The present invention relates to data transmission/reception methods using a polar coding scheme, and devices for supporting same. The method for transmitting data by using polar coding in a wireless access system, according to one embodiment of the present invention, may comprise the steps of deriving Bhattacharyya parameters according to data bits input for finding noise-free channels among equivalent channels; allocating data payloads comprising data bits and cyclic redundancy check (CRC) bits to the found noise-free channels; inputting the data payloads into a polar encoder; and transmitting code bits output by the polar encoder, wherein the CRC bits may be allocated to better noise-free channels, among the noise-free channels indicated by the Bhattacharyya parameters, than the data bits.
|
1. A method for transmitting data by using polar coding in a wireless access system, the method comprising:
inputting first data bits to a polar encoder;
deriving Bhattacharyya parameters in accordance with the first data bits to discover noise free channels from equivalent channels, wherein the equivalent channels are defined for each of the first data bits;
allocating a data payload including second data bits and cyclic redundancy check (CRC) bits to the discovered noise free channels among equivalent channels of a polar encoder, wherein the number of the discovered noise free channels corresponds to a total number of bits of the data payload; and
performing rate matching for the data payload based on a size of the polar encoder and a size of the data payload; and
transmitting code bits output from the polar encoderthrough the noise free channels,
wherein the CRC bits are allocated to noise free channels starting from a noise free channel having a lowest error probability among the discovered noise free channels and the second data bits are allocated to the other noise free channels among the discovered noise free channelsaccording to the Bhattacharyya parameters.
0. 10. A method for transmitting data by using polar coding at a transmitting device in a wireless communication system, the method comprising:
allocating a payload of k bits to k predetermined input bits among n input bits for a polar code of size n, where k is a positive integer not greater than n;
generating encoded bits based on the n input bits and the polar code; and
transmitting the encoded bits to a receiving device,
wherein the payload includes L data bits and m cyclic redundancy check (CRC) bits, where L+M=K, and L and m are positive integers, and
wherein the m CRC bits are allocated to m most reliable input bits among the k predetermined input bits.
0. 13. A transmitting device for transmitting data by using polar coding in a wireless communication system, the transmitting device comprising:
a transmitter;
at least one processor; and
at least one computer memory that is operably connectable to the at least one processor and that has stored thereon instructions which, when executed, cause the at least one processor to perform operations comprising:
allocating a payload of k bits to k predetermined input bits among n input bits for a polar code of size n, where k is a positive integer not greater than n;
generating encoded bits based on the n input bits and the polar code; and
transmitting, via the transmitter, the encoded bits to a receiving device,
wherein the payload includes L data bits and m cyclic redundancy check (CRC) bits, where L+M=K, and L and m are positive integers, and
wherein the m CRC bits are allocated to m most reliable input bits among the k predetermined input bits.
0. 16. A receiving device for receiving data by using polar coding in a wireless communication system, the receiving device comprising:
a receiver;
at least one processor; and
at least one computer memory that is operably connectable to the at least one processor and that has stored thereon instructions which, when executed, cause the at least one processor to perform operations comprising:
receiving, via the receiver, encoded bits from a transmitting device; and
decoding the encoded bits to obtain a payload of k bits based on a polar code of size n,
wherein the encoded bits are decoded based on a mapping relationship between the payload of k bits and k predetermined input bits among n input bits for the polar code, where k is a positive integer not greater than n;
wherein the payload includes L data bits and m cyclic redundancy check (CRC) bits, where L+M=K, and L and m are positive integers, and
wherein the mapping relationship comprises: mapping the m CRC bits to m most reliable input bits among the k predetermined input bits.
2. The method according to
transmitting size information indicating the a size of the data payload and information on regarding a coding rate of the polar encoder to a receiver.
3. The method according to
performing rate matching is performed for the data payload by puncturing or repeating the data payload in accordance with based on the size of the polar encoder.
4. The method according to
generating a generator matrix for the polar encoder by puncturing one or more specific columns of a mother generator matrix based on the a size of the data payload when the size of the code block of the polar encoder is greater than the size of the data payload when performing the rate matching.
5. The method according to
6. The method according to
7. The method according to
8. The method according to
generating a generator matrix for the polar encoder by repeating one or more specific columns of a mother generator matrix based on the a size of the data payload when the size of the code block of the polar encoder is smaller than the size of the data payload when performing the rate matching.
9. The method according to
0. 11. The method according to claim 10, further comprising:
allocating 0 to each of n-k input bits other than the k predetermined input bits among the n input bits for the polar code,
wherein the k predetermined input bits have higher reliability than the n-k input bits.
0. 12. The method according to claim 10, further comprising:
transmitting information regarding k and information regarding a code rate for the payload.
0. 14. The transmitting device according to claim 13, wherein the operations further comprising:
allocating 0 to each of n-k input bits other than the k predetermined input bits among the n input bits for the polar code,
wherein the k predetermined input bits have higher reliability than the n-k input bits.
0. 15. The transmitting device according to claim 13, further comprising:
transmitting, via the transmitter, information regarding k and information regarding a code rate for the payload.
0. 17. The receiving device according to claim 16, wherein the mapping relationship further comprises:
mapping 0 to each of n-k input bits other than the k predetermined input bits among the n input bits for the polar code,
wherein the k predetermined input bits have higher reliability than the n-k input bits.
0. 18. The receiving device according to claim 16, wherein the operations further comprise:
receiving, via the receiver, information regarding k and information regarding a code rate for the payload.
|
This application is
where M(L) is the number of PDCCH candidates with CCE aggregation level L to be monitored in the SS, m=0, . . . M(L)−1, i is the index of a CCE in each PDCCH candidate, and i=0, L−1. k=└ns/2┘ where ns is the index of a slot in a radio frame.
As described before, the UE monitors both the USS and the CSS to decode a PDCCH. The CSS supports PDCCHs with CCE aggregation levels {4, 8} and the USS supports PDCCHs with CCE aggregation levels {1, 2, 4, 8}. [Table 5] illustrates PDCCH candidates monitored by a UE.
TABLE 5
Search space Sk(L)
Aggregation
Number of PDCCH
Type
level L
Size [in CCEs]
candidates M(L)
UE-
1
6
6
specific
2
12
6
4
8
2
8
16
2
Common
4
16
4
8
16
2
Referring to [Equation 1], for two aggregation levels, L=4 and L=8, Yk is set to 0 in the CSS, whereas Yk is defined by [Equation 2] for aggregation level L in the USS.
Yk=(A·Yk-1 mod D [Equation 2]
where Y−1=nRNTI≠0, nRNTI indicating an RNTI value. A=39827 and D=65537.
1.3 Carrier Aggregation (CA) Environment
1.3.1 CA Overview
A 3GPP LTE system (conforming to Rel-8 or Rel-9) (hereinafter, referred to as an LTE system) uses Multi-Carrier Modulation (MCM) in which a single Component Carrier (CC) is divided into a plurality of bands. In contrast, a 3GPP LTE-A system (hereinafter, referred to an LTE-A system) may use CA by aggregating one or more CCs to support a broader system bandwidth than the LTE system. The term CA is interchangeably used with carrier combining, multi-CC environment, or multi-carrier environment.
In the present disclosure, multi-carrier means CA (or carrier combining). Herein, CA covers aggregation of contiguous carriers and aggregation of non-contiguous carriers. The number of aggregated CCs may be different for a DL and a UL. If the number of DL CCs is equal to the number of UL CCs, this is called symmetric aggregation. If the number of DL CCs is different from the number of UL CCs, this is called asymmetric aggregation. The term CA is interchangeable with carrier combining, bandwidth aggregation, spectrum aggregation, etc.
The LTE-A system aims to support a bandwidth of up to 100 MHz by aggregating two or more CCs, that is, by CA. To guarantee backward compatibility with a legacy IMT system, each of one or more carriers, which has a smaller bandwidth than a target bandwidth, may be limited to a bandwidth used in the legacy system.
For example, the legacy 3GPP LTE system supports bandwidths {1.4, 3, 5, 10, 15, and 20 MHz} and the 3GPP LTE-A system may support a broader bandwidth than 20 MHz using these LTE bandwidths. A CA system of the present disclosure may support CA by defining a new bandwidth irrespective of the bandwidths used in the legacy system.
There are two types of CA, intra-band CA and inter-band CA. Intra-band CA means that a plurality of DL CCs and/or UL CCs are successive or adjacent in frequency. In other words, the carrier frequencies of the DL CCs and/or UL CCs are positioned in the same band. On the other hand, an environment where CCs are far away from each other in frequency may be called inter-band CA. In other words, the carrier frequencies of a plurality of DL CCs and/or UL CCs are positioned in different bands. In this case, a UE may use a plurality of Radio Frequency (RF) ends to conduct communication in a CA environment.
The LTE-A system adopts the concept of cell to manage radio resources. The above-described CA environment may be referred to as a multi-cell environment. A cell is defined as a pair of DL and UL CCs, although the UL resources are not mandatory. Accordingly, a cell may be configured with DL resources alone or DL and UL resources.
For example, if one serving cell is configured for a specific UE, the UE may have one DL CC and one UL CC. If two or more serving cells are configured for the UE, the UE may have as many DL CCs as the number of the serving cells and as many UL CCs as or fewer UL CCs than the number of the serving cells, or vice versa. That is, if a plurality of serving cells are configured for the UE, a CA environment using more UL CCs than DL CCs may also be supported.
CA may be regarded as aggregation of two or more cells having different carrier frequencies (center frequencies). Herein, the term ‘cell’ should be distinguished from ‘cell’ as a geographical area covered by an eNB. Hereinafter, intra-band CA is referred to as intra-band multi-cell and inter-band CA is referred to as inter-band multi-cell.
In the LTE-A system, a Primacy Cell (PCell) and a Secondary Cell (SCell) are defined. A PCell and an SCell may be used as serving cells. For a UE in RRC_CONNECTED state, if CA is not configured for the UE or the UE does not support CA, a single serving cell including only a PCell exists for the UE. On the contrary, if the UE is in RRC_CONNECTED state and CA is configured for the UE, one or more serving cells may exist for the UE, including a PCell and one or more SCells.
Serving cells (PCell and SCell) may be configured by an RRC parameter. A physical-layer ID of a cell, PhysCellId is an integer value ranging from 0 to 503. A short ID of an SCell, SCellIndex is an integer value ranging from 1 to 7. A short ID of a serving cell (PCell or SCell), ServeCellIndex is an integer value ranging from 1 to 7. If ServeCellIndex is 0, this indicates a PCell and the values of ServeCellIndex for SCells are pre-assigned. That is, the smallest cell ID (or cell index) of ServeCellIndex indicates a PCell.
A PCell refers to a cell operating in a primary frequency (or a primary CC). A UE may use a PCell for initial connection establishment or connection reestablishment. The PCell may be a cell indicated during handover. In addition, the PCell is a cell responsible for control-related communication among serving cells configured in a CA environment. That is, PUCCH allocation and transmission for the UE may take place only in the PCell. In addition, the UE may use only the PCell in acquiring system information or changing a monitoring procedure. An Evolved Universal Terrestrial Radio Access Network (E-UTRAN) may change only a PCell for a handover procedure by a higher-layer RRCConnectionReconfiguraiton message including mobilityControlInfo to a UE supporting CA.
An SCell may refer to a cell operating in a secondary frequency (or a secondary CC). Although only one PCell is allocated to a specific UE, one or more SCells may be allocated to the UE. An SCell may be configured after RRC connection establishment and may be used to provide additional radio resources. There is no PUCCH in cells other than a PCell, that is, in SCells among serving cells configured in the CA environment.
When the E-UTRAN adds an SCell to a UE supporting CA, the E-UTRAN may transmit all system information related to operations of related cells in RRC_CONNECTED state to the UE by dedicated signaling. Changing system information may be controlled by releasing and adding a related SCell. Herein, a higher-layer RRCConnectionReconfiguration message may be used. The E-UTRAN may transmit a dedicated signal having a different parameter for each cell rather than it broadcasts in a related SCell.
After an initial security activation procedure starts, the E-UTRAN may configure a network including one or more SCells by adding the SCells to a PCell initially configured during a connection establishment procedure. In the CA environment, each of a PCell and an SCell may operate as a CC. Hereinbelow, a Primary CC (PCC) and a PCell may be used in the same meaning and a Secondary CC (SCC) and an SCell may be used in the same meaning in embodiments of the present disclosure.
If a specific cell manages N DL CCs, the network may allocate M (M≤N) DL CCs to a UE. The UE may monitor only the M DL CCs and receive a DL signal in the M DL CCs. The network may prioritize L (L≤M≤N) DL CCs and allocate a main DL CC to the UE. In this case, the UE should monitor the L DL CCs. The same thing may apply to UL transmission.
The linkage between the carrier frequencies of DL resources (or DL CCs) and the carrier frequencies of UL resources (or UL CCs) may be indicated by a higher-layer message such as an RRC message or by system information. For example, a set of DL resources and UL resources may be configured based on linkage indicated by System Information Block Type 2 (SIB2). Specifically, DL-UL linkage may refer to a mapping relationship between a DL CC carrying a PDCCH with a UL grant and a UL CC using the UL grant, or a mapping relationship between a DL CC (or a UL CC) carrying HARQ data and a UL CC (or a DL CC) carrying an HARQ ACK/NACK signal.
1.3.2 Cross Carrier Scheduling
Two scheduling schemes, self-scheduling and cross carrier scheduling are defined for a CA system, from the perspective of carriers or serving cells. Cross carrier scheduling may be called cross CC scheduling or cross cell scheduling.
In self-scheduling, a PDCCH (carrying a DL grant) and a PDSCH are transmitted in the same DL CC or a PUSCH is transmitted in a UL CC linked to a DL CC in which a PDCCH (carrying a UL grant) is received.
In cross carrier scheduling, a PDCCH (carrying a DL grant) and a PDSCH are transmitted in different DL CCs or a PUSCH is transmitted in a UL CC other than a UL CC linked to a DL CC in which a PDCCH (carrying a UL grant) is received.
Cross carrier scheduling may be activated or deactivated UE-specifically and indicated to each UE semi-statically by higher-layer signaling (e.g. RRC signaling).
If cross carrier scheduling is activated, a Carrier Indicator Field (CIF) is required in a PDCCH to indicate a DL/UL CC in which a PDSCH/PUSCH indicated by the PDCCH is to be transmitted. For example, the PDCCH may allocate PDSCH resources or PUSCH resources to one of a plurality of CCs by the CIF. That is, when a PDCCH of a DL CC allocates PDSCH or PUSCH resources to one of aggregated DL/UL CCs, a CIF is set in the PDCCH. In this case, the DCI formats of LTE Release-8 may be extended according to the CIF. The CIF may be fixed to three bits and the position of the CIF may be fixed irrespective of a DCI format size. In addition, the LTE Release-8 PDCCH structure (the same coding and resource mapping based on the same CCEs) may be reused.
On the other hand, if a PDCCH transmitted in a DL CC allocates PDSCH resources of the same DL CC or allocates PUSCH resources in a single UL CC linked to the DL CC, a CIF is not set in the PDCCH. In this case, the LTE Release-8 PDCCH structure (the same coding and resource mapping based on the same CCEs) may be used.
If cross carrier scheduling is available, a UE needs to monitor a plurality of PDCCHs for DCI in the control region of a monitoring CC according to the transmission mode and/or bandwidth of each CC. Accordingly, an appropriate SS configuration and PDCCH monitoring are needed for the purpose.
In the CA system, a UE DL CC set is a set of DL CCs scheduled for a UE to receive a PDSCH, and a UE UL CC set is a set of UL CCs scheduled for a UE to transmit a PUSCH. A PDCCH monitoring set is a set of one or more DL CCs in which a PDCCH is monitored. The PDCCH monitoring set may be identical to the UE DL CC set or may be a subset of the UE DL CC set. The PDCCH monitoring set may include at least one of the DL CCs of the UE DL CC set. Or the PDCCH monitoring set may be defined irrespective of the UE DL CC set. DL CCs included in the PDCCH monitoring set may be configured to always enable self-scheduling for UL CCs linked to the DL CCs. The UE DL CC set, the UE UL CC set, and the PDCCH monitoring set may be configured UE-specifically, UE group-specifically, or cell-specifically.
If cross carrier scheduling is deactivated, this implies that the PDCCH monitoring set is always identical to the UE DL CC set. In this case, there is no need for signaling the PDCCH monitoring set. However, if cross carrier scheduling is activated, the PDCCH monitoring set may be defined within the UE DL CC set. That is, the eNB transmits a PDCCH only in the PDCCH monitoring set to schedule a PDSCH or PUSCH for the UE.
Referring to
2. Control Signal Transmission Through PUCCH (Physical Uplink Control Channel)
The PUCCH is an uplink control channel used to transmit uplink control information (UCI). The UCI transmitted on the PUCCH includes scheduling request (SR) information, HARQ ACK/NACK information and CQI information.
The amount of control information which a UE can transmit in a subframe depends on the number of SC-FDMA symbols available for transmission of control signaling data (at this time, excluding SC-FDMA symbols used for transmission of reference signals used for coherent detection of the PUCCH). The LTE/LTE-A system supports 7 different PUCCH formats depending on information which will be signaled on the PUCCH.
PUCCH may include the following formats to transmit control information.
(1) Format 1: On-Off keying (OOK) modulation, used for SR (Scheduling Request)
(2) Format 1a & 1b: Used for ACK/NACK transmission
1) Format 1a: BPSK ACK/NACK for 1 codeword
2) Format 1b: QPSK ACK/NACK for 2 codewords
(3) Format 2: QPSK modulation, used for CQI transmission
(4) Format 2a & Format 2b: Used for simultaneous transmission of CQI and ACK/NACK
(5) Format 3: Used for multiple ACK/NACK transmission in a carrier aggregation environment
Table 6 shows a modulation scheme according to PUCCH format and the number of bits per subframe. Table 7 shows the number of reference signals (RS) per slot according to PUCCH format. Table 8 shows SC-FDMA symbol location of RS (reference signal) according to PUCCH format. In Table 6, PUCCH format 2a and PUCCH format 2b correspond to a case of normal cyclic prefix (CP).
TABLE 6
PUCCH
No. of bits per
format
Modulation scheme
subframe, Mbit
1
N/A
N/A
1a
BPSK
1
1b
QPSK
2
2
QPSK
20
2a
QPSK + BPSK
21
2b
QPSK + BPSK
22
3
QPSK
48
TABLE 7
PUCCH format
Normal CP
Extended CP
1, 1a, 1b
3
2
2, 3
2
1
2a, 2b
2
N/A
TABLE 8
SC-FDMA symbol location of RS
PUCCH format
Normal CP
Extended CP
1, 1a, 1b
2, 3, 4
2, 3
2, 3
1, 5
3
2a, 2b
1, 5
N/A
Referring to
2.1 CQI Transmission Through PUCCH Format
The periodicity and frequency resolution used by a UE to report CQI are both controlled by the eNB. In the time domain, both periodic and aperiodic CQI reporting are supported. The PUCCH format 2 is used for periodic CQI reporting only, and the PUSCH is used for aperiodic reporting of the CQI. At this time, the eNB especially commands CQI reporting to the UE, and the UE transmits CQI report to a resource which is scheduled for uplink data transmission.
The PUCCH CQI channel structure for one slot in case of a normal CP will be understood with reference to
CQI information of 10 bits channel coded with a 1/2 coding rate is punctured by (20, k) Reed-Muller (RM) code to give 20 coded bits. Afterwards, the CQI information is scrambled (for example, scrambled in a similar way to PUSCH data with a length-31 Gold sequence) prior to QPSK constellation mapping. One QPSK modulated symbol is transmitted to each of the 10 SC-FDMA symbols in the subframe by modulating a cyclic time shift of the base RS sequence of length-12 prior to OFDM modulation. The 12 equally-spaced cyclic time shifts allow 12 different UEs to be orthogonally multiplexed on the same CQI PUCCH RB. The DM RS sequence is similar to the frequency domain CQI signal sequence but does not include CQI data modulation.
The UE is configured to periodically report different CQI, PMI, and RI types on CQI PUCCH by receiving a higher layer signal that includes a PUCCH resource index nPUCCH(2), which indicates both the cyclic time shift and the PUCCH region which will be used.
2.2 HARQ ACK/NACK Transmission Through PUCCH Format 1
Referring to
In case of CQI transmission, the one BPSK/QPSK modulated symbol is transmitted on each SC-FDMA data symbol by modulating a cyclic time shift of the base RS sequence of length-12 (i.e. frequency-domain CDM) prior to OFDM modulation. In addition, time-domain spread codes with orthogonal (Walsh-Hadamard of DFT) spreading codes are used to code-division-multiplex UEs. The RSs from the different UEs are multiplexed in the same way as the data SC-FDMA symbols.
2.3 Multiplexing of CQI and ACK/NACK
In the LTE system, simultaneous transmission of HARQ ACK/NACK and CQI is enabled by UE-specific higher layer signaling.
In the case that simultaneous transmission is not enabled and that the UE is configured to report CQI on the PUCCH of the same subframe that needs HARQ ACK/NACK transmission, CQI report is dropped and only HARQ ACK/NACK is transmitted using the PUCCH format 1a/1b.
In the case that simultaneous transmission is enabled, the CQI and the 1- or 2-bit ACK/NACK information need to be multiplexed on the same PUCCH RB while maintaining the low CM (Cubic Metric) single carrier property. The methods used to achieve this are different for the case of normal CP and extended CP.
In the case of the normal CP, to transmit a 1- or 2-bit HARQ ACK/NACK together with CQI, the ACK/NACK bits (which are not scrambled) are BPSK/QPSK modulated as shown in
In case of the extended CP with one RS symbol per slot, the 1- or 2-bit HARQ ACK/NACK is jointly encoded with the CQI resulting in a (20, kCQI+kA/N) Reed-Muller based block code. A 20-bit codeword is transmitted on the PUCCH that uses the CQI channel structure of
2.4 Multiplexing of SR and ACK/NACK
Referring to
2.5 HARQ ACK/NACK Transmission in TDD System
In case of LTE TDD (Time Division Multiplexing), since the UE can receive PDSCHs during a plurality of subframes, the UE can feed HARQ ACK/NACK for multiple PDSCHs back to the eNB. That is, there are two types of HARQ ACK/NACK transmission schemes as follows.
(1) ACK/NACK Bundling
With ACK/NACK bundling, ACK/NACK responses for multiple data units are combined by logical-AND operation. For example, if the Rx node (or receiver) decodes all the data units successfully, the Rx node transmits ACK using one ACK/NACK unit. Otherwise, if the Rx node fails in decoding any of the data units, the Rx node may either transmit NACK using one ACK/NACK unit or transmit nothing for ACK/NACK.
(2) ACK/NACK Multiplexing
With ACK/NACK multiplexing, contents of the ACK/NACK responses for multiple data units are identified by the combination of the ACK/NACK unit used in actual ACK/NACK transmission and the one of QPSK modulation symbols. For example, if it is assumed that one ACK/NACK unit carries two bits and two data units are transmitted in maximum, the ACK/NACK result can be identified at the TX node as illustrated in the following Table 9.
TABLE 9
HARQ-ACK(0), HARQ-ACK(1)
nPUCCH(1)
b(0), b(1)
ACK, ACK
nPUCCH, 1(1)
1, 1
ACK, NACK/DTX
nPUCCH, 0(1)
0, 1
NACK/DTX, ACK
nPUCCH, 1(1)
0, 0
NACK/DTX, NACK
nPUCCH, 1(1)
1, 0
NACK, DTX
nPUCCH, 0(1)
1, 0
DTX, DTX
N/A
N/A
In Table 9, HARQ-ACK(i) indicates the ACK/NACK result for the data unit i (there are maximum 2 data units, that is, data unit 0 and data unit 1 in this example). In Table 9, DTX means there is no data unit transmitted for corresponding HARQ-ACK(i) or the Rx node does not detect the existence of the data unit corresponding to HARQ-ACK(i). nPUCCH,X(1) indicates the ACK/NACK unit which is used in actual ACK/NACK transmission, where there are two ACK/NACK units, nPUCCH,0(1) and nPUCCH,1(1) in maximum.
b(0),b(1) indicates two bits carried by the selected ACK/NACK unit. Modulation symbol which is transmitted through ACK/NACK unit is decided in accordance with the bits. For example, if the RX node receives and decodes two data units successfully, the Rx node transmits two bits, (1, 1), using ACK/NACK unit nPUCCH,1(1). For another example, if the Rx node receives two data units, fails in decoding of the first data unit (corresponding to HARQ-ACK(0)), and decodes the second data unit (corresponding to HARQ-ACK(1)) successfully, the RX node transmits two bits (0, 0) using nPUCCH,X(1).
By linking the actual ACK/NACK contents with the combination of ACK/NACK unit selection and the actual bit contents used for transmission of the ACK/NACK unit, ACK/NACK transmission using single ACK/NACK unit for multiple data units is possible. The example described in Table 9 can be extended to the ACK/NACK transmission for more than 2 data units.
In ACK/NACK multiplexing method, NACK and DTX are coupled as NACK/DTX as shown in Table 9 if at least one ACK exists for all data units. This is because that combinations of ACK/NACK unit and QPSK symbol are insufficient to cover all ACK/NACK hypotheses based on decoupling of NACK and DTX. On the other hand, for the case that no ACK exists for all data units (in other words, NACK or DTX only exists for all data units), single definite NACK case is defined as the case that only one of HARQ-ACK(i) is NACK decoupled with DTX. In this case, ACK/NACK unit linked to the data unit corresponding to single definite NACK can also be reserved to transmit the signal of multiple ACK/NACKs.
When the maximum number of data units which can be transmitted within a given amount of physical resources becomes larger, the required ACK/NACK hypotheses for ACK/NACK multiplexing over all the data units may exponentially increase. Denoting the maximum number of data units and the number of corresponding ACK/NACK units as N and NA, respectively, 2N ACK/NACK hypotheses are required for ACK/NACK multiplexing even if DTX case is precluded. On the other hand, applying the single ACK/NACK unit selection as described above, ACK/NACK multiplexing can be supported by up to 4N, ACK/NACK hypotheses.
In other words, as the number of data units increases, the single ACK/NACK unit selection requires relatively larger amount of ACK/NACK units which yields increased overhead of control channel resources required to transmit the signal for multiple ACK/NACKs. For example, if 5 data units (N=5) are used for transmission, 8 ACK/NACK units (NA=8) should be available for ACK/NACK transmission because the required number of ACK/NACK hypotheses for ACK/NACK multiplexing is 2N=32 (=4NA).
2.6 Uplink Channel Coding for PUCCH Format 2
In LTE uplink transmission, certain control channels are encoded using a linear block code as illustrated in Table 10.
TABLE 10
i
Mi, 0
Mi, 1
Mi, 2
Mi, 3
Mi, 4
Mi, 5
Mi, 6
Mi, 7
Mi, 8
Mi, 9
Mi, 10
Mi, 11
Mi, 12
0
1
1
0
0
0
0
0
0
0
0
1
1
0
1
1
1
1
0
0
0
0
0
0
1
1
1
0
2
1
0
0
1
0
0
1
0
1
1
1
1
1
3
1
0
1
1
0
0
0
0
1
0
1
1
1
4
1
1
1
1
0
0
0
1
0
0
1
1
1
5
1
1
0
0
1
0
1
1
1
0
1
1
1
6
1
0
1
0
1
0
1
0
1
1
1
1
1
7
1
0
0
1
1
0
0
1
1
0
1
1
1
8
1
1
0
1
1
0
0
1
0
1
1
1
1
9
1
0
1
1
1
0
1
0
0
1
1
1
1
10
1
0
1
0
0
1
1
1
0
1
1
1
1
11
1
1
1
0
0
1
1
0
1
0
1
1
1
12
1
0
0
1
0
1
0
1
1
1
1
1
1
13
1
1
0
1
0
1
0
1
0
1
1
1
1
14
1
0
0
0
1
1
0
1
0
0
1
0
1
15
1
1
0
0
1
1
1
1
0
1
1
0
1
16
1
1
1
0
1
1
1
0
0
1
0
1
1
17
1
0
0
1
1
1
0
0
1
0
0
1
1
18
1
1
0
1
1
1
1
1
0
0
0
0
0
19
1
0
0
0
0
1
1
0
0
0
0
0
0
If input bits to the linear block code is denoted as a0, a1, a2, . . . , aA, after encoding the bits are denoted by b0, b1, b2, . . . , bB where B=20. The following Equation 3 indicates one of methods for generating encoded bits.
The encoded bits then are mapped to code-time-frequency resource as shown in
2.7 Uplink Channel Coding in LTE-A System
As described above, in the LTE system (that is, Rel-8), if UCI is transmitted to a PUCCH format 2, (20, A) RM coding of Table 10 is performed for CSI of maximum 13 bits. However, if the UCI is transmitted to the PUSCH, (32, A) RM coding of Table 11 is performed for CQI of maximum 11 bits, and truncation or cyclic repetition is performed to match a code rate which will be transmitted to the PUSCH.
TABLE 11
i
Mi, 0
Mi, 1
Mi, 2
Mi, 3
Mi, 4
Mi, 5
Mi, 6
Mi, 7
Mi, 8
Mi, 9
Mi, 10
0
1
1
0
0
0
0
0
0
0
0
1
1
1
1
1
0
0
0
0
0
0
1
1
2
1
0
0
1
0
0
1
0
1
1
1
3
1
0
1
1
0
0
0
0
1
0
1
4
1
1
1
1
0
0
0
1
0
0
1
5
1
1
0
0
1
0
1
1
1
0
1
6
1
0
1
0
1
0
1
0
1
1
1
7
1
0
0
1
1
0
0
1
1
0
1
8
1
1
0
1
1
0
0
1
0
1
1
9
1
0
1
1
1
0
1
0
0
1
1
10
1
0
1
0
0
1
1
1
0
1
1
11
1
1
1
0
0
1
1
0
1
0
1
12
1
0
0
1
0
1
0
1
1
1
1
13
1
1
0
1
0
1
0
1
0
1
1
14
1
0
0
0
1
1
0
1
0
0
1
15
1
1
0
0
1
1
1
1
0
1
1
16
1
1
1
0
1
1
1
0
0
1
0
17
1
0
0
1
1
1
0
0
1
0
0
18
1
1
0
1
1
1
1
1
0
0
0
19
1
0
0
0
0
1
1
0
0
0
0
20
1
0
1
0
0
0
1
0
0
0
1
21
1
1
0
1
0
0
0
0
0
1
1
22
1
0
0
0
1
0
0
1
1
0
1
23
1
1
1
0
1
0
0
0
1
1
1
24
1
1
1
1
1
0
1
1
1
1
0
25
1
1
0
0
0
1
1
1
0
0
1
26
1
0
1
1
0
1
0
0
1
1
0
27
1
1
1
1
0
1
0
1
1
1
0
28
1
0
1
0
1
1
1
0
1
0
0
29
1
0
1
1
1
1
1
1
1
0
0
30
1
1
1
1
1
1
1
1
1
1
1
31
1
0
0
0
0
0
0
0
0
0
0
In the LTE-A system, a PUCCH format 3 has been introduced to transmit UCI (A/N and SR) bits of maximum 21 bits, and in the status of the normal CP, the UE may transmit code bits of 48 bits by using the PUCCH format 3. Therefore, when the number of UCI bits is 11 bits or less, (32, A) RM coding is used, and in this case, cyclic repetition of code bits is used to correspond to code bits required by the PUCCH format 3. If the number of UCI bits exceeds 11 bits, the number of (32, A) RM code based sequences in Table 11 is not sufficient, whereby two code bits are generated using two (32, A) RM coding blocks as illustrated in
In the case that the UCI of maximum 21 bits is transmitted to the PUSCH, truncation or cyclic repetition is performed using (32, A) RM coding in the same manner as the legacy Rel-8 system to match a code rate which will be transmitted to the PUSCH when the number of UCI bits is 11 bits or less, whereas two coded bits are generated using Dual RM when the number of UCI bits exceeds 11 bits, and truncation or cyclic repetition is performed for the two coded bits to match the code rate which will be transmitted to the PUSCH.
Referring to
In more detail, a bit configuration order per UCI will be described. If the PUCCH format 3 is configured to be used for an SR transport subframe, when SR and A/N are transmitted to the PUCCH format 3 or the PUSCH, the A/N is first arranged and then the SR is arranged next to the A/N, whereby UCI bits are configured.
The code bits A0, A1, . . . , A23 and B0, B1 , . . . , B23 are input to an interleaver, and the code bits output from the interleaver are output in pairs in due order to generate bit streams of A0, A1, B0, B1, A2, A3, B2, B3, . . . , A22, A23, B22 and B23. The bit streams are QPSK modulated and transmitted in accordance with a PUCCH format 3 transport format, wherein the first 24 bits (12 QPSK symbols) of the bit streams are mapped into a first slot and the other 24 bits (12 QPSK symbols) are mapped into a second slot.
3. Polar Coding
A polar code is known as a channel code that can obtain channel capacity in a B-DMC (Binary-input Discrete Memory less Channel). That is, the polar code is a channel code that can obtain channel capacity having no error when a size N of a code block becomes large infinitely. An encoder of the polar code can perform a channel combining procedure and a channel splitting procedure.
The channel combining procedure is to concatenate B-DMCs in parallel and determine the size of the code block.
In this case, u1 and u2 are binary-input source bits, and y1 and y2 are output coded bits. At this time, it is assumed that an entire equivalent channel is W2. When N number of B-DMCs are subjected to channel combining, the respective channels which are combined can be expressed in a recursive format. That is, when x1N=u1NGN, x1N={x1, . . . , xN}, and u1N={u1, . . . , uN}, a generator matrix GN can be calculated as expressed by the following Equation 4.
In the Equation 4, RN indicates a bit-reversal interleaver, and performs a mapping operation for an input bit s1N into an output bit x1N=(s1, s3, . . . , sN−1, s2, . . . , sN. This relation is shown in
After N number of B-DMCs are subjected to channel combining, a procedure of defining an equivalent channel for a specific input can be defined as a channel splitting procedure. The channel splitting procedure can be expressed as channel transition probability as expressed by the following Equation 5.
After the aforementioned channel combining procedure and the aforementioned channel splitting procedure are performed, a theory as disclosed in Table 12 below can be derived.
TABLE 12
Theorem: For any B-DMC W, the channels {WN(i)} polarize in the
sense that, for any fixed δ ∈ (0, 1), as N goes to infinity through
powers of two, the fraction of indices i ∈ {1, . . . , N} for which
I(WN(i)) ∈ (1 − δ, 1] goes to I(W) and the fraction for which I(WN(i)) ∈
[0, δ) goes to 1 − I(W). Hence, as N → ∞, channels polarize, either com-
pletely noisy or noise free and we know these channels exactly at the
transmitter. So, we fix bad channels and transmit uncoded bits over
good ones.
The theory derived in Table 12 is as follows. If the size N of the code block becomes great infinitely, the equivalent channel for the specific input bit is categorized into a noise channel having an error and a noise free channel having no error. This means that capacity of the equivalent channel for the specific input bit is categorized into 0 or I (W).
One of methods for decoding a polar code is a successive cancellation (SC) decoding method. The SC decoding method is to obtain a channel transition probability and calculate a likelihood ratio (LLR) for the input bit based on the channel transition probability. At this time, the channel transition probability can be calculated in a recursive format using a recursive property of the channel combining procedure and the channel splitting procedure.
Therefore, LLR value can finally be calculated in a recursive format. First of all, WN(i)(y1N, u1i-1|ui) which is a channel transition probability for the input bit ui can be obtained through the following Equations 6 and 7. In this case, u1i can be defined as u1,oi, u1,ei by being split into an odd index and an even index.
At this time,
which is LLR for the input bit can be obtained as expressed by the following Equation 8.
Since arithmetic symbols used in all the Equations described in the embodiments of the present invention are used to refer to the same meaning as general arithmetic symbols, their detailed description will be omitted, and may be interpreted as the same definition as general arithmetic symbols when the corresponding Equations are interpreted.
The polar encoder and the SC decoder have complexity of O (N log N), which is varied depending on the length N of the code block. When an input bit of K bits is assumed in the polar code of the length N, a coding rate is K/N. At this time, if a generator matrix of the polar encoder of a data payload size N is defined as GN, encoding bits can be expressed as x1N=u1NGN, and K number of bits of u1N correspond to payload bits. It is assumed that a row index of GN corresponding to the payload bits is I and a row index of GN corresponding to the other N-K bits is F. A minimum distance of the aforementioned polar code is defined as expressed by the following Equation 9.
In the Equation 9, wt(i) means the number of ‘1’ during binary extension of i(i=0, 1, . . . , N−1). That is, wt(i) means the number of ‘1’ when an index (that is, column index I of GN) of a channel is expressed as a binary.
3.1 Derivation of Equivalent Channel
The embodiments of the present invention suggest methods for applying polar coding to a mobile communication system.
As described above, if the channel combining procedure and the channel splitting procedure are performed, the equivalent channel is categorized into a noise channel and a noise free channel. At this time, a data payload should be transmitted to the noise free channel. That is, the data payload should be transmitted to the noise free equivalent channel to obtain good performance.
At this time, a method for discovering the noise free equivalent channel can be determined by obtaining a value z(W)=Σ√{square root over (W(y|0)W(y|1))} of the equivalent channel for each input bit. In this case, Z(W) is referred to as a Bhattacharyya parameter. Z(W) means a value corresponding to an upper-bound of an error probability when MAP decision is performed after a binary input 0 or 1 is transmitted. Therefore, values of Z(W) are obtained and then arranged in an ascending order (small order) to select the value of Z(W) as much as a desired data payload, whereby the corresponding data can be transmitted through the noise free channel
Z(W) can be obtained for a BEC (Binary Erasure Channel) as expressed by the following Equation 10.
When the size of the code block is 8 in case of the BEC having an erasure probability of 0.5, the value of Z(W) is calculated as follows using the Equation 10. Z(W)={1.00, 0.68, 0.81, 0.12, 0.88, 0.19, 0.32, 0.00}. Therefore, when the size of the data payload is 2, the data payload is transmitted through an equivalent channel 8 (Z(W)=0.00) and an equivalent channel 4 (Z(W)=0.12).
3.1.1 CRC Addition Method
The transmitter of the wireless access system transmits data by adding CRC (Cyclic Redundancy Check) bits to a data payload to detect an error of the data. That is, in the following embodiments, the data payload may be used to include one or more data bits and CRC bits unless described separately. Since CRC can detect an error, if performance of error detection through CRC is relatively stable, performance of error detection of the data block can be improved. To this end, when values of Z(W) which are obtained are listed in an ascending order (small order), CRC bit streams are arranged in equivalent channels corresponding to a CRC length and then data bits are arranged, whereby error detection performance can be improved.
For example, it is assumed that 3-bit data and 2-bit CRC input in a data payload are subjected to polar coding using a polar encoder of a length 8 as expressed in the Equation 10. At this time, after CRC 2 bits are arranged in an equivalent channel 8 (that is, channel of Z(W)=0.00) and an equivalent channel 4 (that is, channel of Z(W)=0.12) which are noise free channels having the best performance, the data payload can be transmitted through an equivalent channel 6 (that is, channel of Z(W)=0.19, an equivalent channel 7 (that is, channel of Z(W)=0.32) and an equivalent channel 2 (that is, channel of Z(W)=0.68) which are noise free channels having good performance next to the best performance.
The method for calculating the value of Z(W) as expressed in the Equation 10 is performed in the BEC. Therefore, an equivalent channel which will transmit the data payload can be discovered in an additive white Gaussian nose (AWGN) channel by another method. However, even in this case, CRC allows the values of Z(W) which are obtained to be arranged in an ascending order (small order), whereby the equivalent channels are allocated to CRC bits as much as the CRC length, and then the data payload can be arranged in the other equivalent channels.
Also, as still another method, in the case that the receiver does not assume SC decoding, reliability of the CRC bits and reliability of the data payload are important equally. Therefore, when the values of Z(W) are arranged in an ascending order (small order), the data payload is allocated to the equivalent channel having good performance and then the CRC bits can be allocated to next equivalent channels.
It is preferable that the transmitter and the receiver know the equivalent channel, which will be allocated to the data payload, in accordance with the size of the data payload including CRC bits, and a coding rate. It is also preferable that the equivalent channel which will be allocated to the data payload is previously calculated by the transmitter.
Therefore, if the transmitter transmits information on the data payload size and the coding rate to the receiver, the receiver can perform decoding for a polar coded data signal by acquiring information on the equivalent channel to which the data payload is transmitted.
Also, the code block size of the polar encoder of which coding rate is r=K/N is N and its payload size is K. In this case, a bit stream corresponding to N-K is a bit stream allocated and transmitted to the noise channel. It is preferable that the bit stream is previously determined by the transmitter and the receiver. The bit stream which will be allocated to the noise channel can be determined as {0, 0, . . . , 0} or {1, 1, . . . , 1} corresponding to its size N-K.
3.2 Rate Matching for Encoding Bits
The polar encoder has a size of a code block, which is limited to 2n (n is a natural number) in view of its property. Therefore, a rate matching operation of puncturing (or truncation) or repetition is required depending on transmission numerology of the system. Hereinafter, the rate matching procedure for coded bits will be described.
In the embodiments of the present invention, it is assumed that a size of a data payload (including CRC) generated by a higher layer satisfies a relation of 2n<N<2n+1. At this time, if a first threshold value THR1 of a codeword size exists and thus a size of a code bit is greater than the first threshold value, the transmitter performs encoding through a mother polar encoder of 2n+1 size and then performs puncturing as much as 2n+1−N bits, whereby encoding bit streams of a codeword size N are generated. At this time, the mother polar encoder means an encoder which is a reference for performing repetition or puncturing in accordance with a size of the data payload.
Meanwhile, if the size of the data payload is smaller than a second threshold value THR2, the transmitter performs encoding through a mother polar encoder of 2n size and then generates encoding bit streams corresponding to the code block size N through repetition as much as N−2n bits. At this time, it is preferable that the size of the data payload satisfies a relation of K<2n. In this case, THR1 and THR2 may be the same as each other or may be different from each other.
Hereinafter, methods for configuring a generator matrix for performing rate matching by puncturing or repeating codeword bits considering a weight value, a minimum distance and/or a priority will be described.
3.2.1 Configuration of Generator Matrix Using Weight Value
If a generator matrix of a polar encoder of a size N for an input data payload is GN, encoded bit streams can be expressed as x1N=u1NGN. At this time, a number of “1” in each column of GN can be defined as a weight value of each column. If repetition is performed for GN by the mother polar encoder, repetition is performed in the order of column having a greater weight value, whereby a distance of repeated codewords can be set to a maximum value.
Likewise, if the transmitter performs puncturing for GN by the mother polar encoder, repetition is performed in the order of column having a smaller weight value, whereby a distance of punctured codewords can be set to a maximum value. In the embodiments of the present invention, the mother polar encoder can be used as the same meaning as a mother generator matrix. Also, the mother generator matrix can be defined as a first generator matrix, and a new generator matrix generated from the mother generator matrix by repetition or puncturing can be defined as a second generator matrix.
The following Equation 11 is an example of a generator matrix GN of a polar encoder of which code block size is N=8.
The weight value of each column in the polar encoder having the generator matrix as expressed in the Equation 11 is {8, 4, 4, 2, 4, 2, 2, 1}. Therefore, when a codeword of a codeword length C=10 is transmitted, among respective columns of the generator matrix, the first column having the greatest weight value and one of second, third and fifth columns having great weight values next to the greatest weight value are selected and then transmitted repeatedly. That is, codeword C=8 is encoded using the generator matrix, and the other two codewords can be transmitted by selecting the first column and one of the second, third and fifth columns and repeatedly encoding the selected columns. For example, when the transmitter selects the first column and the second column, a new generator matrix is G′8=[G8 Gr], Gr=[G8(:,1) G8(:, 2)]. In this case, G8(:,x) is a column vector indicating the xth column.
Likewise, when a codeword of a codeword length C=6 is transmitted, the eighth column having the smallest weight value and one of fourth, sixth and seventh columns can be punctured and encoded. At this time, when the transmitter selects the eighth column and the fourth column, the generator matrix G6 is as expressed by the following Equation 12.
The Equation 12 indicates a new generator matrix (that is, the second generator matrix) generated as the eighth column and the fourth column are punctured in the Equation 11.
If column permutation is performed for the columns of the generator matrix of the polar encoder in the order of greater weight values or smaller weight values, puncturing and repetition can easily be implemented. That is, when the columns of the first generator matrix are rearranged in the order of column having the greater weight value, repetition is performed in the order of column index, and if puncturing is performed in the reverse order of column index, the minimum distance of the codeword described in the Equation 9 can be set to a maximum value.
The following Equation 13 represents that permutation is performed for the generator matrix of the Equation 11 in the order of column weight value.
3.2.2 Configuration of Generator Matrix Based on Minimum Distance
Hereinafter, methods for configuring a generator matrix considering a minimum distance of a polar encoder will be described. In the generator matrix as expressed in the Equation 11, if the size of the payload is 2, the payload is transmitted through an equivalent channel corresponding to the eighth row and the fourth row (row 8, row 4) of the Equation 11. That is, a matrix such as
may be a generator sub-matrix corresponding to the 2-bit payload.
If output codewords of 6 bits are generated, the transmitter should puncture the column corresponding to 2 bits of the polar encoder from the mother generator matrix which is the first generator matrix. At this time, if puncturing is performed for the column having a small weight value, it is preferable that the column corresponding to 0 of the first row is punctured. If the second and fourth columns are punctured, the second generator matrix that generates a payload of 6 bits can be configured as expressed by the following Equation 14.
That is, column puncturing is performed in the order of smaller column weight values of a sub-matrix comprised of rows of a generator matrix corresponding to a payload.
3.2.3 Configuration of Generator Matrix Based on Priority
In another aspect of the present invention, a new generator matrix can be configured based on a priority of a column index of a mother generator matrix.
If the same column weight value is applied to columns of the mother generator matrix, puncturing may be performed in such a manner that a priority is given in the order of smaller column index or in the order of greater column index.
If puncturing is performed in the order of greater column index, the sixth column and the eighth column of the Equation 11 are punctured, whereby a generator matrix is obtained as expressed by the following Equation 15.
As described above, if puncturing and repetition are performed, performance of a newly generated generator matrix may be degraded due to the same column or row comprised of same elements. Therefore, puncturing or repetition is performed for the column corresponding to a priority, whereby the generator matrix can be configured.
3.3 Method for Transmitting and Receiving Data Using Polar Coding
Hereinafter, a method for transmitting data using polar coding will be described based on the aforementioned embodiments of the present invention.
The transmitter can derive equivalent channels by repeatedly performing a channel combining procedure and a channel splitting procedure. That is, if the channel combining procedure and the channel splitting procedure are performed, the equivalent channels are categorized into a noise channel and a noise free channel (S2210).
The transmitter derives the Bhattacharyya parameter Z(W) described in the clause 3.1 in accordance with each input bit to discover the noise free channel from the categorized equivalent channel (S2220).
The transmitter allocates a data payload comprised of CRC bits and data bits to the noise free channel. At this time, the transmitter may improve receiving performance of the receiver by allocating the CRC bits to the noise free channel better than the data bits (S2230).
Also, it is assumed that the size of the polar encoder to which the data payload is input to performed polar coding is N and the size of the data payload is K. In this case, the transmitter performs puncturing or truncation if N>k, and performs rate matching by performing repetition if N<k. Its detailed description will be understood with reference to the clause 3.2 (S2240).
The transmitter performs interleaving for polar coded code bits (or code symbols) and transmits the interleaved code bits to the receiver (S2250).
However, the receiver should know size information k indicating the size of the data payload input to the polar encoder and a coding rate k/N of the polar encoder to detect and decode the polar coded code bits. Therefore, the transmitter can transmit the size information on the size of the data payload and the coding rate information of the polar encoder to the receiver (S2260).
The step S2260 may be performed if the transmitter receives data from the higher layer, or may be performed after the data payload is input to the polar encoder.
4. Method for Performing HARQ Using Polar Code
If polar coding is used, it is preferable that IR (Incremental Redundancy)-HARQ scheme to obtain HARQ gain. The IR scheme is a retransmission scheme for obtaining maximum coding gain by setting a redundancy version (RV) during retransmission differently from that during initial transmission.
For example, it is assumed that the data payload size N is not changed during retransmission. Then, it is preferable to set maximum polar coding gain by setting puncturing and repetition patterns of the polar encoder during retransmission. Hereinafter, a method for performing HARQ when polar coding is used will be described.
4.1 Configuration of Generator Matrix Based on Puncturing
Hereinafter, a case where transmission of the data payload is performed through puncturing during retransmission including initial transmission will be described.
Puncturing is performed as much as the number of bits of the generator matrix, which will be punctured in the order of the smaller column weight value. If bit streams corresponding to all the columns are punctured, the same puncturing pattern is performed again. A priority may be given to columns having the same weight value.
For example, the priority may be set in the order of column index of the generator matrix. The generator matrix of the Equation 11 is assumed as a mother generator matrix. At this time, puncturing is performed in the order of the eighth column, the fourth column, the sixth column, the seventh column, the second column, the third column, the fifth column, and the first column considering column index in case of the order of the smaller column weight value and the same column weight value.
That is, if 2 bits are punctured to transmit codewords of 6 bits during the first transmission, the transmitter transmits columns corresponding to the eighth bit and the fourth bit in the Equation 11 by puncturing the columns. Also, if codewords of 5 bits are transmitted during the second transmission, the transmitter can transmit the column corresponding to 3 bits in the Equation 11 by puncturing the corresponding column. For example, the transmitter can configure the generator matrix by puncturing the columns corresponding to the sixth bit, the seventh bit and the second bit. Also, if the third retransmission is required and codewords of 4 bits are retransmitted, the transmitter can configure the generator matrix by puncturing the column corresponding to 4 bits. For example, the transmitter can puncture the columns corresponding to the third bit, the fifth bit, the first bit and the eighth bit.
If the transmitter performs permutation for the columns of the generator matrix in the order of column weight value, the transmitter can perform puncturing in the reverse order of column index.
4.2 Configuration of Generator Matrix Based on Repetition
Hereinafter, a case where transmission of the corresponding data payload is performed by repetition during retransmission including initial transmission will be described.
If the generator matrix is configured through repetition, repetition can be performed as much as the number of repetition bits in the order of the greater column weight value of the mother generator matrix. If repetition is performed for bit streams corresponding to all the columns, the same repetition pattern can be performed again. Also, a priority may be set to the columns having the same weight value. In this case, the priority may be set in the order of column index of the generator matrix.
The generator matrix of the Equation 11 is assumed as a mother generator matrix. At this time, repetition can be performed in the order of the first column, the second column, the third column, the fifth column, the fourth column, the sixth column, the seventh column and the eighth column considering column index in case of the order of the greater column weight value and the same column weight value.
At this time, if the transmitter transmits codewords of 10 bits during the first transmission, a new generator matrix is configured by repetition of the column corresponding to 2 bits. If 3 bits are repeatedly transmitted during the second transmission, the third bit, the fifth bit and the fourth bit are repeatedly transmitted. If 4 bits are repeatedly retransmitted during the third transmission, repetition is performed for the columns corresponding to the sixth bit, the seventh bit, the eighth bit and the first bit to configure the generator matrix, whereby the data payload is transmitted.
If the transmitter performs permutation for the columns of the generator matrix in the order of column weight value, the transmitter can perform repetition in the order of column index.
4.3 Configuration of Generator Matrix Based on Puncturing and Repetition
Hereinafter, a case where a generator matrix is configured through puncturing and repetition during initial transmission and retransmission will be described.
The transmitter can transmit the data payload by independently using the clauses 4.1 and 4.2 in accordance with puncturing and repetition patterns of previous transmission. For example, if current transmission is performed using the repetition pattern, the scheme described in the clause 4.2 is used considering the repetition pattern of the previous transmission.
Also, if current transmission is performed using puncturing, the scheme described in the clause 4.1 can be used considering the puncturing pattern of transmission corresponding to puncturing of the previous transmission.
If the transmitter performs permutation for the columns of the generator matrix in the order of column weight value, the transmitter can perform puncturing in the reverse order of column index.
5. Apparatuses
Apparatuses illustrated in
A UE may act as a transmitting end on a UL and as a receiving end on a DL. An eNB may act as a receiving end on a UL and as a transmitting end on a DL.
That is, each of the UE and the eNB may include a transmitter (Tx) 2340 or 2350 and a Receiver (Rx) 2360 or 2370, for controlling transmission and reception of information, data, and/or messages, and an antenna 2300 or 2310 for transmitting and receiving information, data, and/or messages.
Each of the UE and the eNB may further include a processor 2320 or 2330 for implementing the afore-described embodiments of the present disclosure and a memory 2380 or 2390 for temporarily or permanently storing operations of the processor 2320 or 2330.
The embodiments of the present invention can be performed using the elements and functions of the aforementioned UE and the aforementioned eNB. For example, the processor of the UE and the eNB can transmit encoded data by performing polar coding by means of combination of the methods described in the aforementioned clauses 1 to 3. Its details will be understood with reference to the clauses 1 to 3.
The Tx and Rx of the UE and the eNB may perform a packet modulation/demodulation function for data transmission, a high-speed packet channel coding function, OFDMA packet scheduling, TDD packet scheduling, and/or channelization. Each of the UE and the eNB of
Meanwhile, the UE may be any of a Personal Digital Assistant (PDA), a cellular phone, a Personal Communication Service (PCS) phone, a Global System for Mobile (GSM) phone, a Wideband Code Division Multiple Access (WCDMA) phone, a Mobile Broadband System (MBS) phone, a hand-held PC, a laptop PC, a smart phone, a Multi Mode-Multi Band (MM-MB) terminal, etc.
The smart phone is a terminal taking the advantages of both a mobile phone and a PDA. It incorporates the functions of a PDA, that is, scheduling and data communications such as fax transmission and reception and Internet connection into a mobile phone. The MB-MM terminal refers to a terminal which has a multi-modem chip built therein and which can operate in any of a mobile Internet system and other mobile communication systems (e.g. CDMA 2000, WCDMA, etc.).
Embodiments of the present disclosure may be achieved by various means, for example, hardware, firmware, software, or a combination thereof.
In a hardware configuration, the methods according to exemplary embodiments of the present disclosure may be achieved by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), processors, controllers, microcontrollers, microprocessors, etc.
In a firmware or software configuration, the methods according to the embodiments of the present disclosure may be implemented in the form of a module, a procedure, a function, etc. performing the above-described functions or operations. A software code may be stored in the memory 2380 or 2390 and executed by the processor 2320 or 2330. The memory is located at the interior or exterior of the processor and may transmit and receive data to and from the processor via various known means.
Those skilled in the art will appreciate that the present disclosure may be carried out in other specific ways than those set forth herein without departing from the spirit and essential characteristics of the present disclosure. The above embodiments are therefore to be construed in all aspects as illustrative and not restrictive. The scope of the invention should be determined by the appended claims and their legal equivalents, not by the above description, and all changes coming within the meaning and equivalency range of the appended claims are intended to be embraced therein. It is obvious to those skilled in the art that claims that are not explicitly cited in each other in the appended claims may be presented in combination as an embodiment of the present disclosure or included as a new claim by a subsequent amendment after the application is filed.
The present disclosure is applicable to various wireless access systems including a 3GPP system, a 3GPP2 system, and/or an IEEE 802.xx system. Besides these wireless access systems, the embodiments of the present disclosure are applicable to all technical fields in which the wireless access systems find their applications.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
8064333, | Mar 11 2008 | NEC Corporation | Systems and methods for adaptive hybrid automatic retransmission requests |
20130117344, | |||
20150026543, | |||
20150194987, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 28 2015 | KIM, BONGHOE | LG Electronics Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050419 | /0912 | |
Dec 28 2015 | SEO, DONGYOUN | LG Electronics Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050419 | /0912 | |
Sep 18 2019 | LG Electronics Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Sep 18 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
May 18 2024 | 4 years fee payment window open |
Nov 18 2024 | 6 months grace period start (w surcharge) |
May 18 2025 | patent expiry (for year 4) |
May 18 2027 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 18 2028 | 8 years fee payment window open |
Nov 18 2028 | 6 months grace period start (w surcharge) |
May 18 2029 | patent expiry (for year 8) |
May 18 2031 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 18 2032 | 12 years fee payment window open |
Nov 18 2032 | 6 months grace period start (w surcharge) |
May 18 2033 | patent expiry (for year 12) |
May 18 2035 | 2 years to revive unintentionally abandoned end. (for year 12) |