunications in a network environment; receiving access rights to usethe first bandwidth prior to receiving access rights to use the secondbandwidth; and temporally aligning use of the first bandwidth and thesecond bandwidth via communication of a wireless message over the firstbandwidth.
 2. The method as in claim 1, wherein the wireless message isa grant of use message of the first bandwidth communicated from awireless base station to a first mobile communication device.
 3. Themethod as in claim 2 further comprising: communicating the grant of usemessage to the first mobile communication device in a window of timebetween receiving the access rights to use the first bandwidth andreceiving the access rights to use the second bandwidth.
 4. The methodas in claim 3, wherein the grant of use of the first bandwidth by thefirst mobile communication device prevents a competing wireless stationwith respect to the wireless base station from obtaining access rightsto the first bandwidth in the window of time.
 5. The method as in claim3 further comprising: assigning the first bandwidth for use by a firstset of mobile communication devices in communication with the wirelessbase station, the first set of mobile communication devices includingthe first mobile communication device; and assigning the secondbandwidth for use by a second set of mobile communication devices incommunication with the wireless base station.
 6. The method as in claim1, wherein the wireless message indicates a grant of use of the firstbandwidth, the method further comprising: in a first time slot,communicating the wireless message from a wireless base station to afirst mobile communication device, the wireless message indicatingallocation of the first bandwidth to the first mobile communicationdevice to communicate in an uplink direction from the mobilecommunication device to the wireless base station.
 7. The method as inclaim 6, wherein the wireless base station does not yet have accessrights to use the second bandwidth in the first time slot.
 8. The methodas in claim 6 further comprising: in a second time slot following thefirst time slot, via wireless communication of a revoke grant message,revoking the grant of use of the first wireless bandwidth to the firstmobile communication device as indicated by the wireless message, therevoked grant of use indicating deallocation of the first bandwidth fromthe first mobile communication device to communicate in an uplinkdirection from the mobile communication device to the wireless basestation.
 9. The method as in claim 8, wherein the wireless base stationhas access rights to use the second bandwidth in the second time slot.10. The method as in claim 6 further comprising: communicating thewireless message from the wireless base station over a control channelmonitored by multiple mobile communication devices that share use of thefirst bandwidth.
 11. A system comprising: a wireless base stationoperative to: monitor, via listen before talk operations, both a firstbandwidth and a second bandwidth to transmit wireless communications ina network environment; receive access rights to use the first bandwidthprior to receiving access rights to use the second bandwidth; andtemporally align use of the first bandwidth and the second bandwidth viacommunication of a wireless message over the first bandwidth.
 12. Thesystem as in claim 11, wherein the wireless message is a grant of usemessage of the first bandwidth communicated from the wireless basestation to a first mobile communication device.
 13. The system as inclaim 12, wherein the wireless base station is further operative to:communicate the grant of use message to the first mobile communicationdevice in a window of time between receiving the access rights to usethe first bandwidth and receiving the access rights to use the secondbandwidth.
 14. The system as in claim 13, wherein the grant of use ofthe first bandwidth by the first mobile communication device prevents acompeting wireless station with respect to the wireless base stationfrom obtaining access rights to the first bandwidth in the window oftime.
 15. The system as in claim 13, wherein the wireless base stationis further operative to: assign the first bandwidth for use by a firstset of mobile communication devices in communication with the wirelessbase station, the first set of mobile communication devices includingthe first mobile communication device; and assign the second bandwidthfor use by a second set of mobile communication devices in communicationwith the wireless base station.
 16. The system as in claim 11, whereinthe wireless message indicates a grant of use of the first bandwidth,the wireless base station further operative to: in a first time slot,communicate the wireless message from a wireless base station to a firstmobile communication device, the wireless message indicating allocationof the first bandwidth to the first mobile communication device tocommunicate in an uplink direction from the mobile communication deviceto the wireless base station.
 17. The system as in claim 16, wherein thewireless base station does not yet have access rights to use the secondbandwidth in the first time slot.
 18. The system as in claim 16, whereinthe wireless base station is further operative to: in a second time slotfollowing the first time slot, via wireless communication of a revokegrant message, revoke the grant of use of the first wireless bandwidthto the first mobile communication device as indicated by the wirelessmessage, the revoked grant of use indicating deallocation of the firstbandwidth from the first mobile communication device to communicate inan uplink direction from the mobile communication device to the wirelessbase station.
 19. The system as in claim 18, wherein the wireless basestation has access rights to use the second bandwidth in the second timeslot.
 20. The system as in claim 16, wherein the wireless base stationis further operative to: communicate the wireless message from thewireless base station over a control channel monitored by multiplemobile communication devices that share use of the first bandwidth. 21.Computer-readable storage hardware having instructions stored thereon,the instructions, when carried out by computer processor hardware, causethe computer processor hardware to: monitor, via listen before talkoperations, both a first bandwidth and a second bandwidth to transmitwireless communications in a network environment; receive access rightsto use the first bandwidth prior to receiving access rights to use thesecond bandwidth; and temporally align use of the first bandwidth andthe second bandwidth via communication of a wireless message over thefirst bandwidth.