CODING SCHEME AND EXTENDED SYNCHRONIZATION ACCESS BURST FOR EC-GSM-IOT ENHANCEMENT
20200153671 · 2020-05-14
Inventors
- Zhipeng Lin (Nanjing, CN)
- John Walter Diachina (Garner, NC)
- Stefan Eriksson Löwenmark (Färentuna, SE)
- Nicklas Johansson (Brokind, SE)
Cpc classification
H04L1/0072
ELECTRICITY
H04L27/2692
ELECTRICITY
H04W56/0045
ELECTRICITY
International classification
H04L1/00
ELECTRICITY
Abstract
A wireless device, a Radio Access Network (RAN) node, and various methods are described herein for improving the coverage performance of the Extended Coverage (EC)-Random Access Channel (RACH). For instance, the wireless device, the RAN node, and various methods can improve the coverage performance of the EC-RACH by utilizing a new access burst (referred to herein as Extended Synchronization Access Burst (ESAB)), a new coding scheme (referred to herein as RACH11) for the CC5 2TS EC-RACH, and/or an access burst mapping scheme for the CC5 2TS EC-RACH.
Claims
1. A wireless device configured to communicate with a Radio Access Network (RAN) node, the wireless device comprising: a processor; and, a memory that stores processor-executable instructions, wherein the processor interfaces with the memory to execute the processor-executable instructions, whereby the wireless device is operable to: attempt a system access using an Extended Coverage Random Access Channel (EC-RACH) by transmitting, to the RAN node, a system access message on the EC-RACH using repeated Extended Synchronization Access Bursts (ESABs), wherein each ESAB has 102 encrypted data bits coded according to an 11-bit Random Access Channel (RACH) coding scheme which utilizes 11 payload bits and 6 parity bits to which a rate 1/6 tail biting convolutional coding is applied resulting in the 102 encrypted data bits after channel coding.
2. The wireless device of claim 1, wherein each ESAB comprises 140 synchronization bits, the 102 encrypted data bits, 3 tail bits, and 68 guard symbols.
3. The wireless device of claim 1, wherein the rate 1/6 tail biting convolutional coding utilizes the following polynomials:
G4=1+D2+D3+D5+D6;
G4=1+D2+D3+D5+D6;
G7=1+D+D2+D3+D6;
G5=1+D+D4+D6;
G6=1+D+D2+D3+D4+D6; and
G6=1+D+D2+D3+D4+D6.
4. The wireless device of claim 1, wherein the transmitting of the system access message on the EC-RACH is performed when the EC-RACH is in a 2 timeslot (2TS) and coverage class 5 (CC5) operation and involves transmitting 22 repeated ESABs over three consecutive 51-Multi-Frames (MFs) for a total of 66 repeated ESABs.
5. The wireless device of claim 1, wherein each ESAB is extended over 2 timeslots on the EC-RACH.
6. A method implemented by a wireless device configured to communicate with a Radio Access Network (RAN) node, the method comprising: attempting a system access using an Extended Coverage Random Access Channel (EC-RACH) by transmitting, to the RAN node, a system access message on the EC-RACH using repeated Extended Synchronization Access Bursts (ESABs), wherein each ESAB has 102 encrypted data bits coded according to an 11-bit Random Access Channel (RACH) coding scheme which utilizes 11 payload bits and 6 parity bits to which a rate 1/6 tail biting convolutional coding is applied, resulting in the 102 encrypted data bits after channel coding.
7. The method of claim 6, wherein each ESAB comprises 140 synchronization bits, the 102 encrypted data bits, 3 tail bits, and 68 guard symbols.
8. The method of claim 6, wherein the rate 1/6 tail biting convolutional coding utilizes the following polynomials:
G4=1+D2+D3+D5+D6;
G4=1+D2+D3+D5+D6;
G7=1+D+D2+D3+D6;
G5=1+D+D4+D6;
G6=1+D+D2+D3+D4+D6; and
G6=1+D+D2+D3+D4+D6.
9. The method of claim 6, wherein the transmitting of the system access message on the EC-RACH is performed when the EC-RACH is in a 2 timeslot (2TS) and coverage class 5 (CC5) operation and involves transmitting 22 repeated ESABs over three consecutive 51-Multi-Frames (MFs) for a total of 66 repeated ESABs.
10. The method of claim 6, wherein each ESAB is extended over 2 timeslots on the EC-RACH.
11. A Radio Access Network (RAN) node configured to interact with a wireless device, the RAN node comprising: a processor; and, a memory that stores processor-executable instructions, wherein the processor interfaces with the memory to execute the processor-executable instructions, whereby the RAN node is operable to: receive, from the wireless device, a system access message on an Extended Coverage Random Access Channel (EC-RACH), wherein the system access message comprises repeated Extended Synchronization Access Bursts (ESABs), wherein each ESAB has 102 encrypted data bits coded according to an 11-bit Random Access Channel (RACH) coding scheme which utilized 11 payload bits and 6 parity bits to which a rate 1/6 tail biting convolutional coding was applied, resulting in the 102 encrypted data bits after channel coding.
12. The RAN node of claim 11, wherein each ESAB comprises 140 synchronization bits, the 102 encrypted data bits, 3 tail bits, and 68 guard symbols.
13. The RAN node of claim 11, wherein the rate 1/6 tail biting convolutional coding utilized the following polynomials:
G4=1+D2+D3+D5+D6;
G4=1+D2+D3+D5+D6;
G7=1+D+D2+D3+D6;
G5=1+D+D4+D6;
G6=1+D+D2+D3+D4+D6; and
G6=1+D+D2+D3+D4+D6.
14. The RAN node of claim 11, wherein the receiving of the system access message on the EC-RACH is done when the EC-RACH is in a 2 timeslot (2TS) and coverage class 5 (CC5) operation and involves receiving 22 repeated ESABs over three consecutive 51-Multi-Frames (MFs) for a total of 66 repeated ESABs.
15. The RAN node of claim 11, wherein each ESAB is extended over 2 timeslots on the EC-RACH.
16. A method implemented by a Radio Access Network (RAN) node configured to interact with a wireless device, the method comprising: receiving, from the wireless device, a system access message on an Extended Coverage Random Access Channel (EC-RACH), wherein the system access message comprises repeated Extended Synchronization Access Bursts (ESABs), wherein each ESAB has 102 encrypted data bits coded according to an 11-bit Random Access Channel (RACH) coding scheme which utilized 11 payload bits and 6 parity bits to which a rate 1/6 tail biting convolutional coding was applied, resulting in the 102 encrypted data bits after channel coding.
17. The method of claim 16, wherein each ESAB comprises 140 synchronization bits, the 102 encrypted data bits, 3 tail bits, and 68 guard symbols.
18. The method of claim 16, wherein the rate 1/6 tail biting convolutional coding utilized the following polynomials:
G4=1+D2+D3+D5+D6;
G4=1+D2+D3+D5+D6;
G7=1+D+D2+D3+D6;
G5=1+D+D4+D6;
G6=1+D+D2+D3+D4+D6; and
G6=1+D+D2+D3+D4+D6.
19. The method of claim 16, wherein the receiving of the system access message on the EC-RACH is done when the EC-RACH is in a 2 timeslot (2TS) and coverage class 5 (CC5) operation and involves receiving 22 repeated ESABs over three consecutive 51-Multi-Frames (MFs) for a total of 66 repeated ESABs.
20. The method of claim 16, wherein each ESAB is extended over 2 timeslots on the EC-RACH.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0043] A more complete understanding of the present disclosure may be obtained by reference to the following detailed description when taken in conjunction with the accompanying drawings:
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
DETAILED DESCRIPTION
[0061] A discussion is first provided herein to describe an exemplary wireless communication network that includes a CN node (e.g., SGSN), multiple RAN nodes (e.g., BSSs), and multiple wireless devices (e.g., EC-GSM wireless devices) which are configured in accordance with different embodiments of the present disclosure (see
Exemplary Wireless Communication Network 300
[0062] Referring to
[0063] The wireless communication network 300 includes the RAN nodes 302.sub.1 and 302.sub.2 (wireless access nodesonly two shown) which provide network access to the wireless devices 304.sub.1, 304.sub.2, 304.sub.3 . . . 304.sub.n. In this example, the RAN node 302.sub.1 is providing network access to wireless device 304.sub.1 while the RAN node 302.sub.2 is providing network access to wireless devices 304.sub.2, 304.sub.3 . . . 304.sub.n. The RAN nodes 302.sub.1 and 302.sub.2 are connected to the core network 306 (e.g., SGSN core network 306) and, in particular, to the CN node 307 (e.g., SGSN 307). The core network 306 is connected to an external packet data network (PDN) 308, such as the Internet, and a server 310 (only one shown). The wireless devices 304.sub.1, 304.sub.2, 304.sub.3 . . . 304.sub.n may communicate with one or more servers 310 (only one shown) connected to the core network 306 and/or the PDN 308.
[0064] The wireless devices 304.sub.1, 304.sub.2, 304.sub.3 . . . 304.sub.n may refer generally to an end terminal (user) that attaches to the wireless communication network 300, and may refer to either a MTC device (e.g., a smart meter) or a non-MTC device. Further, the term wireless device is generally intended to be synonymous with the term mobile device, mobile station (MS). User Equipment, or UE, as that term is used by 3GPP, and includes standalone wireless devices, such as terminals, cell phones, smart phones, tablets, cellular IoT devices, IoT devices, and wireless-equipped personal digital assistants, as well as wireless cards or modules that are designed for attachment to or insertion into another electronic device, such as a personal computer, electrical meter, etc.
[0065] Likewise, unless the context clearly indicates otherwise, the term RAN node 302.sub.1 and 302.sub.2 (wireless access node 302.sub.1 and 302.sub.2) is used herein in the most general sense to refer to a base station, a wireless access node, or a wireless access point in a wireless communication network 300, and may refer to RAN nodes 302.sub.1 and 302.sub.2 that are controlled by a physically distinct radio network controller as well as to more autonomous access points, such as the so-called evolved Node Bs (eNodeBs) in Long-Term Evolution (LTE) networks.
[0066] Each wireless device 304.sub.1, 304.sub.2, 304.sub.3 . . . 304.sub.n may include a transceiver circuit 310.sub.1, 310.sub.2, 310.sub.3 . . . 310.sub.n for communicating with the RAN nodes 302.sub.1 and 302.sub.2, and a processing circuit 312.sub.1, 312.sub.2, 312.sub.3 . . . 312n for processing signals transmitted from and received by the transceiver circuit 310.sub.1, 310.sub.2, 310.sub.3 . . . 310.sub.n and for controlling the operation of the corresponding wireless device 304.sub.1, 304.sub.2, 304.sub.3 . . . 304.sub.n. The transceiver circuit 310.sub.1, 310.sub.2, 310.sub.3 . . . 310n may include a transmitter 314.sub.1, 314.sub.2, 314.sub.3 . . . 314.sub.n and a receiver 316.sub.1, 316.sub.2, 316.sub.3 . . . 316.sub.n, which may operate according to any standard, e.g., the GSM/EDGE standard. The processing circuit 312.sub.1, 312.sub.2, 312.sub.3 . . . 312.sub.n may include a processor 318.sub.1, 318.sub.2, 318.sub.3 . . . 318.sub.n and a memory 320.sub.1, 320.sub.2, 320.sub.3 . . . 320.sub.n for storing program code for controlling the operation of the corresponding wireless device 304.sub.1, 304.sub.2, 304.sub.3 . . . 304.sub.n. The program code may include code for performing the procedures as described hereinafter.
[0067] Each RAN node 302.sub.1 and 302.sub.2 (wireless access node 302.sub.1 and 302.sub.2) may include a transceiver circuit 322.sub.1 and 322.sub.2 for communicating with wireless devices 304.sub.1, 304.sub.2, 304.sub.3 . . . 304.sub.n, a processing circuit 324.sub.1 and 324.sub.2 for processing signals transmitted from and received by the transceiver circuit 322.sub.1 and 322.sub.2 and for controlling the operation of the corresponding RAN node 302.sub.1 and 302.sub.2, and a network interface 326.sub.1 and 326.sub.2 for communicating with the core network 306. The transceiver circuit 322.sub.1 and 322.sub.2 may include a transmitter 328.sub.1 and 328.sub.2 and a receiver 3301 and 3302, which may operate according to any standard, e.g., the GSM/EDGE standard. The processing circuit 324.sub.1 and 324.sub.2 may include a processor 332.sub.1 and 332.sub.2, and a memory 334.sub.1 and 334.sub.2 for storing program code for controlling the operation of the corresponding RAN node 302.sub.1 and 302.sub.2. The program code may include code for performing the procedures as described hereinafter.
[0068] The CN node 307 (e.g., SGSN 307, MME 307) may include a transceiver circuit 336 for communicating with one or more RAN nodes, e.g., the RAN nodes 302.sub.1 and 302.sub.2, a processing circuit 338 for processing signals transmitted from and received by the transceiver circuit 336 and for controlling the operation of the CN node 307, and a network interface 340 for communicating with one or more RAN nodes, e.g., the RAN nodes 302.sub.1 and 302.sub.2. The transceiver circuit 336 may include a transmitter 342 and a receiver 344, which may operate according to any standard, e.g., the GSM/EDGE standard. The processing circuit 338 may include a processor 346 and a memory 348 for storing program code for controlling the operation of the CN node 307. The program code may include code for performing the procedures as described hereinafter.
Techniques for Improving the Coverage Performance of the EC-RACH
[0069] The present disclosure addresses the problems of the state-of-the-art approaches described above in the Background Section. More specifically, the present disclosure addresses the problems of the state-of-the-art approaches by providing various methods for improving the EC-RACH including (1) a new coding scheme for transmitting payload, parity bits, and an increased quantity of synchronization bits; (2) a new extended synchronization access burst (ESAB) to accommodate the new coding scheme and the increased quantity of synchronization bits; and (3) a new method for mapping the blind physical layer transmissions of the extended synchronization access burst (ESAB) onto timeslots 0 and 1 occurring within distinct subsets of Time Division Multiple Access (TDMA) frames within three consecutive 51-multiframes. The new ESAB, the new coding scheme (referred to herein as the RACH11), and the new multi-frame mapping scheme are discussed in detail next.
Extended Synchronization Access Burst (ESAB)
[0070] The new access burst format referred to hereafter as the Extended Synchronization Access Burst (ESAB) 400 is illustrated in
[0071] In comparing the legacy access burst 100 to the ESAB 400 it can be seen that the ESAB 400 has both the length of encrypted data bits 404 (i.e., 102 encrypted data bits 404) increased as well as the length of the synchronization bits 402 (i.e., 140 synchronization bits 402) increased while keeping the same number of information bits (i.e., 11 information bits). The ESAB 400 effectively decreases the block error rate through a higher data coding rate of the data bits as well as increasing processing gain through better phase difference estimation for between-frame IQ accumulation and channel estimation. That is, the ESAB 400 is an improvement over the legacy access burst 100 and also effectively improves the coverage performance of the EC-RACH.
RACH 11: 11 bit RACH coding scheme for CC5 2TS EC-RACH
[0072] A new coding scheme implemented by the wireless device 304.sub.1 (for example) and designed for CC5 2TS EC-RACH is described below with reference to TABLE 2.
TABLE-US-00002 TABLE 2 Channel coding design for CC5 2TS EC-RACH Payload bits 11 bits Parity 6 bits Convolution coding 1/6 tail biting convolutional coding Number of data bits after channel 102 bits coding
[0073] In one example, the ESAB 400 has a format coded according to the 11-bit RACH coding scheme designed for the CC5 2TS EC-RACH, and wherein the 11-bit RACH coding scheme includes 11 payload bits and 6 parity bits to which a rate 1/6 tail biting convolutional coding is applied resulting in 102 encrypted data bits 404 (see
[0074] In some embodiments, the polynomials used for the rate 1/6 tail biting convolution coding are defined as below:
G4=1+D2+D3+D5+D6
G4=1+D2+D3+D5+D6
G7=1+D+D2+D3+D6
G5=1+D+D4+D6
G6=1+D+D2+D3+D4+D6
G6=1+D+D2+D3+D4+D6
wherein G is the output of the polynomial and D is the input of the formula (note: for the definitions of these terms refer to Annex B of 3GPP Technical Specification (TS) 45.003 V.14.1.0 (2017-03) entitled GSM/EDGE Channel Coding (Release 14) (the entire contents of this document are hereby incorporated by reference herein for all purposes). Note: the D2, D3, D4, D5, and D6 above and hereinafter are actually D.sup.2, D.sup.3, D.sup.4, D.sup.5, and D.sup.6 respectively.
[0075] However, those skilled in the art will readily appreciate that in other embodiments, different polynomials (or a combination of the above same and different polynomials) may be used for the rate 1/6 tail biting convolution coding.
Multi-Frame Mapping
[0076] As is illustrated in
[0077] Further, as can be seen in
[0078] Basically, the 2TS EC-RACH mapping shown in
Performance
[0083] The comparative sensitivity performance of CC5 2TS EC-RACH/66 channel (see
TABLE-US-00003 TABLE 3 Sensitivity Performance for CC5 2TS EC-RACH/66 and CC4 2 TS EC-RACH/48 TU1.2nFH Comparative gain Channel type [dBm] [dB] CC4 2TS EC-RACH/48 128.0 CC5 2TS EC-RACH/75 * 132.0 4.0 CC5 2TS EC-RACH/66 133.1 5.1 (ESAB + RACH11) * Tdoc R6-160176 (see reference above)
[0084] It is to be noted that in the simulation for CC5 2TS EC-RACH/66, a temporary Training Sequence Code (TSC) was used via concatenation of the TSC bits from TSC4/TSC5/TSC6/TSC7 to the length of 140 bits. The TSC4/TSC5/TSC6/TSC7 are defined in Release 13 (R13) of 3GPP TS 45.002 (see reference above).
[0085] When comparing the CC5 2TS EC-RACH/66 with the proposed solution CC5 2TS EC-RACH/75 in Tdoc R6-160193 and Tdoc R6-160176 (see references above), the CC5 2TS EC-RACH/66 has the following benefits: [0086] A 1.1 dB higher performance gain for TU1.2 sensitivity case (5.1 dB vs. 4.0 dB); [0087] 12% lower power consumption per RACH attempt due to a lower number of sent bursts (132 bursts vs. 150 bursts); [0088] 1 more information data bit can be used for the future (11 bits vs. 10 bits); and [0089] Simpler IQ accumulator in BTS receiver since only one data part is used in each burst pair (TS0 and TS1) and no multiple demodulations at each demodulation positions.
Basic Functionalities-Configurations of Wireless Device 304.sub.1 (for Example) and RAN Node 302.sub.1 (for Example)
[0090] Referring to
[0091] Referring to
[0092] As those skilled in the art will appreciate, the above-described module 702 of the wireless device 304.sub.1 may be implemented as suitable dedicated circuit. Further, the module 702 can also be implemented using any number of dedicated circuits through functional combination or separation. In some embodiments, the module 702 may be even combined in a single application specific integrated circuit (ASIC). As an alternative software-based implementation, the wireless device 304.sub.1 may comprise a memory 320.sub.1, a processor 318.sub.1 (including but not limited to a microprocessor, a microcontroller or a Digital Signal Processor (DSP), etc.) and a transceiver 310.sub.1. The memory 320.sub.1 stores machine-readable program code executable by the processor 318.sub.1 to cause the wireless device 304.sub.1 to perform the step of the above-described method 600. Note: the other wireless device 304.sub.2, 304.sub.3 . . . 304.sub.n may be configured the same as wireless device 304.sub.1.
[0093] Referring to
[0094] Referring to
[0095] As those skilled in the art will appreciate, the above-described module 902 of the RAN node 302.sub.1 may be implemented as suitable dedicated circuit. Further, the module 902 can also be implemented using any number of dedicated circuits through functional combination or separation. In some embodiments, the module 902 may be even combined in a single application specific integrated circuit (ASIC). As an alternative software-based implementation, the RAN node 302.sub.1 may comprise a memory 334.sub.1, a processor 332.sub.1 (including but not limited to a microprocessor, a microcontroller or a Digital Signal Processor (DSP), etc.) and a transceiver 322.sub.1. The memory 334.sub.1 stores machine-readable program code executable by the processor 332.sub.1 to cause the RAN node 302.sub.1 to perform the step of the above-described method 800. Note: the other RAN node 302.sub.2 may be configured the same as RAN node 302.sub.1.
[0096] Referring to
[0097] Referring to
[0098] As those skilled in the art will appreciate, the above-described module 1102 of the wireless device 304.sub.1 may be implemented as suitable dedicated circuit. Further, the module 1102 can also be implemented using any number of dedicated circuits through functional combination or separation. In some embodiments, the module 1102 may be even combined in a single application specific integrated circuit (ASIC). As an alternative software-based implementation, the wireless device 304.sub.1 may comprise a memory 320.sub.1, a processor 318.sub.1 (including but not limited to a microprocessor, a microcontroller or a Digital Signal Processor (DSP), etc.) and a transceiver 310.sub.1. The memory 320.sub.1 stores machine-readable program code executable by the processor 318.sub.1 to cause the wireless device 304.sub.1 to perform the step of the above-described method 1000. Note: the other wireless device 304.sub.2, 304.sub.3 . . . 304.sub.n may be configured the same as wireless device 304.sub.1.
[0099] Referring to
[0100] Referring to
[0101] As those skilled in the art will appreciate, the above-described module 1302 of the RAN node 302.sub.1 may be implemented as suitable dedicated circuit. Further, the module 1302 can also be implemented using any number of dedicated circuits through functional combination or separation. In some embodiments, the module 1302 may be even combined in a single application specific integrated circuit (ASIC). As an alternative software-based implementation, the RAN node 302.sub.1 may comprise a memory 334.sub.1, a processor 332.sub.1 (including but not limited to a microprocessor, a microcontroller or a Digital Signal Processor (DSP), etc.) and a transceiver 322.sub.1. The memory 334.sub.1 stores machine-readable program code executable by the processor 332.sub.1 to cause the RAN node 302.sub.1 to perform the step of the above-described method 1200. Note: the other RAN node 302.sub.2 may be configured the same as RAN node 302.sub.1.
[0102] Referring to
[0103] Referring to
[0104] As those skilled in the art will appreciate, the above-described module 1502 of the wireless device 304.sub.1 may be implemented as suitable dedicated circuit. Further, the module 1502 can also be implemented using any number of dedicated circuits through functional combination or separation. In some embodiments, the module 1502 may be even combined in a single application specific integrated circuit (ASIC). As an alternative software-based implementation, the wireless device 304.sub.1 may comprise a memory 320.sub.1, a processor 318.sub.1 (including but not limited to a microprocessor, a microcontroller or a Digital Signal Processor (DSP), etc.) and a transceiver 310.sub.1. The memory 320.sub.1 stores machine-readable program code executable by the processor 318.sub.1 to cause the wireless device 304.sub.1 to perform the step of the above-described method 1400. Note: the other wireless device 304.sub.2, 304.sub.3 . . . 304.sub.n may be configured the same as wireless device 304.sub.1.
[0105] Referring to
[0106] Referring to
[0107] As those skilled in the art will appreciate, the above-described module 1702 of the RAN node 302.sub.1 may be implemented as suitable dedicated circuit. Further, the module 1702 can also be implemented using any number of dedicated circuits through functional combination or separation. In some embodiments, the module 1702 may be even combined in a single application specific integrated circuit (ASIC). As an alternative software-based implementation, the RAN node 302.sub.1 may comprise a memory 334.sub.1, a processor 332.sub.1 (including but not limited to a microprocessor, a microcontroller or a Digital Signal Processor (DSP), etc.) and a transceiver 322.sub.1. The memory 334.sub.1 stores machine-readable program code executable by the processor 332.sub.1 to cause the RAN node 302.sub.1 to perform the step of the above-described method 1600. Note: the other RAN node 302.sub.2 may be configured the same as RAN node 302.sub.1.
[0108] Those skilled in the art will appreciate that the use of the term exemplary is used herein to mean illustrative, or serving as an example, and is not intended to imply that a particular embodiment is preferred over another or that a particular feature is essential. Likewise, the terms first and second, and similar terms, are used simply to distinguish one particular instance of an item or feature from another, and do not indicate a particular order or arrangement, unless the context clearly indicates otherwise. Further, the term step, as used herein, is meant to be synonymous with operation or action. Any description herein of a sequence of steps does not imply that these operations must be carried out in a particular order, or even that these operations are carried out in any order at all, unless the context or the details of the described operation clearly indicates otherwise.
[0109] Of course, the present disclosure may be carried out in other specific ways than those herein set forth without departing from the scope and essential characteristics of the invention. One or more of the specific processes discussed above may be carried out in a cellular phone or other communications transceiver comprising one or more appropriately configured processing circuits, which may in some embodiments be embodied in one or more application-specific integrated circuits (ASICs). In some embodiments, these processing circuits may comprise one or more microprocessors, microcontrollers, and/or digital signal processors programmed with appropriate software and/or firmware to carry out one or more of the operations described above, or variants thereof. In some embodiments, these processing circuits may comprise customized hardware to carry out one or more of the functions described above. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.
[0110] Although multiple embodiments of the present disclosure have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it should be understood that the invention is not limited to the disclosed embodiments, but instead is also capable of numerous rearrangements, modifications and substitutions without departing from the present disclosure that has been set forth and defined within the following claims.