摘要 |
Coverage holes are identified and appropriate action taken in response thereto. The identification of a coverage hole may be based on, for example, measurements taken at an access point, measurement report messages from an access terminal, idle user registrations, active user handovers, or handover history. Upon identification of a coverage hole, action may be taken to mitigate (e.g., reduce or eliminate) the coverage hole and/or avoid the coverage hole. For example, in some embodiments, access point resources such as power, frequency and time are allocated accordingly. The action to be taken may depend on whether a coverage hole is noise-limited or interference-limited. In some embodiments, the manner in which handovers are conducted is modified upon identification of a coverage hole. The above actions may be performed entirely at an access point. |