Neural network-assisted generation of interleaver in wireless communication system
12471093 ยท 2025-11-11
Assignee
Inventors
- Bryan Liu (Massy, FR)
- Samad ALI (Oulu, FI)
- Oana-Elena Barbu (Aalborg, DK)
- Amir Aghaei Anvigh (Nozay, FR)
Cpc classification
H03M13/6597
ELECTRICITY
H04B7/0626
ELECTRICITY
H03M13/2742
ELECTRICITY
H04W72/20
ELECTRICITY
H03M13/6508
ELECTRICITY
International classification
H04W72/20
ELECTRICITY
H04L1/00
ELECTRICITY
Abstract
The present disclosure relates to a technical solution that improves the reliability of communications over a wireless communication channel by replacing a conventional interleaver (e.g., random interleaver) with a Neural Network (NN)-generated interleaver. For this purpose, a well-trained NN is used, which is configured to receive a UE connection status and a channel status as input data and outputs the interleaver in the form of an orthogonal binary matrix. The NN is shared by a UE and a network node. The network node may use the interleaver to interleave a set of bits in a downlink control message before the downlink control message is encoded, e.g., with an error correcting code, such as a polar code. The UE may generate and transpose the interleaver to obtain a deinterleaver to be applied to the downlink control message after its decoding (e.g., polar decoding).
Claims
1. A network node in a wireless communication network, comprising: at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the network node at least to: generate a control message to be transmitted to a User Equipment (UE) over a wireless communication channel, the control message comprising a set of bits, the wireless communication channel having a channel status, and the UE having a connection status in the wireless communication network; generate an interleaver by using a Neural Network (NN), the NN being pre-known to both the network node and the UE, the NN being configured to receive the connection status of the UE and the channel status of the wireless communication channel as input data and output the interleaver, the interleaver being an orthogonal binary matrix; interleave the set of bits in the control message by using the generated interleaver; encode the control message comprising the interleaved set of bits; and transmit the encoded control message to the UE over the wireless communication channel.
2. The network node of claim 1, wherein the network node is configured to encode the message based on a polar code or a convolutional code.
3. The network node of claim 1, wherein the connection status of the UE is defined by a Radio Resource Control (RRC) protocol, and wherein the channel status of the wireless communication channel comprises Channel State Information (CSI) previously reported by the UE to the network node.
4. The network node of claim 1, wherein the NN is pre-trained by using an end-to-end learning model with a back-propagation algorithm and a cross-entropy loss function.
5. The network node of claim 1, wherein the NN is configured as a Gumbel-Sinkhorn network.
6. A User Equipment (UE) in a wireless communication network, comprising: at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the UE at least to: receive an encoded control message from a network node over a wireless communication channel, the encoded control message comprising an interleaved set of bits, the wireless communication channel having a channel status; decode the encoded control message to retrieve the interleaved set of bits; generate an interleaver by using a Neural Network (NN), the NN being pre-known to both the UE and the network node, the NN being configured to receive the channel status of the wireless communication channel and a connection status of the UE in the wireless communication network as input data and output the interleaver, the interleaver being an orthogonal binary matrix; generate a deinterleaver by applying a transpose operation to the generated interleaver; and deinterleave the interleaved set of bits by using the generated deinterleaver.
7. The UE of claim 6, wherein the encoded control message is obtained based on a polar code or a convolutional code, and wherein the UE is configured to decode the encoded control message based on the polar code or the convolutional code, respectively.
8. The UE of claim 6, wherein the connection status of the UE is defined by a Radio Resource Control (RRC) protocol, and wherein the channel status of the wireless communication channel comprises Channel State Information (CSI) previously reported from the UE to the network node.
9. The UE of claim 6, wherein the NN is pre-trained by using an end-to-end learning model with a back-propagation algorithm and a cross-entropy loss function.
10. The UE of claim 6, wherein the NN is configured as a Gumbel-Sinkhorn network.
11. A method for operating a network node in a wireless communication network, comprising: generating a control message to be transmitted to a User Equipment (UE) over a wireless communication channel, the control message comprising a set of bits, the wireless communication channel having a channel status, and the UE having a connection status in the wireless communication network; generating an interleaver by using a Neural Network (NN), the NN being pre-known to both the network node and the UE, the NN being configured to receive the channel status of the wireless communication channel and the connection status of the UE as input data and output the interleaver, the interleaver being an orthogonal binary matrix; interleaving the set of bits in the control message by using the generated interleaver; encoding the control message comprising the interleaved set of bits; and transmitting the encoded control message to the UE over the wireless communication channel.
12. A computer program product comprising a non-transitory computer-readable storage medium, wherein the computer-readable storage medium stores a computer code which, when executed by at least one processor, causes the at least one processor to perform the method according to claim 11.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The present disclosure is explained below with reference to the accompanying drawings in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
DETAILED DESCRIPTION
(12) Various embodiments of the present disclosure are further described in more detail with reference to the accompanying drawings. However, the present disclosure can be embodied in many other forms and should not be construed as limited to any certain structure or function discussed in the following description. In contrast, these embodiments are provided to make the description of the present disclosure detailed and complete.
(13) According to the detailed description, it will be apparent to the ones skilled in the art that the scope of the present disclosure encompasses any embodiment thereof, which is disclosed herein, irrespective of whether this embodiment is implemented independently or in concert with any other embodiment of the present disclosure. For example, the apparatuses and methods disclosed herein can be implemented in practice by using any numbers of the embodiments provided herein. Furthermore, it should be understood that any embodiment of the present disclosure can be implemented using one or more of the elements presented in the appended claims.
(14) Unless otherwise stated, any embodiment recited herein as example embodiment should not be construed as preferable or having an advantage over other embodiments.
(15) According to the example embodiments disclosed herein, a User Equipment (UE) may refer to an electronic computing device that is configured to perform wireless communications. The UE may be implemented as a mobile station, a mobile terminal, a mobile subscriber unit, a mobile phone, a cellular phone, a smart phone, a cordless phone, a personal digital assistant (PDA), a wireless communication device, a desktop computer, a laptop computer, a tablet computer, a gaming device, a netbook, a smartbook, an ultrabook, a medical mobile device or equipment, a biometric sensor, a wearable device (e.g., a smart watch, smart glasses, a smart wrist band, etc.), an entertainment device (e.g., an audio player, a video player, etc.), a vehicular component or sensor (e.g., a driver-assistance system), a smart meter/sensor, an unmanned vehicle (e.g., an industrial robot, a quadcopter, etc.) and its component (e.g., a self-driving car computer), industrial manufacturing equipment, a global positioning system (GPS) device, an Internet-of-Things (IoT) device, an Industrial IoT (IIoT) device, a machine-type communication (MTC) device, a group of Massive IoT (MIoT) or Massive MTC (mMTC) devices/sensors, or any other suitable mobile device configured to support wireless communications. In some embodiments, the UE may refer to at least two collocated and inter-connected UEs thus defined.
(16) As used in the example embodiments disclosed herein, a network node may refer to a fixed point of communication or communication node for a UE in a particular wireless communication network. More specifically, the network node may be used to connect the UE to a Data Network (DN) through a Core Network (CN) and may be referred to as a base transceiver station (BTS) in terms of the 2G communication technology, a NodeB in terms of the 3G communication technology, an evolved NodeB (eNodeB or eNB) in terms of the 4G communication technology, and a gNB in terms of the 5G New Radio (NR) communication technology. The network node may serve different cells, such as a macrocell, a microcell, a picocell, a femtocell, and/or other types of cells. The macrocell may cover a relatively large geographic area (e.g., at least several kilometers in radius). The microcell may cover a geographic area less than two kilometers in radius, for example. The picocell may cover a relatively small geographic area, such, for example, as offices, shopping malls, train stations, stock exchanges, etc. The femtocell may cover an even smaller geographic area (e.g., a home). Correspondingly, the network node serving the macrocell may be referred to as a macro node, the network node serving the microcell may be referred to as a micro node, and so on.
(17) According to the example embodiments disclosed herein, a wireless communication network, in which a UE and a network node communicate with each other, may refer to a cellular or mobile network, a Wireless Local Area Network (WLAN), a Wireless Personal Area Networks (WPAN), a Wireless Wide Area Network (WWAN), a satellite communication (SATCOM) system, or any other type of wireless communication networks. Each of these types of wireless communication networks supports wireless communications according to one or more communication protocol standards. For example, the cellular network may operate according to the Global System for Mobile Communications (GSM) standard, the Code-Division Multiple Access (CDMA) standard, the Wide-Band Code-Division Multiple Access (WCDM) standard, the Time-Division Multiple Access (TDMA) standard, or any other communication protocol standard, the WLAN may operate according to one or more versions of the IEEE 802.11 standards, the WPAN may operate according to the Infrared Data Association (IrDA), Wireless USB, Bluetooth, or ZigBee standard, and the WWAN may operate according to the Worldwide Interoperability for Microwave Access (WiMAX) standard.
(18) Error correcting codes (e.g., polar codes) can correct errors successfully if there are not too many errors in a single codeword. However, errors sometimes tend to be bursty in the sense that there can be a local concentration of many errors. This situation can occur, for example, in burst error channels, such as wireless communication channels. To cope with the problem of burst errors, interleaving can be used, which consists in dispersing sequences of bits in a bitstream so as to minimize the effect of burst errors introduced in transmission. There are different kinds of interleavers currently used in different communication systems, but none of them considers the diversity of entropies of source control bits.
(19) To demonstrate that the diversity of the entropies of the source control bits affects polar decoding performance, let us consider the following example. Suppose an encoded codeword length is 128 and there are 60 information bits, and each information bit is sampled from a Bernoulli distribution of b.sub.iBern(.sub.i), where .sub.i is an activation ratio that is randomly drawn from a uniform distribution from 0 to 1. As a result, each control bit has its own entropy. Moreover, since a polar code bit-wise capacity is different, it becomes important to map a control bit with a small entropy value to a polar code bit position which has a low bit-wise capacity, and vice versa. Therefore, the selection of a suitable interleaver is of great importance.
(20)
(21) The numerical results presented in
(22) The example embodiments disclosed herein provide a technical solution that improves the reliability of communications over a wireless communication channel by replacing a conventional interleaver (e.g., random interleaver) with an adaptive NN-generated interleaver. For this purpose, a well-trained NN is used, which is configured to receive a UE connection status (e.g., defined by the RRC protocol) and a channel status (e.g., one or more different CQIs reported by the UE) as input data and outputs the interleaver in the form of an orthogonal binary matrix. The NN is shared by a UE and a network node. The network node may use the interleaver to interleave a set of bits in a downlink control message before the downlink control message is encoded, e.g., with an error correcting code, such as a polar code. The UE may transpose the interleaver to obtain a deinterleaver to be applied to the downlink control message after its decoding (e.g., polar decoding).
(23)
(24) The processor 202 may be implemented as a CPU, general-purpose processor, single-purpose processor, microcontroller, microprocessor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), digital signal processor (DSP), complex programmable logic device, etc. It should be also noted that the processor 202 may be implemented as any combination of one or more of the aforesaid. As an example, the processor 202 may be a combination of two or more microprocessors.
(25) The memory 204 may be implemented as a classical nonvolatile or volatile memory used in the modern electronic computing machines. As an example, the nonvolatile memory may include Read-Only Memory (ROM), ferroelectric Random-Access Memory (RAM), Programmable ROM (PROM), Electrically Erasable PROM (EEPROM), solid state drive (SSD), flash memory, magnetic disk storage (such as hard drives and magnetic tapes), optical disc storage (such as CD, DVD and Blu-ray discs), etc. As for the volatile memory, examples thereof include Dynamic RAM, Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDR SDRAM), Static RAM, etc.
(26) The processor-executable instructions 206 stored in the memory 204 may be configured as a computer-executable program code which causes the processor 202 to perform the aspects of the present disclosure. The computer-executable program code for carrying out operations or steps for the aspects of the present disclosure may be written in any combination of one or more programming languages, such as Java, C++, or the like. In some examples, the computer-executable program code may be in the form of a high-level language or in a pre-compiled form and be generated by an interpreter (also pre-stored in the memory 204) on the fly.
(27)
(28) The method 300 starts with a step S302, in which the processor 202 generates a control message to be transmitted to a UE over a wireless communication channel. The control message comprises a set of bits and may be, for example, a control message that causes the UE to take a certain action (e.g., the control message may be a RRC Release message that instructs the UE to go from RRC_CONNECTED state to RRC_INACTIVE state, or if the UE has a sparse traffic, the control message may indicate that the resulting control bits for frequency-domain scheduling may also become sparse). The wireless communication channel has a channel status that is previously reported by the UE to the network node 200, e.g., in the form of Channel State Information (CSI), such as a Rank indicator (RI), a Precoder Matrix Indicator (PMI), a Channel Quality indicator (CQI), a CSI-RS resource indicator (CRI), etc. The UE itself has a connection status in the wireless communication channel, which may be defined by the RRC protocol, so that there may be three connection statuses in 5G NR networks: RRC_CONNECTED, RRC_INACTIVE, and RRC_IDLE.
(29) Next, the method 300 goes on to a step S304, in which the processor 202 generates an interleaver by using a NN. It should be again noted that the NN is pre-known to both the network node 200 and the UE (i.e., it is shared by the UE and the network node 200). For example, the NN may be pre-stored in the UE and the network node 200 (i.e., in the memory 204), or it may be provided to the UE and the network node 200 from a remote server before or during the method 300. The NN is configured to receive the channel status of the wireless communication channel and the connection status of the UE as input data and output the interleaver. In general, the NN model may be configured to receive any local information (e.g., reported CQI, past DCI messages, UE RRC status, etc.) that is common to both the UE and the network node 200. Preferably, the NN is pre-trained by using an end-to-end learning model with a back-propagation algorithm and a cross-entropy loss function. More preferably, the NN is configured as a Gumbel-Sinkhorn network.
(30) After the interleaver is generated, the method 300 goes on to a step S306, in which the processor 202 interleaves the set of bits in the control message by using the generated interleaver.
(31) In a step S308, the processor 202 encodes the control message comprising the interleaved set of bits. Said encoding may be performed, for example, by using a polar code. It should be noted that the present disclosure is not limited to polar codes onlyin some embodiments, any channel code (e.g., convolutional codes) may be applicable, which is suitable for a control channel.
(32) The method 300 ends up with a step S310, in which the processor 202 transmits the encoded control message to the UE over the wireless communication channel.
(33)
(34)
(35)
(36)
(37)
(38) In the training phase 802, a central training server collects information that is known both to the network node 200 and the UE 500. For instance, this information may comprise sub-band CQIs and the connection status of the UE 500. This common information serves as the input to the NN to generate the interleaver. By embedding the NN as part of the end-to-end training model 800, the CE loss at the receiver side is minimized. The receiver is highlighted in
(39) In the test phase 804, the well-trained NN is provided to the network node 200 and the UE 500. The deinterleaver equipped at the UE side is simply the transpose of the NN output. Note that since the UE 500 shares the same common information as the network node 200, the generated interleaver should be identical for the network node 200 and the UE 500. As a result, the UE 500 can successfully decode the source control message.
(40)
(41) In a step S916, the DCI message is transmitted over the PDCCH to the UE 500.
(42) Next, symmetric steps are performed by the UE 500 with respect to the DCI message. That is, the UE 500 demultiplexes the DCI message from the PDCCH in a step 918, perform rate dematching in a step S920, perform polar decoding in a step S922, and de-interleave the interleaved sequence of bits in the decoded DCI message in a step S924. It should be noted that the polar decoding is highlighted in
(43) Let us now mathematically describe the operation of the end-to-end learning model 900 in case of using the Gumbel-Sinkhorn network. For convenience, let us first introduce the following notations: x.sup.t.sub.2.sup.A: the CRC scrambled sequence with a length of A at TTI t. q.sup.t
.sup.V: the latest sub-band CQIs that are reported from the UE 500 at TTI t. c.sup.t: the RRC states for each UE at TTI t. f.sub.NN(.Math.): NN function that finds the latent permutation matrix. S.sup.k(P)=.sub.c(.sub.r(S.sup.k-1(P))), a Sinkhorn operator with a preset number of iterations of K. .sub.r=P
P1.sub.A, .sub.c=P
1.sub.A.sup.TP, 1.sub.A indicates an all-ones column vector and
denotes the element-wise division. In short, the Sinkhorn operator iteratively performs row-wise and column-wise normalization to an input matrix P.
.sub.2.sup.KK: a permutation matrix that has a size of KK.
(44) The steps for training the NN and encoding the DCI messages may be summarized as follows: 1. Update a memory buffer for the features, such as sub-band CQIs, DCI messages and UE's RRC states. The memorized features are denoted as m.sup.t={x.sup.t, x.sup.t-1, . . . x.sup.t-M, q.sup.t, q.sup.t-1, q.sup.t-M, c.sup.t, c.sup.t-1, . . . , c.sup.t-M}, where M is the memory buffer size. The memory buffer size is a preset value, which may be determined based on the channel coherence time and the computational complexity that the receiver may support. 2. Pass the features m.sup.t into the NN to find the latent variables, v.sup.t=f.sub.NN(m.sup.t). 3. Given the latent variables v.sup.t, sample a permutation matrix from the Gumbel-Sinkhorn distribution. The steps for sampling a permutation matrix are as follows: a. Sample a Gumbel noise: Gumbel. b. Apply the Sinkhorn operator to v.sup.t, i.e.,
(45)
(46)
(47) At the receiver side, after demultiplexing and channel decoder, the transpose of the interleaver is applied to the decoded sequence. The receiver should obtain a recovered sequence {circumflex over (x)}.sup.t with soft information. The CE loss f.sub.CE(x.sup.t,{circumflex over (x)}.sup.t)=.sub.i(x.sub.i.sup.t log {circumflex over (x)}.sub.i.sup.t+(1x.sub.i.sup.t)log(1{circumflex over (x)}.sub.i.sup.t)) is computed between {circumflex over (x)}.sup.t and x.sup.t and the gradient of loss is back-propagted to the NN to update its trainable parameters.
(48)
(49) It should be noted that each step or operation of the methods 300 and 600 and the learning models 800 and 900, or any combinations of the steps or operations, can be implemented by various means, such as hardware, firmware, and/or software. As an example, one or more of the steps or operations described above can be embodied by processor executable instructions, data structures, program modules, and other suitable data representations. Furthermore, the processor-executable instructions which embody the steps or operations described above can be stored on a corresponding data carrier and executed by the processors 202 and 502, respectively. This data carrier can be implemented as any computer-readable storage medium configured to be readable by said at least one processor to execute the processor executable instructions. Such computer-readable storage media can include both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, the computer-readable media comprise media implemented in any method or technology suitable for storing information. In more detail, the practical examples of the computer-readable media include, but are not limited to information-delivery media, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVD), holographic media or other optical disc storage, magnetic tape, magnetic cassettes, magnetic disk storage, and other magnetic storage devices.
(50) Although the example embodiments of the present disclosure are described herein, it should be noted that any various changes and modifications could be made in the embodiments of the present disclosure, without departing from the scope of legal protection which is defined by the appended claims. In the appended claims, the word comprising does not exclude other elements or operations, and the indefinite article a or an does not exclude a plurality. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.