Methods and apparatus for managing interference across operators

ABSTRACT

Aspects of the present disclosure provide an apparatus and techniques for managing interference across operators. A base station identifies a first region of a first frequency spectrum assigned to a first operator, wherein uplink and downlink subframe configurations for Time Division Duplex (TDD) communications using the first region and a first region of a second frequency spectrum assigned to a second operator are synchronized between the first and second operator. The base station further identifies a second region of the first frequency spectrum, wherein uplink and downlink subframe configurations for TDD communications using the second region and a second region of the second frequency spectrum are not synchronized between the first and second operator. The base station communicates with one or more user equipments using the first and second region of the first frequency spectrum.

This application claims priority to U.S. Provisional Application Ser.No. 62/359,609, entitled “METHODS AND APPARATUS FOR MANAGINGINTERFERENCE ACROSS OPERATORS”, filed on Jul. 7, 2016, which isexpressly incorporated by reference herein in its entirety.

BACKGROUND Field of the Disclosure

The present disclosure generally relates to wireless communication and,more particularly, to methods and apparatus for managing interferenceacross operators.

Description of Related Art

Wireless communication systems are widely deployed to provide varioustelecommunication services such as telephony, video, data, messaging,and broadcasts. Typical wireless communication systems may employmultiple-access technologies capable of supporting communication withmultiple users by sharing available system resources (e.g., bandwidth,transmit power). Examples of such multiple-access technologies includecode division multiple access (CDMA) systems, time division multipleaccess (TDMA) systems, frequency division multiple access (FDMA)systems, orthogonal frequency division multiple access (OFDMA) systems,single-carrier frequency divisional multiple access (SC-FDMA) systems,and time division synchronous code division multiple access (TD-SCDMA)systems.

In some examples, a wireless multiple-access communication system mayinclude a number of base stations, each simultaneously supportingcommunication for multiple communication devices, otherwise known asuser equipment (UEs). In LTE or LTE-A network, a set of one or more basestations may define an eNodeB (eNB). In other examples (e.g., in a nextgeneration or 5G network), a wireless multiple access communicationsystem may include a number of distributed units (DUs) (e.g., edge units(EUs), edge nodes (ENs), radio heads (RHs), smart radio heads (SRHs),transmission reception points (TRPs), etc.) in communication with anumber of central units (CUs) (e.g., central nodes (CNs), access nodecontrollers (ANCs), etc.), where a set of one or more distributed units,in communication with a central unit, may define an access node (e.g., anew radio base station (NR BS), a new radio node-B (NR NB), a networknode, 5G NB, gNB, etc.). A base station or DU may communicate with a setof UEs on downlink channels (e.g., for transmissions from a base stationor to a UE) and uplink channels (e.g., for transmissions from a UE to abase station or distributed unit).

These multiple access technologies have been adopted in varioustelecommunication standards to provide a common protocol that enablesdifferent wireless devices to communicate on a municipal, national,regional, and even global level. An example of an emergingtelecommunication standard is new radio (NR), for example, 5G radioaccess. NR is a set of enhancements to the LTE mobile standardpromulgated by Third Generation Partnership Project (3GPP). It isdesigned to better support mobile broadband Internet access by improvingspectral efficiency, lowering costs, improving services, making use ofnew spectrum, and better integrating with other open standards usingOFDMA with a cyclic prefix (CP) on the downlink (DL) and on the uplink(UL) as well as support beamforming, multiple-input multiple-output(MIMO) antenna technology, and carrier aggregation.

However, as the demand for mobile broadband access continues toincrease, there exists a need for further improvements in NR technology.Preferably, these improvements should be applicable to othermulti-access technologies and the telecommunication standards thatemploy these technologies.

SUMMARY

The systems, methods, and devices of the disclosure each have severalaspects, no single one of which is solely responsible for its desirableattributes. Without limiting the scope of this disclosure as expressedby the claims which follow, some features will now be discussed briefly.After considering this discussion, and particularly after reading thesection entitled “Detailed Description” one will understand how thefeatures of this disclosure provide advantages that include improvedcommunications between access points and stations in a wireless network.

Certain aspects of the present disclosure provide a method of wirelesscommunication performed by a base station. The method generally includesidentifying a first region of a first frequency spectrum assigned to afirst operator, wherein uplink and downlink subframe configurations forTime Division Duplex (TDD) communications using the first region and afirst region of a second frequency spectrum assigned to a secondoperator are synchronized between the first and second operator,identifying a second region of the first frequency spectrum, whereinuplink and downlink subframe configurations for TDD communications usingthe second region and a second region of the second frequency spectrumare not synchronized between the first and second operator, andcommunicating with one or more user equipments (UEs) using the first andsecond region of the first frequency spectrum.

Certain aspects of the present disclosure provide an apparatus forwireless communication by a base station. The apparatus generallyincludes means for identifying a first region of a first frequencyspectrum assigned to a first operator, wherein uplink and downlinksubframe configurations for Time Division Duplex (TDD) communicationsusing the first region and a first region of a second frequency spectrumassigned to a second operator are synchronized between the first andsecond operator, means for identifying a second region of the firstfrequency spectrum, wherein uplink and downlink subframe configurationsfor TDD communications using the second region and a second region ofthe second frequency spectrum are not synchronized between the first andsecond operator, and means for communicating with one or more userequipments (UEs) using the first and second region of the firstfrequency spectrum.

Certain aspects of the present disclosure provide an apparatus forwireless communication by a base station. The apparatus generallyincludes at least one processor and a memory coupled to the at least oneprocessor. The at least one processor is configured to identify a firstregion of a first frequency spectrum assigned to a first operator,wherein uplink and downlink subframe configurations for Time DivisionDuplex (TDD) communications using the first region and a first region ofa second frequency spectrum assigned to a second operator aresynchronized between the first and second operator, identify a secondregion of the first frequency spectrum, wherein uplink and downlinksubframe configurations for TDD communications using the second regionand a second region of the second frequency spectrum are notsynchronized between the first and second operator, and communicate withone or more user equipments (UEs) using the first and second region ofthe first frequency spectrum.

Certain aspects of the present disclosure provide a computer-readablemedium for wireless communication by a base station, storinginstructions executable by at least one processor to perform a methodgenerally including identifying a first region of a first frequencyspectrum assigned to a first operator, wherein uplink and downlinksubframe configurations for Time Division Duplex (TDD) communicationsusing the first region and a first region of a second frequency spectrumassigned to a second operator are synchronized between the first andsecond operator, identifying a second region of the first frequencyspectrum, wherein uplink and downlink subframe configurations for TDDcommunications using the second region and a second region of the secondfrequency spectrum are not synchronized between the first and secondoperator, and communicating with one or more user equipments (UEs) usingthe first and second region of the first frequency spectrum.

BRIEF DESCRIPTION OF THE DRAWINGS

So that the manner in which the above-recited features of the presentdisclosure can be understood in detail, a more particular description,briefly summarized above, may be had by reference to aspects, some ofwhich are illustrated in the appended drawings. It is to be noted,however, that the appended drawings illustrate only certain typicalassets of this disclosure and are therefore not to be consideredlimiting of its scope, for the description may admit to other equallyeffective aspects.

FIG. 1 is a block diagram conceptually illustrating an exampletelecommunications system, in accordance with certain aspects of thepresent disclosure.

FIG. 2 is a block diagram illustrating an example logical architectureof a distributed RAN, in accordance with certain aspects of the presentdisclosure.

FIG. 3 is a diagram illustrating an example physical architecture of adistributed RAN, in accordance with certain aspects of the presentdisclosure.

FIG. 4 is a block diagram conceptually illustrating a design of anexample BS and user equipment (UE), in accordance with certain aspectsof the present disclosure.

FIG. 5 is a diagram showing examples for implementing a communicationprotocol stack, in accordance with certain aspects of the presentdisclosure.

FIG. 6a illustrates an example of a DL-centric subframe, in accordancewith certain aspects of the present disclosure.

FIG. 6b illustrates an example of an UL-centric subframe, in accordancewith certain aspects of the present disclosure.

FIGS. 7A and 7B illustrate example jamming graphs, in accordance withcertain aspects of the present disclosure.

FIG. 8 illustrates example deployment of bandwidth regions of twoadjacent operators, in accordance with certain aspects of the presentdisclosure.

FIG. 9 illustrates example operations that may be performed by a basestation, for implementing dynamic TDD across operators, in accordancewith certain aspects of the present disclosure.

FIG. 10 illustrates an example technique for managing mixed interferencebetween networks of different operators, in accordance with certainaspects of the present disclosure.

FIG. 11 illustrates example operations that maybe performed by a basestation, for implementing dynamic TDD across carriers assigned to aparticular operator, in accordance with certain aspects of the presentdisclosure.

DETAILED DESCRIPTION

As the demand for mobile broadband access continues to increase, andwith more UEs accessing the long-range wireless communication networksand more short-range wireless systems being deployed in communities, thepossibilities of interference and congested networks grows. For example,traditional time division duplexing (TDD) implementations have utilizedfixed configurations of downlink and uplink subframes, wherein thedownlink and uplink scheduling is synchronized over the entiredeployment. In such a fixed configuration, the entire system follows aparticular timing pattern for base station downlink and uplinkcommunications. Such synchronized downlink and uplink schedulingdeployments have been generally acceptable due to their relativelysimple deployment and management. In particular, the use of downlink anduplink synchronized scheduling limits the interference scenarios todownlink-to-downlink and uplink-to-uplink interference scenarios.Accordingly, downlink-to-uplink or uplink-to-downlink interferencescenarios (collectively and separately referred to herein as mixedinterference scenarios) are avoided and interference mitigation for suchmixed interference scenarios need not be provided for.

One goal of 5^(th) Generation (5G) or New Radio (NR) standards is toprovide for dynamic scheduling of UL or DL transmissions for one or moresubframes in a network depending on current traffic needs of thenetwork. This dynamic configuration of subframes is often referred to asDynamic TDD configuration or simply Dynamic TDD. Dynamic TDD has beenmade possible within a particular operator's assigned bandwidth regionby coordination among network elements of the particular operator. Forexample, mixed interference profiles may be exchanged between networkelements of the operator. One or more network elements (e.g., basestations) of the operator may dynamically select a transmissiondirection (e.g., UL or DL) to be used in a particular transmissioninterval based on the traffic needs of the network element and/or basedon the mixed interference profiles received from other neighboringnetwork elements.

However, operators generally are not willing to share data acrossoperators' networks, and thus, coordination between network elements ofdifferent operators for the purposes of mixed interference mitigation isnot generally practical. One solution to enable adjacent operators(e.g., assigned adjacent bandwidth regions of a spectrum) to employasynchronous TDD operation (e.g., dynamic TDD not synchronous withadjacent operator's network) is to have a large guard band separatingthe bandwidth regions of the two adjacent operators so thattransmissions within bandwidth regions of the two operators do notinterfere with each other. However, a large guardband leads to wastageof spectrum, which is a valuable resource. Thus, there is a need fortechniques that may enable different operators to employ asynchronousTDD operation (e.g., dynamic TDD) with minimal mixed interferencebetween network elements of the operators and without wasting too muchspectrum allocated for guard bands.

In certain aspects of the present disclosure, a technique to accomplishthe above goal may include dividing bandwidth regions assigned tonetworks of each of one or more operators (e.g., operators havingadjacent assigned bandwidth regions of a spectrum) into regions ofasynchronous TDD operation (e.g., dynamic TDD configuration) andsynchronous TDD operation (e.g., static UL/DL configuration), withsynchronous regions of the networks assigned at edges of the bandwidthregions closer to each other. The synchronous regions act as a bufferbetween the asynchronous regions, thus helping to mitigate interferencebetween the asynchronous regions. In addition, as a result of thisbuffer provided by the synchronous regions, the guard band between thebandwidth regions of the operators may be reduced or completelyeliminated as discussed in aspects of the present disclosure.

The detailed description set forth below in connection with the appendeddrawings is intended as a description of various configurations and isnot intended to represent the only configurations in which the conceptsdescribed herein may be practiced. The detailed description includesspecific details for the purpose of providing a thorough understandingof various concepts. However, it will be apparent to those skilled inthe art that these concepts may be practiced without these specificdetails. In some instances, well-known structures and components areshown in block diagram form in order to avoid obscuring such concepts.

Several aspects of telecommunication systems will now be presented withreference to various apparatus and methods. These apparatus and methodswill be described in the following detailed description and illustratedin the accompanying drawings by various blocks, modules, components,circuits, steps, processes, algorithms, etc. (collectively referred toas “elements”). These elements may be implemented using hardware,software/firmware, or combinations thereof. Whether such elements areimplemented as hardware or software depends upon the particularapplication and design constraints imposed on the overall system.

By way of example, an element, or any portion of an element, or anycombination of elements may be implemented with a “processing system”that includes one or more processors. Examples of processors includemicroprocessors, microcontrollers, digital signal processors (DSPs),field programmable gate arrays (FPGAs), programmable logic devices(PLDs), state machines, gated logic, discrete hardware circuits, andother suitable hardware configured to perform the various functionalitydescribed throughout this disclosure. One or more processors in theprocessing system may execute software. Software shall be construedbroadly to mean instructions, instruction sets, code, code segments,program code, programs, subprograms, software modules, applications,software applications, software packages, routines, subroutines,objects, executables, threads of execution, procedures, functions, etc.,whether referred to as software/firmware, middleware, microcode,hardware description language, or otherwise.

Accordingly, in one or more exemplary embodiments, the functionsdescribed may be implemented in hardware, software/firmware, orcombinations thereof. If implemented in software, the functions may bestored on or encoded as one or more instructions or code on acomputer-readable medium. Computer-readable media includes computerstorage media. Storage media may be any available media that can beaccessed by a computer. By way of example, and not limitation, suchcomputer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or otheroptical disk storage, magnetic disk storage or other magnetic storagedevices, or any other medium that can be used to carry or store desiredprogram code in the form of instructions or data structures and that canbe accessed by a computer. Disk and disc, as used herein, includescompact disc (CD), laser disc, optical disc, digital versatile disc(DVD), floppy disk and Blu-ray disc where disks usually reproduce datamagnetically, while discs reproduce data optically with lasers.Combinations of the above should also be included within the scope ofcomputer-readable media.

Aspects of the present disclosure may be used for new radio (NR) (newradio access technology or 5G technology). NR may support variouswireless communication services, such as Enhanced mobile broadband(eMBB) targeting wide bandwidth (e.g. 80 MHz beyond), millimeter wave(mmW) targeting high carrier frequency (e.g. 60 GHz), massive MTC (mMTC)targeting non-backward compatible MTC techniques, and/or missioncritical targeting ultra reliable low latency communications (URLLC).These services may include latency and reliability requirements. Theseservices may also have different transmission time intervals (TTI) tomeet respective quality of service (QoS) requirements. In addition,these services may co-exist in the same subframe.

The techniques described herein may be used for various wirelesscommunication networks such as LTE, CDMA, TDMA, FDMA, OFDMA, SC-FDMA andother networks. The terms “network” and “system” are often usedinterchangeably. A CDMA network may implement a radio technology such asUniversal Terrestrial Radio Access (UTRA), cdma2000, etc. UTRA includesWideband CDMA (WCDMA) and other variants of CDMA. cdma2000 coversIS-2000, IS-95 and IS-856 standards. A TDMA network may implement aradio technology such as Global System for Mobile Communications (GSM).An OFDMA network may implement a radio technology such as NR (e.g. 5GRA), Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11(Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDMA, etc. UTRA andE-UTRA are part of Universal Mobile Telecommunication System (UMTS). NRis an emerging wireless communications technology under development inconjunction with the 5G Technology Forum (5GTF). 3GPP Long TermEvolution (LTE) and LTE-Advanced (LTE-A) are releases of UMTS that useE-UTRA. UTRA, E-UTRA, UMTS, LTE, LTE-A and GSM are described indocuments from an organization named “3rd Generation PartnershipProject” (3GPP). cdma2000 and UMB are described in documents from anorganization named “3rd Generation Partnership Project 2” (3GPP2). Thetechniques described herein may be used for the wireless networks andradio technologies mentioned above as well as other wireless networksand radio technologies. For clarity, while aspects may be describedherein using terminology commonly associated with 3G and/or 4G wirelesstechnologies, aspects of the present disclosure can be applied in othergeneration-based communication systems, such as 5G and later, includingNR technologies.

FIG. 1 illustrates an example wireless network 100 in which aspects ofthe present disclosure may be implemented. For example, the wirelessnetwork may be a new radio (NR) or 5G network. A BS, for example a BS110, may be configured to perform operations 900 in FIG. 9 and methodsdescribed herein for implementing dynamic TDD across operators. Forexample, the BS identifies a first region of a first frequency spectrumassigned to a first operator and a first region of a second frequencyspectrum assigned to a second operator. In one aspect, the uplink anddownlink subframe configurations for Time Division Duplex (TDD)communications using the first region of the first frequency spectrumand the first region of the second frequency spectrum are synchronizedbetween the first and second operator. The BS communicates with one ormore user equipments (UEs) using the first and second regions of thefirst frequency spectrum.

The BS also identifies a second region of the first frequency spectrumassigned to the first operator and a second region of the secondfrequency spectrum assigned to the second operator. The uplink anddownlink subframe configurations for TDD communications using the secondregion of the first frequency spectrum and the second region of thesecond frequency spectrum are not synchronized between the first andsecond operator.

BS 110 may comprise a transmission gNB, reception point (TRP), Node B(NB), 5G NB, access point (AP), new radio (NR) BS, Master BS, primaryBS, etc.). The NR network 100 may include the central unit.

As illustrated in FIG. 1, the wireless network 100 may include a numberof BSs 110 and other network entities (or network elements). Accordingto an example, the network entities including the BS and UEs maycommunicate on high frequencies (e.g., >6 GHz) using beams. One or moreBS may also communicate at a lower frequency (e.g., <6 GHz). The one ormore BS configured to operate in a high frequency spectrum and the oneor more BS configured to operate in a lower frequency spectrum may beco-located.

A BS may be a station that communicates with UEs. Each BS 110 mayprovide communication coverage for a particular geographic area. In3GPP, the term “cell” can refer to a coverage area of a Node B and/or aNode B subsystem serving this coverage area, depending on the context inwhich the term is used. In NR systems, the term “cell” and gNB, Node B,5G NB, AP, NR BS, NR BS, or TRP may be interchangeable. In someexamples, a cell may not necessarily be stationary, and the geographicarea of the cell may move according to the location of a mobile basestation. In some examples, the base stations may be interconnected toone another and/or to one or more other base stations or network nodes(not shown) in the wireless network 100 through various types ofbackhaul interfaces such as a direct physical connection, a virtualnetwork, or the like using any suitable transport network.

In general, any number of wireless networks may be deployed in a givengeographic area. Each wireless network may support a particular radioaccess technology (RAT) and may operate on one or more frequencies. ARAT may also be referred to as a radio technology, an air interface,etc. A frequency may also be referred to as a carrier, a frequencychannel, etc. Each frequency may support a single RAT in a givengeographic area in order to avoid interference between wireless networksof different RATs. In some cases, NR or 5G RAT networks may be deployed.

A BS may provide communication coverage for a macro cell, a pico cell, afemto cell, and/or other types of cell. A macro cell may cover arelatively large geographic area (e.g., several kilometers in radius)and may allow unrestricted access by UEs with service subscription. Apico cell may cover a relatively small geographic area and may allowunrestricted access by UEs with service subscription. A femto cell maycover a relatively small geographic area (e.g., a home) and may allowrestricted access by UEs having association with the femto cell (e.g.,UEs in a Closed Subscriber Group (CSG), UEs for users in the home,etc.). A BS for a macro cell may be referred to as a macro BS. A BS fora pico cell may be referred to as a pico BS. A BS for a femto cell maybe referred to as a femto BS or a home BS. In the example shown in FIG.1, the BSs 110 a, 110 b and 110 c may be macro BSs for the macro cells102 a, 102 b and 102 c, respectively. The BS 110 x may be a pico BS fora pico cell 102 x. The BSs 110 y and 110 z may be femto BS for the femtocells 102 y and 102 z, respectively. A BS may support one or multiple(e.g., three) cells.

The wireless network 100 may also include relay stations. A relaystation is a station that receives a transmission of data and/or otherinformation from an upstream station (e.g., a BS or a UE) and sends atransmission of the data and/or other information to a downstreamstation (e.g., a UE or a BS). A relay station may also be a UE thatrelays transmissions for other UEs. In the example shown in FIG. 1, arelay station 110 r may communicate with the BS 110 a and a UE 120 r tofacilitate communication between the BS 110 a and the UE 120 r. A relaystation may also be referred to as a relay BS, a relay, etc.

The wireless network 100 may be a heterogeneous network that includesBSs of different types, e.g., macro BS, pico BS, femto BS, relays, etc.These different types of BSs may have different transmit power levels,different coverage areas, and different impact on interference in thewireless network 100. For example, macro BS may have a high transmitpower level (e.g., 20 Watts) whereas pico BS, femto BS, and relays mayhave a lower transmit power level (e.g., 1 Watt).

The wireless network 100 may support synchronous or asynchronousoperation. For synchronous operation, the BSs may have similar frametiming, and transmissions from different BSs may be approximatelyaligned in time. For asynchronous operation, the BSs may have differentframe timing, and transmissions from different BSs may not be aligned intime. The techniques described herein may be used for both synchronousand asynchronous operation.

A network controller 130 may couple to a set of BSs and providecoordination and control for these BSs. The network controller 130 maycommunicate with the BSs 110 via a backhaul. The BSs 110 may alsocommunicate with one another, e.g., directly or indirectly via wirelessor wireline backhaul.

The UEs 120 (e.g., 120 x, 120 y, etc.) may be dispersed throughout thewireless network 100, and each UE may be stationary or mobile. A UE mayalso be referred to as a mobile station, a terminal, an access terminal,a subscriber unit, a station, a Customer Premises Equipment (CPE), acellular phone, a smart phone, a personal digital assistant (PDA), awireless modem, a wireless communication device, a handheld device, alaptop computer, a cordless phone, a wireless local loop (WLL) station,a tablet, a camera, a gaming device, a netbook, a smartbook, anultrabook, a medical device or medical equipment, a biometricsensor/device, a wearable device such as a smart watch, smart clothing,smart glasses, a smart wrist band, smart jewelry (e.g., a smart ring, asmart bracelet, etc.), an entertainment device (e.g., a music device, avideo device, a satellite radio, etc.), a vehicular component or sensor,a smart meter/sensor, industrial manufacturing equipment, a globalpositioning system device, or any other suitable device that isconfigured to communicate via a wireless or wired medium. Some UEs maybe considered evolved or machine-type communication (MTC) devices orevolved MTC (eMTC) devices. MTC and eMTC UEs include, for example,robots, drones, remote devices, sensors, meters, monitors, locationtags, etc., that may communicate with a BS, another device (e.g., remotedevice), or some other entity. A wireless node may provide, for example,connectivity for or to a network (e.g., a wide area network such asInternet or a cellular network) via a wired or wireless communicationlink. Some UEs may be considered Internet-of-Things (IoT) devices.

In FIG. 1, a solid line with double arrows indicates desiredtransmissions between a UE and a serving BS, which is a BS designated toserve the UE on the downlink and/or uplink. A dashed line with doublearrows indicates interfering transmissions between a UE and a BS.

Certain wireless networks (e.g., LTE) utilize orthogonal frequencydivision multiplexing (OFDM) on the downlink and single-carrierfrequency division multiplexing (SC-FDM) on the uplink. OFDM and SC-FDMpartition the system bandwidth into multiple (K) orthogonal subcarriers,which are also commonly referred to as tones, bins, etc. Each subcarriermay be modulated with data. In general, modulation symbols are sent inthe frequency domain with OFDM and in the time domain with SC-FDM. Thespacing between adjacent subcarriers may be fixed, and the total numberof subcarriers (K) may be dependent on the system bandwidth. Forexample, the spacing of the subcarriers may be 15 kHz and the minimumresource allocation (called a ‘resource block’) may be 12 subcarriers(or 180 kHz). Consequently, the nominal FFT size may be equal to 128,256, 512, 1024 or 2048 for system bandwidth of 1.25, 2.5, 5, 10 or 20megahertz (MHz), respectively. The system bandwidth may also bepartitioned into subbands. For example, a subband may cover 1.08 MHz(i.e., 6 resource blocks), and there may be 1, 2, 4, 8 or 16 subbandsfor system bandwidth of 1.25, 2.5, 5, 10 or 20 MHz, respectively.

While aspects of the examples described herein may be associated withLTE technologies, aspects of the present disclosure may be applicablewith other wireless communications systems, such as NR.

NR may utilize OFDM with a CP on the uplink and downlink and includesupport for half-duplex operation using TDD. A single component carrierbandwidth of 100 MHz may be supported. NR resource blocks may span 12sub-carriers with a sub-carrier bandwidth of 75 kHz over a 0.1 msduration. In one aspect, each radio frame may consist of 50 subframeswith a length of 10 ms. Consequently, each subframe may have a length of0.2 ms. In another aspect, each radio frame may consist of 10 subframeswith a length of 10 ms, where each subframe may have a length of 1 ms.Each subframe may indicate a link direction (i.e., DL or UL) for datatransmission and the link direction for each subframe may be dynamicallyswitched. Each subframe may include DL/UL data as well as DL/UL controldata. UL and DL subframes for NR may be as described in more detailbelow with respect to FIGS. 6 and 7. Beamforming may be supported andbeam direction may be dynamically configured. MIMO transmissions withprecoding may also be supported. MIMO configurations in the DL maysupport up to 8 transmit antennas with multi-layer DL transmissions upto 8 streams and up to 2 streams per UE. Multi-layer transmissions withup to 2 streams per UE may be supported. Aggregation of multiple cellsmay be supported with up to 8 serving cells. Alternatively, NR maysupport a different air interface, other than an OFDM-based. NR networksmay include entities such CUs and/or DUs.

In some examples, access to the air interface may be scheduled, whereina scheduling entity (e.g., a base station) allocates resources forcommunication among some or all devices and equipment within its servicearea or cell. Within the present disclosure, as discussed further below,the scheduling entity may be responsible for scheduling, assigning,reconfiguring, and releasing resources for one or more subordinateentities. That is, for scheduled communication, subordinate entitiesutilize resources allocated by the scheduling entity. Base stations arenot the only entities that may function as a scheduling entity. That is,in some examples, a UE may function as a scheduling entity, schedulingresources for one or more subordinate entities (e.g., one or more otherUEs). In this example, the UE is functioning as a scheduling entity, andother UEs utilize resources scheduled by the UE for wirelesscommunication. A UE may function as a scheduling entity in apeer-to-peer (P2P) network, and/or in a mesh network. In a mesh networkexample, UEs may optionally communicate directly with one another inaddition to communicating with the scheduling entity.

Thus, in a wireless communication network with a scheduled access totime-frequency resources and having a cellular configuration, a P2Pconfiguration, and a mesh configuration, a scheduling entity and one ormore subordinate entities may communicate utilizing the scheduledresources.

As noted above, a RAN may include a CU and DUs. A NR BS (e.g., gNB, 5GNode B, Node B, transmission reception point (TRP), access point (AP))may correspond to one or multiple BSs. NR cells can be configured asaccess cells (ACells) or data only cells (DCells). For example, the RAN(e.g., a central unit or distributed unit) can configure the cells.DCells may be cells used for carrier aggregation or dual connectivity,but not used for initial access, cell selection/reselection, orhandover. In some cases, DCells may not transmit synchronizationsignals—in some case cases DCells may transmit SS. NR BSs may transmitdownlink signals to UEs indicating the cell type. Based on the cell typeindication, the UE may communicate with the NR BS. For example, the UEmay determine NR BSs to consider for cell selection, access, handover,and/or measurement based on the indicated cell type.

FIG. 2 illustrates an example logical architecture of a distributedradio access network (RAN) 200, which may be implemented in the wirelesscommunication system illustrated in FIG. 1. A 5G access node 206 mayinclude an access node controller (ANC) 202. The ANC may be a centralunit (CU) of the distributed RAN 200. The backhaul interface to the nextgeneration core network (NG-CN) 204 may terminate at the ANC. Thebackhaul interface to neighboring next generation access nodes (NG ANs)may terminate at the ANC. The ANC may include one or more TRPs 208(which may also be referred to as BSs, NR BSs, Node Bs, 5G NBs, APs, orsome other term). As described above, a TRP may be used interchangeablywith “cell.”

The TRPs 208 may be a DU. The TRPs may be connected to one ANC (ANC 202)or more than one ANC (not illustrated). For example, for RAN sharing,radio as a service (RaaS), and service specific AND deployments, the TRPmay be connected to more than one ANC. A TRP may include one or moreantenna ports. The TRPs may be configured to individually (e.g., dynamicselection) or jointly (e.g., joint transmission) serve traffic to a UE.

The local architecture 200 may be used to illustrate fronthauldefinition. The architecture may be defined that support fronthaulingsolutions across different deployment types. For example, thearchitecture may be based on transmit network capabilities (e.g.,bandwidth, latency, and/or jitter).

The architecture may share features and/or components with LTE.According to aspects, the next generation AN (NG-AN) 210 may supportdual connectivity with NR. The NG-AN may share a common fronthaul forLTE and NR.

The architecture may enable cooperation between and among TRPs 208. Forexample, cooperation may be preset within a TRP and/or across TRPs viathe ANC 202. According to aspects, no inter-TRP interface may beneeded/present.

According to aspects, a dynamic configuration of split logical functionsmay be present within the architecture 200. As will be described in moredetail with reference to FIG. 5, the Radio Resource Control (RRC) layer,Packet Data Convergence Protocol (PDCP) layer, Radio Link Control (RLC)layer, Medium Access Control (MAC) layer, and a Physical (PHY) layersmay be adaptably placed at the DU or CU (e.g., TRP or ANC,respectively). According to certain aspects, a BS may include a centralunit (CU) (e.g., ANC 202) and/or one or more distributed units (e.g.,one or more TRPs 208).

FIG. 3 illustrates an example physical architecture of a distributed RAN300, according to aspects of the present disclosure. A centralized corenetwork unit (C-CU) 302 may host core network functions. The C-CU may becentrally deployed. C-CU functionality may be offloaded (e.g., toadvanced wireless services (AWS)), to handle peak capacity.

A centralized RAN unit (C-RU) 304 may host one or more ANC functions.Optionally, the C-RU may host core network functions locally. The C-RUmay have distributed deployment. The C-RU may be closer to the networkedge.

A DU 306 may host one or more TRPs (edge node (EN), an edge unit (EU), aradio head (RH), a smart radio head (SRH), or the like). The DU may belocated at edges of the network with radio frequency (RF) functionality.

FIG. 4 illustrates example components of the BS 110 and UE 120illustrated in FIG. 1, which may be used to implement aspects of thepresent disclosure. The BS may include a TRP and may be referred to as aMaster eNB (MeNB) (e.g., Master BS, primary BS). According to aspects,the Master BS may operate at lower frequencies, for example, below 6 GHzand a Secondary BS may operate at higher frequencies, for example,mmWave frequencies above 6 GHz. The Master BS and the Secondary BS maybe geographically co-located.

One or more components of the BS 110 and UE 120 may be used to practiceaspects of the present disclosure. For example, antennas 452, Tx/Rx 454,processors 466, 458, 464, and/or controller/processor 480 of the UE 120and/or antennas 434, processors 420, 430, 438, and/orcontroller/processor 440 of the BS 110 may be used to perform theoperations described herein and illustrated with reference to FIGS.7-13.

FIG. 4 shows a block diagram of a design of a BS 110 and a UE 120, whichmay be one of the BSs and one of the UEs in FIG. 1. For a restrictedassociation scenario, the base station 110 may be the macro BS 110 c inFIG. 1, and the UE 120 may be the UE 120 y. The base station 110 mayalso be a base station of some other type. The base station 110 may beequipped with antennas 434 a through 434 t, and the UE 120 may beequipped with antennas 452 a through 452 r.

At the base station 110, a transmit processor 420 may receive data froma data source 412 and control information from a controller/processor440. The control information may be for the Physical Broadcast Channel(PBCH), Physical Control Format Indicator Channel (PCFICH), PhysicalHybrid ARQ Indicator Channel (PHICH), Physical Downlink Control Channel(PDCCH), etc. The data may be for the Physical Downlink Shared Channel(PDSCH), etc. The processor 420 may process (e.g., encode and symbolmap) the data and control information to obtain data symbols and controlsymbols, respectively. The processor 420 may also generate referencesymbols, e.g., for the PSS, SSS, and cell-specific reference signal(CRS). A transmit (TX) multiple-input multiple-output (MIMO) processor430 may perform spatial processing (e.g., precoding) on the datasymbols, the control symbols, and/or the reference symbols, ifapplicable, and may provide output symbol streams to the modulators(MODs) 432 a through 432 t. Each modulator 432 may process a respectiveoutput symbol stream (e.g., for OFDM, etc.) to obtain an output samplestream. Each modulator 432 may further process (e.g., convert to analog,amplify, filter, and upconvert) the output sample stream to obtain adownlink signal. Downlink signals from modulators 432 a through 432 tmay be transmitted via the antennas 434 a through 434 t, respectively.

At the UE 120, the antennas 452 a through 452 r may receive the downlinksignals from the base station 110 and may provide received signals tothe demodulators (DEMODs) 454 a through 454 r, respectively. Eachdemodulator 454 may condition (e.g., filter, amplify, downconvert, anddigitize) a respective received signal to obtain input samples. Eachdemodulator 454 may further process the input samples (e.g., for OFDM,etc.) to obtain received symbols. A MIMO detector 456 may obtainreceived symbols from all the demodulators 454 a through 454 r, performMIMO detection on the received symbols if applicable, and providedetected symbols. A receive processor 458 may process (e.g., demodulate,deinterleave, and decode) the detected symbols, provide decoded data forthe UE 120 to a data sink 460, and provide decoded control informationto a controller/processor 480.

On the uplink, at the UE 120, a transmit processor 464 may receive andprocess data (e.g., for the Physical Uplink Shared Channel (PUSCH)) froma data source 462 and control information (e.g., for the Physical UplinkControl Channel (PUCCH) from the controller/processor 480. The transmitprocessor 464 may also generate reference symbols for a referencesignal. The symbols from the transmit processor 464 may be precoded by aTX MIMO processor 466 if applicable, further processed by thedemodulators 454 a through 454 r (e.g., for SC-FDM, etc.), andtransmitted to the base station 110. At the BS 110, the uplink signalsfrom the UE 120 may be received by the antennas 434, processed by themodulators 432, detected by a MIMO detector 436 if applicable, andfurther processed by a receive processor 438 to obtain decoded data andcontrol information sent by the UE 120. The receive processor 438 mayprovide the decoded data to a data sink 439 and the decoded controlinformation to the controller/processor 440.

The controllers/processors 440 and 480 may direct the operation at thebase station 110 and the UE 120, respectively. The processor 440 and/orother processors and modules at the base station 110 may perform ordirect, e.g., the execution of the functional blocks illustrated in FIG.9, and/or other processes for the techniques described herein. Thememories 442 and 482 may store data and program codes for the BS 110 andthe UE 120, respectively. A scheduler 444 may schedule UEs for datatransmission on the downlink and/or uplink.

FIG. 5 illustrates a diagram 500 showing examples for implementing acommunications protocol stack, according to aspects of the presentdisclosure. The illustrated communications protocol stacks may beimplemented by devices operating in a in a 5G system. Diagram 500illustrates a communications protocol stack including a Radio ResourceControl (RRC) layer 510, a Packet Data Convergence Protocol (PDCP) layer515, a Radio Link Control (RLC) layer 520, a Medium Access Control (MAC)layer 525, and a Physical (PHY) layer 530. In various examples thelayers of a protocol stack may be implemented as separate modules ofsoftware, portions of a processor or ASIC, portions of non-collocateddevices connected by a communications link, or various combinationsthereof. Collocated and non-collocated implementations may be used, forexample, in a protocol stack for a network access device (e.g., ANs,CUs, and/or DUs) or a UE.

A first option 505-a shows a split implementation of a protocol stack,in which implementation of the protocol stack is split between acentralized network access device (e.g., an ANC 202 in FIG. 2) anddistributed network access device (e.g., DU 208 in FIG. 2). In the firstoption 505-a, an RRC layer 510 and a PDCP layer 515 may be implementedby the central unit, and an RLC layer 520, a MAC layer 525, and a PHYlayer 530 may be implemented by the DU. In various examples the CU andthe DU may be collocated or non-collocated. The first option 505-a maybe useful in a macro cell, micro cell, or pico cell deployment.

A second option 505-b shows a unified implementation of a protocolstack, in which the protocol stack is implemented in a single networkaccess device (e.g., access node (AN), new radio base station (NR BS), anew radio Node-B (NR NB), a network node (NN), or the like.). In thesecond option, the RRC layer 510, the PDCP layer 515, the RLC layer 520,the MAC layer 525, and the PHY layer 530 may each be implemented by theAN. The second option 505-b may be useful in a femto cell deployment.

Regardless of whether a network access device implements part or all ofa protocol stack, a UE may implement an entire protocol stack (e.g., theRRC layer 510, the PDCP layer 515, the RLC layer 520, the MAC layer 525,and the PHY layer 530).

FIG. 6a is a diagram 6 a showing an example of a DL-centric subframe.The DL-centric subframe may include a control portion 602. The controlportion 602 may exist in the initial or beginning portion of theDL-centric subframe. The control portion 602 may include variousscheduling information and/or control information corresponding tovarious portions of the DL-centric subframe. In some configurations, thecontrol portion 602 may be a physical DL control channel (PDCCH), asindicated in FIG. 6a . The DL-centric subframe may also include a DLdata portion 604. The DL data portion 604 may sometimes be referred toas the payload of the DL-centric subframe. The DL data portion 604 mayinclude the communication resources utilized to communicate DL data fromthe scheduling entity (e.g., UE or BS) to the subordinate entity (e.g.,UE). In some configurations, the DL data portion 604 may be a physicalDL shared channel (PDSCH).

The DL-centric subframe may also include a common UL portion 606. Thecommon UL portion 606 may sometimes be referred to as an UL burst, acommon UL burst, and/or various other suitable terms. The common ULportion 606 may include feedback information corresponding to variousother portions of the DL-centric subframe. For example, the common ULportion 606 may include feedback information corresponding to thecontrol portion 602. Non-limiting examples of feedback information mayinclude an ACK signal, a NACK signal, a HARQ indicator, and/or variousother suitable types of information. The common UL portion 606 mayinclude additional or alternative information, such as informationpertaining to random access channel (RACH) procedures, schedulingrequests (SRs), and various other suitable types of information. Asillustrated in FIG. 6a , the end of the DL data portion 604 may beseparated in time from the beginning of the common UL portion 606. Thistime separation may sometimes be referred to as a gap, a guard period, aguard interval, and/or various other suitable terms. This separationprovides time for the switch-over from DL communication (e.g., receptionoperation by the subordinate entity (e.g., UE)) to UL communication(e.g., transmission by the subordinate entity (e.g., UE)). One ofordinary skill in the art will understand that the foregoing is merelyone example of a DL-centric subframe and alternative structures havingsimilar features may exist without necessarily deviating from theaspects described herein.

FIG. 6b is a diagram 6 b showing an example of an UL-centric subframe.The UL-centric subframe may include a control portion 612. The controlportion 612 may exist in the initial or beginning portion of theUL-centric subframe. The control portion 612 in FIG. 6b may be similarto the control portion described above with reference to FIG. 6a . TheUL-centric subframe may also include an UL data portion 614. The UL dataportion 614 may sometimes be referred to as the payload of theUL-centric subframe. The UL portion may refer to the communicationresources utilized to communicate UL data from the subordinate entity(e.g., UE) to the scheduling entity (e.g., UE or BS). In someconfigurations, the control portion 612 may be a physical UL controlchannel (PUCCH).

As illustrated in FIG. 6b , the end of the control portion 612 may beseparated in time from the beginning of the UL data portion 614. Thistime separation may sometimes be referred to as a gap, guard period,guard interval, and/or various other suitable terms. This separationprovides time for the switch-over from DL communication (e.g., receptionoperation by the scheduling entity) to UL communication (e.g.,transmission by the scheduling entity). The UL-centric subframe may alsoinclude a common UL portion 616. The common UL portion 616 in FIG. 6bmay be similar to the common UL portion 616 described above withreference to FIG. 6b . The common UL portion 616 may additional oralternative include information pertaining to channel quality indicator(CQI), sounding reference signals (SRSs), and various other suitabletypes of information. One of ordinary skill in the art will understandthat the foregoing is merely one example of an UL-centric subframe andalternative structures having similar features may exist withoutnecessarily deviating from the aspects described herein.

In some circumstances, two or more subordinate entities (e.g., UEs) maycommunicate with each other using sidelink signals. Real-worldapplications of such sidelink communications may include public safety,proximity services, UE-to-network relaying, vehicle-to-vehicle (V2V)communications, Internet of Everything (IoE) communications, IoTcommunications, mission-critical mesh, and/or various other suitableapplications. Generally, a sidelink signal may refer to a signalcommunicated from one subordinate entity (e.g., UE1) to anothersubordinate entity (e.g., UE2) without relaying that communicationthrough the scheduling entity (e.g., UE or BS), even though thescheduling entity may be utilized for scheduling and/or controlpurposes. In some examples, the sidelink signals may be communicatedusing a licensed spectrum (unlike wireless local area networks, whichtypically use an unlicensed spectrum).

A UE may operate in various radio resource configurations, including aconfiguration associated with transmitting pilots using a dedicated setof resources (e.g., a radio resource control (RRC) dedicated state,etc.) or a configuration associated with transmitting pilots using acommon set of resources (e.g., an RRC common state, etc.). Whenoperating in the RRC dedicated state, the UE may select a dedicated setof resources for transmitting a pilot signal to a network. Whenoperating in the RRC common state, the UE may select a common set ofresources for transmitting a pilot signal to the network. In eithercase, a pilot signal transmitted by the UE may be received by one ormore network access devices, such as an AN, or a DU, or portionsthereof. Each receiving network access device may be configured toreceive and measure pilot signals transmitted on the common set ofresources, and also receive and measure pilot signals transmitted ondedicated sets of resources allocated to the UEs for which the networkaccess device is a member of a monitoring set of network access devicesfor the UE. One or more of the receiving network access devices, or a CUto which receiving network access device(s) transmit the measurements ofthe pilot signals, may use the measurements to identify serving cellsfor the UEs, or to initiate a change of serving cell for one or more ofthe UEs.

Example Techniques for Managing Interference Across Operators

In some implementations, a system may utilize time division duplexing(TDD). For TDD, the downlink and uplink share the same frequencyspectrum or channel, and downlink and uplink transmissions are sent onthe same frequency spectrum. The downlink channel response may thus becorrelated with the uplink channel response. Reciprocity may allow adownlink channel to be estimated based on transmissions sent via theuplink. These uplink transmissions may be reference signals or uplinkcontrol channels (which may be used as reference symbols afterdemodulation). The uplink transmissions may allow for estimation of aspace-selective channel via multiple antennas.

In operation of a fixed TDD configuration, the actual downlink anduplink traffic load ratio may not be aligned with the ratio of downlinkand uplink subframes in the fixed configuration. For example, there maybe a system wide misalignment of the downlink and uplink traffic loadand fixed downlink and uplink scheduling configuration, or themisalignment may be localized (e.g., some cells may experience adifferent downlink and uplink load ratio than other cells within thesystem). If the downlink load is very high the downlink throughput maybe perceived as low, even if the uplink resources are under-utilized.

Converting uplink TDD slots (e.g., subframes) to downlink TDD slots (orvice versa) in some cells, such as to more closely align the downlinkand uplink scheduling with the corresponding local traffic load for aparticular cell may solve this problem, but has traditionally not beenpracticable due to the converting of such TDD slots in some cellsintroducing mixed interference scenarios resulting in jamming andotherwise unacceptable interference. For example, in anuplink-to-downlink interference scenario two cell-edge UEs withdifferent serving cells may be arbitrarily close to each other, wherebybase station jamming (i.e., jamming of the base station transmission bythe nearby UE's transmission) results from the downlink/uplink mismatchat the two UEs. Likewise, in a downlink-to-uplink interference scenariothe receive power from an adjacent base station transmission may be muchstronger than the desired uplink signals from UEs, resulting in receivede-sense at the base station receiver. Such mixed interference isparticularly serious where the interference is between co-channel oradjacent-channel deployments of different operators, where there islimited or no ability for dynamic coordination.

Certain mixed interference management techniques provide for managingcommunications, such as to dynamically switch downlink and/or uplink TDDsubframes or slots, based on mixed interference information. Forexample, logic of a base station (BS) analyzes information regardingmixed interference to determine if a switch in downlink and/or uplinkscheduling is to be implemented, for example, to accommodate additionaltraffic in the downlink or uplink, to increase downlink or uplinkthroughput, to meet quality of service (QoS) metrics, to efficientlyutilize the spectrum, priority, data class, device class, service class,etc.

The information regarding mixed interference may include mixedinterference information reported by one or more UEs served by the basestations and/or mixed interference information reported by one or moreother BSs (e.g., other BSs in the system, neighboring BSs, BSs capableof providing/experiencing undesired levels of interference with respectto the BS, etc.). The mixed interference information reported by the oneor more other BSs may include mixed interference information regardingone or more UEs served by respective ones of the other BSs (e.g., mixedinterference information reported by a UE to one of the other BSsserving that UE). Accordingly, an BS may analyze the impact of downlinkand uplink scheduling changes prior to their being implemented and,based on such analysis, implement dynamic switching of downlink and/oruplink slots without introducing unacceptable mixed interference.

Base stations and/or UEs operating within the communication system mayperform mixed interference measurements to collect data relevant for themixed information reporting. For example, base station-to-base stationmixed interference may be measured by each base station from other basestations. Similarly, UE-to-UE mixed interference may be measured by eachUE from other UEs. For example, a mixed interference measurementprotocol may be implemented within the communication frame structurewhereby particular subframes (e.g., mixed interference measurementsubframes) are utilized for transmission of reference signals for use inmixed interference measurements.

Mixed interference measurement may be performed at various times inaccordance with aspects of the present disclosure. For example, mixedinterference measurements may be made by base stations and/or UEsoperating within a communication system periodically, such as inaccordance with the timing of a mixed interference measurement protocol,based upon a temporal schedule (e.g., GPS timing signal, communicationsystem clock, etc.), and/or the like. A mixed interference measurementmay be made every iteration of a particular number of subframes (e.g.,every X downlink and/or Y uplink subframes, wherein X and Y may be anumber of subframes ranging from 2-50, for example, and wherein X and Ymay or may not be the same). Additionally or alternatively, a mixedinterference measurement may be made upon the occurrence of one or moreevents. In accordance with an exemplary implementation, one or moreiterations of mixed interference measurements may be triggered bysignificant change events occurring within the communication system,such as one or more UEs moving within a cell (e.g., a distancesufficient to potentially alter interference with UEs in other cells,movement resulting in the UE being disposed more near or farther from acell edge potentially altering interference with UEs in other cells, aswitch in downlink and/or uplink scheduling having been implemented,etc.). A mixed interference measurement may additionally oralternatively be made randomly or pseudo-randomly, such as duringperiods of reduced communication traffic or other periods in which mixedinterference measurement may be accommodated without undesirablyimpacting communication system operation.

Reporting of the mixed interference information may occur throughover-the-air signaling and/or through backhaul connections, wherein themixed interference information reported may be directly provided by themeasured interference power level or may be information derivedtherefrom.

A UE may report mixed interference measurement information to itsserving base station, wherein the mixed interference informationcomprises information provided by or otherwise derived from themonitoring of other UEs (e.g., UE-to-UE interference). Similarly, basestations may exchange mixed interference measurement information,wherein the mixed interference information comprises informationprovided by or otherwise derived from the monitoring of other basestations (e.g., base station-to-base station interference). Moreover,the mixed interference information exchanged by the base stations mayinclude information provided by or otherwise derived from the UEs servedby that base station monitoring of other UEs (e.g., UE-to-UEinterference). The mixed interference information as reported by anysuch network element (e.g., BS or UE) provides a mixed interferenceprofile for that network element as may be used in performing mixedinterference management as discussed herein.

The measurements made by the UEs and/or base stations, such as maycomprise signal strength information and signal source identification(e.g., transmitting station identifier, such as base stationidentification information or UE identification information), perhapsaccompanied by other relevant or otherwise useful information (e.g.,location at which the measurement was made, time at which themeasurement was made, etc.), may be provided in the mixed interferenceinformation reports. Additionally or alternatively, information derivedfrom the measurements made by the UEs and/or base stations may beprovided in the mixed interference information reports. For example,such derived information may comprise whether or not the signal receivedfrom an interfering station exceeds a threshold (e.g., a mixedinterference tolerance threshold), information indicating that themeasured interference is unacceptable to the reporting receiver,information regarding an amount of signal power back-off needed for theinterference to be acceptable to the reporting receiver, location and/ordirection information (e.g., relative location of a UE computed frombase station receiving antenna direction, received signal strength,timing offset, etc.), and/or the like.

Information regarding the mixed interference profiles of other networkelements in the communication system may be utilized by a base stationto construct a jamming graph. An exemplary jamming graph provided inaccordance with the concepts herein contains information that may beused to evaluate the impact of a scheduling decision that might resultin a mixed interference scenario (i.e., where some cells operate inuplink and other cells operate in downlink simultaneously). Accordingly,based on the mixed interference measurement information reported, a basestation may generate a jamming graph that summarizes the mixedinterference profile relevant to the operations of that base station.The downlink-to-uplink and uplink-to-downlink mixed interference may besummarized in the form of one or more jamming graphs (e.g., basestation-to-base station jamming graphs and/or UE-to-UE jamming graphs)provided according to an aspect of the present disclosure.

In an exemplary base station-to-base station jamming graph, such as maybe utilized with respect to downlink-to-uplink mixed interferencemanagement decisions, one vertex is provided for every base station orevery relevant base station (e.g., base stations disposed in thecommunication system such that they are likely or capable of introducingunacceptable or undesirable interference with respect to the basestation generating the jamming graph, or for which the jamming graph isgenerated). For example, one base station (e.g., BS_(i)) may beconnected to another base station (e.g., BS) in the jamming graph wherethe signal transmitted from that base station results in unacceptable orundesirable interference with respect to the other base station. In anexemplary implementation where a mixed interference tolerance threshold(e.g., a tolerable IoT threshold (BS_TOLERABLE_IOT)) is used, BS, isconnected to BS_(j) if the maximum (Max_IoT) measured for BS_(i) atBS_(j) is greater than the mixed interference tolerance threshold (e.g.,Max_IoT at BS_(j) for BS_(i)>BS_TOLERABLE_IOT of BS_(j)). Suchconnections represent instances of downlink-to-uplink mixed interferencesufficient to undesirably or unacceptably interfere with communicationswhere asynchronous downlink and uplink scheduling is implemented asbetween the connected base stations. These connections (also referred toas edges herein) between base stations may be represented in a basestation-to-base station jamming graph as a line or link between the basestations. The connections or edges represented in the basestation-to-base station jamming graph may have a label associatedtherewith, wherein the label provides information regarding theconnection (e.g., the measured mixed interference power level asmeasured by the receiving base station, a back-off power level foravoiding the mixed interference, etc.). For example, the labels of edgesprovided in a base station-to-base station jamming graph implementedaccording to some aspects of the disclosure comprise the transmit power(e.g., TX-power/EIRP) back-off needed at BS_(i) to ensure that the IoTat BS_(j) due to BS_(i) becomes equal to (or less than) theBS_TOLERABLE_IOT of BS_(j).

In an exemplary UE-to-UE jamming graph, such as may be utilized withrespect to uplink-to-downlink mixed interference management decisions,one vertex is provided for every UE or every relevant UE (e.g., UEsdisposed in the communication system such that they are likely orcapable of introducing unacceptable or undesirable interference withrespect to the UEs served by the base station generating the jamminggraph, or for which the jamming graph is generated). For example, one UE(e.g., UE_(i)) may be connected to another UE (e.g., UE_(j)) in thejamming graph where the signal transmitted from that UE results inunacceptable or undesirable interference with respect to the other UE.In an exemplary implementation where a mixed interference tolerancethreshold (e.g., a tolerable IoT threshold (UE_TOLERABLE_IOT)) is used,UE, is connected to UE_(j) if the maximum (Max_IoT) measured for UE, atUE_(i) is greater than the mixed interference tolerance threshold (e.g.,Max_IoT at UE_(j) for UE_(i)>UE_TOLERABLE_IOT of UE_(j)). Suchconnections represent instances of uplink-to-downlink mixed interferencesufficient to undesirably or unacceptably interfere with communicationswhere asynchronous uplink and downlink scheduling is implemented asbetween the connected UEs. Similar to the base station-to-base stationjamming graphs discussed above, these connections (also referred to asedges herein) between UEs may be represented in a UE-to-UE jamming graphas a line or link between the UEs. The connections or edges representedin the UE-to-UE jamming graph may also have a label associatedtherewith, wherein the label provides information regarding theconnection (e.g., the measured mixed interference power level asmeasured by the receiving UE, a back-off power level for avoiding themixed interference, etc.). For example, the labels of edges provided ina UE-to-UE jamming graph implemented according to some aspects of thedisclosure comprise the transmit power (e.g., TX-power/EIRP) back-offneeded at UE_(i) to ensure that the IoT at UE_(j) due to UE_(i) becomesequal to (or less than) the UE_TOLERABLE_IOT of UE₁.

Example jamming graphs, as may be provided in operation of exemplaryimplementations, are shown in FIGS. 7A and 7B. The example of FIG. 7Ashows a global view of a base station-to-base station jamming graph asbase station-to-base station jamming graph 710. In the illustratedexample of base station-to-base station jamming graph 710, vertices701-707 represent the base stations of the communication system. Theaforementioned edges, representing instances of uplink-to-downlink mixedinterference sufficient to undesirably or unacceptably interfere withcommunications, are shown by the lines connecting particular ones of thevertices. The aforementioned labels, representing a back-off power levelin dB for avoiding the mixed interference, are shown by the numbersassociated with each of the illustrated edges. For example, the labelsof the illustrated example show the power back-off needed to meet a 3 dBtolerable limit of interference over thermal noise.

In some implementations, each base station may only learn about and usethe information about edges directly connected to it. Accordingly, abase station-to-base station jamming graph generated by such a basestation (or for which the jamming graph was generated) might onlyinclude the edges directly connected to that base station. However, inanother implementations, a base station may also learn about edgesbetween other base stations, possibly restricted to neighbors only.Accordingly, a base station-to-base station jamming graph generated bysuch a base station may include edges connecting base station pairs thatdo not include the base station that generated the jamming graph (or forwhich the jamming graph was generated). As an example, this may enablethe base station to predict whether the neighbor base station will beable to convert direction, and may incorporate this information into itsown analysis of the interference environment.

The example of FIG. 7B shows base station-to-base station jamming graph720 regenerated from the mixed interference information utilized ingenerating base station-to-base station jamming graph 710 of FIG. 7Awith a 6 dB transmission power back-off. As can be seen in the exampleillustrated in FIG. 7B, this 6 dB power back-off results in some of theedges (e.g., the edges between vertices 701 and 703, between vertices705 and 706, and between vertices 706 and 707) being eliminated, therebyindicating that the power back-off is sufficient to avoid undesired orunacceptable uplink-to-downlink mixed interference between the basestations represented by those vertices. It should be appreciated thatlabels shown in base station-to-base station jamming graph 720 of FIG.7B are likewise updated to show the further power back-off needed tomeet a 3 dB tolerable limit of interference over thermal noise withrespect to the remaining edges.

As may be appreciated from the foregoing, jamming graphs providedaccording to the concepts herein may be utilized to determine if aswitch in downlink and/or uplink scheduling may be implemented, such asto accommodate additional traffic in the downlink or uplink, to increasedownlink or uplink throughput, to meet quality of service (QoS) metrics,to efficiently utilize the spectrum, etc. As an example, a base stationmay analyze the impact of downlink and uplink scheduling changes priorto their being implemented and, based on such analysis, implementdynamic switching of downlink and/or uplink slots without introducingunacceptable mixed interference. Such analysis and implementation ofdynamic switching of downlink and/or uplink slots may include analyzingand/or implementing power back-off, such as through the regeneration ofjamming graphs with a power back-off. Persons skilled in the art willappreciate that the representations provided in FIGS. 7A and 7B aremerely illustrative examples of jamming graphs and that any othersuitable representations capturing information regarding mixedinterference profiles may be used.

In a multi operator scenario (e.g., multiple RANs operated by differentoperators), chunks of a frequency spectrum are allocated to thedifferent operators. For example, if two different operators areoperating in a particular service area, a first bandwidth region of thespectrum is allocated to a first operator and a second bandwidth regionof the spectrum is allocated to a second operator. Generally, everyoperator uses fixed TDD UL/DL subframe configurations within their ownallocated bandwidth regions that are mutually agreed between theoperators to minimize or completely avoid mixed interference acrossnetwork elements (e.g., base stations or UEs) of the differentoperators. In certain aspects, if the two operators are assignedadjacent bandwidth regions of the spectrum, network elements of both theoperators are configured to transmit and/or receive in a synchronousfashion. For example, the two operators agree on using a sametransmission direction (UL or DL direction) for one or more subframes ofboth the operators in a particular time interval to avoid mixedinterference between network elements of the two operators.

Ideally each operator may like to decide whether to use a particulartime interval (e.g. subframe) for UL or DL transmission dynamicallybased on current traffic needs of the operator, for example, to maximizethroughput. However, different operators may have different trafficneeds in a particular time interval. Thus, adjacent operators (e.g.,operators assigned adjacent bandwidth regions of a frequency spectrum)operating asynchronously (e.g, employing dynamic TDD configuration) maychoose to transmit in opposite directions within the same time interval,causing mixed interference across network elements of the two operators.

One goal of 5^(th) Generation (5G) standards is to provide for dynamicscheduling of UL or DL transmissions for one or more subframes in anetwork depending on current traffic needs of the network. This dynamicconfiguration of subframes is often referred to as Dynamic TDDconfiguration or simply Dynamic TDD. Dynamic TDD has been made possiblewithin a particular operator's assigned bandwidth region by coordinationamong network elements of the particular operator. For example, as notedabove, mixed interference profiles may be exchanged between networkelements of the operator. One or more network elements (e.g., basestations) of the operator may dynamically select a transmissiondirection (e.g., UL or DL) to be used in a particular transmissioninterval based on the traffic needs of the network element and/or basedon the mixed interference profiles received from other neighboringnetwork elements.

However, operators generally are not willing to share data acrossoperators' networks, and thus, coordination between network elements ofdifferent operators for the purposes of mixed interference mitigation isnot generally practical. Thus, to avoid mixed interference betweennetwork elements across networks of different operators (e.g., operatorsthat are assigned adjacent bandwidth regions of a spectrum), theoperators, as noted above, generally agree upon fixed TDD subframeconfigurations.

One solution to enable adjacent operators (e.g., assigned adjacentbandwidth regions of a spectrum) to employ asynchronous TDD operation(e.g., dynamic TDD not synchronous with adjacent operator's network), isto have a large guard band separating the bandwidth regions of the twoadjacent operators so that transmissions within bandwidth regions of thetwo operators do not interfere with each other. This is illustrated inFIG. 8 which shows bandwidth region 802 assigned to operator 1 andanother adjacent bandwidth region 804 assigned to operator 2. As shown,bandwidth regions 802 and 804 are separated by a guard band 806. In anaspect, the guard band is selected to be large enough to enable one orboth operators to operate asynchronously and select transmissiondirections based on current traffic needs of the operator.

However a large guardband leads to wastage of spectrum which generallyis a valuable resource. Thus, there is a need for techniques that mayenable different operators to employ asynchronous TDD operation (e.g.,dynamic TDD) with minimal mixed interference between network elements ofthe operators and without wasting too much spectrum allocated for guardbands.

In certain aspects of the present disclosure, a technique to accomplishthe above goal may include dividing bandwidth regions assigned tonetworks of each of one or more operators (e.g., operators havingadjacent assigned bandwidth regions of a spectrum) into regions ofasynchronous TDD operation (e.g., dynamic TDD configuration) andsynchronous TDD operation (e.g., static UL/DL configuration), withsynchronous regions of the networks assigned at edges of the bandwidthregions closer to each other.

For example, the synchronous region of a first operator is allocatedtowards the edge of the first operator's allocated spectrum and facesthe synchronous region of a second operator. The synchronous region ofthe second operator is also allocated towards the edge of its ownspectrum facing the first operator's spectrum. Thus, the asynchronousand synchronous regions for each operator with adjacent allocatedbandwidth regions of a spectrum may be allocated such that thesynchronous regions of the two operators are allocated towards the edgesof each of the operators' spectrums closer to each other and theasynchronous regions of the operators are allocated away from the edgesof their own bandwidth region facing the other operator's bandwidthregion. Thus, the asynchronous regions of two adjacent operators have agood buffer between them and the dynamic TDD operation in theseasynchronous regions may cause little or no mixed interference to eachother. The synchronous regions generally employ fixed TDD subframeconfigurations mutually agreed between the operators for minimal mixedinterference between network elements of the two operators operating inthe synchronous regions.

Thus, instead of leaving a large guard band unused, at least a portionof the guard band may be used for regions of synchronous TDD operationfor the adjacent operators, with subframe timing and DL/ULconfigurations synchronized across the synchronous regions of the twooperators. This way spectrum wastage for employing the guard bands maybe reduced or eliminated at the same time providing the necessary bufferbetween the asynchronous regions of the operators for mitigating mixedinterference across operators. Thus, in certain aspects, UE RBallocation may be dynamically adjusted to make use of the RBs in theguard band for synchronous TDD operation (UL or DL) between twodifferent operators. Further, a UE may be allocated RBs from the guardband between adjacent bandwidth regions of two operators based on adirectionality aspect of a jamming graph with respect to the UE (e.g.,the UE's location in the network). As long as the transmissiondirections of subframes used within the guard band are synchronizedacross the two adjacent operators, the guardband may be allocated for ULor DL transmission.

FIG. 9 illustrates example operations 900 that may be performed by abase station, for implementing dynamic TDD across operators, inaccordance with certain aspects of the present disclosure. Operations900 begin, at 902 by identifying a first region of a first frequencyspectrum (or bandwidth region) assigned to a first operator, whereinuplink and downlink subframe configurations for TDD communications usingthe first region and a first region of a second frequency spectrum (orbandwidth region) assigned to a second operator are synchronized betweenthe first and second operator. At 904, the base station identifies asecond region of the first frequency spectrum, wherein uplink anddownlink subframe configurations for TDD communications using the secondregion and a second region of the second frequency spectrum are notsynchronized between the first and second operator. At 906, the basestation communicates with one or more UEs using the first and secondregions of the first frequency spectrum.

FIG. 10 illustrates an example technique for managing mixed interferencebetween networks of different operators, in accordance with certainaspects of the present disclosure. As shown in FIG. 10, bandwidth region802 is assigned to operator 1 and bandwidth region 804 is assigned tooperator 2. Each of the bandwidth regions 802 and 804 are divided intoregions of asynchronous TDD operation and synchronous TDD operation. Forexample, as shown in FIG. 10, bandwidth region 802 of operator 1includes asynchronous region 1002 (e.g., employing asynchronous dynamicTDD) and a synchronous region 1004 (employing fixed TDD operation).Similarly, bandwidth region 804 of operator 2 includes synchronousregion 1006 and asynchronous region 1008. As shown, the synchronousregions 1004 and 1006 are assigned at the edges of each of the bandwidthregions 802 and 804 respectively adjacent to each other. This way thesynchronous regions provide a buffer region between the asynchronousregions of the two operators so that the mixed interference between thetwo asynchronous regions is minimal or non-existent.

In certain aspects, since the synchronous regions 1004 and 1006 providethe buffer between the asynchronous regions 1002 and 1008, the guardband 806 may be reduced in size or completely eliminated based on thesizes chosen for the synchronous regions 1004 and 1006. In an aspect,smaller synchronous regions may require larger guard bands and largersynchronous regions may require smaller or no guard bands betweenbandwidth regions of the adjacent operators. Thus, in an aspect, theplacement of synchronous regions of each of the operators at edges oftheir assigned bandwidth regions facing each other minimizes or in somecases eliminates the need for a guard band between the operators'assigned bandwidths. In certain aspects, the amounts of each of theoperator's spectrum allocated for asynchronous and synchronous regionsmay be decided based on one or more criteria including interferenceprofiles, guardband between the two operators' spectrums, any othersuitable criteria, and/or any combination thereof.

In certain aspects, moderate inter-operator coordination may beimplemented to employ opportunistic guard bands between bandwidthregions of the operators. For example, a size of the guard band betweenbandwidth regions of two different operators may be chosen based oncoordination between the two operators. For instance, the size of theguard band may be selected based on the two operators exchanginginformation regarding sizes of their synchronous regions adjacent toeach other.

In an aspect, since asynchronous operation provides flexibility to theoperator to optimize capacity by choosing DL/UL configuration dependingon traffic needs, an attempt is made to allocate as much of thebandwidth regions 802 and 804 of each of the operators as possible forasynchronous operation. This approach is most beneficial to theoperator. In an aspect, an operator may choose a size of its synchronousregion to be as small as possible in order to minimize the mixedinterference with an adjacent bandwidth region of a different operatorto acceptable levels (e.g., below a threshold) and may assign rest ofthe bandwidth for asynchronous operation.

In certain aspects, some level of inter-operator interferencecoordination may implement dynamic TDD for at least some portion of thesynchronous regions of the operators. For example, there may be somelimited information sharing between two adjacent operators. This limitedcoordination between adjacent operators may be used to implement dynamicTDD in the synchronous regions of the operators in a limited fashion.For example, some resources (e.g., subframes or RBs) of a synchronousregion may be scheduled dynamically (e.g., based on current trafficneeds) based on the limited exchanged information between the operators.This limited exchanged information may include information regardingjamming graphs (e.g., jamming graphs 710 and 720 of FIGS. 7A and 7B).Having information regarding jamming graphs from an adjacent secondoperator, a first operator may use the synchronous region in a moreaggressive manner by deciding to reverse the pre-determined fixeddirection (e.g. UL to DL or vice versa) configured for a subframesubject to one or more constraints imposed by the jamming graphs sharedby the second operator. Thus, this type of inter-operator coordinationmay help an operator to override the fixed configuration of one or moresubframes in its synchronous region.

In certain aspects, in order to implement such inter-operatorcoordination, the entire system (e.g., including bandwidth regions ofboth the operators) may be treated essentially like multi-channeldeployment of the same operator. Time synchronous, mutually compatiblesubframe configurations may be employed across multiple deployments.Network elements of an operator may be allowed to transmit (or at leastlisten for) reference signals in the other operator's channels. Thistransmission may be performed at a low duty cycle. For instance, thismay provide for mixed channel state information (CSI) sharing. Incertain aspects, backhaul connectivity across cells of multipleoperators may be implemented for sharing of information regarding mixedinterference (e.g., jamming graph information such as provided byjamming graphs 710 and 720 of FIGS. 7A and 7B). Additionally oralternatively, dynamic over-the-air (OTA) signaling may be implementedfor sharing of such information across operators.

In certain aspects, the asynchronous and synchronous regions of eachoperator's assigned bandwidth region may be mapped to separate carriers(e.g., component carriers) or separate sets of carriers. Carriers (orsub-carriers) within the synchronous region of an operator do not causemixed interference to each other as the UL/DL configurations within thesynchronous region remains fixed. However, network elements assigned foroperation in the asynchronous and synchronous regions may cause mixedinterference to each other as UL/DL configurations are chosendynamically in the asynchronous region.

To manage this mixed interference between network elements of theasynchronous region and synchronous region, intra-operator interferencecoordination may be implemented to manage (e.g., mitigate) the mixedinterference across the asynchronous and synchronous regions. Forexample, as discussed above, information regarding interference profiles(e.g., mixed interference information) may be exchanged between networkelements of the asynchronous and synchronous regions, and one or morenetwork elements (e.g., base stations) may choose UL/DL configurationfor one or more subframes based on the exchanged interferenceinformation. In an aspect, the exchanged information may includeinformation regarding jamming graphs (e.g., similar to the jamminggraphs shown in FIGS. 7A and 7B).

In certain aspects, the static-TDD carrier (or set of carriers) neverreverses subframe direction. It simply yields to its co-deployed dynamicTDD carrier as dictated by the mixed interference management approachdiscussed above. In other words, scheduling decisions of the static TDDcarrier always has lower priority than the co-deployed dynamic TDDcarrier.

In certain aspects, intra-operator interference coordination betweennetwork elements of a particular operator may not be possible. Forexample, network elements (e.g., UE, BS etc.) assigned to a firstcarrier may not exchange information regarding mixed interferenceprofiles with network elements (e.g., UE, BS etc.) assigned to a secondadjacent carrier, both first and second carriers being assigned withinthe bandwidth region of a particular operator. In some cases, theoperator may avoid intra-operator interference coordination to simplifyoperation, for example, when running different kinds of services on eachof the first carrier and the second carrier. In certain aspects, thetechniques discussed above to mitigate inter-operator interference maybe implemented to mitigate intra-operator interference, for example,between network elements assigned to adjacent carriers of the operator.For example, each of the first and second carriers may be divided intoportions of asynchronous TDD operation (e.g., dynamic TDD configuration)and synchronous TDD operation (e.g., static UL/DL configuration), withsynchronous portions of the carriers assigned at edges of the carrierscloser to each other, thus providing a buffer between the asynchronousportions of the two carriers.

FIG. 11 illustrates example operations 1100 that maybe performed by abase station, for implementing dynamic TDD across carriers assigned to aparticular operator, in accordance with certain aspects of the presentdisclosure. Operations 1100 begin, at 1102, by identifying a firstportion of a first carrier assigned to an operator, wherein uplink anddownlink subframe configurations for TDD communications using the firstportion and a first portion of a second carrier also assigned to thefirst operator are synchronized between the first and the secondcarrier. At 1104, the base station identifies a second portion of thefirst carrier, wherein uplink and downlink subframe configurations forTDD communications using the second portion and a second portion of thesecond carrier are not synchronized between the first and secondcarriers. At 1106, the base station communicates with one or more UEsusing the first and second portions of the first carrier.

In certain aspects, synchronous region of an operator may be mapped to aset of resource blocks (RBs). As noted above, operators agree onpre-determined fixed UL/DL configurations for the synchronous regions.In an aspect, if the pre-determined fixed configuration for one or moreRBs in the set of resources mapped to a synchronous region is inagreement with what is chosen for the one or more RBs by the operator,the one or more RBs are used for communication. On the other hand, ifthe pre-determined fixed configuration of the RBs does not agree withthe operator chosen configuration for the RBs, the RBs are left unused.For example, if the operator decides UL for a subframe while thesynchronous region corresponds to DL, then RBs in the synchronous regionare left unused. In certain aspects, the final UL/DL configuration isdetermined as a combination of traffic requirements as well as thefraction of time for which the synchronous region is left unused.

As used herein, a phrase referring to “at least one of” a list of itemsrefers to any combination of those items, including single members. Asan example, “at least one of: a, b, or c” is intended to cover: a, b, c,a-b, a-c, b-c, and a-b-c, as well as any combination with multiples ofthe same element (e.g., a-a, a-a-a, a-a-b, a-a-c, a-b-b, a-c-c, b-b,b-b-b, b-b-c, c-c, and c-c-c or any other ordering of a, b, and c).

As used herein, the term “determining” encompasses a wide variety ofactions. For example, “determining” may include calculating, computing,processing, deriving, investigating, looking up (e.g., looking up in atable, a database or another data structure), ascertaining and the like.Also, “determining” may include receiving (e.g., receiving information),accessing (e.g., accessing data in a memory) and the like. Also,“determining” may include resolving, selecting, choosing, establishingand the like.

In some cases, rather than actually communicating a frame, a device mayhave an interface to communicate a frame for transmission or reception.For example, a processor may output a frame, via a bus interface, to anRF front end for transmission. Similarly, rather than actually receivinga frame, a device may have an interface to obtain a frame received fromanother device. For example, a processor may obtain (or receive) aframe, via a bus interface, from an RF front end for transmission.

The methods disclosed herein comprise one or more steps or actions forachieving the described method. The method steps and/or actions may beinterchanged with one another without departing from the scope of theclaims. In other words, unless a specific order of steps or actions isspecified, the order and/or use of specific steps and/or actions may bemodified without departing from the scope of the claims.

The various operations of methods described above may be performed byany suitable means capable of performing the corresponding functions.The means may include various hardware and/or software/firmwarecomponent(s) and/or module(s), including, but not limited to a circuit,an application specific integrated circuit (ASIC), or processor.Generally, where there are operations illustrated in Figures, thoseoperations may be performed by any suitable corresponding counterpartmeans-plus-function components.

Those of skill in the art would understand that information and signalsmay be represented using any of a variety of different technologies andtechniques. For example, data, instructions, commands, information,signals, bits, symbols, and chips that may be referenced throughout theabove description may be represented by voltages, currents,electromagnetic waves, magnetic fields or particles, optical fields orparticles, or combinations thereof.

Those of skill would further appreciate that the various illustrativelogical blocks, modules, circuits, and algorithm steps described inconnection with the disclosure herein may be implemented as electronichardware, software/firmware, or combinations thereof. To clearlyillustrate this interchangeability of hardware and software/firmware,various illustrative components, blocks, modules, circuits, and stepshave been described above generally in terms of their functionality.Whether such functionality is implemented as hardware orsoftware/firmware depends upon the particular application and designconstraints imposed on the overall system. Skilled artisans mayimplement the described functionality in varying ways for eachparticular application, but such implementation decisions should not beinterpreted as causing a departure from the scope of the presentdisclosure.

The various illustrative logical blocks, modules, and circuits describedin connection with the disclosure herein may be implemented or performedwith a general-purpose processor, a digital signal processor (DSP), anapplication specific integrated circuit (ASIC), a field programmablegate array (FPGA) or other programmable logic device, discrete gate ortransistor logic, discrete hardware components, or any combinationthereof designed to perform the functions described herein. Ageneral-purpose processor may be a microprocessor, but in thealternative, the processor may be any conventional processor,controller, microcontroller, or state machine. A processor may also beimplemented as a combination of computing devices, e.g., a combinationof a DSP and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DSP core, or any other suchconfiguration.

The steps of a method or algorithm described in connection with thedisclosure herein may be embodied directly in hardware, in asoftware/firmware module executed by a processor, or in a combinationthereof. A software/firmware module may reside in RAM memory, flashmemory, ROM memory, EPROM memory, EEPROM memory, phase change memory,registers, hard disk, a removable disk, a CD-ROM, or any other form ofstorage medium known in the art. An exemplary storage medium is coupledto the processor such that the processor can read information from, andwrite information to, the storage medium. In the alternative, thestorage medium may be integral to the processor. The processor and thestorage medium may reside in an ASIC. The ASIC may reside in a userterminal. In the alternative, the processor and the storage medium mayreside as discrete components in a user terminal.

In one or more exemplary designs, the functions described may beimplemented in hardware, software/firmware, or combinations thereof. Ifimplemented in software/firmware, the functions may be stored on ortransmitted over as one or more instructions or code on acomputer-readable medium. Computer-readable media includes both computerstorage media and communication media including any medium thatfacilitates transfer of a computer program from one place to another. Astorage media may be any available media that can be accessed by ageneral purpose or special purpose computer. By way of example, and notlimitation, such computer-readable media can comprise RAM, ROM, EEPROM,CD/DVD or other optical disk storage, magnetic disk storage or othermagnetic storage devices, or any other medium that can be used to carryor store desired program code means in the form of instructions or datastructures and that can be accessed by a general-purpose orspecial-purpose computer, or a general-purpose or special-purposeprocessor. Also, any connection is properly termed a computer-readablemedium. For example, if the software/firmware is transmitted from awebsite, server, or other remote source using a coaxial cable, fiberoptic cable, twisted pair, digital subscriber line (DSL), or wirelesstechnologies such as infrared, radio, and microwave, then the coaxialcable, fiber optic cable, twisted pair, DSL, or wireless technologiessuch as infrared, radio, and microwave are included in the definition ofmedium. Disk and disc, as used herein, includes compact disc (CD), laserdisc, optical disc, digital versatile disc (DVD), floppy disk andBlu-ray disc where disks usually reproduce data magnetically, whilediscs reproduce data optically with lasers. Combinations of the aboveshould also be included within the scope of computer-readable media.

The previous description of the disclosure is provided to enable anyperson skilled in the art to make or use the disclosure. Variousmodifications to the disclosure will be readily apparent to thoseskilled in the art, and the generic principles defined herein may beapplied to other variations without departing from the spirit or scopeof the disclosure. Thus, the disclosure is not intended to be limited tothe examples and designs described herein but is to be accorded thewidest scope consistent with the principles and novel features disclosedherein.

What is claimed is:
 1. A method of wireless communication by a basestation, comprising: identifying a first region of a first frequencyspectrum assigned to a first operator, wherein uplink and downlinksubframe configurations for Time Division Duplex (TDD) communicationsusing the first region and a first region of a second frequency spectrumassigned to a second operator are synchronized between the first andsecond operator; identifying a second region of the first frequencyspectrum, wherein uplink and downlink subframe configurations for TDDcommunications using the second region and a second region of the secondfrequency spectrum are not synchronized between the first and secondoperators; and communicating with one or more user equipments (UEs)using the first and second regions of the first frequency spectrum. 2.The method of claim 1, further comprising dynamically changing uplinkand downlink subframe configurations for TDD communications using thesecond region.
 3. The method of claim 2, wherein the dynamic changing ofuplink and downlink subframe configurations for TDD communications usingthe second region is based, at least in part, on traffic needs using thefirst frequency spectrum.
 4. The method of claim 2, wherein the dynamicchanging of uplink and downlink subframe configurations for TDDcommunications using the second region is based, at least in part, oninformation regarding interference between the first and second regionsof the first frequency spectrum exchanged with one or more other basestations of the first operator.
 5. The method of claim 4, wherein theinterference information comprises jamming graph information indicatinginterference between various network elements.
 6. The method of claim 1,wherein synchronization of uplink and downlink subframe configurationsfor TDD communications using the first region of the first frequencyspectrum and the first region of the second frequency spectrum involvesusing one or more fixed uplink and downlink subframe configurations. 7.The method of claim 6, wherein: the first region of the first frequencyspectrum is mapped to a set of resource blocks (RBs); and whether or notRBs in the set of RBs are used for a particular type of communication isdependent on agreement of that type of communication with the uplink anddownlink subframe configurations.
 8. The method of claim 1, furthercomprising dynamically allocating one or more resource blocks (RBs) froma guard band separating the first frequency spectrum and the secondfrequency spectrum for synchronous TDD operation between the first andthe second operator.
 9. The method of claim 8, wherein the RBs areallocated to a UE based on a position of the UE within a wirelesscommunication network.
 10. The method of claim 1, wherein the firstregion of the first frequency spectrum is adjacent the first region ofthe second frequency spectrum.
 11. The method of claim 10, wherein thefirst region of the first frequency spectrum and the first region of thesecond frequency spectrum are separated by a guard band.
 12. The methodof claim 11, wherein at least one of a size of the guard band orlocation is determined based on coordination between operators.
 13. Themethod of claim 11, wherein one or more of the operators utilizes theguard band based on a static TDD uplink and downlink subframeconfiguration.
 14. The method of claim 1, wherein uplink and downlinksubframe configurations for TDD communications using at least one of thefirst or second regions of the first frequency spectrum is determinedbased on coordination between the first and second operators.
 15. Themethod of claim 1, wherein the first and second regions of the firstfrequency spectrum are mapped to separate component carriers.
 16. Themethod of claim 15, further comprising: identifying a first portion of afirst carrier assigned to the first region of the first operator,wherein uplink and downlink subframe configurations for TDDcommunications using the first portion and a first portion of a secondcarrier assigned to the first region of the first operator aresynchronized between the first and second carriers; identifying a secondportion of the first carrier, wherein uplink and downlink subframeconfigurations for TDD communications using the second portion and asecond portion of the second carrier are not synchronized between thefirst and second carriers; and communicating with one or more userequipments (UEs) using the first and second portions of the firstcarrier.
 17. An apparatus for wireless communication by a base station,comprising: means for identifying a first region of a first frequencyspectrum assigned to a first operator, wherein uplink and downlinksubframe configurations for Time Division Duplex (TDD) communicationsusing the first region and a first region of a second frequency spectrumassigned to a second operator are synchronized between the first andsecond operator; means for identifying a second region of the firstfrequency spectrum, wherein uplink and downlink subframe configurationsfor TDD communications using the second region and a second region ofthe second frequency spectrum are not synchronized between the first andsecond operators; and means for communicating with one or more userequipments (UEs) using the first and second regions of the firstfrequency spectrum.
 18. The apparatus of claim 17, further comprisingmeans for dynamically changing uplink and downlink subframeconfigurations for TDD communications using the second region.
 19. Theapparatus of claim 18, wherein the dynamic changing of uplink anddownlink subframe configurations for TDD communications using the secondregion is based, at least in part, on traffic needs using the firstfrequency spectrum.
 20. The apparatus of claim 18, wherein the dynamicchanging of uplink and downlink subframe configurations for TDDcommunications using the second region is based, at least in part, oninformation regarding interference between the first and second regionsof the first frequency spectrum exchanged with one or more other basestations of the first operator.
 21. The apparatus of claim 20, whereinthe interference information comprises jamming graph informationindicating interference between various network elements.
 22. Theapparatus of claim 17, wherein synchronization of uplink and downlinksubframe configurations for TDD communications using the first region ofthe first frequency spectrum and the first region of the secondfrequency spectrum involves using one or more fixed uplink and downlinksubframe configurations.
 23. The apparatus of claim 22, wherein: thefirst region of the first frequency spectrum is mapped to a set ofresource blocks (RBs); and whether or not RBs in the set of RBs are usedfor a particular type of communication is dependent on agreement of thattype of communication with the uplink and downlink subframeconfigurations.
 24. The apparatus of claim 17, further comprising meansfor dynamically allocating one or more resource blocks (RBs) from aguard band separating the first frequency spectrum and the secondfrequency spectrum for synchronous TDD operation between the first andthe second operator.
 25. The apparatus of claim 24, wherein the RBs areallocated to a UE based on a position of the UE within a wirelesscommunication network.
 26. The apparatus of claim 17, wherein the firstregion of the first frequency spectrum is adjacent the first region ofthe second frequency spectrum.
 27. The apparatus of claim 26, whereinthe first region of the first frequency spectrum and the first region ofthe second frequency spectrum are separated by a guard band.
 28. Theapparatus of claim 27, wherein at least one of a size of the guard bandor location is determined based on coordination between operators. 29.The apparatus of claim 28, wherein one or more of the operators utilizesthe guard band based on a static TDD uplink and downlink subframeconfiguration.
 30. The apparatus of claim 17, wherein uplink anddownlink subframe configurations for TDD communications using at leastone of the first or second regions of the first frequency spectrum isdetermined based on coordination between the first and second operators.31. The apparatus of claim 17, wherein the first and second regions ofthe first frequency spectrum are mapped to separate component carriers.32. The apparatus of claim 31, further comprising: means for identifyinga first portion of a first carrier assigned to the first region of thefirst operator, wherein uplink and downlink subframe configurations forTDD communications using the first portion and a first portion of asecond carrier assigned to the first region of the first operator aresynchronized between the first and second carriers; means foridentifying a second portion of the first carrier, wherein uplink anddownlink subframe configurations for TDD communications using the secondportion and a second portion of the second carrier are not synchronizedbetween the first and second carriers; and means for communicating withone or more user equipments (UEs) using the first and second portions ofthe first carrier.
 33. An apparatus for wireless communication by a basestation, comprising: at least one processor configured to: identify afirst region of a first frequency spectrum assigned to a first operator,wherein uplink and downlink subframe configurations for Time DivisionDuplex (TDD) communications using the first region and a first region ofa second frequency spectrum assigned to a second operator aresynchronized between the first and second operators; identify a secondregion of the first frequency spectrum, wherein uplink and downlinksubframe configurations for TDD communications using the second regionand a second region of the second frequency spectrum are notsynchronized between the first and second operator; and communicate withone or more user equipments (UEs) using the first and second regions ofthe first frequency spectrum; and a memory coupled to the at least oneprocessor.
 34. A computer-readable medium for wireless communication bya base station, storing instructions executable by at least oneprocessor to perform a method comprising: identifying a first region ofa first frequency spectrum assigned to a first operator, wherein uplinkand downlink subframe configurations for Time Division Duplex (TDD)communications using the first region and a first region of a secondfrequency spectrum assigned to a second operator are synchronizedbetween the first and second operator; identifying a second region ofthe first frequency spectrum, wherein uplink and downlink subframeconfigurations for TDD communications using the second region and asecond region of the second frequency spectrum are not synchronizedbetween the first and second operators; and communicating with one ormore user equipments (UEs) using the first and second regions of thefirst frequency spectrum.