A method for transmitting information data by using a Reed-Muller coding scheme in a wireless communication system is disclosed. The method includes configuring a number of resource elements for transmitting the information data; dividing the information data to first information data and second information data if a bit size O of the information data is equal to or larger than a predetermined number; applying RM coding on each of the first information data and the second information data; concatenating the coded first information data and the coded second information data, and transmitting the concatenated data by using the predetermined number of resource elements, wherein a minimum value Q′min for the number of resource elements is defined by a sum of a minimum value Q′min_1 for the number of resource elements corresponding to the first information data and a minimum value Q′min_2 for the number of resource elements corresponding to the second information data.

Patent
   RE48628
Priority
Aug 20 2010
Filed
Feb 28 2017
Issued
Jul 06 2021
Expiry
Jun 17 2031

TERM.DISCL.
Assg.orig
Entity
Large
0
48
currently ok
0. 10. A user equipment (UE) in a wireless communication system, the UE comprising:
a processor configured to divide control information into first and second portions, wherein a size of the control information is at least 12 bits, encode the first and second portions separately, and concatenate the encoded first and second portions of the control information;
a transmitter configured to transmit the concatenated first and second portions of the control information to a base station by mapping to modulation symbols,
wherein a number of the modulation symbols is determined based on a size (O) of the control information, and
wherein a minimum value for the number of the modulation symbols is defined by using the following equation:
2 × O 2 Q m + 2 × O 2 Q m ( where Q m indicates a bit size per modulation symbol ) .
0. 7. A method for a user equipment transmitting control information in a wireless communication system, the method comprising:
dividing the control information into first and second portions, wherein a size of the control information is at least 12 bits,
encoding the first and second portions separately;
concatenating the encoded first and second portions of the control information; and
transmitting the concatenated first and second portions of the control information to a base station by mapping to modulation symbols,
wherein a number of the modulation symbols is determined based on a size (O) of the control information, and
wherein a minimum value for the number of the modulation symbols is defined by using the following equation:
2 × O 2 Q m + 2 × O 2 Q m ( where Q m indicates a bit size per modulation symbol ) .
0. 1. A method for transmitting uplink control information (UCI) at a user equipment in a wireless communication system, the method comprising:
dividing the UCI into a first sub-UCI and a second sub-UCI, a bit size (O) of the UCI equal to or larger than a predetermined number;
encoding each of the first sub-UCI and the second sub-UCI by using a Reed-Muller (RM) coding scheme;
concatenating the encoded first sub-UCI and the encoded second sub-UCI;
transmitting the concatenated first sub-UCI and second sub-UCI to a base station using modulation symbols,
wherein a number of the modulation symbols is determined based on O,
wherein a minimum number (Q′min) of the modulation symbols is defined by a sum of a minimum number of the modulation symbols corresponding to the first sub-UCI (Q′min_1) and a minimum number of the modulation symbols corresponding to the second sub-UCI (Q′min_2),
wherein Q′min_1 and Q′min_2 are defined by using the following Equations:
Q min _ 1 = 2 × O 2 Q m and Q min _ 2 = 2 × ( O O 2 ) Q m = 2 × O 2 Q m ,
where Qm indicates a bit size per modulation symbol.
0. 2. The method of claim 1, wherein the concatenated first sub-UCI and second sub-UCI transmitted via a Physical Uplink Shared Channel (PUSCH).
0. 3. The method of claim 1, wherein the predetermined number corresponds to 12 bits.
0. 4. A user equipment (UE) of a wireless communication system, the UE comprising:
a processor configured to divide uplink control information (UCI) into a first sub-UCI and a second sub-UCI, to encode each of the first sub-UCI and the second sub-UCI by using a Reed-Muller (RM) coding scheme, and to concatenate the encoded first sub-UCI and the second sub-UCI, wherein a bit size (O) of the UCI equal to or larger than a predetermined number; and
a transmitter configured to transmit the concatenated first sub-UCI and second sub-UCI using modulation symbols to a base station,
wherein a number of the modulation symbols is determined based on O,
wherein a minimum number (Q′min) of the modulation symbols is defined by a sum of a minimum number of the modulation symbols corresponding to the first sub-UCI (Q′min_1) and a minimum number of the modulation symbols corresponding to the second sub-UCI (Q′min_2),
wherein Q′min_1 and Q′min_2 are defined by using the following Equations:
Q min _ 1 = 2 × O 2 Q m and Q min _ 2 = 2 × ( O O 2 ) Q m = 2 × O 2 Q m ,
where Qm indicates a bit size per modulation symbol.
0. 5. The UE of claim 4, wherein the concatenated first sub-UCI and second sub-UCI transmitted via a Physical Uplink Shared Channel (PUSCH).
0. 6. The UE of claim 4, wherein the predetermined number corresponds to 12 bits.
0. 8. The method of claim 7, wherein the control information is transmitted through a Physical Uplink Shared Channel (PUSCH).
0. 9. The method of claim 7, wherein the control information comprises rank indicators (RI) or an acknowledgement/negative-acknowledgement (ACK/NACK).
0. 11. The user equipment of claim 10, wherein the control information is transmitted through a Physical Uplink Shared Channel (PUSCH).
0. 12. The user equipment of claim 10, wherein the control information comprises rank indicators (RI) or an acknowledgement/negative-acknowledgement (ACK/NACK).

The related art channel coding method is realized under the assumption that a single carrier environment is given. However, in case a multiple carrier method is applied, as in the LTE-A system, since it is generally known that the UCI corresponding to each component carrier, i.e., the ACK/NACK or RI data are combined by a component carrier order, the UCI size may also increase in proportion to a number of aggregated component carriers. Most particularly, in case of the RI, the convention single carrier may have a maximum information data size of 3 bits. However, in an environment wherein 5 component carriers can be aggregated, the maximum information data size may be equal to 15 bits. Therefore, since a maximum of 11 bits of information data can be coded by using the currently realized RM coding scheme, a new scheme (or method) capable of decoding the UCI in a multiple carrier environment is required. Hereinafter, a coding method and a rate matching method for each UCI size will now be specifically proposed.

In a single carrier environment and a multiple carrier environment, since RM coding is used, when the RI or ACK/NACK having the size of 3 bits or more, the coded output data has a bit size of 32 bits. However, in case the channel status is excellent, and when the number of resource elements is calculated by using Equation 1 and Equation 2, only an extremely small number of resource elements may be allocated based upon the bit size of the information data. In this case, during the rate matching step, which is performed by using Equation 4, the coded codewords may be excessively punctured due to the RM coding, thereby causing the performance to be degraded.

More specifically, in order to perform robust transmission regardless of the channel status, since the RI or ACK/NACK transmits codewords, which are coded by the RI or ACK/NACK by using the RM coding scheme, by using only the constellation points of corner points, instead of using all of the constellations so as perform modulation, it is generally known that only 2 bits are mapped to a single resource element. Therefore, in order to transmit all of the codewords coded to 32 bits, a total of 16 resource elements are required. And, at this point, if the calculated number of resource elements is smaller than 16, puncturing may be performed on the codewords as the rate matching process. However, when performing the puncturing process, a receiving end may determine the process as an error. Therefore, even if the codeword has a value of 16, which corresponds to the maximum value for the minimum distance between codes of the RM code, when puncturing a portion of the data corresponding 4 symbols, the performance cannot be ensured. Also, since the puncturing process is sequentially performed in 2-bit units starting from the very last bit of the codeword, in order to maintain the performance of the puncturing process, the degrading of the performance may be increased. Hereinafter, as a first embodiment of the present invention, the present invention proposes a method for preventing such degrading of the performance caused by the above-described puncturing process.

1) When the ACK/NACK or RI has an information data size corresponding to a specific number of bits, i.e., when the ACK/NACK or RI corresponds to information data having a size equal to or larger than 3 bits, the first embodiment of the present invention proposes a method of configuring a minimum value as the number of resource elements being allocated to the ACK/NACK or RI. For example, when the information data size of the ACK/NACK or RI is equal to or greater than 3 bits, the number of resource elements allocated for transmitting the information data of the ACK/NACK or RI is configured to be equal to a minimum number of 16 bits. Herein, it is preferable that the minimum value of the number of resource elements, which is allocated to the ACK/NACK or RI, is equal to or greater than half the number of bits corresponding to the information data size. More specifically, the number of REs being allocated to the ACK/NACK and the RI, i.e., the number of coded modulation symbols may be calculated by using Equation 6 and Equation 7 shown below.

Q = max ( Q min , min ( Q temp , 4 · M sc PUSCH ) ) [ Equation 5 ] Q temp = ( O · M sc PUSCH - initial ( 1 ) · N symb PUSCH - initial ( 1 ) · M sc PUSCH - initial ( 2 ) · N symb PUSCH - initial ( 2 ) · β offset PUSCH ) ( r = 0 C ( 1 ) - 1 K r ( 1 ) · M sc PUSCH - initial ( 2 ) · N symb PUSCH - initial ( 2 ) + r = 0 C ( 2 ) - 1 K R ( 2 ) · M sc PUSCH - initial ( 1 ) · N symb PUSCH - initial ( 1 ) ) [ Equation 6 ]

A minimum value Q′min for the number of resource elements being allocated to the ACK/NACK or RI may be decided according to Equation 7 shown below.

Q min = 2 × O Q m [ Equation 7 ]

Herein, O represents a bit size of the information data of the ACK/NACK or RI, and Qm corresponds to a bit size per symbol according to the modulation order. In case of the QPSK, Qm is equal to 2, in case of the 16QAM, Qm is equal to 4, and, in case of the 64QAM, Qm is equal to 6.

Meanwhile, in case of the ACK/NACK and the RI, the standard of a coding rate for the RM coding process is ⅓. Accordingly, the minimum value Q′min for the number of resource elements being allocated to the ACK/NACK or RI may be decided by using Equation 8 to Equation 10 shown below.

Q min _ 1 = 3 × O Q m [ Equation 8 ] Q min - 2 × O Q m - 1 2 or Q min - 2 × O - Q m / 2 Q m [ Equation 9 ] Q min = 2 × O Q m - 3 4 or Q min = 2 × O - ( 3 Q m / 4 ) Q m [ Equation 10 ]

Table 4 to Table 7 shown below respectively correspond to examples of calculating the minimum value Q′min for the number of resource elements being allocated to the ACK/NACK or RI by using Equation 7 to Equation 10 presented above.

TABLE 4
Info. REs REs REs
bit size for QPSK for 16 QAM for 64 QAM
 3  3 2 1
 4  4 2 2
 5  5 3 2
 6  6 3 2
 7  7 4 3
 8  8 4 3
 9  9 5 3
10 10 5 4
11 11 6 4

TABLE 5
Info. REs REs REs
bit size for QPSK for 16 QAM for 64 QAM
 3  3 1 1
 4  4 2 1
 5  5 2 2
 6  6 3 2
 7  7 3 2
 8  8 4 3
 9  9 4 3
10 10 5 3
11 11 5 4

TABLE 6
Info. REs REs REs
bit size for QPSK for 16 QAM or 64 QAM
 3  5 3 2
 4  6 3 2
 5  8 4 3
 6  9 5 3
 7 11 6 4
 8 12 6 4
 9 14 7 5
10 15 8 5
11 17 9 6

TABLE 7
Info. REs REs REs
bit size for QPSK for 16 QAM for 64 QAM
 3 2 2 1
 4 3 2 1
 5 3 2 1
 6 6 3 2
 7 6 3 2
 8 6 3 2
 9 6 3 2
10 6 3 2
11 9 5 3

2) Also, in the first embodiment of the present invention, after the ACK/NACK or RI codes the RM coding, when the ACK/NACK or RI is punctured by the rate matching process, it may be considered to perform puncturing by a predetermined and specific order. More specifically, when the ACK/NACK or RI is allocated to a given number of resource elements, the allocation order may be decided by grouping the ACK/NACK or RI in 1-bit or 2-bit units or in units of a specific number of bits, so that the ACK/NACK or RI can be allocated to the resource elements by the decided order. For example, if the output data having the ACK/NACK or RI coded correspond to c0, c1, Λ, c31, the output data are realigned through a permutation function π(i), i=0, 1, Λ, 31, which corresponds to a predetermined rule, so that an optimal performance can be demonstrated when performing the puncturing process. Then, in accordance with the permuted order, the resource elements may be sequentially allocated, or the puncturing process may be sequentially performed, by the index order or by an inverse index order. More specifically, when 8 coded output data are allocated to the resource elements, the located data becomes cπ(0), cπ(1), Λ, cπ(7), instead of c0, c1, Λ, c7.

3) Furthermore, according to the first embodiment of the present invention, different βoffsetPUSCH offset values may be used depending upon the information data size respective to the ACK/NACK and the RI. When puncturing the coded output data, i.e., the codeword by using the RM coding scheme, the influence of the puncturing process may vary depending upon the bit size of the information data. Therefore, depending upon the level of influence affecting the minimum distance of the codeword caused by the puncturing process, the βoffsetPUSCH value may be configured differently. For example, when puncturing the codeword, a comparatively large βoffsetPUSCH value is set up for the fastest bit size of the information data to have its minimum distance value be equal to 0.

Although the above-described processes 1) to 3) describe the process of setting up the minimum value of the number of resource elements being allocated to the UCI, in order to achieve the same object, a minimum bit size value of the coded output data after processing rate matching may also be set up. More specifically, the minimum value Q′min shown in Equation 5 may be configured in the number of resource elements as the minimum bit size value of the output data, as shown in Equation 11 below.
Q′min=2O  [Equation 11]

In case the information data size of the ACK/NACK and the RI is equal to or greater than 12 bits, the PUSCH groups the information data to the same bit size or to a different bit size, which corresponds to at least two or more data sets. And, channel coding may be performed on each of the divided information data groups by using a (32,0) RM coding scheme, which is used in each PUSCH.

More specifically, when multiplexing the UCI, such as the RI or ACK/NACK, and the data in a multiple carrier environment, the information data bits of the UCI are divided into at least two or more group, and each group may be coded as a single codeword. In this case, since a (32,0) RM coding scheme using Table 1 may be applied, when a range of the bit size of the information data is between 3 bits and 11 bits, if the bit size of the information data included in each group is between 6 bits and 10 bits, then the (32,0) RM coding scheme, i.e., a dual RM coding scheme may be applied for each group. Hereinafter, a method for dividing the information data into group will first be described, and then a method for calculating the number of resource elements for allocating the coded information data and a method for performing rate matching, i.e., a coding chain, when applying the dual (32,0) RM coding scheme, will be described afterwards. Thereafter, a method for calculating a minimum number of resource elements that can be allocated for each codeword when applying the dual (32,0) RM coding scheme according to the first embodiment of the present invention will be described.

1) Information Data Grouping Method when Performing Dual RM Coding

First of all, a method of dividing information data having the size of 12 bits or more into groups in order to apply the dual (32,0) RM coding scheme will be described with reference to FIG. 18 and FIG. 19.

(1) FIG. 18 illustrates a method of dividing information data into groups in order to apply a dual (32,0) RM coding scheme according to a second embodiment of the present invention.

Referring to FIG. 18, the whole (or entire) information data may be sequentially allocated as the input data of each encoder used for the dual (32,0) RM coding scheme. For example, when the 12-bit information data d0, d1, d2, Λ, d11 is coded by two RM encoders, the information data being inputted to a first RM encoder may correspond to 6 bits d0, d2, d4, Λ, d10, which correspond to even-numbered information data bits. And, the information data being inputted to a second (32,0) RM encoder may correspond to 6 bits d1, d3, d5, Λ, d11, which correspond to odd-numbered information data bits.

More specifically, in case the given information data corresponds to o0, o1, o2, Λ, oQ-1, among the input data of the RM encoder b0, b1, b2, Λ, bQ-1, if b0, b1, b2, Λ, b┌Q/1┐, b┌Q/2┐, b┌Q/2┐+1, b┌Q/2┐+2, Λ, bQ-1 are respectively inputted to the first RM encoder and the second RM encoder, when i is an even number then bi/2=oi. And, when i is an odd number then b┌Q/2┐+(i−1)/2=oi.

(2) FIG. 19 illustrates another method of dividing information data into groups in order to apply a dual (32,0) RM coding scheme according to a second embodiment of the present invention.

Referring to FIG. 19, a first half of the whole information data may be allocated as the information data being inputted to the first RM encoder, and a second half of the whole information data may be allocated as the information data being inputted to the second RM encoder. For example, when the 12-bit information data d0, d1, d2, Λ, d11 is coded by two RM encoders, 6 bits d0, d1, d2, Λ, d5 of the information data may be inputted to the first RM encoder, and 6 bits d6, d7, d8, Λ, d11 of the information data may be inputted to the second RM encoder.

Meanwhile, collectively referring to FIG. 18 and FIG. 19, when the bit size O of the whole information data corresponds to an odd number, (O+1)/2 bits may be allocated as the information data being inputted to the first RM encoder, and (O−1)/2 bits may be allocated as the information data being inputted to the second RM encoder. Alternatively, (O−1)/2 bits may be allocated as the information data being inputted to the first RM encoder, and (O+1)/2 bits may be allocated as the information data being inputted to the second RM encoder.

(3) Among the component carriers, information data corresponding to primary component carriers (primary CCs) may be configured as one group, and information data corresponding to other component carriers (CCs) may be configured as another group. Herein, the primary component carrier may correspond to a component carrier having a most significant index or a least significant index, or may correspond to a predetermined index. Alternatively, a component carrier having a most favorable channel status or having a least favorable channel status may also be configured as the primary component carrier. Furthermore, a component carrier having a largest bit size or a smallest bit size of the information data may be configured as the primary component carrier. And, in the aspects of coding rates and modulation orders, the primary component carrier may be configured by using the same method.

2) Coding Chain when Applying the Dual RM Coding Scheme

(1) Hereinafter, a method for calculating a number of resource elements for allocating coded information data, when applying the dual RM coding scheme, will now be defined. When calculating the number of resource elements, the present invention proposes a method of calculating the number of resource elements by using Equation 1 and Equation 2, based upon the bit size of the whole information data, instead of the bit size of the information data being divided into a plurality of groups. More specifically, when the ACK/NACK and the RI are coded by using the dual RM coding scheme, the number of resource elements being allocated to each RM codeword is allocated by equally the number of resource elements, which is calculated from the given bit size O of the whole information data.

Accordingly, when the number of resource elements Q′ calculated from the given bit size O of the whole information data corresponds to an even number, Q′/2 number of resource elements may be allocated to each codeword, each codeword being generated in accordance with the dual RM coding scheme.

Also, when the number of resource elements Q′ calculated from the given bit size O of the whole information data corresponds to an odd number, (Q′+1)/2 number of resource elements may be allocated to a 1st codeword, which is generated in accordance with the dual RM coding scheme, and (Q′−1)/2 number of resource elements may be allocated to a 2nd codeword, which is also generated in accordance with the dual RM coding scheme. Alternatively, (Q′−1)/2 number of resource elements may be allocated to a 1st codeword, and (Q′+1)/2 number of resource elements may be allocated to a 2nd codeword.

(2) However, in the rate matching step using Equation 4, rate matching, i.e., puncturing may be individually performed on each codeword, each codeword being generated in accordance with the dual RM coding scheme, while matching the number and modulation order of the resource elements, wherein the resource elements are allocated to each codeword as described in 2).

(3) FIG. 20 illustrates a coding chain for dual RM coding according to the second embodiment of the present invention.

Referring to FIG. 20, the coding chain for the dual RM coding according to the present invention may be recapitulated as a method of performing the dual RM coding scheme, which is proposed in the present invention, wherein a single resource element calculation is combined with individual rate matching processes.

More specifically, in case the information data size of the ACK/NACK and the RI is equal to or greater than 12 bits, the dual (32,0) RM coding scheme of the present invention may be applied, and, as described in 1), the whole information data may be grouped and divided into first (1st) information data and second (2nd) information data.

Subsequently, as described in (1) of 2), when calculating the number of resource elements that are to be allocated, the corresponding number of resource elements may be calculated based upon the bit size of the whole information data, instead of the bit size of the information data being divided into a plurality of groups. Then, the calculated number of resource elements is distributed to each RM encoder. Afterwards, rate matching may be performed on the codewords outputted from each encoder, in accordance with the given resource size. Thereafter, the processed data may be concatenated. Furthermore, although an interleaver may be applied to the concatenated data, the interleaver may be omitted in some cases.

3) Method for Deciding the Minimum Number of Resource Elements when Applying the Dual RM Coding Scheme

Meanwhile, as described in the first embodiment of the present invention, in the dual RM coding scheme, a minimum value is also required to be configured in the number of resource elements being allocated to the UCI, i.e., the ACK/NACK or RI. Therefore, in the dual RM coding scheme according to the present invention, the minimum value for the number of resource elements being allocated to the ACK/NACK and the RI may be configured by adding the minimum number of resource elements corresponding to each of the grouped information data bits.

More specifically, if the equations for calculating the minimum number of resource elements respective to O bits of the information data, i.e., Equation 5 to Equation 7 are referred to as f(O) for simplicity, the equation for calculating the minimum number of resource elements that are to be allocated to each codeword, during the dual RM coding process, may correspond to f(O/2). And, the minimum number of resource elements that are allocated to the whole (or entire) ACK/NACK and RI may correspond to f(O/2)+f(O/2). As a simple example, the minimum number of resource elements that are allocated to the 12-bit sized information data corresponds to f(6)+f(6), instead of f(12).

Meanwhile, in case the size of the information data corresponds to an odd number, the size of each information data group that is used for calculating the minimum number of resource elements may be allocated with (O+1)/2 bits for the first codeword and may be allocated with (O−1)/2 bits for the second codeword. Alternatively, the minimum number of resource elements may be allocated with (O−1)/2 bits for the first codeword and may be allocated with (O+1)/2 bits for the second codeword. In this case, the minimum number of resource elements being allocated to the whole ACK/NACK and RI corresponds to f((O+1)/2)+f((O−1)/2) For example, the minimum number of resource elements being calculated for the 13-bit information data corresponds to f(7)+f(6), instead of f(13)

Therefore, Equation 7 may be changed to Equation 12 and Equation 13 shown below.

Q min = 2 × 2 × O 2 Q m = 2 × O Q m ( wherein O is an even number ) [ Equation 12 ] Q min = 2 × O + 1 2 Q m + 2 × O - 1 2 Q m = O + 1 Q m + O - 1 Q m ( wherein O is an odd number ) [ Equation 13 ]

A combination of Equation 12 and Equation 13 may be expressed as Equation 14 shown below.

Q min = 2 × O / 2 Q m + 2 × ( O - O / 2 ) Q m = 2 × O / 2 Q m + 2 × O 2 Q m [ Equation 14 ]

If the whole information data are divided into N number of groups so that the RM coding scheme can be individually applied, and if the size of the information data being inputted during each RM coding process is referred to as Oi, the minimum number of resource elements being allocated to the ACK/NACK and the RI corresponds to

i = 0 N - 1 f ( O i ) .

Meanwhile, among the modulation orders of the transmission block, wherein the PUSCH transmission is performed, Qm may correspond to a lower modulation order. More specifically, when the modulation order of the first transmission block (TB) is QPSK, and when the modulation order of the second TB is 16QAM, Qm is equal to 2, which corresponds to a QPSK value respective to the lower modulation order among the modulation orders of two transmission blocks. Alternatively, Qm may correspond to an average value of the modulation order values of the transmission block, wherein the PUSCH transmission is performed. More specifically, when the modulation order of the first transmission block (TB) is QPSK, and when the modulation order of the second TB is 16QAM, Qm is equal to 3, which corresponds to the average value of the modulation orders of the two transmission blocks. Furthermore, among the modulation orders of the transmission block, wherein the PUSCH transmission is performed, Qm may correspond to a higher modulation order. More specifically, when the modulation order of the first transmission block (TB) is QPSK, and when the modulation order of the second TB is 16QAM, Qm is equal to 4, which corresponds to a 16QAM value respective to the higher modulation order among the modulation orders of two transmission blocks.

When mapping the coded UCI to the PUSCH according to the first embodiment and the second embodiment of the present invention, each of the coded codewords may be mapped to one resource element or to a specific number of resource elements by a virtual carrier order.

When performing sequential mapping, the coded codeword is mapped from a least significant (or lowest) index of the virtual subcarrier in an increasing direction of the index. For example, when performing dual RM coding, the first codeword may be mapped starting from an odd-numbered virtual subcarrier of the least significant index to each odd-numbered virtual subcarrier. And, the second codeword may be mapped starting from an even-numbered virtual subcarrier of the least significant index to each even-numbered virtual subcarrier.

Additionally, a mapping method may also be performed in a time-based order. For example, when the allocated resource elements correspond to the 2nd, 4th, 9th, and 11th symbols, respectively, the first codeword may be mapped to the 2nd and 9th symbols, and the second codeword may be mapped to the 4th and 11th symbols. Alternatively, the first codeword may be mapped to resource elements corresponding to two symbols, and the second codeword may be mapped to resource elements corresponding to the remaining symbols.

FIG. 21 illustrates a block view showing a structure of a communication apparatus according to an embodiment of the present invention.

Referring to FIG. 21, a communication apparatus 2100 includes a processor 2110, a memory 2120, an RF module 2130, a display module 2140, and a user interface module 2150.

The communication apparatus 2100 is an exemplary illustration provided to simplify the description of the present invention. Also, the communication apparatus 2100 may further include necessary modules. Also, in the communication apparatus 2100 some of the modules may be divided into more segmented modules. Referring to FIG. 21, an example of the processor 2110 is configured to perform operations according to the embodiment of the present invention. More specifically, for the detailed operations of the processor 2110, reference may be made to the description of the present invention shown in FIG. 1 to FIG. 20.

The memory 2120 is connected to the processor 2110 and stores operating systems, applications, program codes, data, and so on. The RF module 2130 is connected to the processor 2110 and performs a function of converting baseband signals to radio (or wireless) signals or converting radio signals to baseband signals. In order to do so, the RF module 2130 performs analog conversion, amplification, filtering, and frequency uplink conversion or inverse processes of the same. The display module 2140 is connected to the processor 2110 and displays diverse information. The display module 2140 will not be limited only to the example given herein. In other words, generally known elements, such as Liquid Crystal Display (LCD), Light Emitting Diode (LED), Organic Light Emitting Diode (OLED) may also be used as the display module 2140. The user interface module 2150 is connected to the processor 2110, and the user interface module 2150 may be configured of a combination of generally known user interfaces, such as keypads, touchscreens, and so on.

The above-described embodiments of the present invention correspond to predetermined combinations of elements and features and characteristics of the present invention. Moreover, unless mentioned otherwise, the characteristics of the present invention may be considered as optional features of the present invention. Herein, each element or characteristic of the present invention may also be operated or performed without being combined with other elements or characteristics of the present invention. Alternatively, the embodiment of the present invention may be realized by combining some of the elements and/or characteristics of the present invention. Additionally, the order of operations described according to the embodiment of the present invention may be varied. Furthermore, part of the configuration or characteristics of any one specific embodiment of the present invention may also be included in (or shared by) another embodiment of the present invention, or part of the configuration or characteristics of any one embodiment of the present invention may replace the respective configuration or characteristics of another embodiment of the present invention. Furthermore, it is apparent that claims that do not have any explicit citations within the scope of the claims of the present invention may either be combined to configure another embodiment of the present invention, or new claims may be added during the amendment of the present invention after the filing for the patent application of the present invention.

In the description of the present invention, the embodiments of the present invention have been described by mainly focusing on the data transmission and reception relation between the base station and the terminal (or user equipment). Occasionally, in the description of the present invention, particular operations of the present invention that are described as being performed by the base station may also be performed by an upper node of the base station. More specifically, in a network consisting of multiple network nodes including the base station, it is apparent that diverse operations that are performed in order to communicate with the terminal may be performed by the base station or b network nodes other than the base station. Herein, the term ‘Base Station (BS)’ may be replaced by other terms, such as fixed station, Node B, eNode B (eNB), Access Point (AP), and so on.

The above-described embodiments of the present invention may be implemented by using a variety of methods. For example, the embodiments of the present invention may be implemented in the form of hardware, firmware, or software, or in a combination of hardware, firmware, and/or software.

In case of implementing the embodiments of the present invention in the form of hardware, the method according to the embodiments of the present invention may be implemented by using at least one of Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), processors, controllers, micro controllers, micro processors, and so on.

In case of implementing the embodiments of the present invention in the form of firmware or software, the method according to the embodiments of the present invention may be implemented in the form of a module, procedure, or function performing the above-described functions or operations. A software code may be stored in a memory unit and driven by a processor. Herein, the memory unit may be located inside or outside of the processor, and the memory unit may transmit and receive data to and from the processor by using a wide range of methods that have already been disclosed.

As described above, the method for transmitting control information in wireless communication system and apparatus therefore according to the present invention are advantageous in that, in a wireless communication system, a transmitting end may effectively encode the control information according to the present invention. Also, the method for transmitting control information in wireless communication system and apparatus therefore according to the present invention may be applied to wireless communication systems. Most particularly, the present invention may be applied to wireless mobile communication apparatuses that are used for cellular systems.

The present invention may be realized in another concrete configuration (or formation) without deviating from the scope and spirit of the essential characteristics of the present invention. Therefore, in all aspect, the detailed description of present invention is intended to be understood and interpreted as an exemplary embodiment of the present invention without limitation. The scope of the present invention shall be decided based upon a reasonable interpretation of the appended claims of the present invention and shall come within the scope of the appended claims and their equivalents.

Therefore, it will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the inventions. Thus, it is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents.

Chung, Jaehoon, Han, Seunghee, Lee, Moonil, Ko, Hyunsoo, Jang, Jiwoong

Patent Priority Assignee Title
Patent Priority Assignee Title
10194450, Nov 04 2011 Huawei Technologies Co., Ltd. Method for transmitting control information, user equipment and base station
7165208, Jun 12 2000 Samsung Electronics Co., Ltd. Apparatus and method for encoding and decoding TFCI in a mobile communication system
7331102, Sep 30 2002 NAGANO KEIKI CO., LTD. Apparatus for detecting an amount of strain and method for manufacturing same
7409009, Apr 17 2003 UNIVERSITY OF SOUTHAMPTON Method and apparatus of peak-to-average power ratio reduction
8068548, Sep 08 2010 Huawei Technologies Co., Ltd. Method, apparatus and system for transmitting information bits
8274940, Feb 28 2007 NTT DoCoMo, Inc Base station apparatus and communication control method
8320496, Jan 07 2009 Huawei Technologies Co., Ltd. Encoding method and apparatus
8351370, Aug 14 2007 LG Electronics Inc Method of transmitting scheduling request signal
8369884, Feb 28 2007 NTT DoCoMo, Inc Base station apparatus and communication control method
8588162, Aug 20 2010 LG Electronics Inc. Method for transmitting control information in wireless communication system and apparatus therefor
8599727, Aug 20 2010 LG Electronics Inc. Method for transmitting control information in wireless communication system and apparatus therefor
8619633, Nov 15 2010 Huawei Technologies Co., Ltd. Method for transmitting and receiving uplink control information, terminal, base station
8634365, Apr 29 2010 Telefonaktiebolaget LM Ericsson (publ) System and method for allocating transmission resources
8634367, Jun 21 2010 Telefonaktiebolaget LM Ericsson (publ) System and method for allocating transmission resources
8681719, Oct 22 2010 Qualcomm Incorporated Systems, apparatus and methods for facilitating frequency reuse for downlink control channels
8699435, Apr 30 2010 Telefonaktiebolaget LM Ericsson (publ) System and method for allocating transmission resources
8713415, Feb 25 2010 LG Electronics Inc Method for generating codewords
8750223, Aug 20 2010 LG Electronics Inc. Method for transmitting control information in wireless communication system and apparatus therefor
8848557, Aug 25 2010 Samsung Electronics Co., Ltd. Multiplexing of control and data in UL MIMO system based on SC-FDM
8923222, Aug 20 2010 LG Electronics Inc. Method for transmitting control information in wireless communication system and apparatus therefor
8923240, Aug 20 2010 LG Electronics Inc. Method for transmitting control information in wireless communication system and apparatus therefor
8971197, Apr 01 2011 Industrial Technology Research Institute Method for reporting uplink control information and wireless communication device using the same
8971299, Mar 17 2009 Samsung Electronics Co., Ltd Uplink transmission power control in multi-carrier communication systems
8990656, Nov 17 2010 LG Electronics Inc Method for transmitting uplink control information in a wireless access system and terminal for same
9014057, Nov 15 2010 Huawei Technologies Co. Ltd Method for transmitting and receiving uplink control information, terminal, base station
9036739, Jun 08 2010 Samsung Electronics Co., Ltd. Multiplexing control and data information from a user equipment in MIMO transmission mode
9042232, May 03 2010 Telefonaktiebolaget L M Ericsson (publ) System and method for allocating transmission resources based on a transmission rank
9100155, May 03 2010 Qualcomm Incorporated Method and apparatus for control and data multiplexing in wireless communication
9106398, Aug 20 2010 LG Electronics Inc. Method for transmitting control information in wireless communication system and apparatus therefor
9113459, Aug 20 2010 LG Electronics Inc. Method for transmitting control information in wireless communication system and apparatus therefor
9144065, Dec 16 2011 Samsung Electronics Co., Ltd Communication support for low capability devices
9220091, Nov 10 2010 ZTE Corporation Method and terminal for transmitting uplink control information and method and apparatus for determining the number of coded symbol
9398573, Mar 08 2012 Samsung Electronics Co., Ltd. Transmission of uplink control information for coordinated multi-point reception
9401793, Dec 29 2011 Huawei Technologies Co., Ltd. Method and apparatus for encoding uplink control information
9485784, Sep 23 2008 IDTP Holdings, Inc. Methods and arrangements in a telecommunication system for sending feedback data and user data on a combined feedback and data channel
9591627, May 03 2010 Telefonaktiebolaget LM Ericsson (publ) System and method for allocating transmission resources based on a transmission rank
20050083901,
20060250942,
20090219911,
20090286482,
20120044886,
20120243511,
20130039398,
20140056253,
CN101132230,
CN101682451,
JP2010141906,
TW201018127,
//////
Executed onAssignorAssigneeConveyanceFrameReelDoc
May 23 2011JANG, JIWOONGLG Electronics IncASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0417340590 pdf
May 23 2011LEE, MOONILLG Electronics IncASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0417340590 pdf
May 23 2011CHUNG, JAEHOONLG Electronics IncASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0417340590 pdf
May 23 2011HAN, SEUNGHEELG Electronics IncASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0417340590 pdf
May 23 2011KO, HYUNSOO LG Electronics IncASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0417340590 pdf
Feb 28 2017LG Electronics Inc.(assignment on the face of the patent)
Date Maintenance Fee Events
Jan 09 2023M1552: Payment of Maintenance Fee, 8th Year, Large Entity.


Date Maintenance Schedule
Jul 06 20244 years fee payment window open
Jan 06 20256 months grace period start (w surcharge)
Jul 06 2025patent expiry (for year 4)
Jul 06 20272 years to revive unintentionally abandoned end. (for year 4)
Jul 06 20288 years fee payment window open
Jan 06 20296 months grace period start (w surcharge)
Jul 06 2029patent expiry (for year 8)
Jul 06 20312 years to revive unintentionally abandoned end. (for year 8)
Jul 06 203212 years fee payment window open
Jan 06 20336 months grace period start (w surcharge)
Jul 06 2033patent expiry (for year 12)
Jul 06 20352 years to revive unintentionally abandoned end. (for year 12)