Method and apparatus for generating and transmitting code sequence in a wireless communication system
RE046643 · 2017-12-19
Assignee
Inventors
- Seung Hee Han (Seoul, KR)
- Min Seok Noh (Seoul, KR)
- Yeong Hyeon Kwon (Suwon-si, KR)
- Hyun Hwa Park (Anyang-si, KR)
- Hyun Woo Lee (Anyang-si, KR)
- Dong Cheol Kim (Uiwang-si, KR)
Cpc classification
H04L41/028
ELECTRICITY
International classification
Abstract
A method of generating a code sequence in a wireless communication system is disclosed. More specifically, the method includes recognizing a desired length of the code sequence, generating a code sequence having a length different from the desired length, and modifying the length of the generated code sequence to equal the desired length. Here, the step of modifying includes discarding at least one element of the generated code sequence or inserting at least one null element to the generated code sequence.
Claims
.[.1. A method for transmitting a synchronization channel (SCH) signal by generating a code sequence in a wireless communication system, the method comprising: generating a first code sequence (C.sub.1) having a first length by using a first variable (M.sub.1); generating a second code sequence (C.sub.2) having a second length by using a second variable (M.sub.2), wherein the M.sub.1 and the M.sub.2 are different from each other; generating the code sequence as a combination of the first code sequence (C.sub.1) and the second code sequence (C.sub.2); and transmitting the code sequence as the SCH signal, wherein at least one of the first length and the second length is a prime number length, and the sum of the first length and the second length corresponds to a length of the SCH signal, wherein the combination of the first code sequence (C.sub.1) and the second code sequence (C.sub.2), each of which is generated using the different variables, provides a receiving end device with information about a cell identification and a location of the SCH within a radio frame..].
.[.2. An apparatus for transmitting a synchronization channel (SCH) signal by generating a code sequence in a wireless communication system, the apparatus comprising: a code sequence generating module for generating a first code sequence (C.sub.1) having a first length by using a first variable (M.sub.1), generating a second code sequence (C.sub.2) having a second length by using a second variable (M.sub.2), wherein the M.sub.1 and the M.sub.2 are different from each other, and generating the code sequence as a combination of the first code sequence (C.sub.1) and the second code sequence (C.sub.2); and a transmission module for transmitting the code sequence as the SCH signal, wherein at least one of the first length and the second length is a prime number length, and the sum of the first length and the second length corresponds to a length of the SCH signal, wherein the combination of the first code sequence (C.sub.1) and the second code sequence (C.sub.2), each of which is generated using the different variables, provides a receiving end device with information about a cell identification and a location of the SCH within a radio frame..].
.[.3. A method for receiving a synchronization channel (SCH) signal by using a code sequence in a wireless communication system, the method comprising: receiving the code sequence as the SCH signal in a form of a combination of a first code sequence (C.sub.1) having a first length, which has been generated by using a first variable (M.sub.1), and a second code sequence (C.sub.2) having a second length, which has been generated by using a second variable (M.sub.2), wherein the M.sub.1 and the M.sub.2 are different from each other; and acquiring information about a cell identification and a location of the SCH within a radio frame via the combination of the first code sequence (C.sub.1) and the second code sequence (C.sub.2), wherein at least one of the first length and the second length is a prime number length, and the sum of the first length and the second length corresponds to a length of the SCH signal..].
.Iadd.4. A method for transmitting a synchronization channel signal by generating a code sequence in a wireless communication system, the method comprising: generating a first code sequence having a first length by using a first variable, wherein the first code sequence is a Zadoff-Chu CAZAC sequence; generating a second code sequence having a second length by using a second variable, wherein the first variable and the second variable are different from each other; generating the code sequence as a combination of the first code sequence and the second code sequence; shifting the code sequence such that either a rear portion of the code sequence moves to a start portion of the code sequence, or a front portion of the code sequence moves to an end portion of the code sequence; channel coding the shifted code sequence using one or more of convolution coding, turbo coding, and/or low density parity check coding to generate a channel coded signal; modulating the channel-coded signal to generate a modulated signal; mapping the modulated signal onto OFDM subcarriers to generate a mapped signal; and transmitting the mapped signal including the shifted code sequence as the synchronization channel signal, wherein at least one of the first length and the second length is a prime number length, and a sum of the first length and the second length corresponds to a length of the synchronization channel signal, wherein the combination of the first code sequence and the second code sequence, each of which is generated using the different variables, provides a receiving end device with information about a cell identification and a location of the synchronization channel signal within a radio frame, and wherein the synchronization channel signal is usable for one or more of initial synchronization, cell search and/or channel estimation. .Iaddend.
.Iadd.5. The method of claim 4, further comprising multiplexing the shifted code sequence with traffic data. .Iaddend.
.Iadd.6. The method of claim 4, wherein modulating the channel-coded signal comprises using a modulation from a set that includes quadrature phase shift keying or 16-quadriture amplitude modulation. .Iaddend.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principle of the invention. In the drawings;
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
DETAILED DESCRIPTION OF THE INVENTION
(22) Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
(23)
(24) In
(25) Depending on the communication system, the code sequence can be used in various forms. For example, the code sequence in an IEEE 802.16 wideband wireless access system can be used in a preamble or a pilot signal format, and in a multi-input, multi-output (MIMO) system, the code sequence can be used as a midamble format.
(26) After being processed at the muxer 11, the multiplexed traffic and control data is then channel coded by a channel coding module 12. Channel coding is used to allow the receiving end to correct error that can occur during transmission by adding parity bits. Examples of channel coding include convolution coding, turbo coding, and low density parity check (LDPC) coding.
(27) Thereafter, the channel coded data is modulated by a digital modulation module 13 in which data symbols are mapped using algorithms such as a quadrature phase shift keying (QPSK) or a 16-quadrature amplitude modulation (16QAM). The mapped data symbols are then processed by a subchannel modulation module 14 through which the data symbols are mapped to each subcarrier of the OFDM system or OFDMA system. Then, the data symbols mapped to subcarriers are processed by an inverse fast Fourier transform (IFFT) module 15 which transform the data symbols into a signal in a time domain. The transformed data symbols are then processed through a filter 16 and further processed through a digital-to-analog conversion (DAC) module 17 where the filtered data symbols are converted to analog signals. Lastly, the analog signals are converted into a radio frequency (RF) by a RF module 18 which is then transmitted via an antenna 19 to the receiving end.
(28) Based on the type of generated code (e.g., CAZAC code), the steps of channel coding and/or symbol mapping can be omitted.
(29) A code sequence is used for transmitting control information, which includes identification (ID) and synchronization information, to classify types of sequences in a communication system. In order for more effective reception of the control information using code sequence, the code sequence can be adjusted or modified. Further, the code sequence can be applied to all of the channels that use code sequence for control signaling such as a random access channel (RACH), downlink/uplink reference symbol, channel quality information (CQI), and Acknowledgement (ACK)/Negative Acknowledgement (NACK).
(30)
(31) Equation .sup.aN.sub.seq.sub._.sub.NxN is a matrix of .sup.N.sub.seq.sub._.sub.N.sup.xN of
(32)
is a row vector of
(33)
Furthermore,
(34)
(n) indicates n(=0,1,2, . . . , element of k(=0,1,2, . . . , N.sub.seq.sub._.sub.N−1) code sequence.
(35) Referring to
(36) Subsequently, a code sequence set .sup.aN.sub.seq.sub._.sub.NxN having .sup.N.sub.seq.sub._.sub.M number of code sequences, can be generated where a resulting length of the code sequence is length N. More specifically, the code sequence set .sup.aN.sub.seq.sub._.sub.NxM having .sup.N.sub.seq.sub._.sub.M number of code sequences where each code sequence has length M (from step S301), can have elements of the code sequence removed. That is, elements which comprise each code sequence can be removed from the code sequence allowing the length of the code sequence to be adjusted or shortened. Here, M−N number of elements can be removed from the code sequence whose length corresponds to length M. By removing elements from the code sequence with length M, a code sequence having length N can be generated. As discussed, N is smaller than M.
(37) Consequently, a code sequence set .sup.aN.sub.seq.sub._.sub.NxN having .sup.N.sub.seq.sub._.sub.M number of code sequences in which each code sequence has length N, can be generated (S302).
(38) A code sequence is used for transmitting control information, which includes identification (ID) and synchronization information, to classify types of sequences in a communication system. Currently in 3.sup.rd Generation Partnership Project (3GPP) Long Term Evolution (LTE), a CAZAC sequence is being considered.
(39) The CAZAC sequence can be used by channels to output various IDs and information. The channels include channels for downlink synchronization (e.g., primary synchronization channel, secondary synchronization channel, and broadcast channel), uplink synchronization (e.g., random access channel), and pilot channels (e.g., data pilot and channel quality pilot). Further, the CAZAC sequence can be used in scrambling as well as channels that use code sequence such as RACH.
(40) Although there are various types of the CAZAC sequences, there are two types of often used CAZAC sequences—GCL CAZAC and Zadoff-Chu CAZAC. The Zadoff-Chu CAZAC sequence can be defined by the following equations.
(41)
(42)
(43) Here, k denotes sequence index, N denotes a length of CAZAC to be generated, and M denotes sequence ID.
(44) If the Zadoff-Chu CAZAC sequence and the GCL CAZAC sequence are expressed by c(k; N, M) as shown in Equations 1 and 2, then the sequences have the following three (3) characteristics as presented in following equations.
|c(k; N, M)|=1 (for all k, N, M) [Equation 3]
(45)
R.sub.M.sub.
(46) According to Equation 3, the CAZAC sequence always has a size of 1, and the CAZAC sequence of Equation 4 has an auto-correlation function denoted by a delta function. Here, the auto-correlation is based on circular correlation. Further, Equation 5 is a cross-correlation which is constant if N is a prime number.
(47) If the length to be applied in the wireless communication system for generating the CAZAC sequence is denoted by L, a method for generating the CAZAC sequence sets N of Equations 1 and 2 to equal L (N=L)—identified as step (1). Step (2) can be identified by a method where a value of N is set to be a prime number greater than a value of length L for generating the CAZAC sequence.
(48) Referring to the characteristics of the generated CAZAC sequence having a specified length of L, if L is not a prime number, the generated CAZAC sequence can include M=1, 2,. . . L−1 number of codes, some of which are repeated codes. In other words, the number of different codes is less than L−1 number of codes. On the contrary, if L is a prime number, there is L−1 number of different codes. The above descriptions may also be applied to other types of code sequences and are not limited to Zadoff-Chu CAZAC sequence.
(49) Further, the following technique has been considered. More specifically, if the length of code to be applied to the system is not a prime number, and there are a large number of codes to be used, a smallest prime number greater than L was selected. Using the selected prime number, the CAZAC sequence was generated, and discards or removes at least one element of the generated CAZAC sequence for use. This technique is different than the technique introduced with respect to step 1.
(50) For example, assume that a number of codes of a CAZAC code sequence (N) is 1024. The following equation can be used to express an algorithm for generating a Zadoff-Chu CAZAC code.
(51)
(52) In Equation 6, A and M are natural numbers, and index (A)(=0,1,2, . . . , N.sub.seq.sub._.sub.M−1) is an index of A in ascending order. In order to extend the CAZAC sequence where N=1024, a smallest prime number greater than 1024 is used. That is, the smallest prime number greater than 1024 is 1031. As such, the code sequence set .sup.aN.sub.seq.sub._.sub.NxM where M=1031 is applied to Equation 6.
(53) Since M (=1031) is a prime number, .sup.N.sub.seq.sub._.sub.M=1030. Furthermore, A can be referred to as a seed value used to generate a code sequence maintaining CAZAC properties. If M is a prime number, a total of M−1 number of code sequences can be generated. In other words, for example, if M=1024, a total of 512 (=1024/2 or N/2) number of code sequences are generated. However, if M=1031, a total of 1030 number of code sequences (M−1) are generated. Moreover, the cross-correlation properties of the generated code sequence are better if M is a prime number than a composite number.
(54) In order to adjust or modify the CAZAC code sequence set .sup.aN.sub.seq.sub._.sub.NxM where M=1031 to a code sequence seta .sup.a N.sub.seq.sub._.sub.NxM whose length is N=1024, M−N number of elements can be removed from index n=N, . . . , M−1, generating a code sequence set .sup.aN.sub.seq.sub._.sub.NxN.
(55) In determining the value of M, although the number of code sequences can increase with increase in value of N, it is preferable to determine the value of M based on the code sequence whose length is N that promotes maintenance of good correlation properties. In case of the CAZAC code, optimum correlation properties can be attained if the value of length M is the smallest prime number greater than the value of length N.
(56) If the code sequence set .sup.aN.sub.seq.sub._.sub.NxN generated using length N=1024 is compared with the code sequence set .sup.aN.sub.seq.sub._.sub.NxN, a total number code sequences of the former can be represented by N/2 or 512 (=1024/2) code sequences having an index 0,1,2, . . . , N/2−1 (N=1024), and a total number of code sequences of the latter can be represented by M−1 or 1030 having an index 0,1,2, . . . , M−2 (M=1031).
(57)
(58) Further,
(59)
(60)
(61) As discussed, the codes in addition to the CAZAC code are available, such as the PN code and the Hadamard code. The discussion with respect to the CAZAC code sequence can also be applied to the PN code and the Hadamard code. With respect to the PN code, a modular shift register generator is used to generate the code sequences. If a number of shift registers generated is represented by N, a code sequence having a length of 2.sup.N−1 is generated. Thereafter, a value “1” is added to the shift register, resulting in a length 2.sup.N+1−1, and then, adjust the length to equal 2.sup.N.
(62) With respect to the Hadamard codes, a number of code sequences, which equal the length of the code sequence, make up a code sequence. However, for example, if M number of code sequences having length N is required (M>N), then M number of code sequences having length M are generated, followed by removing a specified number of elements to make the length of the code sequence equal length N.
(63)
(64) Assuming that the code sequence having poor auto-correlation and cross-correlation properties are removed, the remaining number of code sequences may be less than L−1.
(65) In order to attain a desired length and a maximum number of CAZAC sequence types corresponding to the desired length, a smallest prime number, X, greater than the desired length, L, (X>L) can be selected. Although the CAZAC sequence can be generated using X due to deterioration of the correlation properties, the correlations properties of CAZAC sequence as shown in Equations 4 and 5 cannot be attained. Further, when selecting a length of the generated code sequence, the length that is nearest to the desired length L which is between a smallest prime number larger than the desired length or a largest prime number smaller than the desired length can be selected.
(66) Referring to
(67)
(68) Referring to
(69)
(70) Discussions of above relate to the methods of generating the sequence using the desired length L, and of increasing transmitted control information using the circular shift. If these methods are applied in generating the sequence, the following processes take place. First, select a smallest prime number greater than L or a largest prime number less than L, which is referred to as X. Second, remove or add a sequence unit having a length corresponding to X-L or L-X. Third, apply the circular shift to the resulting sequence.
(71)
(72)
(73) Referring to
(74)
(75)
(76) Referring to
(77) Between
(78) Between
(79) Further, according to the discussion above, the desired length L (or required length) is first recognized. As illustrated with respect to
(80) For example, if the desired length L is 75, the value of the smallest prime number greater than 75 is 79, and the value of the largest prime number smaller than the 75 is 73. Here, the prime number 73 can be selected since 73 is closer to 75 than 79 is to 75.
(81) Although the illustration above selects the prime number closest to the desired length L, selection regarding removal or addition of the element(s) is not limited to the example of above and other implementations may be applied.
(82) Regarding padding, there are five (5) schemes by which padding can be accomplished. As a first padding scheme, the padding portion can be comprised of a constant number (e.g., 0s). Although the padding portion is used to fill the portion of the code sequence so that the length of the code sequence coincides with the desired length, it is possible for the padding portion to be less then completely full. In other words, it is possible for that the length of the code sequence with padded portion is not equal to or is shorter than the code sequence with the desired length. That is, when the code sequence is used for functions deemed less important, such as for cell search or random access, it is not necessary to use the entire length of the code sequence, and as such, the padding portion does not need to be completely occupied to correspond to the desired length of the code sequence.
(83) As a second padding scheme, the padding portion can be comprised of a repeated portion. In other words, the portion corresponding to L-X of the code sequence 1204 can be duplicated and inserted/attached to the end of the code sequence 1204. This can be referred to as cyclic postfix. Here, the code sequence uses the entire length L. When determining the identification (ID) of the code sequence, the entire length L is used to facilitate identifying of the code sequence ID. At the same time, the generated code sequence does not experience distortion by using the entire length L. In the discussion above, the cyclic postfix is used. Alternatively, cyclic prefix can also be used.
(84) As a third padding scheme, the padding portion can be comprised of additional information through which different messages can be delivered. More specifically, the desired length L of the code sequence can be used to generate a supplemental code sequence whose length equals the desired length L (N=L). The code sequence portion corresponding to L-X is extracted from the supplemental code sequence and inserted/attached to the generated code sequence as the padded portion.
(85) As a fourth padding scheme, a portion corresponding to length L-X is extracted from the code sequence and inserted as the padding portion. Here, the code sequence inserted to the padding portion may be a different code sequence than the code sequence 1204. Put differently, the code sequence inserted to the padding portion may be a CAZAC sequence having a length of M, for example, which is different from the code sequence 1204 having a length of L. Further, the code sequence inserted to the padding portion can be a different code sequence other than the CAZAC sequence. By using different code sequence, additional information can be delivered including information related to type of code sequence adjustments.
(86) As a fifth padding scheme, the padding portion can be used as lower bandwidth guard interval. During transmission of control information using a prescribed sequence, the following possible scenarios can occur such as transmitting data without establishing synchronization with an access channel, transmitting data by a plurality of users within a communication system, and distortion of frequency of the received data.
(87) Furthermore, the padding portions can be placed at both ends of the code sequence to use the padding portions as guard intervals of the lower bandwidth. Consequently, a more reliable acquisition of control information from the received data can take place despite distorted frequency signals. In the padding portions used as guard intervals, constant numbers (e.g., 0s) can be used or cyclic prefix or postfix of the generated code sequence can be used.
(88) If the padding portions are placed at both ends of the code sequence and used as guard intervals of the lower bandwidth, the code sequences can be protected from frequency signal distortions. Moreover, if 0s are inserted between the guard intervals or put differently, within the code sequence, interference to neighboring codes can be reduced. Alternatively, if cyclic prefix/postfix is used as guard intervals, the code sequences can be protected from frequency distortions and can be used to transmit the control information containing the sequence ID if there is no frequency distortion.
(89)
(90) In the discussions above, five (5) padding schemes are introduced. However, the padding schemes are not limited to the discussed schemes, and there can be other types of padding schemes.
(91) Besides the first padding scheme in which no information is inserted, the other four padding schemes insert additional information in the padding portions to allow expansion of the code sequence and/or transmission of message(s). Various information can be inserted into the padding portion including, for example, initial access information, timing update information, resource request information, user ID information, channel quality information (CQI), user group ID information related to a random access channel (RACH). Furthermore, the information can include cell ID information, multi-input multi-output (MIMO) information, and synchronization channel information of a synchronization channel (SCH), for example. In addition, the padding portion can be used for transmitting data for message transmission as well as arbitrary information using a code sequence having a length of L-X.
(92)
(93) Referring to
(94) The code sequence that can be selected by the sequence selection unit 1602 has a length of L as illustrated in
(95) Although it is preferable to use length X which is a smallest prime number greater than the length of L or a largest prime number smaller than the length of L, as long as the value of length X is a prime number, different or other prime numbers can be used as the value of length X.
(96)
(97) The code sequence length adjustment unit 1702 further comprises a control unit 1702a, a code sequence removing unit 1702b, and a padding unit 1702c. More specifically, the control unit 1702a receives C2 as well as the value of length L. The control unit 1702a determines whether to remove a portion/section of C2 or insert/add a portion/section to C2. Based on the determination from the control unit 1702a, C2 is delivered to the sequence removing unit 1702b in which a portion/section of C2 corresponding to a length of X-L is removed. Alternatively, C2 can be delivered to the padding unit 1702c for inserting/adding a portion/section of C2 whose length corresponds to the length of L-X.
(98) If C2 and the value of length L are provided to the control unit 1702a, the control unit 1702a compares the value of length X which identifies the length of C2 with the value of the length L. Here, if X is greater than L, then C2 is inputted into the sequence removing unit 1702b. From C2, the portion length of C2 corresponding to length X-L is removed, resulting in C3. However, if X is less than L, then C2 is inputted into the padding unit 1702c. From C2, the padding portion length corresponding to length L-X is inserted/added to C2, resulting in C4. Here, the padding portion can be inserted to either end or both ends of C2.
(99)
(100) Referring to
(101) In
(102)
(103) However, regarding a code sequence generated with a padding portion with cyclic prefix/postfix attached thereto, there is no need to power boost since all of the code sequences corresponding to length L are used for acquiring sequence ID information.
(104) In the receiving end, information related to the generated code sequence and length X used to generate the code sequence is received. From the code sequence, a portion corresponding to length X is processed to acquire the control information. To this end, it is important to first receive synchronization information of the received data. Equation 7 and Equation 8 can be used to acquire synchronization information. Here, Equation 7 relates to auto-correlation, and Equation 8 relates to cross-correlation.
(105)
(106)
(107) Equation 7 is used to acquire auto-correlation value(s) from the received code sequence whose sequence ID is M. Further, the acquired auto-correlation value d, which is a value other than 0, is used to achieve synchronization.
(108) Equation 8 is used to acquire cross-correlation value(s) of a code sequence whose ID is M.sub.2 from the received code sequence whose sequence ID is M.sub.1. Through the acquired value, synchronization can be achieved.
(109) Typically, if the wireless communication system is a synchronous network, auto-correlation is used to acquire synchronization information, and if the system is an asynchronous network, cross-correlation is used to acquire synchronization information. However, according to the embodiments of the present invention, synchronization information can be acquired using any one or at least one of the correlation schemes.
(110) After the synchronization information of the received code sequence is acquired, the receiving end analyzes the received code sequence to acquire the sequence ID, as shown in Equations 9 and 10.
σc(k;M,X)=c(k+1;M,X).Math.c*(k;M,X)(for k=0,1, . . . , L−1) [Equation 9]
σc(k;M,X)=c(k+1;M,X).Math.c*(k;M,X)(for k=0,1, . . . , X−1) [Equation 10]
(111) In Equations 9 and 10, σc(k; M,X) denotes difference sequence of the received sequences. Equation 9 is used to acquire the ID information of the received sequence using the differential sequence corresponding to the total length of the received sequence. Equation 9 can also be used to acquire the ID information of the code sequence which has been generated with the cyclic prefix/postfix padded portion. Equation 10 is used to acquire the ID information of the received sequence using the smallest prime number corresponding to length X.
(112) As discussed, if the differential sequence of the CAZAC sequence is calculated using Equations 9 or 10, k of the sequence index is generated, and the result therefrom is transformed by the Fourier transform scheme, to show a single peak value. Thereafter, by detecting the peak value, the ID information of the sequence can be acquired.
(113) The discussion of above regarding a code sequence or a code sequence set can be applied to 3.sup.rd Generation Partnership Project (3GPP) system or 3GPP2 system as well as a Wibro system or a Wimax system.—
(114) It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the inventions. Thus, it is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents.