Operation methods of terminal and base station in mobile communication networks
10616805 ยท 2020-04-07
Assignee
Inventors
Cpc classification
H04L5/0007
ELECTRICITY
H03M13/2732
ELECTRICITY
International classification
H04L12/28
ELECTRICITY
H03M13/00
ELECTRICITY
H04W28/16
ELECTRICITY
Abstract
Disclosed are operation methods of a terminal and a base station in mobile communications. The operation method of the terminal in a mobile communication network, comprises receiving a terminal identifier from a base station; generating a plurality of interleaving parameters based on the terminal identifier; dividing a channel-coded data block into a plurality of sub-blocks, and performing a block interleaving on each of the plurality of sub-blocks using the plurality of interleaving parameters; and transmitting the plurality of sub-blocks on which the block interleaving has been performed, wherein an interleaving pattern of the block interleaving for each of the plurality of sub-blocks is determined by the plurality of interleaving parameters.
Claims
1. An operation method of a terminal in a mobile communication network, comprising: receiving a terminal identifier and information from a base station; generating a plurality of interleaving parameters based on the terminal identifier; dividing a channel-coded data block into a plurality of sub-blocks; performing a block interleaving on each of the plurality of sub-blocks using the plurality of interleaving parameters; performing a scrambling on each of the plurality of sub-blocks on which the block interleaving has been performed; and transmitting the plurality of sub-blocks on which the scrambling has been performed, wherein an interleaving pattern of the block interleaving for each of the plurality of sub-blocks is determined by the plurality of interleaving parameters, and wherein the scrambling on each of the plurality of sub-blocks is performed by: adding a pseudo-random sequence to each of the plurality of sub-blocks on which the block interleaving has been performed; and calculating remainders obtained by dividing each component of each of the plurality of sub-blocks to which the pseudo-random sequence is added by two.
2. The operation method according to claim 1, wherein the terminal identifier includes a Cell Radio Network Temporary Identifier (C-RNTI).
3. The operation method according to claim 1, wherein the terminal identifier has a size of 16 bits, and the plurality of interleaving parameters are generated by: dividing the terminal identifier into four bit strings each of which has a size of 4 bits; and determining numbers represented respectively by the four bit strings as first to fourth interleaving parameters.
4. The operation method according to claim 3, wherein the block interleaving is performed by: interleaving bit strings of each of the plurality of sub-blocks using the first interleaving parameter; interleaving the bit strings interleaved by the first interleaving parameter using the second interleaving parameter; interleaving the bit strings interleaved by the second interleaving parameter using the third interleaving parameter; and interleaving the bit strings interleaved by the third interleaving parameter using the fourth interleaving parameter.
5. The operation method according to claim 1, further comprising: receiving information of a signal transmission time allocated to a group of terminals to which the terminal belongs from the base station, wherein the plurality of sub-blocks are transmitted at the signal transmission time.
6. An operation method of a terminal in a mobile communication network, comprising: receiving a terminal identifier from a base station; dividing the terminal identifier into a plurality of bit strings of a predetermined size; determining numbers represented respectively by a plurality of bit strings as a plurality of interleaving parameters; dividing a channel-coded data block into a plurality of sub-blocks; performing a block interleaving on each of the plurality of sub-blocks using the plurality of interleaving parameters; and transmitting the plurality of sub-blocks on which the block interleaving has been performed, wherein an interleaving pattern of the block interleaving for each of the plurality of sub-blocks is determined by the plurality of interleaving parameters.
7. An operation method of a terminal in a mobile communication network, comprising: receiving a terminal identifier from a base station; generating a plurality of interleaving parameters based on the terminal identifier; dividing a channel-coded data block into a plurality of sub-blocks; performing a block interleaving on each of the plurality of sub-blocks using the plurality of interleaving parameters; receiving a random sequence from the base station; performing a random interleaving on each of the plurality of sub-blocks on which the block interleaving has been performed by using the random sequence; and transmitting the plurality of sub-blocks on which the random interleaving has been performed, wherein an interleaving pattern of the block interleaving for each of the plurality of sub-blocks is determined by the plurality of interleaving parameters.
8. An operation method of a base station in a mobile communication network, comprising: transmitting a terminal identifier and information of a signal transmission time allocated to a group of terminals to which a terminal belongs to the terminal; receiving a plurality of sub-blocks on which a block interleaving has been performed at a first time period; identifying the terminal identifier based on the signal transmission time allocated to the group of terminals and an interleaving pattern of the block interleaving for each of the plurality of sub-blocks, wherein the interleaving pattern is determined by a plurality of interleaving parameters.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1) Example embodiments of the present invention will become more apparent by describing in detail example embodiments of the present invention with reference to the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
DESCRIPTION OF EXAMPLE EMBODIMENTS
(14) Embodiments of the present disclosure are disclosed herein. However, specific structural and functional details disclosed herein are merely representative for purposes of describing embodiments of the present disclosure, however, embodiments of the present disclosure may be embodied in many alternate forms and should not be construed as limited to embodiments of the present disclosure set forth herein.
(15) Accordingly, while the present disclosure is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit the present disclosure to the particular forms disclosed, but on the contrary, the present disclosure is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure. Like numbers refer to like elements throughout the description of the figures.
(16) It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present disclosure. As used herein, the term and/or includes any and all combinations of one or more of the associated listed items.
(17) It will be understood that when an element is referred to as being connected or coupled to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being directly connected or directly coupled to another element, there are no intervening elements present. Other words used to describe the relationship between elements should be interpreted in a like fashion (i.e., between versus directly between, adjacent versus directly adjacent, etc.).
(18) The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the present disclosure. As used herein, the singular forms a, an and the are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms comprises, comprising, includes and/or including, when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
(19) Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this present disclosure belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
(20) Hereinafter, embodiments of the present disclosure will be described in greater detail with reference to the accompanying drawings. In order to facilitate general understanding in describing the present disclosure, the same components in the drawings are denoted with the same reference signs, and repeated description thereof will be omitted.
(21) Hereinafter, wireless communication networks to which exemplary embodiments according to the present disclosure will be described. However, wireless communication networks to which exemplary embodiments according to the present disclosure are applied are not restricted to what will be described below. That is, exemplary embodiments according to the present disclosure may be applied to various wireless communication networks.
(22)
(23) Referring to
(24) The plurality of communication nodes may support 4.sup.th generation (4G) communication (e.g., long term evolution (LTE), LTE-advanced (LTE-A)), or 5.sup.th generation (5G) communication defined in the 3.sup.rd generation partnership project (3GPP) standard. The 4G communication may be performed in a frequency band below 6 gigahertz (GHz), and the 5G communication may be performed in a frequency band above 6 GHz. For example, for the 4G and 5G communications, the plurality of communication nodes may support at least one communication protocol among a code division multiple access (CDMA) based communication protocol, a wideband CDMA (WCDMA) based communication protocol, a time division multiple access (TDMA) based communication protocol, a frequency division multiple access (FDMA) based communication protocol, an orthogonal frequency division multiplexing (OFDM) based communication protocol, an orthogonal frequency division multiple access (OFDMA) based communication protocol, a single carrier PUMA (SC-FDMA) based communication protocol, a non-orthogonal multiple access (NOMA) based communication protocol, and a space division multiple access (SDMA) based communication protocol. Also, each of the plurality of communication nodes may have the following structure.
(25)
(26) In the embodiment illustrated in
(27) Referring to
(28) The interleaving block 220 may divide the channel-coded data block into a plurality of sub-blocks. The interleaving block 220 may perform a block interleaving on each of the plurality of sub-blocks. An interleaving pattern of the block interleaving may depend on terminal identifier of the terminal 200 described later. Interleaved sub-blocks may be input to the modulation block 230.
(29) The modulation block 230 may modulate and change a phase of signal according to the plurality of sub-blocks on which the block interleaving has been performed. The modulation block 230 may add a reference signal or the like. The modulation block 230 may perform scrambling. The scrambling may mean changing a bit string of the sub-blocks according to a predetermined rule.
(30) A pseudo-random sequence may be used for the scrambling, which will be described in detail below. A bit string output from the modulation block 230 may be input to the padding block 240. The padding block 240 may change the length of the bit string received from the modulation block 230. For example, the padding block 240 may add predetermined sequence to the bit string so that the length of the bit string is equal to a predetermined size.
(31) According to
(32)
(33) Referring to
(34)
(35) Referring to
(36) In step S110, the base station 300 may transmit the terminal identifier in response to the registration request. The terminal 200 may receive the terminal identifier from the base station 300.
(37) In step S115, the base station 300 may transmit a random sequence. The terminal 200 may receive the random sequence from the base station 300. The random sequence may be used in the random interleaving process described below. In step S110, the base station 300 may transmit different terminal identifiers to different terminals. On the other hand, in step S115, the base station 300 may transmit the same random sequence to terminals within a coverage of the base station 300. The base station 300 may further transmit the cell ID of the base station 300 together with the random sequence.
(38) In step S120, the terminal 200 may determine interleaving parameters. The terminal 200 may determine the interleaving parameters based on the terminal identifier received from the base station 300. For example, the process by which the terminal 200 generates the interleaving parameters may be expressed as Equation 1.
(39)
(40) In Equation 1, RNTI.sub.UE may mean a terminal identifier, and a.sub.0, a.sub.1, a.sub.2, and a.sub.3 mean the interleaving parameters of the terminal 200.
(41) Referring to Equation 1, the terminal 200 may determine the interleaving parameters from s bit string of the terminal identifier RNTI.sub.UE. The terminal 200 may divide the bit string of the terminal identifier RNTI.sub.UE into a plurality of bit strings of a predetermined size. As shown in Equation 1, in a case that the RNTI.sub.UE has a size of 16-bits, the terminal 200 may divide the RNTI.sub.UE into bit strings each of which has a size of 4 bits. For example, the terminal 200 may sequentially divide [1 0 1 1 0 0 1 1 0 0 0 1 0 1 0 0], and output [1 0 1 1], [0 0 1 1], [0 0 0 1], and [0 1 0 0]. Although Equation 1 shows an example in which the bit string of RNTI.sub.UE is sequentially divided, the embodiments of the present disclosure are not limited thereto. For example, k-th bit string may include (4n+k)-th (n=0, 1, 2, 3; k=1, 2, 3, 4) components of bit string of RNTI.sub.UE.
(42) The terminal 200 may change binary numbers represented respectively by the bit strings [1 0 1 1], [0 0 1 1], [0 0 0 1], and [0 1 0 0] into decimal numbers and output the decimal numbers as the interleaving parameters a.sub.0, a.sub.1, a.sub.2, and a.sub.3, respectively.
(43) In step S140, the terminal 200 may interleave the channel-coded data block b (.) by using the interleaving parameters a.sub.0, a.sub.1, a.sub.2, and a.sub.3. The terminal 200 may interleave channel-coded data block with a block interleaving scheme. The terminal 200 may divide the channel-coded data block into a plurality of sub-blocks. The terminal 200 may interleave each of the plurality of sub-blocks. Interleaving in the block interleaving process may be performed for each sub-block, and an order of the bit string may be changed within each sub-block. An index i for the block interleaving may be expressed as Equation 2.
i=[z mod L.sub.itlv]
z=0,1,2, . . . ,D1[Equation 2]
(44) In Equation 2, D may mean a bit size of the channel coded data block output from the channel coding block 210. L.sub.itlv may mean a bit size of each the sub-blocks in the block interleaving. For example, if the bit size of each the sub-blocks L.sub.itlv=32, index i may have one of values from 0 to 31. The channel coded data block may be divided into the plurality of sub-blocks each of which has a size of 32 bits. Since the index i is used in the block interleaving process, an order of bit string may be changed only within a 32-bit sized sub-block in the block interleaving process. Thus, interleaving and deinterleaving processes of the channel coded data block may be simplified.
(45) According to Equation 2, the number of sub-blocks in the block interleaving may be
(46)
If D is not a multiple of L.sub.itlv the terminal 200 may add a padding sequence shorter than L.sub.itlv to the channel coded data block. The padding sequence may be a sequence of all zeros. The terminal 200 may add the padding sequence to the channel-coded block so as to be ((D+n.sub.padding) mod L.sub.itlv)=0. Here, n.sub.padding may mean a bit size of the padding sequence.
(47) In the block interleaving process, the terminal 200 may perform block interleaving multiple times consecutively. For example, the first interleaving process may be expressed as Equation 3.
(48)
(49) In Equation 3, b(i) may mean the i-th component of the channel-coded data block output from the channel coding block 210. a mod b may mean the remainder obtained by dividing a by b.
(50) Referring to Equation 3, the terminal 200 may interleave the channel-coded data block on a block-by-block basis using a first interleaving parameter a.sub.3 among the interleaving parameters a.sub.0, a.sub.1, a.sub.2, and a.sub.3. The terminal 200 may interleave one of the sub-blocks to obtain a bit string s.sub.0. The terminal 200 may obtain a bit string s.sub.1 by interleaving the bit string s.sub.0 according to Equation 3. The terminal 200 may obtain the bit string s.sub.1 as a result of the first interleaving process.
(51) When the first interleaving process is completed, the terminal 200 may perform a second interleaving process using a different interleaving parameter than the first interleaving parameter a.sub.3 used in the first interleaving process. For example, the terminal 200 may interleave the bit string s.sub.1 using a second interleaving parameter a.sub.2. The second interleaving process may be expressed as Equation 4.
(52)
(53) Referring to Equation 4, the terminal 200 may interleave the bit string s.sub.1 resulting from the first interleaving process. The terminal 200 may obtain a bit string s.sub.2 as shown in Equation 4 using a second interleaving parameter a.sub.2. The terminal 200 may interleave the bit string s.sub.2 and obtain a bit string s.sub.3.
(54) When the second interleaving process is completed, the terminal 200 may perform a third interleaving process using a different interleaving parameter than the first interleaving parameter a.sub.3 and the second interleaving parameter a.sub.2 used in the first and second interleaving process. For example, the terminal 200 may interleave bit string s.sub.3 using a third interleaving parameter a.sub.1. The third interleaving process may be expressed as Equation 5.
(55)
(56) Referring to Equation 5, the terminal 200 may interleave the bit string s.sub.3 resulting from the second interleaving process using the third interleaving parameter a.sub.1. The terminal 200 may obtain the bit string s.sub.3 as shown in Equation 5 using the third interleaving parameter a.sub.1. The terminal 200 may interleave bit string s.sub.3 and obtain a bit string s.sub.4.
(57) When the third interleaving process is completed, the terminal 200 may perform a fourth interleaving process using a different interleaving parameter than the first through third interleaving parameters a.sub.3, a.sub.2, and a.sub.1 used in the first to third interleaving process. For example, the terminal 200 may interleave the bit string s.sub.5 using a fourth interleaving parameter a.sub.0. The fourth interleaving process may be expressed as Equation 6.
s.sub.6((a.sub.0+i)mod L.sub.itlv)=s.sub.5(i)[Equation 6]
(58) Referring to Equation 6, the terminal 200 may interleave the bit string s.sub.5 using the fourth interleaving parameter a.sub.0. The terminal 200 may interleave the bit string s.sub.5 and obtain a bit string s.sub.6.
(59) As described with reference to Equations 3 to 6, if the interleaving is performed a plurality of times using the interleaving parameters, in most cases, the interleaving pattern may be uniquely determined according to the identifier RNTI.sub.UE of the terminal 200. That is, terminals having different terminal identifiers may interleave each of the sub-blocks with different interleaving patterns. Accordingly, the base station 300 may identify the terminal 200 transmitting an uplink signal by deinterleaving the uplink signal received from the terminal 200.
(60) In step S150, the terminal 200 may perform random interleaving. The terminal 200 may perform random interleaving using the random sequence received in step S115. For example, the random sequence may be expressed as Equation 7. The random sequence may be changed according to the design of the system rather than the sequence expressed in Equation 7. Any random sequence may be applied if the terminal 200 and the base station 300 share information about the random sequence.
v.sub.real(i)={21,15,2,13,27,14,11,5,17,8,31,3,29,22,10,19}
v.sub.imag(i)={12,9,6,24,16,23,18,7,26,30,4,0,25,20,1,28}[Equation 7]
(61) In Equation 7, v.sub.real may mean a first random sequence used to interleave the real part of the sub-block. v.sub.imag may mean a second random sequence used to interleave the imaginary part of the sub-block.
(62) Referring to Equation 7, the size of each of the first random sequence and the second random sequence may be half of size of the block L.sub.itlv (for example, 32 bits). The numerical arrangement of the first random sequence and the second random sequence shown in Equation 7 is merely an example, and the embodiment is not limited thereto.
(63) The terminal 200 may interleave bit string s.sub.6 obtained through Equation 6 using the first random sequence and the second random sequence. The random interleaving process may be expressed as Equation 8.
(64)
(65) In Equation 7, s.sub.real may mean a bit string used for a real part of an uplink signal. And s.sub.image may mean a bit string used in the imaginary part of the uplink signal. The range of m in Equation 8 may be determined by Equation 9.
m=0,1,2, . . . ,D/(L.sub.tilv/2)1[Equation 9]
(66) Referring to Equation 9, the value of m may have one of the values from 0 to D/(L.sub.tilv/2)1. The value of m may be different for each of the plurality of sub-blocks. The value of m applied to each block may be determined randomly. For example, the value of m applied to each of the plurality of sub-blocks may be determined from a random row of matrices of Latin squares. For example, if the row determining the m value is [0, 1, 2, 3, 4], m=0 is applied to the interleaving of a first sub-block. And m=1 is applied to a second sub-block. In this case, interleaving may be performed for each of the plurality of sub-blocks, and the interleaving may not be performed between different sub-blocks.
(67) As another example, if the row determining the m value is [1, 2, 4, 0, 3], components of a bit string of the second sub-block are arranged in the first sub-block, and components of a bit string of the first sub-block are arranged in the fourth sub-block. That is, interleaving between different sub-blocks may be performed.
(68) The interleaving process has been described above with reference to Equations (1) to (9). In the interleaving process, the interleaving parameters a.sub.0, a.sub.1, a.sub.2 and a.sub.3 determined from the terminal identifiers are used. In the above example, each of a.sub.0, a.sub.1, a.sub.2 and a.sub.3 may have a value of 0 to 15. However, the embodiments of present disclosure are not limited thereto. For example, if the number of terminals connected to the base station 300 is small, the terminal 200 may limit the range of the values of the interleaving parameters to further simplify interleaving process. For example, the terminal 200 may limit the values of the interleaving parameters to 0 to 2. In this case, the terminal 200 may determine the interleaving parameters as the remainders obtained by dividing each of the numbers represented respectively by our bit strings each of which has a size of 4 bits. However, the method by which the terminal 200 determines the interleaving parameter is not limited to the above-described example.
(69) The terminal 200 may transmit the plurality of sub-blocks on which the block interleaving and the random interleaving have been performed. As another example, the terminal 200 may further perform scrambling on the plurality of sub-blocks on which the block interleaving and the random interleaving have been performed.
(70) Referring again to
e.sub.real(i)=(s.sub.real(i)+c(i).sub.RNTI.sub.
e.sub.imag(i)=(s.sub.imag(i)+c(i)+c(i).sub.RNTI.sub.
(71) Referring to Equation 10, the terminal 200 may perform the scrambling on a bit string s.sub.real to obtain a bit string e.sub.real. The terminal 200 may perform scrambling on the bit string s.sub.imag to obtain a bit string e.sub.imag. The terminal 200 may add a pseudo-random sequence c(i).sub.RNTI.sub.
(72) The pseudo-random sequence c(i).sub.RNTI.sub.
c(i).sub.RNTI.sub.
x.sub.1(i+31)=(x.sub.1(i+3)+x.sub.1(i))mod 2
x.sub.2(i+3)=(x.sub.2(i+3)+x.sub.2(i+2)+x.sub.2(i+1)+x.sub.2(i))mod 2,
i=0,1,2, . . . ,D1[Equation 11]
(73) In Equation 11, initial shift register value of x.sub.1 may be determined to be x.sub.1(0)=1, {x.sub.1(k)=0, k=1, 2, . . . 30}. In addition, the initial shift register value of x.sub.2 may be determined depending on the cell ID of the base station 300. For example, the initial shift register value of x.sub.2 may be determined by Equation 12.
.sub.k=0.sup.k=15RNTI.sub.cell(k).Math.2.sup.k=.sub.k=0.sup.k=30x.sub.2(k).Math.2.sup.k[Equation 12]
(74) The sequence x.sub.2 may be determined to satisfy equation 11 and equation 12. Referring to equation 12, the sequence x.sub.2 may depend on the cell ID RNTI.sub.CELL of the base station 300. The terminal 200 may perform a 2-modulo operation on each component of sum of sequence x.sub.1 and sequence x.sub.2 to obtain a pseudo-random sequence. The terminal 200 may perform scrambling using the pseudo-random sequence.
(75) In step S170, the terminal 200 may transmit the plurality of sub-blocks on which the block interleaving has been performed through an uplink signal. The base station 300 may receive the uplink signal from the terminal 200.
(76) In step S180, the base station 300 may demodulate the uplink signal received from the terminal 200. In the demodulation process, the base station 300 may perform deinterleaving process. The base station 300 may verify a result of the deinterleaving process while applying different deinterleaving schemes. The base station 300 may check whether the deinterleaving is normally performed, and check an interleaver of the uplink signal. The base station 300 may identify the terminal 200 transmitting the uplink signal by checking the interleaver of the uplink signal.
(77) As described above, the base station 300 may identify the terminal 200 by checking the interleaver in the process of demodulating the uplink signal. However, if the number of terminals connected to the base station 300 is large, it may be difficult to check all interleavers available from the base station 300. Accordingly, the base station 300 may allocate a signal transmission time to each of the terminals. In a case that the base station 300 identifies a terminal transmitting the uplink signal, the base station 300 may consider only a candidate set determined according to the time of transmission of uplink signal, not all terminals.
(78)
(79) Referring to
(80) In step S112, the base station 300 may transmit information about the signal transmission time allocated to the terminal identifier of the terminal 200. The terminal 200 may receive the information about the signal transmission time from the base station 300. The terminal 200 may receive the information about the signal transmission time and determine the time to transmit the uplink signal.
(81) In step S170, the terminal 200 may transmit uplink signal within a signal transmission time allocated to the terminal 200. The terminal 200 may transmit the sub-blocks on which the block interleaving has been performed through uplink signal.
(82)
(83) Referring to
(84) For example, the base station 300 may receive uplink signal within an interval A. In this case, the base station 300 may limit the range of the terminal identifier to 3FC0 to 3FCF, 3F20 to 3F2F, and 3F10 to 3F1F. As another example, in a case that the base station 300 receives uplink signal within an interval B, the base station 300 may limit the range of the terminal identifier to 3FD0 to 3FDF, 3F60 to 3F6F, 3F70 to 3F7F.
(85) The base station 300 may identify a terminal within a limited group based on the time of reception of the uplink signal. For example, in a case that the base station 300 receives the uplink signal within the A interval, the number of deinterleaving schemes may be reduced in consideration of the above-described range of the terminal identifier. By reducing the number of cases of the deinterleaving schemes of the base station 300, time and resources for signal demodulation and identification of terminal may be reduced.
(86)
(87) In step S205, the terminal 200 may transmit a registration request. The base station 300 may receive the registration request from the terminal 200. The base station 300 may manage information of the terminal 200 and provide a service to the terminal 200. For example, the terminal identifier may comprise Cell Ratio Network Temporary Identifier (C-RNTI). The terminal identifier may have a size of 16 bits. However, the above-described examples and numerical values are illustrative only and the embodiments of the present disclosure are not limited thereto. For example, the terminal identifier may have size smaller than or larger than 16 bits.
(88) In step S210, the base station 300 may transmit information about the terminal identifier in response to the registration request. The terminal 200 may receive the information about the terminal identifier from the base station 300.
(89) In step S220, the terminal 200 may determine a subcarrier index from the terminal identifier. The terminal 200 may divide the terminal identifier into multiple bit strings having a predetermined size and determine the subcarrier index using numbers represented respectively by the multiple bit strings. For example, the terminal 200 may divide the 16-bits terminal identifier into four bit strings each of which has a size of 4 bits and determine numbers represented respectively by the four bit strings as a.sub.0, a.sub.1, a, and a.sub.3, as described with reference to Equation 1. The terminal 200 may determine a subcarrier index using a.sub.0, a.sub.1, a.sub.2, and a.sub.3. For example, the subcarrier index may be determined by equation 13.
k.sub.sel=(4096.Math.a.sub.3+256.Math.a.sub.2+16.Math.a.sub.1+a.sub.0)mod N.sub.u_max[Equation 13]
(90) In Equation 13, k.sub.sel may mean a subcarrier index corresponding to the terminal identifier. N.sub.u_max may mean the number of effective subcarriers of the OFDM symbol frequency axis.
(91) Referring to Equation 13, the subcarrier index k.sub.sel used by the terminal 200 for transmitting the reference signal may depend on the parameters a.sub.0, a.sub.1, a.sub.2 and a.sub.3 derived from the terminal identifier of the terminal 200.
(92) In step S230, the terminal 200 may set a signal strength of each subcarrier component. The terminal 200 may transmit a reference signal according to the determined signal strength of each subcarrier component determined in step S220. For example, the terminal 200 may generate the reference signal as shown in equation 14.
(93)
(94) In Equation 14, x.sub.n may mean a reference signal. X.sub.k may mean a vector representing k-th subcarrier component of x.sub.n. Referring to Equation 14, X.sub.k may not be 0 only in a case that k=k.sub.sel. The terminal 200 may set signal strengths of components excluding a component corresponding to the subcarrier index obtained in Equation 13 to be smaller than a threshold value.
(95) In step S240, the terminal 200 may transmit the reference signal. The base station 300 may receive the reference signal from the terminal 200.
(96)
(97) Referring to
(98) In step S250, the base station 300 may measure the reference signal received from the terminal 200. The base station 300 may measure a signal strength of each subcarrier component of the reference signal. The base station 300 may compare the signal strength of each subcarrier component of the reference signal to predetermined threshold value. For example, the base station 300 may analyze the signal strength of each subcarrier component of the reference signal as shown in equation 15.
(99)
(100) Referring to Equation 15, the base station 300 may compare the signal strength of the reference signal with predetermined threshold value .sub.thres. The base station 300 may set the X.sub.det (k) value to 1 if an absolute value of X.sub.k is greater than the threshold value .sub.thres. On the other hand, the base station 300 may set the X.sub.det (k) to 0 in a case that the absolute value of X.sub.k is smaller than the threshold value .sub.thres.
(101) In step S260, the base station 300 may determine a candidate set for the terminal transmitting the reference signal based on the signal strength of each subcarrier component of the reference signal. The candidate set for the terminal transmitting the reference signal may be determined by a k value satisfying X.sub.det (k)=1. For example, in a case that X.sub.det (k) has a value of 1 only at k=2, the base station 300 may determine the candidate set for the terminal transmitting the reference signal as a group of terminals transmitting a reference signal through subcarrier 2. For example, a group of terminals transmitting a reference signal through subcarrier 2 may include terminals assigned a terminal identifier satisfying k.sub.sel=2 in Equation 13.
(102)
(103) In
(104) The accuracy with which the base station 300 determines the candidate may depend on the threshold value .sub.thres in equation 15.
(105)
(106) The graph L1 shows a probability of failing to determine the candidate set, and the L2 graph shows a probability of determining wrong candidate set. Referring to
(107) In step S270, the base station 300 may identify the terminal 200 transmitting the reference signal in the determined candidate set. The base station 300 may apply decoding schemes corresponding to the determined candidate set to decode the reference signal.
(108)
(109) Referring to
(110) In a case that the base station 300 receives the reference signal transmitted through the first subcarrier, the base station 300 may determine the first terminal, the second terminal, and the fourth terminal as the candidate set. The base station 300 may decode the reference signal using decoding schemes corresponding to the first terminal, the second terminal, and the fourth terminal.
(111) The base station 300 may decode the reference signal and determine whether a result of the decoding passes a cyclic redundancy check (CRC). The base station 300 may determine that the terminal corresponding to the decoding scheme that passes the CRC has transmitted the reference signal. The base station 300 may try only the decoding schemes of the terminals included in the candidate set determined in step S260 without trying all the decoding schemes of all the terminals. Therefore, the process of decoding the reference signal and identifying the terminal 200 by the base station 300 may be simplified.
(112)
(113) Referring to
(114) In step S212, the base station 300 may transmit information about the signal transmission time allocated to the terminal identifier of the terminal 200. The terminal 200 may receive information about the signal transmission time from the base station 300. The terminal 200 may receive the information about the signal transmission time and determine a time to transmit the uplink signal.
(115) In step S240, the terminal 200 may transmit a reference signal within the signal transmission time allocated to itself.
(116) In step S260, the base station 300 may determine the first candidate set based on a signal strength of each subcarrier component of the reference signal.
(117) In step S265, the base station 300 may determine the second candidate set based on the time at which the reference signal is received.
(118) In step S270, the base station 300 may determine an intersection of the first candidate set and the second candidate set. The base station 300 may decode the reference signal with decoding schemes corresponding to the terminals included in the intersection. The base station 300 may identify the terminal 200 transmitting the reference signal within the intersection of the first candidate set and the second candidate set based a result of the decoding. The number of the decoding schemes used by the base station 300 may be limited to the number of terminals included in the intersection of the first candidate set and the second candidate set. Therefore, the process of decoding the reference signal and identifying the terminal 200 by the base station 300 may be simplified.
(119) The operation methods of the terminal and the base station according to the embodiments of the present disclosure have been described above with reference to
(120) The embodiments of the present disclosure may be implemented as program instructions executable by a variety of computers and recorded on a computer readable medium. The computer readable medium may include a program instruction, a data file, a data structure, or a combination thereof. The program instructions recorded on the computer readable medium may be designed and configured specifically for the present disclosure or can be publicly known and available to those who are skilled in the field of computer software.
(121) Examples of the computer readable medium may include a hardware device such as ROM, RAM, and flash memory, which are specifically configured to store and execute the program instructions. Examples of the program instructions include machine codes made by, for example, a compiler, as well as high-level language codes executable by a computer, using an interpreter. The above exemplary hardware device can be configured to operate as at least one software module in order to perform the embodiments of the present disclosure, and vice versa.
(122) While the embodiments of the present disclosure and their advantages have been described in detail, it should be understood that various changes, substitutions and alterations may be made herein without departing from the scope of the present disclosure.