Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 36.828
Word version: 11.0.0
0…
2…
2
References
3
Definitions, symbols and abbreviations
4
Objectives of study
5
Feasibility study
6
Performance evaluation
7
Methods to support different time scales for TDD UL-DL reconfiguration
8
Potential interference mitigation schemes
9
Conclusion and recommendations
A
Co-existence simulation assumptions
$
Change history
2
References
p. 6
3
Definitions, symbols and abbreviations
p. 6
3.1
Definitions
p. 6
3.2
Symbols
p. 6
3.3
Abbreviations
p. 6
4
Objectives of study
p. 7
5
Feasibility study
p. 7
5.1
Methodologies
p. 7
5.2
Scenario 1
p. 8
5.2.1
Deterministic evaluations
p. 8
5.2.2
System simulation evaluations
p. 8
5.3
Scenario 2
p. 12
5.3.1
Deterministic evaluations
p. 12
5.3.2
System simulation evaluations
p. 13
5.4
Scenario 3
p. 17
5.4.1
Deterministic evaluations
p. 17
5.4.2
System simulation evaluations
p. 18
5.5
Scenario 4
p. 22
5.5.1
Deterministic evaluations
p. 22
5.5.2
System simulation evaluations
p. 24
5.6
Scenario 5
p. 29
5.6.1
Deterministic evaluations
p. 29
5.6.2
System simulation evaluations
p. 30
5.7
Scenario 6
p. 32
5.7.1
Deterministic evaluations
p. 32
5.7.2
System simulation evaluations
p. 33
5.8
Scenario 7
p. 38
5.8.1
Deterministic evaluations
p. 38
5.8.2
System simulation evaluations
p. 38
5.9
Scenario 8
p. 41
5.9.1
Deterministic evaluations
p. 41
5.10
Summary
p. 41
6
Performance evaluation
p. 42
6.1
Methodologies
p. 42
6.2
Scenario 1: Isolated pico cell
p. 42
6.3
Scenario 2: Multi-cell pico scenario
p. 59
6.3.1
Evaluation results without interference mitigation
p. 61
6.3.2
Evaluation results with interference mitigation
p. 70
6.4
Scenario 3: Co-channel multi-cell macro-pico scenario
p. 76
6.4.1
Evaluation results without interference mitigation
p. 80
6.4.2
Evaluation results with interference mitigation
p. 88
6.5
Scenario 4: Adjacent-channel multi-cell macro-pico scenario
p. 92
6.6
Summary
p. 97
7
Methods to support different time scales for TDD UL-DL reconfiguration
p. 99
7.1
Method 1 - System information signaling
p. 99
7.1.1
Description
p. 99
7.1.2
Specification impact
p. 99
7.2
Method 2 - RRC signaling
p. 100
7.2.1
Description
p. 100
7.2.2
Specification impact
p. 100
7.3
Method 3 - MAC Control Element Signaling
p. 100
7.3.1
Description
p. 100
7.3.2
Specification impact
p. 101
7.4
Method 4 - Physical layer signaling
p. 101
7.4.1
Description
p. 101
7.4.2
Specification impact
p. 101
8
Potential interference mitigation schemes
p. 101
8.1
Scheme 1: Cell clustering interference mitigation
p. 101
8.1.1
Description
p. 101
8.1.2
Specification impact
p. 102
8.2
Scheme 2: Scheduling dependent interference mitigation
p. 102
8.2.1
Description
p. 102
8.2.2
Specification impact
p. 102
8.3
Scheme 3: Interference mitigation based on eICIC/FeICIC schemes
p. 103
8.3.1
Description
p. 103
8.3.2
Specification impact
p. 103
8.4
Scheme 4: Interference suppressing interference mitigation
p. 103
8.4.1
Description
p. 103
8.4.2
Specification impact
p. 103
9
Conclusion and recommendations
p. 103
A
Co-existence simulation assumptions
p. 105
$
Change history
p. 109