Search

US-12627997-B2 - Systems and methods for simulating wireless interference in a wired telecommunications network

US12627997B2US 12627997 B2US12627997 B2US 12627997B2US-12627997-B2

Abstract

One or more computing devices, systems, and/or methods are provided. In an example, a method includes instantiating a first user equipment (UE) module on a first computing device and instantiating a second UE module on a second computing device connected to the first computing device by a wired network. A first base station (BS) module associated with the first UE module is instantiated on a third computing device coupled to the wired network and a second BS module associated with the second UE module is instantiated on a fourth computing device coupled to the wired network. A first resource allocation map is sent from the first BS module to the second BS module. An interference metric is generated based on the first resource allocation map. A data transmission between the second UE module and the second BS module is modulated based on the interference metric.

Inventors

  • Xiong Yang
  • Mourad B. Takla
  • Matthijs Andries Visser
  • Chokri Trabelsi
  • Sankrith Subramanian

Assignees

  • VERIZON PATENT AND LICENSING INC.

Dates

Publication Date
20260512
Application Date
20230710

Claims (20)

  1. 1 . A system for simulating a telecommunications network, comprising: a first user equipment (UE) module and a second UE module; a first base station (BS) module associated with the first UE module; and a second BS module associated with the second UE module, wherein: one of the second UE module or the second BS module is configured to generate an interference metric and modulate a data transmission between the second UE module and the second BS module based on the interference metric.
  2. 2 . The system of claim 1 , wherein: the data transmission comprises a downlink data transmission from the second BS module to the second UE module; and the second UE module is configured to generate the interference metric based on a path loss parameter between the first BS module and the second UE module.
  3. 3 . The system of claim 1 , comprising: a third UE module, wherein: the first BS module is associated with the third UE module; the first BS module is configured to send a first downlink control information (DCI) message to the first UE module and send a second DCI message to the third UE module; and the interference metric is based on a first resource allocation map generated based on the first DCI message and the second DCI message.
  4. 4 . The system of claim 1 , wherein: the data transmission comprises an uplink data transmission from the second UE module to the second BS module; and the second BS module is configured to generate the interference metric based on a path loss parameter between the first UE module and the second BS module.
  5. 5 . The system of claim 1 , comprising: a third UE module, wherein: the first BS module is associated with the third UE module; the first BS module is configured to send a first uplink control information (UCI) message to the first UE module and send a second UCI message to the third UE module; and the interference metric is based on a first resource allocation map generated based on the first UCI message and the second UCI message.
  6. 6 . The system of claim 5 , wherein: the first resource allocation map comprises a first path loss parameter associated with the first UE module and the second BS module and a second path loss parameter associated with the third UE module and the second BS module.
  7. 7 . The system of claim 1 , comprising: an RF channel emulator configured to generate a path loss parameter between the first BS module and the second UE module, wherein: the one of the second UE module or the second BS module is configured to generate the interference metric based on a first resource allocation map and the path loss parameter.
  8. 8 . The system of claim 1 , wherein: the first UE module comprises: a UE emulator configured to simulate a physical layer (PHY) and a medium access control (MAC) module.
  9. 9 . The system of claim 1 , comprising: a switch module having a first side coupled to the first UE module and the second UE module and a second side coupled to the first BS module and the second BS module.
  10. 10 . A method comprising: instantiating a first user equipment (UE) module on a first computing device coupled to a network, wherein the first UE module is associated with a first base station (BS) module on a second computing device coupled to the network; instantiating a second UE module on a third computing device connected to the first computing device by the network, wherein the second UE module is associated with a second BS module on a fourth computing device coupled to the network; generating an interference metric; and modulating a data transmission between the second UE module and the second BS module based on the interference metric.
  11. 11 . The method of claim 10 , comprising: generating the interference metric by the second UE module based on a path loss parameter between the first BS module and the second UE module, wherein: the data transmission comprises a downlink data transmission from the second BS module to the second UE module.
  12. 12 . The method of claim 10 , comprising: instantiating a third UE module associated with the first BS module on a fifth computing device connected to the network; sending a first downlink control information (DCI) message from the first BS module to the first UE module; sending a second DCI message from the first BS module to the third UE module; and generating the interference metric based on the first DCI message and the second DCI message.
  13. 13 . The method of claim 10 , comprising: generating the interference metric in the second BS module based on a path loss parameter between the first UE module and the second BS module, wherein: the data transmission comprises an uplink data transmission from the second UE module to the second BS module.
  14. 14 . The method of claim 10 , comprising: instantiating a third UE module associated with the first BS module on a fifth computing device connected to the network; sending a first uplink control information (UCI) message from the first BS module to the first UE module; sending a second UCI message from the first BS module to the third UE module; and generating the interference metric based on the first UCI message and the second UCI message.
  15. 15 . The method of claim 14 , wherein: the interference metric is generated based on a first path loss parameter associated with the first UE module and the second BS module and a second path loss parameter associated with the third UE module and the second BS module.
  16. 16 . The method of claim 10 , comprising: instantiating an RF channel emulator configured to generate a path loss parameter between the first BS module and the second UE module on a fifth computing device, wherein: generating the interference metric comprises generating the interference metric based on the path loss parameter.
  17. 17 . The method of claim 10 , wherein: the first UE module comprises: a UE emulator configured to simulate a physical layer (PHY) and radio interface and a medium access control (MAC) module.
  18. 18 . The method of claim 10 , comprising: instantiating a switch module having a first side coupled to the first UE module and the second UE module and a second side coupled to the first BS module and the second BS module on a fifth computing device.
  19. 19 . A non-transitory computer-readable medium, storing instructions thereon that when executed by a processor cause the processor to: generate an interference metric associated with a first user equipment (UE) module associated with a first base station (BS) module; and modulate a data transmission between a second UE module associated with a second BS module and the second BS module based on the interference metric.
  20. 20 . The medium of claim 19 , wherein: the processor is to generate the interference metric in the second BS module based on a path loss parameter between the first UE module and the second BS module.

Description

RELATED APPLICATION This application claims priority to and is a continuation of U.S. application Ser. No. 17/464,860, filed on Sep. 2, 2021, entitled “SYSTEMS AND METHODS FOR SIMULATING WIRELESS INTERFERENCE IN A WIRED TELECOMMUNICATIONS NETWORK”, which is incorporated by reference herein in its entirety. BACKGROUND A wireless telecommunication network provides various telecommunication services such as telephony, video, data, messaging, and/or broadcasts. The wireless telecommunication network may include a number of base stations (e.g., a Node B, a gNB, an access point (AP), a radio head, a transmit receive point (TRP), a New Radio (NR) BS, a 5G Node B, and/or the like) that can support communication for a number of user equipment (UEs). A user equipment (UE) may communicate with a base station via a downlink and an uplink. The downlink (or forward link) refers to the communication link from the base station to the UE, and the uplink (or reverse link) refers to the communication link from the UE to the base station. BRIEF DESCRIPTION OF THE DRAWINGS While the techniques presented herein may be embodied in alternative forms, the particular embodiments illustrated in the drawings are only a few examples that are supplemental of the description provided herein. These embodiments are not to be interpreted in a limiting manner, such as limiting the claims appended hereto. FIGS. 1A-1D are diagrams of one or more example implementations 100, according to some embodiments. FIGS. 2 and 3, are diagrams of an example implementations illustrating downlink communications and uplink communications, respectively, according to some embodiments. FIG. 4 is a flow chart illustrating an example method for estimating interference in a wireless telecommunication network, according to some embodiments. FIG. 5 is an illustration of a scenario involving various examples of transmission mediums that may be used to communicatively couple computers and clients. FIG. 6 is an illustration of a scenario involving an example configuration of a computer that may utilize and/or implement at least a portion of the techniques presented herein. FIG. 7 is an illustration of a scenario involving an example configuration of a client that may utilize and/or implement at least a portion of the techniques presented herein. FIG. 8 is an illustration of a scenario featuring an example non-transitory machine readable medium in accordance with one or more of the provisions set forth herein. FIG. 9 is an illustration of an example environment in which at least a portion of the techniques presented herein may be utilized and/or implemented. FIG. 10 is an illustration of an example network that may utilize and/or implement at least a portion of the techniques presented herein. DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS Subject matter will now be described more fully hereinafter with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific example embodiments. This description is not intended as an extensive or detailed discussion of known concepts. Details that are well known may have been omitted, or may be handled in summary fashion. The following subject matter may be embodied in a variety of different forms, such as methods, devices, components, and/or systems. Accordingly, this subject matter is not intended to be construed as limited to any example embodiments set forth herein. Rather, example embodiments are provided merely to be illustrative. Such embodiments may, for example, take the form of hardware, software, firmware or any combination thereof. The following provides a discussion of some types of computing scenarios in which the disclosed subject matter may be utilized and/or implemented. In some instances, an operator may determine to modify a wireless telecommunication network. For example, an operator may determine that a new base station is to be installed to enable the wireless telecommunication network to accommodate additional user equipment (UE), that the wireless telecommunication network is to be reconfigured to increase a quality of service associated with the wireless telecommunication network, that a site within the wireless telecommunication is to be decommissioned, and/or other modifications. Prior to modifying the wireless telecommunication network, the operator may run a simulation to determine the effect of the modification on the wireless telecommunication network. For example, the operator may run a simulation to determine an increase in a quantity of UEs that can be accommodated by the wireless telecommunication network that may result from installing the new base station, whether a change to the configuration of the wireless telecommunication network will improve the quality of service associated with the wireless telecommunication network, and/or other effects of the modification. To run the simulation, the user may utilize individual hardware components to si