Information adding method and apparatus
11218250 · 2022-01-04
Assignee
Inventors
Cpc classification
H04L1/0072
ELECTRICITY
H03M13/09
ELECTRICITY
H04W72/23
ELECTRICITY
H04L61/30
ELECTRICITY
International classification
H04L1/00
ELECTRICITY
Abstract
An information adding method and apparatus, to increase a quantity of terminals that can be represented by an identifier sequence. The method includes: performing, by a transmit end, polar code encoding on a first bit sequence to generate an encoded second bit sequence; adding, by the transmit end, a part or all of an identifier sequence to the second bit sequence to generate a third bit sequence, where the identifier sequence is used to identify a terminal; and sending, by the transmit end, the third bit sequence.
Claims
1. An information adding method, comprising: obtaining, by a transmit end, to-be-encoded information bits and performing check encoding on the information bits to obtain check bits; adding, by the transmit end, all of an identifier sequence to the check bits or adding, by the transmit end, a first part of the identifier sequence to the check bits; generating, by the transmit end, a first bit sequence based on the information bits and the check bits carrying the identifier sequence; performing, by the transmit end, polar code encoding on the first bit sequence to generate an encoded second bit sequence; adding, by the transmit end, a part or all of the identifier sequence to the second bit sequence to generate a third bit sequence, wherein the identifier sequence is used to identify a terminal; and outputting, by the transmit end, the third bit sequence, wherein determining that the transmit end adds the first part of the identifier sequence to the check bits, the adding, by the transmit end, of the part or all of the identifier sequence to the second bit sequence comprises: adding, by the transmit end, a second part of the identifier sequence to the second bit sequence, wherein the first part differs from the second part, or the first part and the second part have an intersection set.
2. The method according to claim 1, wherein the adding, by the transmit end, of the part or all of the identifier sequence to the second bit sequence to generate a third bit sequence comprises: performing, by the transmit end, a scrambling operation on the second bit sequence by using the part or all of the identifier sequence; to generate the third bit sequence.
3. The method according to claim 2, wherein the performing, by the transmit end, of the scrambling operation on the second bit sequence by using the part or all of the identifier sequence comprises: performing, by the transmit end, the scrambling operation on a part or all of the second bit sequence by using the part or all of the identifier sequence.
4. The method according to claim 2, wherein the performing, by the transmit end, of the scrambling operation on the second bit sequence by using the part or all of the identifier sequence comprises: scrambling, by the transmit end, the second bit sequence by using the part or all of the identifier sequence based on a specified mapping relationship.
5. The method according to claim 4, wherein the scrambling, by the transmit end, of the second bit sequence by using the part or all of the identifier sequence based on a specified mapping relationship comprises: sequentially scrambling, by the transmit end, the second bit sequence by using the part or all of the identifier sequence through several times of repetition.
6. The method according to claim 1, wherein the adding, by the transmit end, of the part or all of the identifier sequence to the second bit sequence to generate a third bit sequence comprises: performing, by the transmit end, an interleaving operation on the second bit sequence in interleaving mode to generate the third bit sequence, wherein the interleaving mode is determined by the part or all of the identifier sequence.
7. An information adding apparatus, comprising: a non-volatile memory, configured to store an instruction; and a processor, configured to execute the instruction to: obtain to-be-encoded information bits, and perform check encoding on the information bits, to obtain check bits; add all of an identifier sequence to the check bits, or add a first part of the identifier sequence to the check bits; generate a first bit sequence based on the information bits and the check bits carrying the identifier sequence; perform polar code encoding on the first bit sequence to generate an encoded second bit sequence; add a part or all of an identifier sequence to the second bit sequence to generate a third bit sequence, wherein the identifier sequence is used to identify a terminal; and output the third bit sequence; and add a second part of the identifier sequence to the second bit sequence determining that the processing unit adds the first part of the identifier sequence to the check bits, wherein the first part differs from the second part, or the first part and the second part have an intersection set.
8. The apparatus according to claim 7, wherein the adding of the part or all of the identifier sequence to the second bit sequence comprises: performing a scrambling operation on the second bit sequence by using the part or all of the identifier sequence, to generate the third bit sequence.
9. The apparatus according to claim 8, wherein the scrambling comprises: performing the scrambling operation on the part or all of the second bit sequence by using the part or all of the identifier sequence.
10. The apparatus according to claim 8, wherein the scrambling comprises: scrambling the second bit sequence by using the part or all of the identifier sequence based on a specified mapping relationship.
11. The apparatus according to claim 10, wherein the scrambling comprises: sequentially scrambling the second bit sequence by using the part or all of the identifier sequence through several repetitions.
12. The apparatus according to claim 7, wherein the processor is further configured to: perform an interleaving operation on the second bit sequence in interleaving mode to generate the third bit sequence, wherein the interleaving mode is determined by the part or all of the identifier sequence.
13. A computer readable non-transitory storage medium, configured to store a computer program, wherein the computer program comprises an instruction, wherein the instruction causes an information adding apparatus to: obtain to-be-encoded information bits, and perform check encoding on the information bits, to obtain check bits; add all of an identifier sequence to the check bits, or add a first part of the identifier sequence to the check bits; generate the first bit sequence based on the information bits and the check bits carrying the identifier sequence; perform polar code encoding on the first bit sequence to generate an encoded second bit sequence; add a part or all of the identifier sequence to the second bit sequence to generate a third bit sequence, wherein the identifier sequence is used to identify a terminal; and output the third bit sequence; and add a second part of the identifier sequence to the second bit sequence determining that the processing unit adds the first part of the identifier sequence to the check bits, wherein the first part differs from the second part, or the first part and the second part have an intersection set.
14. The computer readable non-transitory storage medium according to claim 13, wherein the adding of the part or all of the identifier sequence to the second bit sequence to generate a third bit sequence comprises: performing a scrambling operation on the second bit sequence by using the part or all of the identifier sequence, to generate the third bit sequence.
15. The computer readable non-transitory storage medium according to claim 14, wherein the performing of the scrambling operation on the second bit sequence by using the part or all of the identifier sequence comprises: performing the scrambling operation on a part or all of the second bit sequence by using the part or all of the identifier sequence.
16. The computer readable non-transitory storage medium according to claim 14, wherein the performing of the scrambling operation on the second bit sequence by using the part or all of the identifier sequence comprises: scrambling the second bit sequence by using the part or all of the identifier sequence based on a specified mapping relationship.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
DESCRIPTION OF EMBODIMENTS
(18) The following describes in detail the embodiments with reference to accompanying drawings.
(19) A polar code encoding scheme features high performance, relatively low complexity, flexible matching, and the like, and has been determined as a control channel encoding scheme in a 5th generation (5G) communications system by the 3rd generation partnership project (3GPP). The embodiments provide an information adding method and apparatus. An identifier sequence used to identify a terminal is added to an encoded polar code. It is assumed that a code length of the encoded polar code is N bits, where N is a positive integer. Compared with LTE, in which 16 CRC bits are scrambled by using a PDCCH identifier sequence, in the embodiments a length of the carried identifier sequence is not limited to 16 bits. The length of the identifier sequence may be extended to a maximum of N bits, and the quantity of terminals that can be identified by the N-bit identifier sequence is increased to 2.sup.N. According to the solutions in the embodiments, a polar code has low hardware overheads, thereby resolving a problem of an insufficient length of an identifier sequence in an existing system. The length of the identifier sequence is increased, so that the quantity of terminals that can be identified by the identifier sequence is also increased, thereby better meeting a requirement of a future massive access scenario. It should be noted that the solutions in the embodiments are described with reference to an example of a polar code encoding scheme, but the method provided in the embodiments may be further applied to other encoding schemes such as a low-density parity-check code (LDPC) encoding scheme and a turbo code encoding scheme. Provided that an encoded code word is used to carry the identifier sequence, the encoding schemes shall fall within the protection scope of the embodiments.
(20) To better understand the solutions in the embodiments, the following briefly describes the polar code channel encoding scheme.
(21) The polar code encoding scheme may be represented by using the following formula: x=u.Math.F.sub.n, where u is an N-bit binary vector, and F.sub.n is Kronecker power transformation matrix, and is also a polar code encoding matrix.
(22)
and is a product of 2×2 matrices
(23)
(24) In the embodiments, after the foregoing encoding, the identifier sequence used to identify the terminal is added to the encoded bit sequence. The encoded bit sequence carrying the identifier sequence is modulated, then passes through a noise channel, and then is output.
(25) As shown in
(26) In the embodiments, an identifier sequence is used by the base station to identify different terminals. For example, the identifier sequence may be an RNTI sequence, a sequence number of a terminal, a group number of a terminal group, or the like. Without loss of generality, the RNTI is used as an example for description.
(27) Based on the system architecture shown in
(28) In step 401, the transmit end performs polar code encoding on a first bit sequence, to generate an encoded second bit sequence.
(29) In a possible implementation, the first bit sequence is a bit sequence obtained by the base station before the polar code encoding. The transmit end first obtains to-be-encoded information bits, and performs check encoding on the to-be-encoded information bits, to obtain check bits. The check bits may be used to carry an identifier sequence. Optionally, all of the identifier sequence is carried in the check bits, or a first part of the identifier sequence is carried in the check bits. The transmit end serially cascades the information bits and the check bits carrying all or a part of the identifier sequence, to generate the first bit sequence.
(30) This embodiment does not limit a check encoding scheme. For example, the check encoding scheme may be CRC check scheme, where check bits are CRC bits, and all CRC bits are attached to the end of an information bit sequence. Alternatively, some CRC bits are inserted into an information bit sequence in a distributed manner, and some CRC bits are attached to the end of the information bit sequence. In another example, the check encoding scheme may be a parity check (PC) scheme, where PC bits are used in an information bit sequence, so that some information bits previous to the PC bits satisfy a check relationship, or the PC bits may alternatively be placed at the end of the information bit sequence. In another example, the check encoding scheme may be a hash check scheme.
(31) In step 402, the transmit end adds a part or all of the identifier sequence to the second bit sequence, to generate a third bit sequence.
(32) The second bit sequence may be a sequence on which rate matching is performed, or may be a sequence on which no rate matching is performed. If the second bit sequence is a sequence on which no rate matching is performed, after adding the part or all of the identifier sequence to the second bit sequence, the transmit end further needs to perform rate matching on the second bit sequence carrying the identifier sequence, to generate the third bit sequence.
(33) For example, if the transmit end has already added all of the identifier sequence to the check bits, the transmit end may further add all of the identifier sequence to the second bit sequence.
(34) For another example, the transmit end adds the first part of the identifier sequence to the check bits, and the transmit end adds a second part of the identifier sequence to the second bit sequence, where the first part differs from the second part, or the first part and the second part have an intersection set.
(35) The identifier sequence may be added in, but not limited to, through scrambling and an interleaving operation.
(36) If the identifier sequence is added through scrambling, the transmit end may perform a scrambling operation on a part or all of the second bit sequence by using the part or all of the identifier sequence. In addition, the scrambling manner may not be limited to directly performing an XOR operation. The transmit end may further scramble the second bit sequence by using the part or all of the identifier sequence based on a specified mapping relationship. For example, the transmit end sequentially scrambles the second bit sequence by using the part or all of the identifier sequence through several repetitions.
(37) If the identifier sequence is added through the interleaving operation, the transmit end may determine an interleaving mode by using the part or all of the identifier sequence, and performs the interleaving operation on the second bit sequence in the generated interleaving mode, to generate the third bit sequence.
(38) In step 401 and step 402, how the transmit end performs encoding and adds the identifier sequence are generally described. In the following steps, it is described that the receive end adds an identifier sequence in the same manner and then performs decoding.
(39) In step 403, the transmit end sends the third bit sequence.
(40) In step 404, a receive end obtains a to-be-decoded sequence.
(41) In step 405, the receive end performs a descrambling operation on the to-be-decoded sequence by using the part or all of the identifier sequence; or the receive end performs a de-interleaving operation on the to-be-decoded sequence in interleaving mode, where the interleaving mode is determined by the part or all of the identifier sequence.
(42) In step 406, the receive end performs polar code decoding on a sequence obtained after the descrambling operation or the de-interleaving operation.
(43) Correspondingly, the receive end obtains the manner of adding the identifier sequence by the transmit end, and descrambles or de-interleaves the to-be-decoded sequence in a corresponding manner.
(44) The receive end may perform the descrambling operation on a part or all of the to-be-decoded sequence by using the part or all of the identifier sequence.
(45) The receive end performs, based on a specified mapping relationship, the descrambling operation on the to-be-decoded sequence by using the part or all of the identifier sequence. For example, the receive end sequentially performs, through several repetitions, the descrambling operation on the to-be-decoded sequence using the part or all of the identifier sequence.
(46) Optionally, after performing the polar code decoding on the sequence obtained after the descrambling operation or the de-interleaving operation, the receive end extracts check bits from the decoded sequence, and performs a descrambling operation on the check bits by using the part or all of the identifier sequence.
(47) In this embodiment, an encoded bit sequence is used to carry the identifier sequence, and when the encoded bit sequence has a length of N bits, the identifier sequence can carry a maximum of 2.sup.N terminals, thereby greatly increasing the quantity of terminals that can be identified by the identifier sequence, and better meeting a requirement of a future massive access scenario. In addition, an effect of carrying the identifier sequence by using the encoded bit sequence in this embodiment is equivalent to that of carrying the identifier sequence by using a frozen bit that has not been encoded. However, if a bit sequence that has not been encoded is used to carry the identifier sequence, it cannot be ascertained that a value, at each fixed bit location, of a polar code that has not been encoded is 0, and relatively large hardware overheads are caused. Because the encoded bit sequence is used to carry the identifier sequence, a value, at a fixed bit location, of a polar code that has not been encoded can be ascertained to remain 0, thereby ensuring low hardware overheads.
(48) Based on the information adding method shown in
(49) As shown in
(50) In addition, if T is equal to N, the base station may further generate a corresponding interleaving mode based on a specified function mapping relationship by using the RNTI sequence, and perform an interleaving operation on the encoded bit sequence with the interleaving mode.
(51) Eventually, the base station performs a modulation, mapping, and sending procedure on the scrambled bit sequence or the interleaved bit sequence.
(52) For example, as shown in
(53) As shown in
(54) As shown in
(55) As shown in
(56) Based on the scrambling manner in
(57)
(58) As shown in
(59) Correspondingly, a PDCCH decoding process is shown in
(60) In step 1001, a terminal receives a polar code, and performs a demapping and demodulation process.
(61) In step 1002, the terminal selects a PDCCH location, and the terminal performs a descrambling or de-interleaving operation on a demodulated bit sequence based on a determined manner of adding an RNTI sequence by a base station.
(62) In step 1003, a polar code decoding operation is performed on a bit sequence obtained after the descrambling or de-interleaving operation.
(63) In step 1004, CRC information bits and DCI information bits in the decoded polar code are extracted.
(64) In step 1005, the extracted CRC information bits are descrambled. This step is an optional step. If the manner, determined by the terminal, of adding the RNTI sequence by the base station does not include a CRC bit scrambling operation, this step is omitted.
(65) In step 1006, CRC check is performed on the decoded DCI information.
(66) In step 1007, it is determined whether the CRC check succeeds; and if yes, step 1008 is performed; otherwise, a next PDCCH location is selected and step 1002 is performed.
(67) In step 1008, the decoded DCI information is obtained, and the procedure is ended.
(68) Therefore, the terminal performs descrambling or de-interleaving based on a unique identifier of the terminal in a determined manner of adding an identifier sequence by the base station, so as to better distinguish users.
(69) Based on the same concept as the information adding method shown in
(70) a processing unit 1101, configured to perform polar code encoding on a first bit sequence, to generate an encoded second bit sequence, where
(71) the processing unit 1101 is further configured to add a part or all of an identifier sequence to the second bit sequence, to generate a third bit sequence, where the identifier sequence is used to identify a terminal; and
(72) a sending unit 1102, configured to send the third bit sequence generated by the processing unit 1101.
(73) Optionally, the processing unit 1101 is configured to perform a scrambling operation on the second bit sequence by using the part or all of the identifier sequence, to generate the third bit sequence.
(74) Optionally, the processing unit 1101 is configured to perform the scrambling operation on a part or all of the second bit sequence by using the part or all of the identifier sequence.
(75) Optionally, the processing unit 1101 is configured to scramble the second bit sequence by using the part or all of the identifier sequence based on a specified mapping relationship.
(76) Optionally, the processing unit 1101 is configured to sequentially scramble the second bit sequence by using the part or all of the identifier sequence through several repetitions.
(77) Optionally, the processing unit 1101 is configured to perform an interleaving operation on the second bit sequence in interleaving mode, to generate the third bit sequence, where the interleaving mode is determined by the part or all of the identifier sequence.
(78) Optionally, the processing unit 1101 is further configured to: before performing the polar code encoding on the first bit sequence, obtain to-be-encoded information bits, and perform the check encoding on the information bits, to obtain check bits; add all of the identifier sequence to the check bits, or add a first part of the identifier sequence to the check bits; and generate the first bit sequence based on the information bits and the check bits carrying the identifier sequence.
(79) Optionally, the processing unit 1101 is further configured to: add a second part of the identifier sequence to the second bit sequence if the first part of the identifier sequence is added to the check bit, where the first part differs from the second part, or the first part and the second part have an intersection set.
(80) Based on the same concept as the information adding method shown in
(81) a receiving unit 1201, configured to obtain a to-be-decoded sequence; and
(82) a processing unit 1202, configured to perform, by using a part or all of an identifier sequence, a descrambling operation on the to-be-decoded sequence obtained by the receiving unit 1201; or perform, in interleaving mode, a de-interleaving operation on the to-be-decoded sequence obtained by the receiving unit 1201, where the interleaving mode is determined by the part or all of the identifier sequence, and the identifier sequence is used to identify a terminal, where
(83) the processing unit 1202 is further configured to perform polar code decoding on a sequence obtained after the descrambling operation or the de-interleaving operation.
(84) Optionally, the processing unit 1202 is configured to perform the descrambling operation on a part or all of the to-be-decoded sequence by using the part or all of the identifier sequence.
(85) Optionally, the processing unit 1202 is configured to perform, based on a specified mapping relationship, the descrambling operation on the to-be-decoded sequence by using the part or all of the identifier sequence.
(86) Optionally, the processing unit 1202 is configured to sequentially perform, through several repetitions, the descrambling operation on the to-be-decoded sequence by using the part or all of the identifier sequence.
(87) Optionally, the processing unit 1202 is further configured to extract check bits from the decoded sequence and perform a descrambling operation on the check bits by using the part or all of the identifier sequence.
(88) Based on the same concept as the information adding method shown in
(89) The processor 1302 may be a central processing unit (CPU), a network processor, or a combination of a CPU and a network processor.
(90) The processor 1302 may further include a hardware chip. The foregoing hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof. The PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof.
(91) The memory 1303 may include a volatile memory, such as a random-access memory (RAM). Alternatively, the memory 1303 may include a non-volatile memory, such as a flash memory, a hard disk drive (HDD), or a solid-state drive (SSD). Alternatively, the memory 1303 may include a combination of the foregoing types of memories.
(92) Based on the same concept as the information adding method shown in
(93) The processor 1402 may be a CPU, a network processor, or a combination of a CPU and a network processor.
(94) The processor 1402 may further include a hardware chip. The foregoing hardware chip may be an ASIC, a PLD, or a combination thereof. The PLD may be a CPLD, an FPGA, a GAL, or any combination thereof.
(95) The memory 1403 may include a volatile memory, for example, a RAM. The memory 1403 may alternatively include a non-volatile memory, for example, a flash memory, an HDD, or an SSD. The memory 1403 may alternatively include a combination of the foregoing types of memories.
(96) It should be noted that the apparatuses provided in
(97) An embodiment provides a computer storage medium, configured to store a computer program. The computer program includes an instruction used to perform the information adding method shown in
(98) An embodiment provides a computer program product including an instruction. When the computer program product is run on a computer, the computer is enabled to perform the information adding method shown in
(99) Based on the same concept as the information adding method shown in
(100) The system chip 1500 shown in
(101) A person of ordinary skill in the art should understand that the embodiments may be provided as a method, a system, or a computer program product. Therefore, an embodiment may use a form of hardware only embodiments, software only embodiments, or embodiments with a combination of software and hardware. Moreover, an embodiment may use a form of a computer program product that is implemented on one or more computer-usable storage media (including but not limited to a disk memory, a CD-ROM, an optical memory, and the like) that include computer usable program code.
(102) The embodiments are described with reference to the flowcharts and/or block diagrams of the method, the device (system), and the computer program product according to the embodiments. It should be understood that computer program instructions may be used to implement each process and/or each block in the flowcharts and/or the block diagrams and a combination of a process and/or a block in the flowcharts and/or the block diagrams. These computer program instructions may be provided for a general-purpose computer, a special-purpose computer, an embedded processor, or a processor of another programmable data processing device to generate a machine, so that the instructions executed by a computer or a processor of another programmable data processing device generate an apparatus for implementing a specific function in one or more processes in the flowcharts and/or in one or more blocks in the block diagrams.
(103) These computer program instructions may be stored in a computer readable memory that can instruct the computer or another programmable data processing device to work in a specified manner, so that the instructions stored in the computer readable memory generate an artifact that includes an instruction apparatus. The instruction apparatus implements a function in one or more processes in the flowcharts and/or in one or more blocks in the block diagrams.
(104) These computer program instructions may also be loaded onto a computer or another programmable data processing device, so that a series of operations and steps are performed on the computer or the other programmable device, thereby generating computer-implemented processing. Therefore, the instructions executed on the computer or the other programmable device provide steps for implementing a function in one or more processes in the flowcharts and/or in one or more blocks in the block diagrams.
(105) A person of ordinary skill in the art can make various modifications and variations to the embodiments without departing from the scope of the embodiments. The embodiments are intended to cover these modifications and variations provided that they fall within the scope of protection defined by the following claims and their equivalent technologies.