Recipient Identification for Fifth Generation Communication
20190273517 · 2019-09-05
Inventors
Cpc classification
H04W28/06
ELECTRICITY
H03M13/09
ELECTRICITY
H04W72/23
ELECTRICITY
International classification
H03M13/00
ELECTRICITY
H04L1/00
ELECTRICITY
H04W28/06
ELECTRICITY
H03M13/29
ELECTRICITY
Abstract
Identification of communication participants may be an important aspect of various communication systems. For example, fifth generation (5G) wireless communication systems may benefit from suitable recipient identification. A method can include obtaining data bits to be communicated to a target device. The method can also include obtaining identification bits corresponding to at least one of sender or receiver of the data bits. The method can further include multiplexing the data bits with the identification bits.
Claims
1.-18. (canceled)
19. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to perform: obtain data bits to be communicated to a target device; obtain identification bits corresponding to at least one of sender or receiver of the data bits; and multiplex the data bits with the identification bits.
20. The apparatus of claim 19, wherein the identification bits comprise a radio network temporary identifier.
21. The apparatus of claim 19, wherein the identification bits comprise a common identifier of a plurality of receiving devices.
22. The apparatus of claim 19, wherein the data bits comprise downlink control information.
23. The apparatus of claim 19, wherein the identification bits are used as known bits with channel code shortening.
24. The apparatus of claim 19, wherein the at least one memory and the computer program code are further configured to, with the at least one processor, cause the apparatus to: encode the multiplexed bits.
25. The apparatus of claim 24, wherein the at least one memory and the computer program code are further configured to, with the at least one processor, cause the apparatus to: remove identification data bits from the encoded bits.
26. The apparatus of claim 24, wherein the at least one memory and the computer program code are further configured to, with the at least one processor, cause the apparatus to: perform rate matching on the encoded data bits.
27. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to perform: receive encoded data bits; and insert logarithmic likelihood ratio values corresponding to identification data bits into the received encoded data bits.
28. The apparatus of claim 27, wherein identification bits comprise a radio network temporary identifier.
29. The apparatus of claim 27, wherein the data bits comprise downlink control information.
30. The apparatus of claim 27, wherein the at least one memory and the computer program code are further configured to, with the at least one processor, cause the apparatus to: decode the combined logarithmic likelihood ratio values and encoded data bits.
31. The apparatus of claim 30, wherein the at least one memory and the computer program code are further configured to, with the at least one processor, cause the apparatus to: remove the identification data bits.
32. The apparatus of claim 27, wherein the at least one memory and the computer program code are further configured to, with the at least one processor, cause the apparatus to: rate dematch the encoded data bits prior to inserting the logarithmic likelihood ratio values.
33. A method, comprising: obtaining data bits to be communicated to a target device; obtaining identification bits corresponding to at least one of sender or receiver of the data bits; and multiplexing the data bits with the identification bits.
34. The method of claim 33, wherein the identification bits comprise a radio network temporary identifier.
35. The method of claim 33, wherein the identification bits comprise a common identifier of a plurality of receiving devices.
36. The method of claim 33, wherein the identification bits are used as known bits with channel code shortening.
37. The method of claim 33, further comprising: encoding the multiplexed bits.
38. The method of claim 37, further comprising: removing identification data bits from the encoded bits.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0024] For proper understanding of the invention, reference should be made to the accompanying drawings, wherein:
[0025]
[0026]
[0027]
DETAILED DESCRIPTION
[0028] Certain embodiments relate to how to identify receiver, transmitter, or both in 5G systems with blind decoding. For example, certain embodiments relate specifically to channel code construction. Certain embodiments of the method can be used, for example, in downlink control information reception, and possibly for machine type communication (MTC)/ultra-reliable low latency communication (URLLC) users.
[0029] The bits, such as RNTI, that identify the receiver and/or transmitter can be used as known bits with channel code shortening. The data bits, downlink control information (DCI) for example, can be multiplexed with the known UE id bits.
[0030] Insertion coding, also known as zero padding and shortening, is a method in which known bits are multiplexed with information bits, thus decreasing coding rate, where the method is used as a part of rate matching. This approach is described in Beermann et al. Rate-Compatible LDPC codes using Optimized Dummy Bit Insertion, 8th International Symposium on Wireless Communication Systems (ISWCS), 2011, which is hereby incorporated herein by reference in its entirety. Certain embodiments can apply this or a similar or related technique to combine information bits identifying the receiver and/or transmitter with the information to be transmitted.
[0031]
[0032] The method can also include, at 120, encoding the multiplexed bits. Moreover, the method can further include, at 130, removing the identification bits from the encoded bits. The method can additionally include, at 140, performing rate matching on the encoded data bits.
[0033] The resulting data stream can then be transmitted. At a receiving end of the data stream, the method can include receiving encoded data bits. The method can also include, at 160, inserting logarithmic likelihood ratio values corresponding to identification data bits. The method can include, at 150, rate dematching the encoded data bits prior to inserting the logarithmic likelihood ratio values. The method can also include, at 170, decoding the combined logarithmic likelihood ratio values and encoded data bits. The method can further include, at 180, removing identification data bits.
[0034] There are several options. For example, in downlink, the data bits (DCI, for example) and UE id bits can be multiplexed and encoded. If the same data is intended for several receivers (for example, multicast or broadcast), there can be a common id for all of the recipients. The common ID can be communicated to the recipients, for example, with a control channel
[0035] Both transmitter and intended recipient identifiers can be used. This may be useful for example in massive MTC networks, where data volume per device is very small. When also the recipient ID is used as the known bits in the encoder, the receiver can identify messages which are intended to it.
[0036] Multiplexing of two or more users on the same resources can be done in various ways. For example, channel code(s) can be designed to have good performance in interference situations. The users can be separated by their channel codes and IDs. Specific multi-user detection may not be needed but performance can be further improved by multi-user detection (MUD).
[0037] LDPC codes inherently require fewer CRC bits. The method of using UE ID bits as shortening bits can be combined with CRC masking. With polar codes, the UE ID bits can replace some of the frozen bits. When systematic polar codes are used, a similar method could be used as in
[0038] Other codes can be applied: repeat and accumulate codes, zigzag codes, turbo product codes, convolutional codes, in fact any systematic code. For non-systematic codes the method can also be applied, but there may be a penalty, since the known bits cannot be punctured.
[0039] Certain embodiments can be readily applied to a transmitter. For example, the transmitter can be configured such that CRC appends to the info block, then pads with RNTI sequence. Next, the full block can be encoded and rate matched by removing RNTI bits. Since LDPC is systematic, this operation does not affect decoding if the correct RNTI sequence is used at the receiver side.
[0040]
[0041]
[0042] Transceivers 316 and 326 may each, independently, be a transmitter, a receiver, or both a transmitter and a receiver, or a unit or device that may be configured both for transmission and reception. The transmitter and/or receiver (as far as radio parts are concerned) may also be implemented as a remote radio head which is not located in the device itself, but in a mast, for example. It should also be appreciated that according to the liquid or flexible radio concept, the operations and functionalities may be performed in different entities, such as nodes, hosts or servers, in a flexible manner. In other words, division of labor may vary case by case. One possible use is to make a network element to deliver local content. One or more functionalities may also be implemented as a virtual application that is provided as software that can run on a server.
[0043] A user device or user equipment 320 may be a mobile station (MS) such as a mobile phone or smart phone or multimedia device, a computer, such as a tablet, provided with wireless communication capabilities, personal data or digital assistant (PDA) provided with wireless communication capabilities, vehicle, portable media player, digital camera, pocket video camera, navigation unit provided with wireless communication capabilities or any combinations thereof. The user device or user equipment 320 may be a sensor or smart meter, or other device that may usually be configured for a single location.
[0044] In an exemplifying embodiment, an apparatus, such as a node or user device, may include means for carrying out embodiments described above in relation to
[0045] Processors 314 and 324 may be embodied by any computational or data processing device, such as a central processing unit (CPU), digital signal processor (DSP), application specific integrated circuit (ASIC), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), digitally enhanced circuits, or comparable device or a combination thereof. The processors may be implemented as a single controller, or a plurality of controllers or processors. Additionally, the processors may be implemented as a pool of processors in a local configuration, in a cloud configuration, or in a combination thereof. The term circuitry may refer to one or more electric or electronic circuits. The term processor may refer to circuitry, such as logic circuitry, that responds to and processes instructions that drive a computer.
[0046] For firmware or software, the implementation may include modules or units of at least one chip set (e.g., procedures, functions, and so on). Memories 315 and 325 may independently be any suitable storage device, such as a non-transitory computer-readable medium. A hard disk drive (HDD), random access memory (RAM), flash memory, or other suitable memory may be used. The memories may be combined on a single integrated circuit as the processor, or may be separate therefrom. Furthermore, the computer program instructions may be stored in the memory and which may be processed by the processors can be any suitable form of computer program code, for example, a compiled or interpreted computer program written in any suitable programming language. The memory or data storage entity is typically internal but may also be external or a combination thereof, such as in the case when additional memory capacity is obtained from a service provider. The memory may be fixed or removable.
[0047] The memory and the computer program instructions may be configured, with the processor for the particular device, to cause a hardware apparatus such as network element 310 and/or UE 320, to perform any of the processes described above (see, for example,
[0048] Furthermore, although
[0049] One having ordinary skill in the art will readily understand that the invention as discussed above may be practiced with steps in a different order, and/or with hardware elements in configurations which are different than those which are disclosed. Therefore, although the invention has been described based upon these preferred embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions would be apparent, while remaining within the spirit and scope of the invention.
List of Abbreviations
[0050] CRC Cyclic redundancy check
[0051] DCI Downlink Control Information
[0052] MTC Machine Type Communication
[0053] RNTI Radio Network Temporary Identifier
[0054] UID User Equipment Identity
[0055] URLLC Ultra Reliable and Low Latency Communication