System and method for accommodating more number of users over resource blocks in an uplink transmission
11206165 · 2021-12-21
Inventors
Cpc classification
H04L5/0051
ELECTRICITY
H04L5/10
ELECTRICITY
H04L27/2636
ELECTRICITY
International classification
H04L5/10
ELECTRICITY
H04L25/02
ELECTRICITY
Abstract
A method for accommodating users in an uplink channel is provided. The method comprises a processor for selecting a region of sub carriers in a frequency domain, wherein a channel value of a plurality of users over the selected region varies gradually. The processor is further configured to select the sub carriers within the selected region of sub carriers by skipping the sub carriers by an integer value which is 0 or more than 0. A product of a known sequence and an exponential sequence is transmitting over the selected sub carriers, wherein the exponential sequence is characterized by a cyclic shift value. Further, a base station is configured to perform channel estimation of the users using the received selected sub carriers within the selected region and the processor is also configured to perform data detection for the users over the selected sub carriers using the estimated channel value.
Claims
1. A method for accommodating users in an uplink channel, the method comprising: selecting, by a processor, a region of sub carriers in a frequency domain, wherein channel value of a plurality of users over the selected region varies gradually; selecting, by the processor, sub carriers within the selected region of sub carriers by skipping sub carriers by an integer value which is 0 or more than 0; transmitting over the selected sub carriers, either a product of a known sequence and an exponential sequence for channel estimation or a product of the known sequence and the exponential sequence and a data value for data detection, wherein the exponential sequence is characterized by a cyclic shift value, wherein the cyclic shift value provided to any two users, among the plurality of users, is separated by at least 2w, wherein “w” is a nearest neighbour value and the value of “w” is configurable; performing, by a base station, channel estimation of the users using the received selected sub carriers within the selected region; and performing data detection for the users over the selected sub carriers using the estimated channel value.
2. The method of claim 1, wherein, the integer value is 1 in case of an SRS (Sounding Reference Signal) transmission, wherein the selected region comprises of 8*L.sub.SRS subcarriers, wherein L.sub.SRS is greater than 1.
3. The method of claim 2, wherein the cyclic shift value provided to the plurality of users varies from 0 to (8*L.sub.SRS−1) in SRS transmission.
4. The method of claim 1, wherein, the integer value is 0 in case of a PUCCH Physical Uplink Control Channel) and a PUSCH (Physical Uplink Shared Channel) transmissions, wherein the selected region comprises of 12*L.sub.c subcarriers, wherein L.sub.c is greater than 1.
5. The method of claim 4, wherein the cyclic shift value provided to the plurality of users varies from 0 to (12* L c−1) in the PUCCH and the PUSCH transmissions.
6. The method of claim 1, wherein the value of “w” is such that when a single user with cyclic shift “n.sub.cs” is transmitted and FFT is computed on the selected sub carriers, then probability of value of FFT bin outside (n.sub.cs−w)% A and (n.sub.cs+w)% A being greater than a predetermined percent of the n.sub.cs.sup.th FFT bin is negligible, wherein “A” is the number of selected sub carriers and “%” denotes modulo operator.
7. The method of claim 6, wherein performing the channel estimation for the users, wherein performing the channel estimation for the “i.sup.th” user transmitting using cyclic shift value “n.sub.cs” for one antenna at the base station comprises: multiplying the selected region of the sub carriers by the conjugate of the known sequence; taking FFT of the product; computing channel vector, h.sub.i, of the “i.sup.th” user over the selected region of the sub carriers, wherein, h.sub.i≈Σ.sub.c=−w.sup.wY.sup.((n.sup.
8. The method of claim 1, wherein the known sequence is same for all the users.
9. The method of claim 1, wherein the known sequence is different for plurality of the users.
10. The method of claim 1, wherein maximum number of the users accommodated is
11. The method of claim 1, wherein in case of PUCCH transmission, PUCCH is transmitted over 7 symbols wherein data symbols and DMRS symbols are transmitted over L.sub.c resource blocks, which is 12L.sub.c subcarriers, wherein the data symbols are indexed by a value “b” and the DMRS symbols are indexed by a value “a′”, the data symbols will transmit product of the known sequence of 12L.sub.c values, a data symbol d.sub.b, a constant scalar value
12. The method of claim 11, wherein performing the channel estimation for the users in case of PUCCH transmission, wherein performing the channel estimation for “i.sup.th” user for one antenna at the base station comprises: calculating one scalar value per DMRS symbol, wherein the scalar value is obtained as dot product of two 12L.sub.c×1 vectors, wherein a first of the two vectors is the received signal over 12L.sub.c sub carriers for that DMRS symbol and a second of the two vectors is a 12L.sub.c×1 vector, which is a conjugate of the product of the known sequence and the exponential sequence using cyclic shift ((n.sub.cs+a) %12L.sub.c), where “n.sub.cs” corresponding to cyclic shift value corresponding to the that DMRS symbol for the “i.sup.th” user and “L.sub.c” is greater than 1; calculating “Q” number of scalar values for Q number for the DMRS symbols, wherein Q=3 for a first format and Q=2 for a second format; multiplying the Q number of determined scalar values, Y.sup.(a).sub.DMRS, with their corresponding predefined W.sub.DMRS; adding the obtained Q number of products; dividing the obtained added value by Q to obtain h.sub.i.sup.(a %12Lc) repeating the above steps for a=−w to a=+w; and computing channel vector, h.sub.i, corresponding to the antenna, of the “i.sup.th” user over the selected region of the sub carriers, wherein,
13. The method of claim 12, further comprising data detection using the estimated channel, the data detection comprising: calculating one scalar value per data symbol, wherein the scalar value is obtained as dot product of two 12L.sub.c×1 vectors, wherein a first of the two vectors is the received signal over 12L.sub.c sub carriers for that data symbol and a second of the two vectors is a 12L.sub.c×1 vector, which is a conjugate of the product of the known sequence and the exponential sequence using cyclic shift ((n.sub.cs+a)%12L.sub.c), where “n.sub.cs” corresponding to cyclic shift value corresponding to the that data symbol for the “i.sup.th” user and “L.sub.c” is greater than 1; calculating “D” number of scalar values for D number for the data symbols, wherein D=4 for a first format and D=5 for a second format; multiplying the D number of determined scalar values, Y.sup.(a).sub.data, with their corresponding predefined W.sub.DATA and conjugate of h.sub.i.sup.(a %12Lc) to obtain D number of new scalar values Y.sup.(a)′.sub.DATA; repeating the above steps for a=−w to a=+w; and adding Y.sup.(a)′.sub.DATA for a=−w to a=+w to obtain D number of new scalar values {circumflex over (d)}; wherein {circumflex over (d)} is the estimate of the D data symbols transmitted in one slot of format 2 and the average of {circumflex over (d)} across both the slots for format 1 is the estimate of the lone data symbol transmitted in format 1.
14. The method of claim 12, further comprising data detection using the estimated channel, by ‘B’ number of antennas, the data detection by b.sup.th′ antenna comprising: calculating one scalar value per data symbol, wherein the scalar value is obtained as dot product of two 12L.sub.c×1 vectors, wherein a first of the two vectors is the received signal over 12L.sub.c sub carriers for that data symbol and a second of the two vectors is a 12L.sub.c×1 vector, which is a conjugate of the product of the known sequence and the exponential sequence using cyclic shift ((n.sub.cs+a)%12L.sub.c), where “n.sub.cs” corresponding to cyclic shift value corresponding to the that data symbol for the “i.sup.th” user and “L.sub.c” is greater than 1; calculating “D” number of scalar values for D number for the data symbols, wherein D=4 for a first format and D=5 for a second format; multiplying the D number of determined scalar values, Y.sup.(a,b).sub.DATA, with their corresponding predefined W.sub.DATA and conjugate of h.sub.i.sup.(a %12Lc,b),h.sub.i.sup.(a %12Lc) of the b.sup.th antennae, to obtain D number of new scalar values Y.sup.(a,b)′.sub.DATA; repeating the above steps for a=−w to a=+w; and computing linear combination on Y.sup.(a,b)′.sub.DATA for a=−w to a=+w and b=1 to b=B to obtain D number of new scalar values {circumflex over (d)}; wherein {circumflex over (d)} is the estimate of the D data symbols transmitted in one slot of format 2 and the average of {circumflex over (d)} across both the slots for format 1 is the estimate of the lone data symbol transmitted in format 1.
15. The method of claim 12, further comprising data detection using the estimated channel, by ‘B’ number of antennas, the data detection by b.sup.th′ antenna comprising: calculating one scalar value per data symbol, wherein the scalar value is obtained as dot product of two 12L.sub.c×1 vectors, wherein a first of the two vectors is the received signal over 12L.sub.c sub carriers for that data symbol and a second of the two vectors is a 12L.sub.c×1 vector, which is a conjugate of the product of the known sequence and the exponential sequence using cyclic shift ((n.sub.cs+a) %12L.sub.c), where “n.sub.cs” corresponding to cyclic shift value corresponding to the that data symbol for the “i.sup.th” user and “L.sub.c” is greater than 1; calculating “D” number of scalar values for D number for the data symbols, wherein D=4 for a first format and D=5 for a second format; multiplying the D number of determined scalar values, Y.sup.(a,b).sub.DATA, with their corresponding predefined W.sub.DATA to obtain D number of new scalar values Y.sup.(a,b)′.sub.DATA; repeating the above steps for a=−w to a=+w and b=1 to b=B; and computing linear combination on Y.sup.(a,b)′.sub.DATA for a=−w to a=+w and b=1 to b=B to obtain D number of new scalar values {circumflex over (d)}; wherein {circumflex over (d)} is the estimate of the D data symbols transmitted in one slot of format 2 and the average of {circumflex over (d)}across both the slots for format 1 is the estimate of the lone data symbol transmitted in format 1.
16. The method of claim 1, wherein in case of PUCCH transmission, PUCCH is transmitted over 7 symbols wherein data symbols and DMRS symbols are transmitted over L.sub.c resource blocks, which is 12L.sub.c subcarriers, wherein the data symbols are indexed by a value “b” and the DMRS symbols are indexed by a value “a′”, the data symbols will transmit product of the known sequence of 12L.sub.c values, a data symbol d.sub.b, a constant scalar value
17. The method of claim 16, wherein performing the channel estimation for the users in case of PUCCH transmission, wherein performing the channel estimation for “i.sup.th” user for one antenna at the base station comprises: calculating one scalar value per DMRS symbol, wherein the scalar value is obtained as dot product of two 12L.sub.c×1 vectors, wherein a first of the two vectors is the received signal over 12L.sub.c sub carriers for that DMRS symbol and a second of the two vectors is a 12L.sub.c×1 vector, which is a conjugate of the product of the known sequence and the exponential sequence using cyclic shift ((n.sub.cs+a) %12L.sub.c), where “n.sub.cs” corresponding to cyclic shift value corresponding to the that DMRS symbol for the “i.sup.th” user and “L.sub.c” is greater than 1; calculating “Q” number of scalar values for Q number for the DMRS symbols, wherein Q=3 for a first format and Q=2 for a second format; multiplying the Q number of determined scalar values, Y.sup.(a).sub.DMRS, with their corresponding predefined W.sub.DMRS; adding the obtained Q number of products; dividing the obtained added value by Q to obtain h.sub.i.sup.(a %12Lc); repeating the above steps for a=−w to a=+w; and computing channel vector, h.sub.i, corresponding to the antenna, of the “i.sup.th” user over the selected region of the sub carriers, wherein,
18. The method of claim 17, further comprising data detection using the estimated channel, the data detection comprising: calculating one scalar value per data symbol, wherein the scalar value is obtained as dot product of two 12L.sub.c×1 vectors, wherein a first of the two vectors is the received signal over 12L.sub.c sub carriers for that data symbol and a second of the two vectors is a 12L.sub.c×1 vector, which is a conjugate of the product of the known sequence and the exponential sequence using cyclic shift ((n.sub.cs+a) %12L.sub.c), where “n.sub.cs” corresponding to cyclic shift value corresponding to the that data symbol for the “i.sup.th” user and “L.sub.c” is greater than 1; calculating “D” number of scalar values for D number for the data symbols, wherein D=4 for a first format and D=5 for a second format; multiplying the D number of determined scalar values, Y.sup.(a).sub.data, with their corresponding predefined W.sub.DATA and conjugate of h.sub.i.sup.(a %12Lc) to obtain D number of new scalar values Y.sup.(a)′.sub.DATA; repeating the above steps for a=−w to a=+w; and adding Y.sup.(a)′D.sub.ATA for a=−w to a=+w to obtain D number of new scalar values {circumflex over (d)}; wherein {circumflex over (d)} is the estimate of the D data symbols transmitted in one slot of format 2 and the average of {circumflex over (d)} across both the slots for format 1 is the estimate of the lone data symbol transmitted in format 1.
19. The method of claim 17, further comprising data detection using the estimated channel, by ‘B’ number of antennas, the data detection by bth, antenna comprising: calculating one scalar value per data symbol, wherein the scalar value is obtained as dot product of two 12L.sub.c×1 vectors, wherein a first of the two vectors is the received signal over 12L.sub.c sub carriers for that data symbol and a second of the two vectors is a 12L.sub.c×1 vector, which is a conjugate of the product of the known sequence and the exponential sequence using cyclic shift ((n.sub.cs+a) %12L.sub.c), where “n.sub.cs” corresponding to cyclic shift value corresponding to the that data symbol for the “i.sup.th” user and “L.sub.c” is greater than 1; calculating “D” number of scalar values for D number for the data symbols, wherein D=4 for a first format and D=5 for a second format; multiplying the D number of determined scalar values, Y.sup.(a,b).sub.DATA, with their corresponding predefined W.sub.DATA and conjugate of h.sub.1.sup.(a %12Lc,b)),h.sub.i.sup.(a %12Lc) of the b.sup.th antennae, to obtain D number of new scalar values Y.sup.(a,b)′.sub.DATA; repeating the above steps for a=−w to a=+w; and computing linear combination on Y.sup.(a,b)′.sub.DATA for a=−w to a=+w and b=1 to b=B to obtain D number of new scalar values {circumflex over (d)}; wherein {circumflex over (d)} is the estimate of the D data symbols transmitted in one slot of format 2 and the average of {circumflex over (d)} across both the slots for format 1 is the estimate of the lone data symbol transmitted in format 1.
Description
BRIEF DESCRIPTION OF DIAGRAMS
(1) This disclosure is illustrated by way of example and not limitation in the accompanying figures. Elements illustrated in the figures are not necessarily drawn to scale, in which like references indicate similar elements and in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
(28)
DETAILED DESCRIPTION
(29) I. EXEMPLARY SYSTEM
(30) II. ACCOMMODATING MORE USERS ACROSS L RESOURCE BLOCKS
(31) III. DETERMINATION OF L.sub.min and L.sub.max
(32) IV. CHANNEL ESTIMATION
(33) V. DECODING DATA VALUE FOR PUCCH
(34) VI. PILOT PATTERNS TO MITIGATE ICI
(35) VII. A NEW UPLINK MULTIUSER-MIMO SCHEME
(36) The following detailed description includes references to the accompanying drawings, which form part of the detailed description. The drawings show illustrations in accordance with example embodiments. These example embodiments are described in enough detail to enable those skilled in the art to practice the present subject matter. However, it may be apparent to one with ordinary skill in the art that the present invention may be practised without these specific details. In other instances, well-known methods, procedures and components have not been described in detail so as not to unnecessarily obscure aspects of the embodiments. The embodiments can be combined, other embodiments can be utilized, or structural and logical changes can be made without departing from the scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense.
(37) In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a non-exclusive “or”, such that “A or B” includes “A but not B”, “B but not A”, and “A and B”, unless otherwise indicated.
(38) I. EXEMPLARY SYSTEM
(39) Referring to the figures, a system and method for accommodating more number of users over L resource blocks, wherein L is greater than 1, as compared to a conventional LTE standard in an uplink transmission is provided.
(40) The processor 202 may be configured to receive a transmitted signal from the UEs 210a, 210b, 210c for estimating the channel coefficients ‘h’ for each of the UE 210a, 210b, 210c and various other functions as described in detail below. In an embodiment, processor 202 may include one or more processing units. Processor(s) may be implemented as appropriate in hardware, computer-executable instructions, firmware, or combinations thereof. Computer-executable instruction or firmware implementations of the processor 202 may include computer-executable or machine executable instructions written in any suitable programming language to perform the various functions described.
(41) The memory units/devices 204 may store data and program instructions that are loadable and executable on processor(s) 202 as well as data generated during the execution of these programs. The memory unit 204 may be volatile, such as random-access memory and/or a disk drive or non-volatile memory. The memory unit 204 may comprise of removable memory such as a Compact Flash card, Memory Stick, Smart Media, Multimedia Card, Secure Digital memory, or any other memory storage that exists currently or may exist in the future.
(42) The communication module 206 may interact with the plurality of the UEs 210a, 210b, 210c. The communication module 206 may be configured to receive the transmitted signal from the plurality of UEs 210a, 210b, 210c. The communication module 206 may be further configured to receive the processed data from the processor 202 and communicate aspects of the received data to the plurality of the UEs 210a, 210b, 210c. As an example, the processor 202 may estimate the channel coefficients ‘h’ across RBs for each of the UE 210a, 210b, 210c and the communication module 206 may communicate the channel coefficient to the respective UE's 210a, 210b, 210c. That is to say, the estimated channel coefficient h.sub.1 may be transmitted to UE.sub.1210a, h.sub.2 may be transmitted to UE.sub.2 210b and so on.
(43) II. ACCOMMODATING MORE USERS ACROSS L RESOURCE BLOCKS
(44) Having discussed the architectural configuration of the system 200, the method for accommodating more number of users (UEs) over L resource blocks in the uplink transmission is discussed hereunder.
(45) In an embodiment, referring to
(46)
wherein ‘n.sub.cs’ is cyclic shift or cyclic shift value (n.sub.cs=0, 1, 2, . . . 12L−1), ‘n’ is an index of subcarriers (n=0, 1, 2, . . . 12L−1) and ‘L’ is the number of resource blocks. For multiple users, using the L resource blocks for transmitting the signal, the Zadoff-chu sequence may be constant whereas the cyclic shift sequence may vary for each individual user. For accommodating more number of users, the system 200 may utilize cyclic shift that may be periodic over L resource blocks. Since 1 resource block may be configured to include 12 subcarriers, the cyclic shift may be periodic over 12L subcarriers. (As per conventional LTE standard, the cyclic shift is periodic over 1 resource block or 12 subcarriers). If ‘u’ number of users use 12L subcarriers or L resource blocks, then the number of cyclic shifts provided over L resource blocks may be ‘u’. That is to say, each user may be provided with one cyclic shift for transmission of signal to the base station 208. The cyclic shifts may be calculated using the equation
(47)
From the equation, it can be concluded that the number of cyclic shifts over L resource blocks may be equal to 12L. Hence, theoretically, the number of users that may be accommodated over L resource blocks may be 12L.
(48) In an embodiment, the processor 202 configured in the base station 208 may be configured to receive the uplink signal or data, transmitted by the UE.sub.i, (i.sup.th user or user i) through a channel h.sub.i. That is to say, UE.sub.1 210a may experience h.sub.1, UE.sub.2 210b may experience h.sub.2 and UE.sub.i may experience h.sub.i while transmitting the uplink signal to the base station 208. The channel ‘h’ is due to a wireless air medium through which the signal or data flows across the UE 210a, 210b, 210c and the base station 208. The coefficient of the channel h.sub.i may be constant across a single resource block but may vary gradually across L resource blocks. That is to say, the channel coefficient ‘h’ may be constant over the first resource block but may change for the second resource block. The channel coefficient may be constant for the second resource block but may change for the third resource block and so on. The change of channel coefficient ‘h’ across plurality of resource blocks may be very gradual.
(49)
(50) In an embodiment, if the channel coefficient ‘h’ was constant over L resource blocks, then all the cyclic shifts available over L resource blocks may be provided to the plurality of users. As the channel coefficient ‘h’ is gradually varying over L resource blocks, providing all the cyclic shifts available over L resource blocks for the plurality of users may cause interference between the signals transmitted by the plurality of users. For reducing the signal interference, number of cyclic shifts provided to the plurality of users may be less than the number of cyclic shifts available over L resource blocks. That is to say, some of the cyclic shifts may be skipped while providing the cyclic shifts for the plurality of users. As an example, the zeroth, third, sixth and so on cyclic shifts may be considered. That is to say, 2 cyclic shifts may be skipped in between every provided cyclic shifts.
(51) In an embodiment, the number of cyclic shifts that may be considered or the number of cyclic shifts that may be skipped, for reducing the signal interference, over L resource blocks may be calculated as described below.
(52)
(53) The FFT of the channel h.sub.i may comprise of plurality of bins 302a, 302b, 302c, as depicted in
(54) Referring to
(55) The number of users to be accommodated over L resource blocks may be dependent on the number of cyclic shifts provided to the plurality of users (UEs). As an example, if the cyclic shift is periodic over L resource blocks, then the number of cyclic shifts that may be provided to the plurality of users may be 12L (12 subcarriers×L resource blocks). In such a case, the maximum number of users that can be accommodated over L resource blocks may be 12L users (if ‘h’ is constant over L resource blocks). Practically, such a scenario is not possible as all the cyclic shifts may not be provided to the plurality of users. Hence, the number of users may be less than 12L.
(56) The number of users may be determined from the number of cyclic shifts, a nearest neighbour value ‘w’ and L resource blocks, wherein all the nearest neighbour values ‘w’ may be greater than P % of the largest bin. Referring to
(57) In an embodiment, the number of users ‘u’ that may be accommodated over L resource blocks can be determined using a mathematical expression;
(58)
(59) As an example, let the number of resource blocks be 4 (L=4), then the number of cyclic shifts may be 48. If 2 cyclic shifts may be skipped, then the nearest neighbour value ‘w’=1. If 12 subcarriers may be used for the transmission of the signal, then K=12. Hence, the maximum number of users that may be accommodated over 4 resource blocks may be 16.
(60) As per the conventional LTE standards, maximum number of users may be 12. In an embodiment, as per the above example, the number of users may be 16.
(61) The above described method for calculating the number of user's ‘u’ may be based on determining the nearest neighbour value ‘w’ by applying the Fast Fourier transformation on the slowly varying channel ‘h’ across L resource blocks. The signal ‘S.sub.i’ that may be transmitted by the UE.sub.i, the channel coefficient h.sub.i may not be known at the time of the signal transmission. Since the channel coefficient h.sub.i is not estimated at the time of the signal transmission, practically it may not be possible to apply FFT for channel h.sub.i. Therefore, the FFT may be applied on the received signal ‘y’ (signal received at the base station 208 over L RBs), wherein y=Σ.sub.i=1.sup.i=u(Si∘hi) all in frequency domain (RBs), which is described in detail below. The determination of the number of users to be accommodated over L resource block by applying FFT to the signal ‘y’ is described in detail below with an example, wherein the number of bins is 3.
(62) Consider the signal S.sub.1=f′.sub.1 transmitted by the user 1 (UE.sub.1). f.sub.0 is 1.sup.st column of an A×A IFFT matrix ‘F’, wherein (i,j).sup.th element of the matrix corresponds to
(63)
and 1<i,j<12L and ‘A’=12L is the number of subcarriers in the uplink transmission. The i.sup.th column of F may correspond to f.sub.i−1. We define f′.sub.i=A f.sub.i. The signal received at the base station 208 may be y=(h.sub.i∘f′.sub.1), wherein h.sub.i is the channel through which the signal f′.sub.1 is transmitted to the base station 208, f′.sub.1 is the signal transmitted across 12L subcarriers and ‘∘’ is the Hadamard product of element wise multiplication of two matrixes h.sub.i and f′.sub.1. Since f.sub.1 and h.sub.1 may be transmitted across 12L subcarriers, f′.sub.1 and h.sub.1 may be a 12L×1 matrix. For determining the number of users that may be accommodated over L resource blocks, FFT may be applied to the received signal ‘y’. The received signal ‘y’ after applying FFT is depicted in
(64)
(65)
(66) In the example provided above, since the nearest neighbour value ‘w’ is 1, the number of users that may be accommodated over L resource blocks is
(67)
(68) In an embodiment, when PUCCH (Physical Uplink Control Channel) or PUSCH (Physical Uplink Shared Channel) may be used for the transmission of information, the information may be transmitted over all the 12L.sub.c subcarriers of resource blocks. Then the value of ‘K’ in equation (3) is 12 and thus the equation (3) may be represented as u=12L.sub.c/(2w+1), wherein L.sub.c is the number of resource blocks. That is to say, when the information is transmitted across the PUCCH and PUSCH channels, then the number of users may be u=12L.sub.c/(2w+1). As an example, let the number of resource blocks be 4 (L=4), then the number of cyclic shifts may be 48. If 2 cyclic shifts may be skipped, then the nearest neighbour value ‘w’=1. If 12 subcarriers may be used for the transmission of the signal, then K=12. Hence, the maximum number of users that may be accommodated over 4 resource blocks may be 16.
(69) In another embodiment, when SRS (Sounding Reference Signal) may be transmitted by the uplink users, then the SRS signal is transmitted over alternative subcarriers. The number of subcarriers of the SRS framework per user may be 16L.sub.SRS. During SRS transmission, all the 16L.sub.SRS subcarriers may not be configured to carry the information. The information may be carried by the alternative subcarriers. That is to say, the number of subcarriers configured to transmit the signal may be 8L.sub.SRS (16/2). Therefore, the value ‘K’ in SRS transmission is 8 and thus the equation may be represented as
(70)
wherein L.sub.SRS is greater than 1. As an example, let the number of L.sub.SRS be 3, then the number of cyclic shifts may be 24. If 2 cyclic shifts may be skipped, then the nearest neighbour value ‘w’=1. If 8 subcarriers are used for the transmission of the signal, then K=8. Hence, the maximum number of users that may be accommodated over 4 resource blocks may be 8.
(71) In an embodiment, table 1 provided below represents the number of users that may be accommodated for ETA, EVA and EPA channel for L=50 resource blocks. Since the variation of channel h.sub.i across the resource blocks may be different across different LTE channel models (ETA, EVA and EPA), the value of the nearest neighbour value ‘w’ may also vary for the different LTE channel models. Further, based on the value of the nearest neighbour value ‘w’, the number of users may change accordingly.
(72) TABLE-US-00001 TABLE 1 LTE channel Nearest neighbour Number model value ‘w’ of users ETU 25 12 EVA 10 29 EPA 3 86
(73) Referring to
(74) In an embodiment, an OFDM (Orthogonal Frequency Division Multiplex) symbol transmitted in the uplink transmission may comprise of 2 parts; a data part of ‘N’ samples and a cyclic prefix part of L′ samples. Referring to
(75)
III. DETERMINATION OF L.sub.min and L.sub.max
(76) Having discussed the method for accommodating more number of users (UEs) over L resource blocks in the uplink transmission, the method for determining L.sub.min and L.sub.max is discussed hereunder.
(77) In an embodiment, L.sub.min is the minimum number of resource block for accommodating a given number of users and L.sub.max is the maximum number of resource blocks for accommodating the same number of users, without causing signal interference. Consider the signal S.sub.i transmitted over the channel h.sub.i by the UE.sub.i. If FFT of channel coefficient h.sub.i occupy ‘x’ bins, then the minimum value L.sub.min may be such that an energy in a first nearest neighbour of the largest bin just begin to appear. For the minimum value L=L.sub.min, the number of bins occupying the frequency domain may be ‘x’. As an example, referring to
(78) In an embodiment, the maximum value L.sub.max may be such that the energy in a second nearest neighbour 504a, 504b of the largest bin 502a begin to appear. For the maximum value L.sub.max, the number of bins may be ‘x+2’. As an example, referring to
(79) IV. CHANNEL ESTIMATION
(80) Having discussed the method for determining L.sub.min and L.sub.max, method for estimating channel for the plurality of users, wherein the known sequence transmitted is same for all the users is discussed hereunder.
(81) The signal received at the base station 208 may be the sum of signals transmitted by plurality of users. That is to say, the signal received at the base station 208 may be the sum of signals transmitted by ‘u’ users across 12L subcarriers.
(82) Consider the signals S.sub.1, S.sub.2, S.sub.3 . . . . S.sub.i transmitted by the user 1 (UE.sub.1), user 2 (UE.sub.2), user 3 (UE.sub.3) . . . user i (UE.sub.i) across 12L subcarriers, then the processor 202 may be configured to receive the signal ‘y’ at the base station 208. The received signal ‘y’ may be represented as;
y=Σ.sub.i=1.sup.i=u(Si∘hi) (5) wherein, ‘y’ is a 12L×1 vector of the received signal, ‘S.sub.i’ is the 12L×1 vector of the transmitted signal by the i.sup.th user across 12L subcarriers, ‘h.sub.i’ is the 12L×1 vector of the channel corresponding to the i.sup.th user and ‘∘’ is the Hadamard product or element wise matrix multiplication of S.sub.i and h.sub.i,
(83) Referring to
h.sub.i≈h.sub.i.sup.(0)f.sub.0+h.sub.i.sup.(1)f.sub.1+h.sub.i.sup.(12L−1)f.sub.12L−1+ . . . +h.sub.i.sup.(z)f.sub.z (6)
wherein, h.sub.i.sup.(z) is the value of the FFT of h.sub.i in the Z.sup.th bin.
(84) The number of terms in the equation (6) may depend on the value of L and variation of the channel h. In other words, the equation (6) is dependent on the variation of the channel h across L resource blocks. That is to say, the number of terms in the equation (6) may be dependent on the number of FFT bins of signal ‘y’ when only one user is transmitted. Only the bins of a user whose value is equal to or greater than P % of the largest bin of that user may be considered.
(85) As an example, referring to
(86) Considering yet another example, when FFT of y generates 5 bins, then the channel coefficient h.sub.1 of user 1 may be represented as h.sub.1≈h.sub.1.sup.(0)f.sub.0+h.sub.1.sup.(1)f.sub.1+h.sub.1.sup.(2)f.sub.2+h.sub.1.sup.(12L−2) f.sub.12L−2+h.sub.1.sup.(12L−1) f.sub.12L−1 and
(87) In conventional LTE method, during channel estimation only the first term (h.sub.i.sup.(0)f.sub.0) of equation (6) may be considered and the rest of the terms (h.sub.i.sup.(1)f.sub.1, h.sub.i.sup.(12L−1) f.sub.12L−1, . . . . , h.sub.i.sup.(z)f.sub.z) may not be taken into consideration. That is to say, the channel coefficient h.sub.i for the user i may be h.sub.i=h.sub.i.sup.(0)f.sub.0 as per conventional LTE methods. As an example, the channel coefficient h.sub.1 of the user 1 may be h.sub.1=h.sub.1.sup.(0) f.sub.0, the channel coefficient h.sub.2 of the user 2 may be h.sub.2=h.sub.2.sup.(0)f.sub.0 and so on.
(88) In an embodiment, the processor 202 may be configured to consider all the terms of the equation (6) for channel estimation of the user i. That is to say, the channel coefficient h.sub.i for the user i may be h.sub.i=h.sub.i≈h.sub.i.sup.(0)f.sub.0+h.sub.i.sup.(1)f.sub.1+h.sub.i.sup.(12L−1) f.sub.12L−1+ . . . . +h.sub.i.sup.(z)f.sub.z or some terms of the equation (6) may be considered depending on the channel. As an example, the channel coefficient h.sub.1 of the user 1 may be h.sub.1≈h.sub.1.sup.(0)f.sub.0+h.sub.1.sup.(1)f+h.sub.1.sup.(12L−1)f.sub.12L−1 the channel coefficient h.sub.2 of the user 2 may be h.sub.2≈h.sub.2.sup.(0)f.sub.0+h.sub.2.sup.(1)f.sub.1+h.sub.2.sup.(12L−1) f.sub.12L−1 and so on. Including all the terms for channel estimation improves the quality of the uplink transmission of the signal.
(89) In an embodiment, consider the slowly varying channel h.sub.i, the processor 202 may be configured to process ‘y’ by using an FFT matrix algorithm. When FFT may be applied to the received signal ‘y’, the number of bins of any single user may be ‘x’. Energy of the bins of any user that is less than P % of the largest bin of that user may be not considered. As the number of bins per user is ‘x’, the cyclic shifts provided to the ‘u’ users may be skipped by ‘x−1’. Then the signal transmitted by the user 1, user 2, user 3 and so on may be S.sub.1=f′.sub.1, S.sub.2=f′.sub.1+x, S.sub.3=f′.sub.1+2x and so on respectively. The received signal ‘y’ of equation (5) may be then represented as;
y=(h.sub.1∘f′.sub.1)+(h.sub.2∘f′.sub.1+x)+(h.sub.3∘f′.sub.1+2x)+ . . . (5a)
(90) As an example, referring to
y=(h.sub.1∘f.sub.1)+(h.sub.2∘f′.sub.4)+(h.sub.3∘f′.sub.7)))+ . . . (5a.sub.1)
(91) The channel coefficients of the first user may be estimated from equation (5.sub.a1), equation (6) and the FFT of the received signal ‘y’ (
h.sub.1.sup.(12L−1)=y.sup.(0)
h.sub.1.sup.(0)=y.sup.(1)
h.sub.1.sup.(1)=y.sup.(2) (6a)
wherein, y.sup.(0) is the value of 0.sup.th bin of the FFT of the received signal ‘y’;
(92) y.sup.(1) is the value of 1.sup.st bin of the FFT of the received signal ‘y’ and
(93) y.sup.(2) is the value of 2.sup.nd bin of the FFT of the received signal ‘y’ bin. The channel h.sub.1 over the L RBs may be represented as
h.sub.i≈Σ.sub.c=−w.sup.wY.sup.((n.sup.
(94)
1<i,j<A; as per the above provided example, w=1
(95) Modulo denoted as “%” is a math operation that finds the remainder when one integer is divided by another. In writing, it is frequently abbreviated as mod, or represented by the symbol %. As an example, for any two integers s and t, s mod t=r, where ‘s’ is the dividend, ‘t, is the divisor (or modulus), and ‘r’ is the remainder. That is to say, 3% 8=3 and −1% 8=7. In an embodiment, if the nearest neighbour bins on the left side and the right side of the largest bin 302a are not equal, then the greater number of bins may be considered as ‘w’. As an example, if the number of bins on the left side of the largest bin is 2 and the number of bins on the right side is 3, then the value of ‘w’ may be 3.
(96) The channel coefficients of the second user may be estimated from equation (5.sub.a1), equation (6) and the FFT of the received signal ‘y’ (
h.sub.2.sup.(12L−1)=y.sup.(3)
h.sub.2.sup.(0)=y.sup.(4)
h.sub.2.sup.(1)=y.sup.(5) (6b)
wherein, y.sup.(3) is the value of 3.sup.rd bin of the FFT of the received signal ‘y’;
(97) y.sup.(4) is the value of 4.sup.th bin of the FFT of the received signal ‘y’ and
(98) y.sup.(5) is the value of 5.sup.th bin of the FFT of the received signal ‘y’.
(99) Considering yet another example, referring to
y=(h.sub.1∘f′.sub.2)+(h.sub.2∘f′.sub.7)+(h.sub.3∘f′.sub.12))+ . . . . (5a.sub.2)
(100) The channel coefficients of the first user may be estimated from equation (5.sub.a2) and the FFT of the received signal ‘y’ of. From equation (5.sub.a2) and the FFT of the received signal ‘y’ of, the channel coefficients of the user 1 may be represented as
h.sub.1.sup.(12L−2)=y.sup.(0)
h.sub.1.sup.(12L−1)=y.sup.(1)
h.sub.1.sup.(0)=y.sup.(2)
h.sub.1.sup.(1)=y.sup.(3)
h.sub.1.sup.(2)=y.sup.(4) (6c.sub.1)
wherein, y.sup.(z) is the z.sup.th bin of the FFT of the received signal ‘y’.
(101) The channel coefficients of the second user may be estimated from equation (5.sub.a2) and the FFT of the received signal ‘y’ of. From equation (5.sub.a2) and the FFT of the received signal ‘y’ of, the channel coefficients of the user 2 may be represented as
h.sub.1.sup.(12L−2)=y.sup.(5)
h.sub.1.sup.(12L−1)=y.sup.(6)
h.sub.1.sup.(0)=y.sup.(7)
h.sub.1.sup.(1)=y.sup.(8)
h.sub.1.sup.(2)=y.sup.(9) (6c.sub.2)
wherein, y.sup.(z) is the z.sup.th bin of the FFT of the received signal ‘y’;
V. DECODING DATA VALUE FOR PUCCH
(102) Having discussed the method for estimating channel for the plurality of users, method for decoding data value for PUCCH format 1 and format 2 is discussed hereunder.
(103) A DMRS signal and a data signal may be transmitted by the UEs 210a, 210b and 210c to the base station 208. A PUCCH format may be of 2 types; type 1 and type 2, that is described in detail below.
(104)
(105)
(106) The DMRS signal and the data signal may be transmitted by the UEs 210a, 210b and 210c over ‘L’ resource blocks, wherein L>1 RB. That is to say, the DMRS signal may be transmitted over the DMRS symbols 702c, 702d 702e over the 12L subcarriers.
(107) Referring to
(108) Referring to
(109) Referring to
(110) W.sub.DMRS may be a set of the first complex scalar values which may be the conjugate of w.sub.a′, wherein a′=1, 2, 3 for slot 0 704a and a′=4, 5, 6 for slot 1 704b. The indicator may be an indication of the type of PUCCH format. That is to say, the indicator indicates that the type of PUCCH format is format 1.
(111) Referring to
(112) The inputs Y.sup.(a).sub.DMRS, W.sub.DMRS and an indicator may be fed to the first receiver X.sub.PROP_CE_SLOT 802. The first receiver X.sub.PROP_CE_SLOT 802 may multiply the Q number of Y.sub.DMRS values (3 Y.sub.DMRS for format 1 and 2 Y.sub.DMRS for format 2) with the corresponding W.sub.DMRS (w.sub.a′, wherein a′=1, 2, 3 for slot 0 704a and a′=4, 5, 6 for slot 1 704b for format 1 and a′=1, 2 for slot 0 704c and a′=3, 4 for slot 1 704d for format 2) and may then add the Q number of products. The obtained added value may be then divided by 12*L.sub.c*Q. The first receiver X.sub.PROP_CE_SLOT 802 may run 2w+1 times for each Y.sup.(a).sub.DMRS That is to say, first receiver X.sub.PROP_CE_SLOT 802 may run first time with inputs Y.sup.(1).sub.DMRS, W.sub.DMRS and indicator, second time with inputs Y.sup.(2).sub.DMRS, W.sub.DMRS and indicator and so on till a=−w to +w. As an example, if w=3, then the first receiver X.sub.PROP_CE_SLOT 114a may run 7 times. When Y.sup.(a) DMRS may be the input, the output may be denoted by hi.sup.(a %12L.sub.c), where a=−w to +w may be used to estimate h.sub.i, the ith user channel over 12L subcarriers.
(113) The first receiver X.sub.PROP_CE_SLOT 802 may run maximum of 2w+1 times. If the energy of the bins is less than the P %, the first receiver X.sub.PROP_CE_SLOT 802 may run less than 2w+1 times.
(114) Referring to
(115) For PUCCH format 2, Y.sup.(a).sub.DATA may be a set of 5 scalar values and may be obtained by multiplying the received signal value of the 12L.sub.c subcarriers in each of the data symbols, 702a′, 702c′, 702d′, 702e′ and 702g′ of slot 0 704c and 702h′, 702j′, 702k′, 702l′ and 702n′ of slot 1 704d by the conjugate of corresponding Zadaoff-chu sequence and the exponential sequence indexed by the sum of ‘a’ and the cyclic shift provided to the user and then adding all the 12 values in each of the data symbols. The ‘a’ in Y.sup.(a).sub.DATA may vary from a=−w to +w. The PUCCH format 2 may be set of 5 scalar values as each slot comprises of 5 data symbols. W.sub.DATA may be unity. The indicator may an indication of the type of PUCCH format. That is to say, the indicator indicates that the type of PUCCH format is format 2.
(116) The second receiver X.sub.PROP_DATA_SYM 804 may be configured to comprise maximum of 2w+1 sub receivers X.sub.LTE_DATA_SYM. A first sub receiver X.sub.LTE_DATA_SYM 806a may be fed with the a first set of inputs corresponding to a=−w, a second sub receiver X.sub.LTE_DATA_SYM may be fed with the a second set of inputs corresponding to a=−w+1 and so on and the last sub receiver X.sub.LTE_DATA_SYM 806w may be fed with the a last set of inputs corresponding to a=w. The sub-receivers may multiply the D Y.sup.(a).sub.data scalar values (D=4 for format 1 and D=5 for format 2) wither their corresponding W.sub.DATA (
(117) The outputs, D values of Y.sup.(a)′.sub.data, received from each sub receiver X.sub.LTE_DATA_SYM 806a . . . 806w may be added for a=−w to +w to obtain D number of the data values d={circumflex over (d)}. For PUCCH format 1. the D values may be added to obtain a single estimate of {circumflex over (d)} for all data symbols in that slot. And for format 2, the output may be D=5 {circumflex over (d)} values in each slot as each slot comprises of 5 data symbols and value of d.sub.b may differ in each of the data symbol.
(118)
(119) At step 902, the Y.sup.(a).sub.DMRS, W.sub.DMRS and the indicator may be fed to the first receiver X.sub.PROP_CE_SLOT 802, wherein a=−w to +w. At step 904, the first receiver X.sub.PROP_CE_SLOT 802 may run maximum of 2w+1 times, corresponding to each value of a. As an example, if w=2, then the first receiver X.sub.PROP_CE_SLOT 802 may run 5 times. At step 906, the first receiver X.sub.PROP_CE_SLOT 802 may generate the output h.sup.(a %12L.sub.c)).sub.i, wherein a=−w to +w. The number of outputs generated by the first receiver X.sub.PROP_CE_SLOT 802 may be 2w+1. That is to say, the outputs generated by the first receiver X.sub.PROP_CE_SLOT 802 may be h.sup.(−w % l2L.sub.c).sub.i . . . h.sup.(+w).sub.i. At step 908, the output of the first receiver X.sub.PROP_CE_SLOT 802 along with Y.sup.(a).sub.DATA, W.sub.DATA and the indicator is fed to the second receiver X.sub.PROP_DATA_SYM 804. The first set of data (h.sup.(−w % l2L.sub.c)i, Y.sup.(−w).sub.DATA, W.sub.DATA and the indicator) is fed to the first sub receiver X.sub.LTE_DATA_SYM. 806a, the second set of data (h.sup.((−w+1)%12L.sub.c).sub.i, y.sup.(−w=1).sub.DATA, W.sub.DATA and the indicator) is fed to the second sub receiver X.sub.LTE_DATA_SYM, and so on and the last set of data (h.sup.(+w %12L.sub.c).sub.i, Y.sup.(+w).sub.DATA, W.sub.DATA and the indicator) is fed to the last sub receiver X.sub.LTE_DATA_SYM 806w. At step 910, the outputs from each of the sub receivers X.sub.LTE_DATA_SYM 806a . . . 806w may be added and at step 912 the D data values d may be generated by the second receiver X.sub.PROP_DATA_SYM 804.
(120) In an embodiment, if the base station is configured to comprise of B number of antennas, then the process for a single antennae (as described above) may be repeated for each of the antennae to obtain the output Y.sup.(a′b)′.sub.DATA. That is to say, each of the antennae b=1 . . . b=B may provide the output Y.sup.(a′b)′.sub.DATA. The outputs from each of the antennas may be combined by linear combination of Y.sup.(a′b)′.sub.DATA for a=−w to a=+w and b=1 to b=B to obtain D number of data values {circumflex over (d)}. For PUCCH format 1, the D values may be added to obtain a single estimate of d for all data symbols in that slot. And for format 2, the output may be D=5 {circumflex over (d)} values in each slot as each slot comprises of 5 data symbols and value of d.sub.b may differ in each of the data symbol. In an embodiment, if the base station is configured to comprise of B number of antennas, then the process for a single antennae (as described above) may be repeated for each of the antennae to obtain the output Y.sup.(a′b)′.sub.DATA, wherein to obtain Y.sup.(a′b)′.sub.DATA, h.sub.i.sup.(a %12L.sub.c) for the b.sup.th may be unity. That is to say, each of the antennae b=1 to b=B may provide the output Y.sup.(a′b)′.sub.DATA. The outputs from each of the antennas may be combined by linear combination of Y.sup.(a′b)′.sub.DATA for a=−w to a=+w and b=1 to b=B to obtain D number of data values {circumflex over (d)}. For PUCCH format 1, the D values may be added to obtain a single estimate of {circumflex over (d)} for all data symbols in that slot. And for format 2, the output may be D=5 d values in each slot as each slot comprises of 5 data symbols and value of d.sub.b may differ in each of the data symbol.
(121) Having discussed the method for decoding data value for PUCCH format 1 and format 2, method for estimating channel for the plurality of users, wherein the known sequence transmitted is different for the plurality of users is discussed hereunder.
(122) Referring to
(123)
Here we assume the users to be transmitting over L RBs.
(124) Considering N subcarriers, the processor 202 may be configured to compute Y.sub.1 and Y.sub.2 by using FFT matrix algorithm. A vector Y.sub.F may be obtained by vector multiplication of conjugate of their data bits with the received signals over N subcarriers. Y.sub.F is a column vector which is represented in such a way Y.sub.1 and Y.sub.2 form a 2×1 block column matrix.
(125) The channel values for the first user equipment across subcarriers 1, 2 . . . N may be a, b . . . d respectively. Likewise, channel values for a second user equipment across subcarriers 1,2 . . . N may be a′, b′ . . . d′. In LTE, a Resource Block has N=12 subcarriers. If we consider two Resource blocks, then we have N=24 subcarriers. For L RBS, N=12L. As an example, if one user equipment is transmitting through a set of subcarriers and if another user transmits across the same set of subcarriers which means at each subcarrier, we have sum of the transmission by the two user equipment's.
(126) At step 1002, a first user equipment may transmit symbols across subcarriers 1, 2 . . . N. Likewise, the second user equipment may transmit symbols across subcarriers 1, 2 . . . N. At step 704, the received signal at subcarriers 1, 2 . . . N may be denoted as Y=h.sub.0.Math.d.sub.1+h.sub.2.Math.d.sub.2+n where .Math. represents element by element multiplication of two vectors. The symbols across N subcarriers for first user may be stacked into a vector which is denoted as d.sub.1. Similarly, for the second user equipment these symbols may be stacked into a vector which is denoted as d.sub.2. Let the channel values for the first user equipment across subcarriers 1, 2 . . . N are a, b . . . d respectively and are stacked into a channel vector h.sub.i. Similarly, the channel values for the second user equipment across subcarriers 1, 2 . . . N are a′, b′ . . . d′ respectively and stacked into a channel vector h.sub.2. The processor 202 may be configured to estimate the channel values for the first and the second user equipment represented by h.sub.i and h.sub.2 respectively on the received signal Y where the channel values of the first equipment i.e. (a, b . . . d) and the second user equipment i.e. (a′, b′, . . . d′) varies slowly across the subcarriers 1, 2, . . . N. The algorithm for estimating the channel values in such scenarios is discussed in detail.
(127) At step 1004, the processor 202 may be configured to compute the FFT of the N×1 subcarrier matrix for all the users. Let the FFT matrix function be denoted as F′. At step 1004, the processor 202 computes signals Y.sub.1 and Y.sub.2 using the FFT algorithm, by using the received signal “Y” across the
(128) subcarriers of the base Y.sup.1=F′*(Y.Math.d.sub.1*)
(129) station 208. Y.sub.1 and Y.sub.2 are provided below.
Y.sub.2=F′*(Y.Math.d.sub.2*)
where d.sub.1*and d.sub.2*corresponds to conjugate of the data symbols transmitted by the first user equipment and the second user equipment respectively. d.sub.1 and d.sub.2 are assumed to be unit valued complex values.
(130) At step 1006, the signals Y.sub.1 and Y.sub.2 computed in the previous step may be aligned as 2×1 block column matrices comprising Y.sub.1 and Y.sub.2. The output of this column matrix be denoted as Y.sub.F which is expressed below.
(131)
(132) At step 1008, obtained column vector Y.sub.F may be represented in terms of block diagonal matrices F.sub.1, F.sub.2 and λ where the matrices can be represented as given below.
Y.sub.F=F.sub.1*λ*F.sub.2*H
(133)
where F.sub.1, F.sub.2 and λ are block diagonal matrices wherein element
(134)
is along diagonal for the F.sub.1 matrix and element F′ is along diagonal for the F.sub.2 matrix. λ is a block diagonal matrix wherein the sub blocks not along main diagonals are obtained by element by element multiplication of the data symbol transmitted by second user equipment d.sub.2 to the conjugate of the symbol d.sub.1 transmitted by the first user. Identity matrix is along the diagonals of the block diagonal matrix of λ. The bar on d.sub.1.Math.d.sub.2* is representation of the block matrix wherein first element obtained by the computation is not altered but remaining elements thus obtained by the computation are flipped, such that, last element of the matrix occupies the second place and thereby arranged in decreasing order of the column number it has occupied. As an example, if vector
(135)
where the second element of the matrix is flipped till the last element of the matrix whereas the first element of the matrix is not altered. Similarly,
H′.sub.1=F′h.sub.1 and H′.sub.2=F′h.sub.2.
At step 1010, we compute Z.sub.1=F.sub.1*λ*F.sub.2
(136) The rank of Z.sub.1 is N. So, we select appropriate columns of Z.sub.1 and call it Z.sub.2 so that Z.sub.2 is full column rank. For instance, using “w’ the nearest neighbour, if w=1 and N=4, we select 1.sup.st, 2.sup.2, 4.sup.th, 5.sup.th, 6.sup.th, 8.sup.th columns of Z.sub.1 and assign to Z.sub.2. Let the 1.sup.st, 2.sup.nd, 4.sup.th, 5.sup.th, 6.sup.th, 8.sup.th rows of H be selected and represented a H.sub.2. We can approximate Y.sub.F as Y.sub.F=Z.sub.2H.sub.2. we can similarly generalize for any ‘w’ and N.
(137) At step 1012, H.sub.2 is estimated as:
H.sub.2=(Z.sub.2.sup.HZ.sub.2).sup.−1Z.sub.2.sup.HY.sub.F Where (Z.sub.2.sup.HZ.sub.2).sup.−1Z.sub.2.sup.H is pseudo-inverse of Z.sub.2.
(138) At step 1014, the channel value H.sub.2 may be represented as the 2×1 block column matrix with H.sub.21 (first 3 rows of H.sub.2 for w=1) and H.sub.22 (the last three rows of H.sub.2 for w=1) as the elements of the block column matrix to compute the channel value h.sub.1 and h.sub.2 of the first user equipment and the second user equipment respectively which may be expressed as shown below.
(139)
h.sub.1 and h.sub.2 are the required channel values for the first user equipment and the second user equipment respectively estimated over the N subcarriers of the LTE system. Here F′.sup.H(:,x) means selecting all rows of F′.sup.H and selected columns are denoted by x, where x=1,2, . . . , w+1, N−w+1, N, N+1, . . . , N+1+w, 2N−w+1, . . . , 2N. In the example above, w=11, N=4, x=[1,2,4,5,6,8,];
VI. PILOT PATTERNS TO MITIGATE ICI
A. Conventional Solution and Problem Statement
(140) In uplink MU-MIMO, orthogonal pilot patterns are transmitted across a resource block or RB (the quantity
(141)
This is the conventional scheme>ICI or inter-carrier interference occurs due to a frequency offset, phase noise or Doppler spread associated with movement of user equipment (UE). But if one of the users suffers from inter-carrier interference or ICI, that affects channel estimation and data detection of all the users using the same resource block. Can we design pilot patterns that are immune to a rogue user introducing ICI, such that all users can still estimate their channel and detect data without interference? Such a pilot pattern is presented in this section.
B. Possible Use Case
(142) A possible use case is described here and is similar to the interference-aware detection described above. Referring to
(143) C. Design of Pilot Patterns
(144) For simplicity, we neglect the Zadaoff-Chu sequences in the description without loss of generality. We assume two UEs each with a single antenna transmitting to N.sub.R receive antennas of the base station (BS). The second UE is impaired by intercarrier interference (ICI). Let the ICI be limited to W neighbouring subcarriers. Without loss of generality, we assume W=1 henceforth. We define then following quantities. The a.sup.th element of a vector x is denoted by x(a). The last element of a is a(end) (just as in Matlab). If x=[1, 2, 3, 4] and a, b are two scalars, then a new concatenated vector x.sub.1=[a×b] is x.sub.1=[a, 1, 2, 3, 4, b]. In general, we follow the Matlab notation for accessing and concatenation of vectors. The pilot pattern over one RB for the ith user is denoted by 12×1 vector g.sub.i. This is over 12 subcarriers. The proposed pilot pattern is shown in
g.sub.i=[g.sub.i(end)g.sub.i.sup.Tg.sub.i(1)].sup.T (8) The channel over the 12+2W=14 subcarriers associated with i.sup.th user and the j.sup.th antenna of the BS is denoted by h.sub.ij. The N.sub.R×1 vector h.sub.i denotes the vector of channels over the k.sup.th subcarrier in the RB (note that the channel is assumed constant across the 12+2W=14 subcarriers) and is associated with the i.sup.th user and N.sub.R antennas of the BS. The symbol transmitted by the i.sup.th user on this subcarrier is d.sub.i,k.
D. Channel Estimation
(145) We discuss channel estimation of the first UE only. In the actual patent, we will discuss the channel estimation of the second UE as well, which has ICI. The ICI at the kth subcarrier due to the (k+1).sup.st subcarrier will be called as the left-ICI. Likewise, the ICI at the (k+1).sup.st subcarrier due to the kth subcarrier will be called as the right-ICI. Let the received signal across the RB in the observation window of the first antenna be denoted by y1. Let us examine the tenth subcarrier on the first antenna of the BS. We have;
y.sub.1(10)=h.sub.11g.sub.1(10)+h.sub.21g.sub.2(10)+h.sub.21.sup.(−1)g.sub.2(11)+h.sub.21.sup.(1)g (9)
(146) where h.sub.21.sup.=(−1) and h.sub.21.sup.(1) are due to the left-ICI and right-ICI, respectively. Furthermore, we have
h.sub.21.sup.(1)=ψ.sup.(1)h.sub.21 and h.sub.21.sup.(−1)=ψ.sup.(−1)h.sub.21 (10)
The effect of the left-ICI is that we observe the vector g.sub.2.sup.(−1) associated with ICI in the observation window and it is defined as
g.sub.2.sup.(−1)=[g.sub.2(2: end).sup.Tg.sub.2(1)].sup.T (11)
which essentially is a cyclic left shift of g.sub.2. Similarly, the effect of the right-ICI is that we observe the vector g.sub.2.sup.(1) associated with ICI in the observation window and it is defined as
g.sub.2.sup.(1)=[g.sub.2(12)g.sub.2(1:end−1).sup.T].sup.T (12)
which essentially is a cyclic right shift of g.sub.2. The vector-version of (9) across all subcarriers in the observation window of the RB is
y.sub.1=h.sub.11g.sub.1+h.sub.21g.sub.2+ψ.sup.(1)h.sub.21g.sub.2.sup.(1)+ψ.sup.(−1)h.sub.21g.sub.2.sup.(−1) (13)
The orthogonal codes gi within the observation window are rows of IFFT matrix. IFFT matrix has this property that all rows/columns are orthogonal to one another. This means that g.sub.1 and g.sub.2 are orthogonal and g.sup.H.sub.1g.sub.2=0. The IFFT matrix has another property, that a cyclically shifted version of one row is orthogonal to any cyclically shifted version of another row. This means
g.sub.1.sup.Hg.sub.2=g.sub.1.sup.Hg.sub.2.sup.(1)=g.sub.1.sup.Hg.sub.2.sup.(−1)=0 (14)
which enables estimating the channel of the first user from (13) as
(147)
E. Data Detection
(148) We discuss data detection of the first UE only. In the actual patent, we will discuss the data detection of the second UE as well, which has ICI. The received-signal equation across all NR antennas of the BS for the kth subcarrier is given as:
Y.sup.(k)=h.sub.1d.sub.1,k+h.sub.2d.sub.2,k+ψ.sup.(1)h.sub.2d.sub.2,k−1+ψ.sup.(−1)h.sub.2d.sub.2,k+1 (16)
If h.sub.1 and h.sub.2 are orthogonal to one another, d.sub.2,k−1, d.sub.2,k and d.sub.2,k+1 do not interfere with detection of d.sub.1,k when it is detected as:
d.sub.1,k=h.sub.1.sup.Hy.sup.(k) (17)
Even if h.sub.1 and h.sub.2 are not exactly orthogonal but close to being orthogonal we get very good performances. A low-complexity user selection algorithm presented in [1] can help find almost orthogonal users. Even if number of users is as less as 8-10 users, we can still find users being close to orthogonality and an interference rejection combiner [1] can get results as good as the orthogonal case.
VII. A New Uplink Multiuser-Mimo Scheme
A. Problem Statement
(149) Consider
y=H.sub.1p.sub.1d.sub.1+H.sub.2p.sub.2d.sub.2+H.sub.3p.sub.3d.sub.3+H.sub.4p.sub.4d.sub.4 (1)
Equation (1) can be rewritten with effective channels as:
y=ĥ.sub.1d.sub.1+
If all
{circumflex over (d)}=
with SNR
(150)
as
(151) So, we are solving two problems here 1) How to design precoders p.sub.1, p.sub.2, p.sub.3 and p.sub.4 such that all effective channels
B. Shortcomings of Conventional Solution
(152) In conventional solution, a single UE, say UE1 with 4×4 channel matrix H.sub.1 can transmit up to four spatial streams using singular value decomposition of H.sub.1 as U.sub.1S.sub.1V.sub.1.sup.H=H.sub.1. Here the diagonal elements of the diagonal matrix S.sub.1 are s.sub.11, s.sub.12, s.sub.13 and s.sub.14. There are chances of all the columns of H1 being highly correlated in which case this scheme has drawbacks with the number of spatial streams it can send. The proposed solution then is more effective, as the channels are associated with different UEs and will be uncorrelated always.
(153) C. Choice of UE's Number of Transmit Antennas
(154) Conventionally, a smartphone that acts as an UE will only have 2 transmit antennas, for reasons of battery usage and space limitations. But we are discussing of 4 transmit antennas per UE in this work. We present below at least two use cases where an UE can have more than two transmit antennas. In [2], it is mentioned that there are use cases where the number of transmit antennas of an UE could be greater than two. Refer
D. Proposed Solution on Orthogonality
(155) We will design precoders for UEs 1, 2, 3 and 4 in that order in this section. 1) Precoder p.sub.1 is designed such that SNR of first UE is maximized as per (4). p.sub.1 is designed such that
p.sub.1.sup.HH.sub.1.sup.HH.sub.1p.sub.1 (5) is maximized and as per Rayleigh Quotient [1] when p1 is the eigenvector corresponding to the maximum eigenvalue of H.sub.1.sup.H H.sub.1. 2) We design p.sub.2 such that
(156)
(157)
E. Proposed Solution on Maximizing Snr In Section D, Enumerated Item 1, we considered the first UE. We in fact can select the UE whose value computed as per (5) is the highest as the first UE. In Section III, Enumerated Item 2, for UE 2, the precoder p2 can be from null space of X.sub.2=
X.sub.2p.sub.2=0 (8)
And maximizes
P.sub.2.sup.HH.sub.2.sup.HH.sub.2p.sub.2 (9)
is maximized.
(158) One way of doing the above is as follows Let the singular value decomposition of H.sub.2 be U.sub.2S.sub.2V.sup.H with columns of V.sub.2 as v.sub.21, v.sub.22, v.sub.23 and v.sub.24. This is also the eigenvectors of H.sub.2.sup.HH.sub.2. Note that the eigenvector v.sub.21, v.sub.22, v.sub.23 and v.sub.24 are associated with eigenvalues in decreasing order. Since the dimension of null space of X.sub.2 is three, any three of v.sub.21, v.sub.22, v.sub.23 and v.sub.24 will be present in null space X.sub.2. We choose the eigenvector that is present in null space of X.sub.2 that corresponds to the maximum eigenvalue of H.sub.2.sup.HH.sub.2 as p.sub.2. For example, if v.sub.22, v.sub.23 and v.sub.24 are present in null space of X.sub.2, then p.sub.2=v.sub.22. The precoder for UE 3 is designed accordingly from null space of X.sub.3 which has a dimension 2. Precoder for UE 4 is just the null column vector of X.sub.4.
F. User Selection
(159) User selection can be done in two ways to help improve the overall spectral efficiency of the system In Section D, Enumerated Item 1, we selected UE 1 as the first UE. We could have as well selected the UEs 2, 3 and 4 as the first UE. At this stage we could select the best UE instead of the UE 1. This way we could select the best candidate UE at each stage in Section III. In Section D, Enumerated Item 2, we selected UE 2 as the second UE. We could have as well selected the UE 3 and UE 4 as the second UE. At this stage we could select the best UE instead of the UE 2. This way we could select the best candidate UE at each stage in Section III. This work deals with 4 UEs. If we had N UEs, we could select 4 UEs in
(160)
ways and that will further increase the spectral efficiency.
G. Other Scenarios
(161) We had 4 UEs, with four antennas transmitting to a BS with 4 antennas and each UE transmitted one spatial stream. Other combinations are possible. Three UEs with four transmit antennas, the first UE transmitting two spatial streams and second and third UE transmitting one spatial stream each.
(162) It should be understood that the capabilities of the invention described in the present disclosure and elements shown in the figures may be implemented in various forms of hardware, firmware, software, recordable medium or combinations thereof.
(163) Although embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the system and method described herein. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
(164) Many alterations and modifications of the present invention will no doubt become apparent to a person of ordinary skill in the art after having read the foregoing description. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. It is to be understood that the description above contains many specifications, these should not be construed as limiting the scope of the invention but as merely providing illustrations of some of the personally preferred embodiments of this invention. Thus, the scope of the invention should be determined by the appended claims and their legal equivalents rather than by the examples given.