The present disclosure relates generally to wireless communication systems and, more specifically, to apparatuses and methods for channel state information (CSI) codebook parameters for coherent joint-transmission.
5th generation (5G) or new radio (NR) mobile communications is recently gathering increased momentum with all the worldwide technical activities on the various candidate technologies from industry and academia. The candidate enablers for the 5G/NR mobile communications include massive antenna technologies, from legacy cellular frequency bands up to high frequencies, to provide beamforming gain and support increased capacity, new waveform (e.g., a new radio access technology (RAT)) to flexibly accommodate various services/applications with different requirements, new multiple access schemes to support massive connections, and so on.
The present disclosure relates to apparatuses and methods for CSI codebook parameters for coherent joint-transmission.
In one embodiment, a user equipment (UE) is provided. The UE includes a transceiver configured to receive information about a CSI report. The information indicates codebook parameters NL≥1 combinations of values of {α1, . . . , αN
In another embodiment, a base station (BS) is provided. The BS includes a processor and a transceiver operably coupled to the processor. The transceiver is configured to transmit information about a CSI report and receive the CSI report that is based on the information. The information indicates codebook parameters NL≥1 combinations of values of {α1, . . . , αN
In yet another embodiment, a method performed by a UE is provided. The method includes receiving information about a CSI report. The information indicates codebook parameters NL≥1 combinations of values of {α1, . . . , αN
Other technical features may be readily apparent to one skilled in the art from the following figures, descriptions, and claims.
Before undertaking the DETAILED DESCRIPTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document. The term “couple” and its derivatives refer to any direct or indirect communication between two or more elements, whether or not those elements are in physical contact with one another. The terms “transmit,” “receive,” and “communicate,” as well as derivatives thereof, encompass both direct and indirect communication. The terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation. The term “or” is inclusive, meaning and/or. The phrase “associated with,” as well as derivatives thereof, means to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, have a relationship to or with, or the like. The term “controller” means any device, system or part thereof that controls at least one operation. Such a controller may be implemented in hardware or a combination of hardware and software and/or firmware. The functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. The phrase “at least one of,” when used with a list of items, means that different combinations of one or more of the listed items may be used, and only one item in the list may be needed. For example, “at least one of: A, B, and C” includes any of the following combinations: A, B, C, A and B, A and C, B and C, and A and B and C.
Moreover, various functions described below can be implemented or supported by one or more computer programs, each of which is formed from computer readable program code and embodied in a computer readable medium. The terms “application” and “program” refer to one or more computer programs, software components, sets of instructions, procedures, functions, objects, classes, instances, related data, or a portion thereof adapted for implementation in a suitable computer readable program code. The phrase “computer readable program code” includes any type of computer code, including source code, object code, and executable code. The phrase “computer readable medium” includes any type of medium capable of being accessed by a computer, such as read only memory (ROM), random access memory (RAM), a hard disk drive, a compact disc (CD), a digital video disc (DVD), or any other type of memory. A “non-transitory” computer readable medium excludes wired, wireless, optical, or other communication links that transport transitory electrical or other signals. A non-transitory computer readable medium includes media where data can be permanently stored and media where data can be stored and later overwritten, such as a rewritable optical disc or an erasable memory device.
Definitions for other certain words and phrases are provided throughout this patent document. Those of ordinary skill in the art should understand that in many if not most instances, such definitions apply to prior as well as future uses of such defined words and phrases.
For a more complete understanding of the present disclosure and its advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, in which like reference numerals represent like parts:
The following documents and standards descriptions are hereby incorporated by reference into the present disclosure as if fully set forth herein: 3GPP TS 36.211 v17.2.0, “E-UTRA, Physical channels and modulation” (herein “REF 1”); 3GPP TS 36.212 v17.1.0, “E-UTRA, Multiplexing and Channel coding” (herein “REF 2”); 3GPP TS 36.213 v17.4.0, “E-UTRA, Physical Layer Procedures” (herein “REF 3”); 3GPP TS 36.321 v17.3.0, “E-UTRA, Medium Access Control (MAC) protocol specification” (herein “REF 4”); 3GPP TS 36.331 v17.3.0, “E-UTRA, Radio Resource Control (RRC) Protocol Specification” (herein “REF 5”); 3GPP TS 38.211 v17.4.0, “NR, Physical channels and modulation” (herein “REF 6”); 3GPP TS 38.212 v17.4.0, “NR, Multiplexing and Channel coding” (herein “REF 7”); 3GPP TS 38.213 v17.4.0, “NR, Physical Layer Procedures for Control” (herein “REF 8”); 3GPP TS 38.214 v17.4.0, “NR, Physical Layer Procedures for Data” (herein “REF 9”); 3GPP TS 38.215 v17.2.0, “NR, Physical Layer Measurements” (herein “REF 10”); 3GPP TS 38.321 v17.3.0, “NR, Medium Access Control (MAC) protocol specification” (herein “REF 11”); and 3GPP TS 38.331 v17.3.0, “NR, Radio Resource Control (RRC) Protocol Specification” (herein “REF 12”).
For a cellular system operating in a sub-1GHz frequency range (e.g., less than 1 GHz), supporting large number of CSI-RS antenna ports (e.g., 32) at a single location or remote radio head (RRH) or TRP is challenging due to that a larger antenna form factor size is needed at these frequencies than a system operating at a higher frequency such as 2 GHz or 4 GHz. At such low frequencies, the maximum number of CSI-RS antenna ports that can be co-located at a single site (or TRP/RRH) can be limited, for example to 8. This limits the spectral efficiency of such systems. In particular, the MU-MIMO spatial multiplexing gains offered due to large number of CSI-RS antenna ports (such as 32) can't be achieved.
One way to operate a sub-1GHz system with large number of CSI-RS antenna ports is based on distributing antenna ports at multiple locations (or TRP/RRHs). The multiple sites or TRPs/RRHs can still be connected to a single (common) base unit, hence the signal transmitted/received via multiple distributed TRPs/RRHs can still be processed at a centralized location. This is called distributed MIMO or multi-TRP coherent joint transmission (C-JT).
The discussion of 5G systems and frequency bands associated therewith is for reference as certain embodiments of the present disclosure may be implemented in 5G systems. However, the present disclosure is not limited to 5G systems, or the frequency bands associated therewith, and embodiments of the present disclosure may be utilized in connection with any frequency band. For example, aspects of the present disclosure may also be applied to deployment of 5G communication systems, 6G or even later releases which may use terahertz (THz) bands.
Embodiments of the present disclosure propose methods and apparatuses for codebook parameters considering feedback overhead in a multi-TRP C-JT scenario.
Embodiments of the present disclosure recognize that CSI enhancement described in Rel-18 MIMO considers Rel-16/17 Type-II CSI codebook refinements to support mTRP coherent joint transmission (C-JT) operations by considering performance-and-overhead trade-off. The Rel-16/17 Type-II CSI codebook has three components W1, W2, and Wf. Among them, W2 is the component that could induce large CSI feedback overhead especially in mTRP C-JT operations. Embodiments of the present disclosure recognize that codebook parameter configuration may alleviate the amount of CSI reporting overhead to have good performance-and-overhead trade-off for C-JT operations.
Accordingly, embodiments of the present disclosure propose codebook parameter configurations (an extension of the tables of paraCombination-r16, paraCombination-r17) to have good performance-and-overhead trade-off for mTRP C-JT operations. Additionally, embodiments of the present disclosure propose several components on how to map or translate from codebook parameter combinations for Rel-16-based CJT (multi-TRP) codebook to codebook parameter combinations for Rel-16-based CJT codebook to yield good performance-and-overhead trade-off.
As shown in
The gNB 102 provides wireless broadband access to the network 130 for a first plurality of user equipments (UEs) within a coverage area 120 of the gNB 102. The first plurality of UEs includes a UE 111, which may be located in a small business; a UE 112, which may be located in an enterprise; a UE 113, which may be a WiFi hotspot; a UE 114, which may be located in a first residence; a UE 115, which may be located in a second residence; and a UE 116, which may be a mobile device, such as a cell phone, a wireless laptop, a wireless PDA, or the like. The gNB 103 provides wireless broadband access to the network 130 for a second plurality of UEs within a coverage area 125 of the gNB 103. The second plurality of UEs includes the UE 115 and the UE 116. In some embodiments, one or more of the gNBs 101-103 may communicate with each other and with the UEs 111-116 using 5G/NR, long term evolution (LTE), long term evolution-advanced (LTE-A), WiMAX, WiFi, or other wireless communication techniques.
Depending on the network type, the term “base station” or “BS” can refer to any component (or collection of components) configured to provide wireless access to a network, such as transmit point (TP), transmit-receive point (TRP), an enhanced base station (cNodeB or eNB), a 5G/NR base station (gNB), a macrocell, a femtocell, a WiFi access point (AP), or other wirelessly enabled devices. Base stations may provide wireless access in accordance with one or more wireless communication protocols, e.g., 5G/NR 3rd generation partnership project (3GPP) NR, long term evolution (LTE), LTE advanced (LTE-A), high speed packet access (HSPA), Wi-Fi 802.11a/b/g/n/ac, etc. For the sake of convenience, the terms “BS” and “TRP” are used interchangeably in this patent document to refer to network infrastructure components that provide wireless access to remote terminals. Also, depending on the network type, the term “user equipment” or “UE” can refer to any component such as “mobile station,” “subscriber station,” “remote terminal,” “wireless terminal,” “receive point,” or “user device.” For the sake of convenience, the terms “user equipment” and “UE” are used in this patent document to refer to remote wireless equipment that wirelessly accesses a BS, whether the UE is a mobile device (such as a mobile telephone or smartphone) or is normally considered a stationary device (such as a desktop computer or vending machine).
Dotted lines show the approximate extents of the coverage areas 120 and 125, which are shown as approximately circular for the purposes of illustration and explanation only. It should be clearly understood that the coverage areas associated with gNBs, such as the coverage areas 120 and 125, may have other shapes, including irregular shapes, depending upon the configuration of the gNBs and variations in the radio environment associated with natural and man-made obstructions.
As described in more detail below, one or more of the UEs 111-116 include circuitry, programing, or a combination thereof for using CSI codebook parameters for coherent joint-transmission. In certain embodiments, one or more of the BSs 101-103 include circuitry, programing, or a combination thereof for providing CSI codebook parameters for coherent joint-transmission.
Although
As shown in
The transceivers 210a-210n receive, from the antennas 205a-205n, incoming RF signals, such as signals transmitted by UEs in the network 100. The transceivers 210a-210n down-convert the incoming RF signals to generate IF or baseband signals. The IF or baseband signals are processed by receive (RX) processing circuitry in the transceivers 210a-210n and/or controller/processor 225, which generates processed baseband signals by filtering, decoding, and/or digitizing the baseband or IF signals. The controller/processor 225 may further process the baseband signals.
Transmit (TX) processing circuitry in the transceivers 210a-210n and/or controller/processor 225 receives analog or digital data (such as voice data, web data, e-mail, or interactive video game data) from the controller/processor 225. The TX processing circuitry encodes, multiplexes, and/or digitizes the outgoing baseband data to generate processed baseband or IF signals. The transceivers 210a-210n up-converts the baseband or IF signals to RF signals that are transmitted via the antennas 205a-205n.
The controller/processor 225 can include one or more processors or other processing devices that control the overall operation of the gNB 102. For example, the controller/processor 225 could control the reception of UL channel signals and the transmission of DL channel signals by the transceivers 210a-210n in accordance with well-known principles. The controller/processor 225 could support additional functions as well, such as more advanced wireless communication functions. For instance, the controller/processor 225 could support beam forming or directional routing operations in which outgoing/incoming signals from/to multiple antennas 205a-205n are weighted differently to effectively steer the outgoing signals in a desired direction. As another example, the controller/processor 225 could support methods for providing CSI codebook parameters for coherent joint-transmission. Any of a wide variety of other functions could be supported in the gNB 102 by the controller/processor 225.
The controller/processor 225 is also capable of executing programs and other processes resident in the memory 230, such as an OS. The controller/processor 225 can move data into or out of the memory 230 as required by an executing process.
The controller/processor 225 is also coupled to the backhaul or network interface 235. The backhaul or network interface 235 allows the gNB 102 to communicate with other devices or systems over a backhaul connection or over a network. The interface 235 could support communications over any suitable wired or wireless connection(s). For example, when the gNB 102 is implemented as part of a cellular communication system (such as one supporting 5G/NR, LTE, or LTE-A), the interface 235 could allow the gNB 102 to communicate with other gNBs over a wired or wireless backhaul connection. When the gNB 102 is implemented as an access point, the interface 235 could allow the gNB 102 to communicate over a wired or wireless local area network or over a wired or wireless connection to a larger network (such as the Internet). The interface 235 includes any suitable structure supporting communications over a wired or wireless connection, such as an Ethernet or transceiver.
The memory 230 is coupled to the controller/processor 225. Part of the memory 230 could include a RAM, and another part of the memory 230 could include a Flash memory or other ROM.
Although
As shown in
The transceiver(s) 310 receives from the antenna 305, an incoming RF signal transmitted by a gNB of the network 100. The transceiver(s) 310 down-converts the incoming RF signal to generate an intermediate frequency (IF) or baseband signal. The IF or baseband signal is processed by RX processing circuitry in the transceiver(s) 310 and/or processor 340, which generates a processed baseband signal by filtering, decoding, and/or digitizing the baseband or IF signal. The RX processing circuitry sends the processed baseband signal to the speaker 330 (such as for voice data) or is processed by the processor 340 (such as for web browsing data).
TX processing circuitry in the transceiver(s) 310 and/or processor 340 receives analog or digital voice data from the microphone 320 or other outgoing baseband data (such as web data, e-mail, or interactive video game data) from the processor 340. The TX processing circuitry encodes, multiplexes, and/or digitizes the outgoing baseband data to generate a processed baseband or IF signal. The transceiver(s) 310 up-converts the baseband or IF signal to an RF signal that is transmitted via the antenna(s) 305.
The processor 340 can include one or more processors or other processing devices and execute the OS 361 stored in the memory 360 in order to control the overall operation of the UE 116. For example, the processor 340 could control the reception of DL channel signals and the transmission of UL channel signals by the transceiver(s) 310 in accordance with well-known principles. As another example, the processor 340 could support methods for using CSI codebook parameters for coherent joint-transmission. In some embodiments, the processor 340 includes at least one microprocessor or microcontroller.
The processor 340 is also capable of executing other processes and programs resident in the memory 360. The processor 340 can move data into or out of the memory 360 as required by an executing process. In some embodiments, the processor 340 is configured to execute the applications 362 based on the OS 361 or in response to signals received from gNBs or an operator. The processor 340 is also coupled to the I/O interface 345, which provides the UE 116 with the ability to connect to other devices, such as laptop computers and handheld computers. The I/O interface 345 is the communication path between these accessories and the processor 340.
The processor 340 is also coupled to the input 350, which includes for example, a touchscreen, keypad, etc., and the display 355. The operator of the UE 116 can use the input 350 to enter data into the UE 116. The display 355 may be a liquid crystal display, light emitting diode display, or other display capable of rendering text and/or at least limited graphics, such as from web sites.
The memory 360 is coupled to the processor 340. Part of the memory 360 could include a random-access memory (RAM), and another part of the memory 360 could include a Flash memory or other read-only memory (ROM).
Although
The 3GPP NR specification supports up to 32 CSI-RS antenna ports which enable a gNB to be equipped with a large number of antenna elements (such as 64 or 128). In this case, a plurality of antenna elements is mapped onto one CSI-RS port. For next generation cellular systems such as 5G, the maximum number of CSI-RS ports can either remain the same or increase.
For mmWave bands, although the number of antenna elements can be larger for a given form factor, the number of CSI-RS ports—which can correspond to the number of digitally precoded ports—tends to be limited due to hardware constraints (such as the feasibility to install a large number of ADCs/DACs at mmWave frequencies) as illustrated in
Since the above system utilizes multiple analog beams for transmission and reception (wherein one or a small number of analog beams are selected out of a large number, for instance, after a training duration—to be performed from time to time), the term “multi-beam operation” is used to refer to the overall system aspect. This includes, for the purpose of illustration, indicating the assigned DL or UL transmit (TX) beam (also termed “beam indication”), measuring at least one reference signal for calculating and performing beam reporting (also termed “beam measurement” and “beam reporting”, respectively), and receiving a DL or UL transmission via a selection of a corresponding receive (RX) beam.
The above system is also applicable to higher frequency bands such as >52.6 GHz (also termed the FR4). In this case, the system can employ only analog beams. Due to the O2 absorption loss around 60 GHz frequency (˜10 dB additional loss @ 100 m distance), larger number of and sharper analog beams (hence larger number of radiators in the array) will be needed to compensate for the additional path loss.
At lower frequency bands such as <1 GHz, on the other hand, the number of antenna elements may not be large in a given form factor due to the large wavelength. As an example, for the case of the wavelength size (λ) of the center frequency 600 MHZ (which is 50 cm), it desires 4 m for uniform-linear-array (ULA) antenna panel of 16 antenna elements with the half-wavelength distance between two adjacent antenna elements. Considering a plurality of antenna elements is mapped to one digital port in practical cases, the desirable size for antenna panel(s) at gNB to support a large number of antenna ports such as 32 CSI-RS ports becomes very large in such low frequency bands, and it leads the difficulty of deploying 2-D antenna element arrays within the size of a conventional form factor. This results in a limited number of CSI-RS ports that can be supported at a single site and limits the spectral efficiency of such systems.
Various embodiments of the present disclosure recognize that for a cellular system operating in a sub-1GHz frequency range (e.g., less than 1 GHz), supporting large number of CSI-RS antenna ports (e.g., 32) at a single location or remote radio head (RRH) or TRP is challenging due to that a larger antenna form factor size is needed at these frequencies than a system operating at a higher frequency such as 2 GHz or 4 GHz. At such low frequencies, the maximum number of CSI-RS antenna ports that can be co-located at a single site (or TRP/RRH) can be limited, for example to 8. This limits the spectral efficiency of such systems. In particular, the MU-MIMO spatial multiplexing gains offered due to large number of CSI-RS antenna ports (such as 32) can't be achieved.
One way to operate a sub-1GHz system with large number of CSI-RS antenna ports is based on distributing antenna ports at multiple locations (or TRP/RRHs). The multiple sites or TRPs/RRHs can still be connected to a single (common) base unit, hence the signal transmitted/received via multiple distributed TRPs/RRHs can still be processed at a centralized location. This is called distributed MIMO or multi-TRP coherent joint transmission (C-JT).
Various embodiments of the present disclosure recognize that CSI enhancement described in Rel-18 MIMO considers Rel-16/17 Type-II CSI codebook refinements to support mTRP coherent joint transmission (C-JT) operations by considering performance-and-overhead trade-off. Various embodiments of the present disclosure recognize that utilizing codebook subset restriction (CBSR) is one of the ways to manage CSI feedback overhead. Especially, in multi-TRP C-JT scenarios, CBSR could be useful in terms of reducing overhead.
Accordingly, various embodiments of the present disclosure provide mechanisms for CBSR for multi-TRP C-JT scenarios.
One possible approach to resolving the issue is to form multiple TRPs (multi-TRP) or RRHs with a small number of antenna ports instead of integrating all of the antenna ports in a single panel (or at a single site) and to distribute the multiple panels in multiple locations/sites (or TRPs, RRHs). This approach is shown in
As illustrated in
Although the present disclosure has mentioned low frequency band systems (sub-1 GHz band) as a motivation for distributed MIMO (or mTRP), the distributed MIMO technology is frequency-band-agnostic and can be useful in mid- (sub-6GHz) and high-band (above-6GHz) systems in addition to low-band (sub-1GHz) systems.
The terminology “distributed MIMO” is used as an illustrative purpose, it can be considered under another terminology such as multi-TRP, mTRP, cell-free network, and so on.
All the following components and embodiments are applicable for UL transmission with CP-OFDM (cyclic prefix OFDM) waveform as well as DFT-SOFDM (DFT-spread OFDM) and SC-FDMA (single-carrier FDMA) waveforms. Furthermore, all the following components and embodiments are applicable for UL transmission when the scheduling unit in time is either one subframe (which can include one or multiple slots) or one slot.
In the present disclosure, the frequency resolution (reporting granularity) and span (reporting bandwidth) of CSI reporting can be defined in terms of frequency “subbands” and “CSI reporting band” (CRB), respectively.
A subband for CSI reporting is defined as a set of contiguous PRBs which represents the smallest frequency unit for CSI reporting. The number of PRBs in a subband can be fixed for a given value of DL system bandwidth, configured either semi-statically via higher-layer/RRC signaling, or dynamically via L1 DL control signaling or MAC control element (MAC CE). The number of PRBs in a subband can be included in CSI reporting setting.
“CSI reporting band” is defined as a set/collection of subbands, either contiguous or non-contiguous, wherein CSI reporting is performed. For example, CSI reporting band can include all the subbands within the DL system bandwidth. This can also be termed “full-band”. Alternatively, CSI reporting band can include only a collection of subbands within the DL system bandwidth. This can also be termed “partial band”.
The term “CSI reporting band” is used only as an example for representing a function. Other terms such as “CSI reporting subband set” or “CSI reporting bandwidth” can also be used.
In terms of UE configuration, a UE can be configured with at least one CSI reporting band. This configuration can be semi-static (via higher-layer signaling or RRC) or dynamic (via MAC CE or L1 DL control signaling). When configured with multiple (N) CSI reporting bands (e.g., via RRC signaling), a UE can report CSI associated with n≤N CSI reporting bands. For instance, >6 GHz, large system bandwidth may require multiple CSI reporting bands. The value of n can either be configured semi-statically (via higher-layer signaling or RRC) or dynamically (via MAC CE or L1 DL control signaling). Alternatively, the UE can report a recommended value of n via an UL channel.
Therefore, CSI parameter frequency granularity can be defined per CSI reporting band as follows. A CSI parameter is configured with “single” reporting for the CSI reporting band with Mn subbands when one CSI parameter for all the Mn subbands within the CSI reporting band. A CSI parameter is configured with “subband” for the CSI reporting band with Mn subbands when one CSI parameter is reported for each of the Mn subbands within the CSI reporting band.
As illustrated in
comprise a first antenna polarization, and antenna ports
comprise a second antenna polarization, where PCSIRS is a number of CSI-RS antenna ports and X is a starting antenna port number (e.g., X=3000, then antenna ports are 3000, 3001, 3002, . . . ). Let Ng be a number of antenna panels at the gNB. When there are multiple antenna panels (Ng>1), we assume that each panel is dual-polarized antenna ports with N1 and N2 ports in two dimensions. This is illustrated in
In one example, the antenna architecture of a D-MIMO or CJT (coherent joint-transmission) system is structured. For example, the antenna structure at each RRH (or TRP) is dual-polarized (single or multi-panel as shown in
In another example, the antenna architecture of a D-MIMO or CJT system is unstructured. For example, the antenna structure at one RRH/TRP can be different from another RRH/TRP.
The remainder of the present disclosure assumes a structured antenna architecture. For simplicity, in the remainder of the present disclosure it is assumed that each RRH/TRP is equivalent to a panel, although, an RRH/TRP can have multiple panels in practice. The present disclosure however is not restrictive to a single panel assumption at each RRH/TRP, and can easily be extended (covers) the case when an RRH/TRP has multiple antenna panels.
In one embodiment, an RRH constitutes (or corresponds to or is equivalent to) at least one of the following:
In one example, when RRH or TRP maps (or corresponds to) a CSI-RS resource or resource group, and a UE can select a subset of RRHs (resources or resource groups) and report the CSI for the selected TRPs/RRHs (resources or resource groups), the selected TRPs/RRHs can be reported via an indicator. For example, the indicator can be a CRI or a PMI (component) or a new indicator.
In one example, when RRH or TRP maps (or corresponds to) a CSI-RS port group, and a UE can select a subset of TRPs/RRHs (port groups) and report the CSI for the selected TRPs/RRHs (port groups), the selected TRPs/RRHs can be reported via an indicator. For example, the indicator can be a CRI or a PMI (component) or a new indicator.
In one example, when multiple (K>1) CSI-RS resources are configured for NRRH TRPs/RRHs, a decoupled (modular) codebook is used/configured, and when a single (K=1) CSI-RS resource for NRRH TRPs/RRHs, a joint codebook is used/configured.
As described in U.S. Pat. No. 10,659,118, issued May 19, 2020, and entitled “Method and Apparatus for Explicit CSI Reporting in Advanced Wireless Communication Systems,” which is incorporated herein by reference in its entirety, a UE is configured with high-resolution (e.g., Type II) CSI reporting in which the linear combination-based Type II CSI reporting framework is extended to include a frequency dimension in addition to the first and second antenna port dimensions.
As illustrated,
The basis sets for 1st and 2nd port domain representation are oversampled DFT codebooks of length-N1 and length-N2, respectively, and with oversampling factors O1 and O2, respectively. Likewise, the basis set for frequency domain representation (i.e., 3rd dimension) is an oversampled DFT codebook of length-N3 and with oversampling factor O3. In one example, O1=O2=O3=4. In one example, O1=O2=4 and O3=1. In another example, the oversampling factors Oi belongs to {2, 4, 8}. In yet another example, at least one of O1, O2, and O3 is higher layer configured (via RRC signaling).
As explained in Section 5.2.2.2.6 of REF8, a UE is configured with higher layer parameter codebookType set to ‘ typeII-PortSelection-r16’ for an enhanced Type II CSI reporting in which the pre-coders for all SBs and for a given layer l=1, . . . , v, where v is the associated RI value, is given by either
where:
port selection column vector, where a port selection vector is a defined as a vector which contains a value of 1 in one element and zeros elsewhere,
In a variation, when the UE reports a subset K<2LM coefficients (where K is either fixed, configured by the gNB or reported by the UE), then the coefficient cl,i,f in precoder equations Eq. 1 or Eq. 2 is replaced with xl,i,f×cl,i,f, where
The indication whether xl,i,f=1 or 0 is according to some embodiments of the present disclosure. For example, it can be via a bitmap.
In a variation, the precoder equations Eq. 1 or Eq. 2 are respectively generalized to
where for a given i, the number of basis vectors is Mi and the corresponding basis vectors are {bi,f }. Note that Mi is the number of coefficients cl,i,f reported by the UE for a given i, where Mi≤M (where {Mi} or ΣMi is either fixed, configured by the gNB or reported by the UE).
The columns of Wl are normalized to norm one. For rank R or R layers (υ=R), the pre-coding matrix is given by
Eq. 2 is assumed in the rest of the disclosure. The embodiments of the disclosure, however, are general and are also application to Eq. 1, Eq. 3 and Eq. 4.
Here
then A is an identity matrix, and hence not reported. Likewise, if M=N3, then B is an identity matrix, and hence not reported. Assuming M<N3, in an example, to report columns of B, the oversampled DFT codebook is used. For instance, bf=Wf, where the quantity Wf is given by
When O3=1, the FD basis vector for layer l∈{1, . . . , υ} (where υ is the RI or rank value) is given by
In another example, discrete cosine transform DCT basis is used to construct/report basis B for the 3rd dimension. The m-th column of the DCT compression matrix is simply given by
Since DCT is applied to real valued coefficients, the DCT is applied to the real and imaginary components (of the channel or channel eigenvectors) separately. Alternatively, the DCT is applied to the magnitude and phase components (of the channel or channel eigenvectors) separately. The use of DFT or DCT basis is for illustration purpose only. The disclosure is applicable to any other basis vectors to construct/report A and B.
On a high level, a precoder Wl can be described as follows.
where A=W1 corresponds to the Rel. 15 W1 in Type II CSI codebook [REF8], and B=Wf.
The Cl={tilde over (W)}2 matrix includes all the required linear combination coefficients (e.g., amplitude and phase or real or imaginary). Each reported coefficient (cl,i,f=pl,i,fϕl,i,f) in {tilde over (W)}2 is quantized as amplitude coefficient (pl,i,f) and phase coefficient (ϕl,i,f). In one example, the amplitude coefficient (pl,i,f) is reported using a A-bit amplitude codebook where A belongs to {2, 3, 4}. If multiple values for A are supported, then one value is configured via higher layer signaling. In another example, the amplitude coefficient (pl,i,f) is reported as pl,i,f=pl,i,f(1)pl,i,f(2) where
For layer l, let us denote the linear combination (LC) coefficient associated with spatial domain (SD) basis vector (or beam) i∈{0, 1, . . . , 2L−1} and frequency domain (FD) basis vector (or beam) f∈{0, 1, . . . , M−1} as cl,i,f, and the strongest coefficient as cl,i*,f*. The strongest coefficient is reported out of the KNZ non-zero (NZ) coefficients that is reported using a bitmap, where KNZ≤K0=┌β×2LM┐<2LM and β is higher layer configured. The remaining 2LM−KNZ coefficients that are not reported by the UE are assumed to be zero. The following quantization scheme is used to quantize/report the KNZ NZ coefficients.
For the polarization r*∈{0,1} associated with the strongest coefficient cl,i*,f*, we have
and the reference amplitude pl,i,f(1)=pl,r*(1)=1. For the other polarization r∈{0,1} and r≠r*, we have
mod 2 and the reference amplitude pl,i,f(1)=pl,r(1) is quantized (reported) using the 4-bit amplitude codebook mentioned above.
In Rel. 16 enhanced Type II and Type II port selection codebooks, a UE can be configured to report M FD basis vectors. In one example,
where R is higher-layer configured from {1,2} and p is higher-layer configured from {¼,½}. In one example, the p value is higher-layer configured for rank 1-2 CSI reporting. For rank>2 (e.g., rank 3-4), the p value (denoted by v0) can be different. In one example, for rank 1-4, (p,v0) is jointly configured from {(½,¼),(¼,¼),(¼,⅛)}, i.e.,
for rank 1-2 and
for rank 3-4. In one example, N3=NSB×R where NSB is the number of SBs for CQI reporting. In one example, M is replaced with Mυ to show its dependence on the rank value υ, hence p is replaced with pυ, υ∈{1,2} and v0 is replaced with pυ, υ∈{3,4}.
A UE can be configured to report Mυ FD basis vectors in one-step from N3 basis vectors freely (independently) for each layer l∈{1, . . . , υ} of a rank υ CSI reporting. Alternatively, a UE can be configured to report Mυ FD basis vectors in two-step as follows.
In one example, a one-step method is used when N3≤19 and a two-step method is used when N3>19. In one example, N′3=┌αMυ┐ where α>1 is either fixed (to 2 for example) or configurable.
The codebook parameters used in the DFT based frequency domain compression (Eq. 5) are (L,pυ for υ∈{1,2}, pυ for υ∈{3,4},β,α,Nph). The set of values for these codebook parameters are as follows.
In Rel. 17 (further enhanced Type II port selecting codebook), M∈{1,2},
where K1=α×PCSIRS, and codebook parameters (M,α,β) are configured from Table 2.
The above-mentioned framework (Eq. 5) represents the precoding-matrices for multiple (N3) FD units using a linear combination (double sum) over 2 L (or K1) SD beams/ports and Mυ FD beams. This framework can also be used to represent the precoding-matrices in time domain (TD) by replacing the FD basis matrix Wf with a TD basis matrix Wt, wherein the columns of Wt comprises Mυ TD beams that represent some form of delays or channel tap locations. Hence, a precoder Wl can be described as follows.
In one example, the Mυ TD beams (representing delays or channel tap locations) are selected from a set of N3 TD beams, i.e., N3 corresponds to the maximum number of TD units, where each TD unit corresponds to a delay or channel tap location. In one example, a TD beam corresponds to a single delay or channel tap location. In another example, a TD beam corresponds to multiple delays or channel tap locations. In another example, a TD beam corresponds to a combination of multiple delays or channel tap locations.
In one example, the codebook for the CSI report is according to at least one of the following examples.
In one example, when the codebook is a legacy codebook (e.g., one of Rel. 15/16/17 NR codebooks, according to one of the examples above), then the CSI reporting is based on a CSI resource set comprising one or multiple NZP CSI-RS resource(s), where each NZP CSI-RS resource comprises CSI-RS antenna ports for all TRPs/RRHs, i.e., P=Σr=1NPr, where P is the total number of antenna ports, and Pr is the number of antenna ports associated with r-th TRP. In this case, a TRP corresponds to (or maps to or is associated with) a group of antenna ports.
In one example, when the codebook is a new codebook (e.g., one of the two new codebooks above), then the CSI reporting is based on a CSI resource set comprising one or multiple NZP CSI-RS resource(s).
In one embodiment, a UE is configured with an mTRP (or D-MIMO or C-JT) codebook, via e.g., higher layer parameter codebookType set to ‘typeII-r18-cjt’, which is designed based on Rel-16/17 Type-II codebook. For example, The mTRP codebook has a triple-stage structure which can be represented as W=W1W2WfH, where the component W1 is used to report/indicate a spatial-domain (SD) basis matrix comprising SD basis vectors, the component Wf is used to report/indicate a frequency-domain (FD) basis matrix comprising FD basis vectors, and the component W2 is used to report/indicate coefficients corresponding to SD and FD basis vectors.
In one example, in Rel-16 Type-II codebook, L vectors, vm
In one example, in Rel-17 Type-II codebook, K1 ports are selected from PCSI-RS ports based on L vectors, vm
which are indicated by the index i1,2, where
The elements of m are found from i1,2 using C(x,y) as defined in Tables 5.2.2.2.5-4 and 5.2.2.2.7-2 and the algorithm:
In one embodiment, on the SD basis selection for (Rel-18) Type-II codebook refinement for CJT mTRP, which is designed based on Rel-17 Type-II port-selection codebook, a set of NL≥1 combinations of values for {αn, n=1, . . . , NTRP} is configured by the NW via higher-layer (RRC) signaling, where NTRP is a number of TRPs (CSI-RS resources) configured by the NW. The NL combinations of value(s) for {αn, n=1, . . . , NTRP} can be signaled by using a joint indicator or multiple separate indicators. In one example, NL=1. In another example, NL>1.
In one example, Ln=αnPCSI-RS,n/2 where PCSI-RS,n is a number of CSI-RS ports for CSI-RS resource n (or CSI-RS port group n or TRP n). In one example, PCSI-RS-PCSI-RS,n for all n.
In one example, {αn} values can be configured based on at least one of the tables (or any table (i.e., a sub-table, or whole table) that can be constructed as) described in the present disclosure.
In one example, NL can be explicitly configured via higher-layer (RRC) signaling with a separate parameter. The possible values for NL are a set of . Let denote a total number of a table including combinations of values for {αn, n=1, . . . , NTRP} by NT. In one example,
bit size parameter can be used to indicate NL combinations of values for {αn, n=1, . . . , NTRP}. In one example, the table can be any table (whole table or a sub-table) described in the present disclosure or any table that can be constructed as described in the present disclosure.
In one example, NL is implicitly determined or configured via higher-layer RRC signaling.
(or a function of {αn}). For example, one combination of the values for {αn, n=1, . . . , NTRP} is configured, and other combinations of the values for {αn, n=1, . . . , NTRP} such that
for the configured combination are determined as NL−1 combinations of values {αn, n=1, . . . , NTRP}.
for the configured combination are determined as NL−1 combinations of values {αn, n=1, . . . , NTRP}.
In one example, when NL>1, a UE reports an indicator with the size of ┌log2 NL┐-bit to indicate one selected combination of values for {αn, n=1, . . . , NTRP} in CSI part 1. In one example, when NL=1, a UE follows the configured {αn} values, hence no report is needed for {αn} values.
In one example, NL combinations of {αn} is subject to the UE capability on
In one embodiment, a UE is configured with a CSI report (e.g., via higher layer CSI-ReportConfig) based on a codebook for C-JT transmission from multiple TRPs, as described in the present disclosure, where codebook parameters (such as α or L, β, pυ or Mυ) are configured via a higher-layer parameter ‘paramCombination-r18’ or ‘paramCombinationCJT-r18’.
Any table including at least one of the combinations provided in the (sub)-tables in the present disclosure can be an example for the table of ‘paraCombination-r18’.
In one embodiment, a table used for ‘paramCombination-r18’ is designed based on the following parameter candidates:
In one example, any table including at least one of the combinations provided in the tables in the present disclosure can be an example for a table of ‘paraCombination-r18’.
In one example, {αn} values can be configured based on at least one of the tables (or any table (i.e., sub-table, whole table) that can be constructed as) described in the present disclosure.
In one example, NL can be explicitly configured via higher-layer (RRC) signaling with a separate parameter. The possible values for NL are a set of . Let denote a total number of a table including combinations of values for {αn, n=1, . . . , NTRP} by NT. In one example,
bit size parameter can be configured to indicate NL combinations of values for {Ln, n=1, . . . , NTRP}. In one example, the table can be any table (whole table or sub-table) described in the present disclosure or any table that can be constructed as described in the present disclosure.
In one example, NT combinations of values for {αn} can be configured by using Table 3 or Table 3A or a sub-table including at least one of the rows in Table 3 or Table 3A.
Although a decimal form is used for {αn} in Table 3 and for {αn}, f({αn}) in Table 3A, it can be denoted in a fractional form, e.g., ½, ¾, 1 instead of 0.50, 0.75, 1.
In one example, in Table 3A,
where the max value among {αn} in each row is in the column of f({αn}).
In one example, in Table 3A,
where the min value among {αn} in each row is in the column of f({αn}).
In one example, in Table 3A,
where the average value of {αn} in each row is in the column of f({αn}).
In one example, in Table 3A,
where an upper bound of the average value of {αn} in each row is in the column of f({αn}).
In one example, in table 3a, f({αn})=Σn=1N
In one example, in Table 3A, f({αn})≥Σn=1N
In one example, in Table 3A, f({αn}) can be replaced by another parameter such as αtot, αmax, αsum, αmin,
In one example, a sub-table of Table 3 excluding the column of NTRP can be an example for a table of ‘paraCombination-r18’.
In one example, a sub-table of Table 3 excluding the column of NTRP and/or inserting 0s in the blanks can be an example for a table of ‘paraCombination-r18’.
In one example, a sub-table of Table 3 can be as follows:
In one example, a sub-table of Table 3 corresponding to a value of NTRP can be an example for a table of ‘paraCombination-r18’.
For example, for NTRP=1, the following table can be an example.
In another example, the column of NTRP does not exist in the above table. In another example, indexing number can be different.
For example, for NTRP=2, the following table can be an example.
In another example, the column of NTRP does not exist in the above table. In another example, indexing number can be different.
For example, for NTRP=3, the following table can be an example.
In another example, the column of NTRP does not exist in the above table. In another example, indexing number can be different.
For example, for NTRP=4, the following table can be an example.
In another example, the column of NTRP does not exist in the above table. In another example, indexing number can be different.
In one example, a sub-table of any-table described in the present disclosure associated with {αn} such that αn1≤αn2 (non-decreasing order) when n1<n2 can be an example for a table of ‘paraCombination-r18’.
In one example, a sub-table of any-table described in the present disclosure associated with {αn} such that αn1≥αn2 (non-increasing order) when n1<n2 can be an example for a table of ‘paraCombination-r18’.
In one example, the ordering of the TRPs (or CSI-RS resources) can be configured by the NW, via e.g., RRC, or MAC CE or, DCI.
In one example, {M,β} pair values can be configured based on at least one of the tables (or any table (i.e., sub-table, whole table) that can be constructed as) described in the present disclosure.
In one example, a sub-table of Table 3A excluding the column of NTRP can be an example for a table of ‘paraCombination-r18’.
In one example, a sub-table of Table 3A excluding the column of NTRP and/or inserting 0s in the blanks can be an example for a table of ‘paraCombination-r18’.
In one example, a sub-table of Table 3A corresponding to a value of NTRP can be an example for a table of ‘paraCombination-r18’.
For example, for NTRP=1, the following table can be an example.
In another example, the column of NTRP does not exist in the above table. In another example, indexing number can be different.
For example, for NTRP=2, the following table can be an example.
In another example, the column of NTRP does not exist in the above table. In another example, indexing number can be different.
For example, for NTRP=3, the following table can be an example.
In another example, the column of NTRP does not exist in the above table. In another example, indexing number can be different.
For example, for NTRP=4, the following table can be an example.
In another example, the column of NTRP does not exist in the above table. In another example, indexing number can be different.
In one example, a sub-table of any-table described in the present disclosure associated with {αn} such that αn1≤αn2 (non-decreasing order) when n1<n2 can be an example for a table of ‘paraCombination-r18’.
In one example, a sub-table of any-table described in the present disclosure associated with {αn} such that αn1≥αn2 (non-increasing order) when n1<n2 can be an example for a table of ‘paraCombination-r18’.
In one example, the ordering of the TRPs (or CSI-RS resources) can be configured by the NW, via e.g., RRC, or MAC CE or, DCI.
In one example, {M,β} pair values can be configured based on at least one of the tables (or any table (i.e., sub-table, whole table) that can be constructed as) described in the present disclosure.
In one example, a sub-table of Table 4 can be an example for a table of ‘paraCombination-r18’.
In one example, separate tables for {αn, n=1, . . . , NTRP} and {M,β}, respectively, are used for the configuration of {αn}, M, β, where each table corresponds to one of the tables that can be constructed in the present disclosure.
In one embodiment, any table including at least one of the parameter combinations in a sub-table of Table 4 can be used for a table of ‘paramCombination-r18’, where the sub-table includes parameter combinations associated with M∈, where is a subset of . For example, if ={1,2}, the sub-table includes the parameter combinations associated with M={1,2} in Table 4.
In one embodiment, any table including at least one of the parameter combinations in a sub-table of Table 4 can be used for a table of ‘paramCombination-r18’, where the sub-table includes parameter combinations associated with β∈, where is a subset of . For example, if ={⅜,½,¾,1}, the sub-table includes the parameter combinations associated with β=⅜,½,¾,1 in Table 4.
In one embodiment, any table including at least one of parameter combinations in a sub-table of Table 4 can be used for a table of ‘paramCombination-r18’, where the sub-table includes parameter combinations associated M∈ and β∈, where M∈ is defined in one or more embodiments described herein, and β ∈ is defined in one or more embodiments described herein.
In one example, the sub-table includes parameter combinations associated with:
In one example, a sub-table of Table 4A can be an example for a table of ‘paraCombination-r18’.
In one example, in Table 4A,
where the max value among {αn} in each row is in the column of g({αn}).
In one example, in Table 4A,
where the min value among {αn} in each row is in the column of g({αn}).
In one example, in Table 4A,
where the average value of {αn} in each row is in the column of g({αn}).
In one example, in Table 4A,
where an upper bound of the average value of {αn} in each row is in the column of g({αn}).
In one example, in Table 4A, g({αn})=Σn=1N
In one example, in Table 4A, g({αn})≥Σn=1N
In one example, in Table 4A, g({αn}) can be replaced by another parameter such as αtot, αmax, αsum, αmin,
Values of Xi in Table 4A depend on how g(⋅) is defined. For example,
then X1=0.5, X2=0.75, and X3=1 where it can be constructed by g(⋅) and candidate values of αn, i.e., ={½,¾,1}.
In one example, f({αn})=g({αn}), i.e., the metric or parameter is the same.
In another example, f({αn})≠g({αn}), i.e., the metric or parameter is independent (different).
In one example, separate tables for {αn, n=1, . . . , NTRP} and {M,β}, respectively, are used for the configuration of {αn}, M, β, where each table corresponds to one of the tables that can be constructed in this disclosure.
In one embodiment, any table including at least one of the parameter combinations in a sub-table of Table 4A can be used for a table of ‘paramCombination-r18’, where the sub-table includes parameter combinations associated with M∈, where is a subset of . For example, if ={1,2}, the sub-table includes the parameter combinations associated with M={1,2} in Table 4A.
In one embodiment, any table including at least one of parameter combinations in a sub-table of Table 4A can be used for a table of ‘paramCombination-r18’, where the sub-table includes parameter combinations associated with β∈, where is a subset of . For example, if ={⅜,½,¾,1}, the sub-table includes the parameter combinations associated with β=⅜,½,¾,1 in Table 4.
In one embodiment, any table including at least one of parameter combinations in a sub-table of Table 4A can be used for a table of ‘paramCombination-r18’ where the sub-table includes parameter combinations associated M∈ and β∈, where M∈ is defined in one or more embodiments herein, and β∈ is defined in one or more embodiments herein.
In one example, the sub-table includes parameter combinations associated with:
In one example, a sub-table of Table 4 can be as follows:
In one example, a table of ‘paramCombination-r18’ for αmax, M, β can include at least one of the parameter combinations described in the following table.
In one example, a table of ‘paramCombination-r18’ for αmax, M, β can include at least one of the parameter combinations described in the following table.
In one example, supported {M,β} combinations for Rel-17-based CJT codebook are as follows:
In one embodiment, a UE is configured with an mTRP (or D-MIMO or C-JT) codebook, via e.g., higher layer parameter codebookType set to ‘typeII-r18-cjt’, wherein codebook parameters for the mTRP codebook are configured using two (parameter-combination) tables.
In one embodiment, a first table is one of the tables for {αn} (or whole tables/sub-tables, or tables that can be constructed) in/under embodiment 1, and a second table is one of the tables for {M,β} (or whole tables/sub-tables, or tables that can be constructed) in/under embodiment 1 (or vice versa). For example, a first table is used to configure a combination of {Ln}, and a second table is used to configure a combination of (pv,β) or vice versa.
An illustration of an example is shown in
can be the parameter to link two tables.
can be the parameter to link two tables.
can be the parameter to link two tables.
can be the parameter to link two tables.
In one example, the NW can configure index X in a first table and index Y among indices associated with a value of the linked parameter in a second table. Here, the value of linked parameter is the value associated with index X of the first table.
As an example, by using the illustration shown in
In one example, NL is implicitly derived using ({αn}) and/or g({αn}).
In one embodiment, a subset of parameter combinations in a table designed based on one or more embodiments herein for a table of ‘paramCombination-r18’ can be restricted not to configure based on one or more aspects such as a number of TRPs (NTRP), a number of SBs K (numberOfPMI-SubbandsPerCQI-Subband), and a number of CSI-RS ports (2N1N2 or PCSI-RS)
In one example, the parameter combination with αn=1 and/or ¾ for any n can be used/reported (by the UE) or configured (by the NW) under a condition.
In one example, the parameter combination with M=2 and/or 3 or and/or 4 for any n can be used/reported (by the UE) or configured (by the NW) under a condition.
In one example, the parameter combination with M=1 for any n can be used/reported (by the UE) or configured (by the NW) under a condition.
In one example, the parameter combination with β=½ and/or ¾ and/or 1 for any n can be used/reported (by the UE) or configured (by the NW) under a condition.
In one example, the parameter combination with αn=1 and/or ¾ and/or M=2 and/or 3 and/or 4 and/or 1 for any n can be used/reported (by the UE) or configured (by the NW) under a condition.
In one example, the parameter combination with αn=1 and/or ¾ and/or β=½ and/or ¾ and/or 1 for any n can be used/reported (by the UE) or configured (by the NW) under a condition.
In one example, the parameter combination with M=2 and/or 3 and/or 4 and/or 1 and/or β=½ and/or ¾ and/or 1 for any n can be used/reported (by the UE) or configured (by the NW) under a condition.
In one example, the parameter combination with αn=1 and/or ¾and/or M=2 and/or 3 and/or 4 and/or 1 and/or β=½ and/or ¾ and/or 1 for any n can be used/reported (by the UE) or configured (by the NW) under a condition.
In one embodiment, parameter combinations M, α, β or {αn} and (M,β) for Rel-17-based (further enhanced Type-II port-selection codebook) CJT codebook are derived/generated/constructed/translated from (or based on/related to) parameter combinations L,pv,β or {Ln} and (pv,β) for Rel-16-based (Enhanced Type-II (regular) codebook) CJT codebook.
In one example, parameter combinations for Rel-16-based CJT codebook are used to derive parameter combinations for Rel-17-based CJT codebook, e.g., based on some rules or equations.
In one example, parameter combinations for Rel-16-based CJT codebook are used for constructing/generating/deriving tables of parameter combinations for Rel-17-based CJT codebook. (tables)
To Map (Relate) from Ln to αn
In one embodiment, there is one-to-one relation between Ln and αn, where each Ln value has a corresponding value of αn. (or vice versa) For example, based on increasing order or decreasing order of Ln and αn (the smallest Ln maps to the smallest αn, the largest Ln maps to the largest αn, and the rest can be mapped similarly according to the order).
In one example, Ln∈{2,4,6} in parameter combinations of Rel-16-based CJT codebook can be mapped to αn={½,¾,1} for Rel-17-based CJT codebook.
Assuming the above relation described in
In one example, a one-to-one mapping or relation shown in this example can be used to derive {αn} for Rel-17-based CJT codebook.
In one example, a one-to-one mapping or relation shown in this example can be used to construct/generate/derive a table for {αn} for Rel-17-based CJT codebook.
In example, Ln∈{2,4} in parameter combinations of Rel-16-based CJT codebook can be mapped to αn={½,¾} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive {αn} for Rel-17-based CJT codebook from {Ln} for Rel-16-based CJT codebook.
In one example, Ln∈{2,4} in parameter combinations of Rel-16-based CJT codebook can be mapped to αn={¾,1} for Rel-17-based CJT codebook.
In one example, an example with the same approach shown in one or more examples described herein can be an example to derive {αn} for Rel-17-based CJT codebook from {Ln} for Rel-16-based CJT codebook.
In one example, Ln∈{2,4} in parameter combinations of Rel-16-based CJT codebook can be mapped to αn={½,1} for Rel-17-based CJT codebook.
An example with the same approach shown in one or more examples herein can be an example to derive {αn} for Rel-17-based CJT codebook from {Ln} for Rel-16-based CJT codebook.
In one embodiment, there is one-to-one relation between Ln and αn, where each Ln value has a corresponding value of αn, and different Ln values can be corresponding to a same value of αn. (or vice versa).
In one example, Ln∈{2,4,6} in parameter combinations of Rel-16-based CJT codebook can be mapped to αn={½,¾} for Rel-17-based CJT codebook.
In one example, a many-to-one mapping, or relation shown in this example can be used to derive {αn} for Rel-17-based CJT codebook.
In one example, a many-to-one mapping, or relation shown in this example can be used to construct/generate/derive a table for {αn} for Rel-17-based CJT codebook.
In one example, Ln∈{2,4,6} in parameter combinations of Rel-16-based CJT codebook can be mapped to αn={¾,1} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive {αn} for Rel-17-based CJT codebook from {Ln} for Rel-16-based CJT codebook.
In one example, Ln∈{2,4,6} in parameter combinations of Rel-16-based CJT codebook can be mapped to αn={½,1} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive {αn} for Rel-17-based CJT codebook from {Ln} for Rel-16-based CJT codebook.
In one example, a one-to-many relation between Ln and αn, where Ln=2 maps to αn=½, and Ln=4 maps to αn=½ or ¾, and Ln=6 maps to αn=1 (other one-to-many relation cases are omitted.)
In one embodiment, {αn} for Rel-17-based CJT codebook are derived using a relation between α and L, e.g.,
(in section 5.2.2.2.7 of [9]), where PCSI-RS is a number of CSI-RS ports associated with n-th CSI-RS resource. We assume PCSI-RS,n-PCSI-RS for all CSI-RS resources in the rest of the examples below. For, the examples are general and apply to the case when PCSI-RS,n can be different for different CSI-RS resources.
(calculate
→take it upper bounding by 1)
In one example, for a given configured value of Ln and PCSI-RS, an is determined by
In one example, c=1. In one example, c≤1. In one example, c≥1. PCSI-RS For the case of c=1, we can have following examples:
That is, based on the rule of
αn is determined using configured values of Ln and PCSI-RS.
(calculate
→take it upper bounding by 1→find a nearest value from legacy candidates for α)
In one example, for a given configured value of Ln and PCSI-RS, αn is selected from ={½, ¾, 1}, where the selected value from is the nearest value to
In one example, c=1. In one example, c≤1. In one example, c≥1. For the case of c=1, we can have following examples:
That is, based on the rule of αn selected from , the nearest value to
αn is determined using configured values of Ln and PCSI-RS.
(calculate
→take it upper bounding by 1→find a nearest value from legacy candidates+new candidates for α)
In one example, for a given configured value of Ln and PCSI-RS, αn is selected from , where the selected value from is the nearest value to
In one example, c=1. In one example, c≤1. In one example, c≥1. In one example, A includes (the whole or any subset of) legacy candidate values and/or new candidate values. In one example, ={¼,½,¾,1}. For the case of c=1 and ={¼,½,¾,1}, we can have following examples:
That is, based on the rule of αn selected from , the nearest value to
αn is determined using configured values of Ln and PCSI-RS.
In one example, for a given Ln and PCSI-RS, αn is directly determined by
In this case, we can have following examples:
In this disclosure, a criterion on identifying the nearest value can be based on 1-norm, 2-norm, or another -norm metric.
(calculate
→take it upper bounding by 1)
In one example, for a given configured value of {Ln} combination and PCSI-RS, Σnαn is determined by
In one example, c=2. In one example, c≤2. In one example, c≥2. For the case of c=1, examples include:
That is, based on the rule of
Σnαn is determined using configured values of {Ln} and PCSI-RS.
(calculate
→take it upper bounding by 1→find a nearest value from legacy candidates for Σnαn)
(calculate
→take it upper bounding by 1→find a nearest value from legacy candidates+new candidates for α)
In one example, for a given configured value of {Ln} combination and PCSI-RS, Σnαn is directly determined by
In one embodiment, {αn} for Rel-17-based CJT codebook are derived using a relation between α and L, e.g.,
(in section 5.2.2.2.7 of [9]), where PCSI-RS is a number of CSI-RS ports associated with n-th CSI-RS resource. It may be assumed that PCSI-RS,n=PCSI-RS for all CSI-RS resources in the rest of the examples below. For, the examples are general and apply to the case when PCSI-RS,n can be different for different CSI-RS resources.
(calculate
→take it upper bounding by 1)
In one example, for a given configured value of an and PCSI-RS, Ln is determined by
In one example, c=6. In one example, c≤6. In one example, c≥6. In one example, c=4. In one example, c≤4. In one example, c≥4. For the case of c=4, examples may include:
That is, based on the rule of
Ln is determined using configured values of αn and PCSI-RS.
(calculate
→take it upper bounding by 1→find a nearest value from legacy candidates for α)
In one example, for a given configured value of αn and PCSI-RS, Ln is selected from ={2,4,6} or ={2,4}, where the selected value from is the nearest value to
In one example, c≤6. In one example, c≥6. In one example, c=4. In one example, c≤4. In one example, c≥4. For the case of c=4, examples may include:
That is, based on the rule of
selected from , the nearest value to
Ln is determined using configured values of αn and PCSI-RS.
(calculate
→take it upper bounding by 1→find a nearest value from legacy candidates for α+new legacy value)
In one example, for a given configured value of αn and PCSI-RS, Ln is selected from ={2,4,6} or ={2,3,4}, where the selected value from is the nearest value to
In one example, c≤6. In one example, c≥6. In one example, c=4. In one example, c≤4. In one example, c≥4. For the case of c=4, examples may include:
That is, based on the rule of
selected from the nearest value to
Ln is determined using configured values of αn and PCSI-RS.
In one example, for a given configured value of αn and PCSI-RS, Ln is directly determined by
(calculate
→take it upper bounding by 1)
In one example, for a given configured value of {αn} and PCSI-RS, ΣnLn is determined by
In one example, c=8. In one example, c≤8. In one example, c≥8. For the case of c=8, examples may include:
That is, based on the rule of
ΣnLn is determined using configured values of {αn} and PCSI-RS.
(calculate
→take it upper bounding by 1→find a nearest value from legacy candidates for, ΣnLn)
(calculate
→take it upper bounding by 1→find a nearest value from legacy candidates+new candidates for α)
In one example, for a given configured value of αn and PCSI-RS, ΣnLn is directly determined by
In one embodiment, {αn} for Rel-17-based CJT codebook are derived by Ln and a normalization factor
where n=1, . . . , NTRP.
In one example, for a given combination of {Ln}, αn is determined by
(calculate
→find a nearest value from legacy candidates for α)
In one example, for a given combination of {Ln}, αn is selected from ={½,¾,1}, where the selected value from is the nearest value to
In one embodiment, there is one-to-one relation between pv and M, where each pv value has a corresponding value of M.
In one example, there is one-to-one relation between pv for v=1, 2 and M, i.e., the relation is based on pv for v=1, 2 and M.
In one example, there is one-to-one relation between pv for v=3, 4 and M, i.e., the relation is based on pv for v=3, 4 and M.
In one example, pv∈{⅛,¼ } in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook.
In one example,
In one example, a one-to-one mapping or relation shown in this example can be used to derive M for Rel-17-based CJT codebook.
In one example, a one-to-one mapping or relation shown in this example can be used to construct/generate/derive a table for M (or (M,β)) for Rel-17-based CJT codebook.
In one example, pv∈{¼,½} in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one example, pv∈{⅛,½} in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one example, pv∈{ 1/16,½} in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one example, pv∈{ 1/16,¼ } in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one example, pv∈{ 1/16,⅛ } in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one embodiment, there is a many-to-one relation between pv and M, where each pv value has a corresponding value of M, and different pv values can be corresponding to a same value of M.
In one example, there is a many-to-one relation between pv for v=1, 2 and M, i.e., the relation is based on pv for v=1, 2 and M.
In one example, there is a many-to-one relation between pv for v=3, 4 and M, i.e., the relation is based on pv for v=3, 4 and M.
In one example, pv∈{⅛,¼,½} in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook.
In one example,
In one example, a many-to-one mapping, or relation shown in this example can be used to derive M for Rel-17-based CJT codebook.
In one example, a many-to-one mapping, or relation shown in this example can be used to construct/generate/derive a table for M (or (M,β)) for Rel-17-based CJT codebook.
In one example, pv∈{ 1/16,⅛,¼ } in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one example, pv∈{ 1/16,⅛,½} in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one example, pv∈{ 1/16,¼,½} in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one example, pv∈{ 1/16,⅛,¼,½} in parameter combinations of Rel-16-based CJT codebook can be mapped to M={1,2} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive M for Rel-17-based CJT codebook from pv for Rel-16-based CJT codebook.
In one embodiment, M for Rel-17-based CJT codebook is derived using an existing relation between pv and M, e.g.,
(in section 5.2.2.2.5 of [9]), where the parameter R is configured with the higher-layer parameter numberOfPMI-SubbandsPerCQI-Subband, and N3 is the total number of precoding matrices indicated by the PMI as a function of the number of configured subbands in csi-ReportingBand, the subband size configured by the higher-level parameter subbandSize and of the total number of PRBs in the bandwidth part according to Table 5.2.1.4-2 of [9].
In one example, the existing relation is based on pv for v=1, 2 for Rel-16-based CJT codebook and M for Rel-17-based CJT codebook.
In one example, the existing relation is based on pv for v=3, 4 for Rel-16-based CJT codebook and M for Rel-17-based CJT codebook.
(calculate
→take it upper bounding by 2)
In one example, for a given configured value of pv, R, and N3, M is determined by
In one example, c=2. In one example, c≤2. In one example, c≥2. For the case of c=2, examples may include:
That is, based on the rule of
M is determined using configured values of pv, R, and N3.
In one example, for a given configured value of pv, R, and N3, M is directly determined by
That is, based on the rule of
M is determined using configured values of pv, R, and N3.
In one embodiment, M for Rel-17-based CJT codebook is derived by pv and a scaling factor s, where M=f(pv×s)+b and f(⋅) is a function such as ceiling, flooring, etc, b is an offset value.
In one example, pv for v=1, 2 can be used for deriving M value for Rel-17-based CJT codebook.
In one example, pv for v=3, 4 can be used for deriving M value for Rel-17-based CJT codebook.
In one example, s=1/x where x is the minimum value among configurable pv values for Rel-16-based CJT codebook and f(⋅) is a flooring function and b=0.
In one example, when a configurable value of pv is in {⅛,¼,½}, x=⅛ and s=8. In this case,
In one example, s=1/x where x is the maximum value among configurable pv values for Rel-16-based CJT codebook and f(⋅) is a flooring function and b=1.
In one example, when a configurable value of pv is in {⅛,¼,½}, x=½ and s=2. In this case,
In one embodiment, there is one-to-one relation between β for Rel-16-based CJT codebook (denoted by βR16 hereafter) and β for Rel-17-based CJT codebook (denoted by βR17 hereafter), where each βR16 value has a corresponding value of BR17.
In one example, βR16∈{¼,½,¼ } in parameter combinations of Rel-16-based CJT codebook can be mapped to βR17={½,¼,1} for Rel-17-based CJT codebook.
In one example,
In one example, a one-to-one mapping or relation shown in this example can be used to derive βR17 for Rel-17-based CJT codebook.
In one example, a one-to-one mapping or relation shown in this example can be used to construct/generate/derive a table for βR17 (or (M,β)) for Rel-17-based CJT codebook.
In one example, βR16∈{⅛,¼,½,¾} in parameter combinations of Rel-16-based CJT codebook can be mapped to βR17∈{¼,½,¾,1} for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive βR17 for Rel-17-based CJT codebook from βR16 for Rel-16-based CJT codebook.
In one example, βR16 in any subset of {⅛,¼,½,¾} having two elements in parameter combinations of Rel-16-based CJT codebook can be mapped to βR17 in any subset of {¼,½,¾,1} having two elements for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive βR17 for Rel-17-based CJT codebook from βR16 for Rel-16-based CJT codebook.
In one embodiment, there is a many-to-one relation between βR16 for Rel-16-based CJT codebook and βR17 for Rel-17-based CJT codebook, where each βR16 value has a corresponding value of βR17 and different βR16 values can be corresponding to a same value of βR17.
In one example, βR16∈{⅛,¼,½,¾} in parameter combinations of Rel-16-based CJT codebook can be mapped to βR17={½,¾,1} for Rel-17-based CJT codebook.
In one example,
In one example, a many-to-one mapping, or relation shown in this example can be used to derive βR17 for Rel-17-based CJT codebook.
In one example, a many-to-one mapping, or relation shown in this example can be used to construct/generate/derive a table for βR17 (or (M,β)) for Rel-17-based CJT codebook.
In one example, βR16∈{⅛,¼,½,¾} in parameter combinations of Rel-16-based CJT codebook can be mapped to βR17 in any subset of {¼,½,¾,1} having three elements for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive βR17 for Rel-17-based CJT codebook from βR16 for Rel-16-based CJT codebook.
In one example, βR16 ∈{⅛,¼,½,¾} in parameter combinations of Rel-16-based CJT codebook can be mapped to βR17 in any subset of {¼,½,¾,1} having two elements for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive βR17 for Rel-17-based CJT codebook from βR16 for Rel-16-based CJT codebook.
In one example, βR16 in any subset of {⅛,¼,½,¾} having three elements in parameter combinations of Rel-16-based CJT codebook can be mapped to βR17 in any subset of {¼,½,¾,1} having two elements for Rel-17-based CJT codebook. An example with the same approach shown in one or more examples herein can be an example to derive βR17 for Rel-17-based CJT codebook from βR16 for Rel-16-based CJT codebook.
In one embodiment, there is no table on parameter combinations for Rel-17-based CJT codebook, but there is a rule (or are rules) using at least one of the embodiments/examples described in this disclosure to determine/derive {αn} and (M,β) from parameter combinations {Ln} and (pv,β) (or tables) for Rel-16-based CJT codebook.
In one embodiment, another table set for Rel-17-based CJT codebook is constructed/generated/derived/determined by at least one of the embodiments/examples described in this disclosure and parameter combinations (or tables) for Rel-16-based CJT codebook.
In one example, a table for {αn} combinations (or supported {αn} combinations) for Rel-17-based CJT codebook includes at least one of the combinations that can be derived from the parameter combinations {Ln} for Rel-16-based CJT codebook using one or more examples herein.
For example, as shown in the following table, possible {αn} combinations are described w.r.t. PCSI-RS for given {Ln} combinations, using one or more examples herein.
In one example, a table for {αn} combinations (or supported {αn} combinations) for Rel-17-based CJT codebook includes at least one of the following combinations:
For each row associated with {αn} combination having permutations, the case of {αn} combination including permutations is denoted by A# and the case of {αn} combination without permutations is denoted by A'#, respectively.
In one example, a table for {αn} combinations (or supported {αn} combinations) for Rel-17-based CJT codebook includes at least one of the following combinations (A1-A8, A10-A14):
In one example, a table for {αn} combinations (or supported {αn} combinations) for Rel-17-based CJT codebook includes at least one of the following combinations (A1, A2, A4, A5, A7, A9, A10, A′13, A′14, A16):
In one example, a table for {αn} combinations (or supported {αn} combinations) for Rel-17-based CJT codebook includes at least one of the following combinations (A1-A7, A9, A10, A13, A′14, A16)
In one example, a table for {αn} combinations (or supported {αn} combinations) for Rel-17-based CJT codebook includes all of the combinations in the table above, i.e., A1-A7, A9, A10, A13, A′14, A16.
In one example, a table for {αn} combinations (or supported {αn} combinations) for Rel-17-based CJT codebook includes some of the combinations in the table above, i.e., A1-A7, A9, A10, A13, A′14, A16 and some of the combinations not in the table above, i.e., A8, A11, A12, A15.
In one example, a table for {αn} combinations (or supported {αn} combinations) for Rel-17-based CJT codebook includes at least one (or some or all) of the combinations in the table above in which for at least one of the combinations having permutations is replaced by the combination without having its permutations, i.e., A #→A′# or vice versa, i.e., A′#→A #.
For purpose of illustration, assume that a supported number of {αn} combinations is S and a supported number of (M,β) combinations is Q, e.g., S=20, Q=5.
In one example, one linkage matrix with size of S×Q (or Q×S) is used to indicate/refer linking pairs between {αn} and (M,β) combinations. For example, each entry (s, q) of the linkage matrix has either 0 or 1, where 0 refers to “not supported” for the linkage between s-th {αn} combination and q-th (M,β) combination, or 1 refers to “supported” for the linkage between s-th {αn} combination and q-th (M,β) combination.
In one example, the UE is not expected to configure the combination pair of {αn} and (M,β) corresponding to any of the “not supported” entries of the linkage matrix.
In one example, the UE is expected to configure the combination pair of {αn} and (M,β) corresponding to one (any) of the “supported” entries of the linkage matrix.
In one example, the linkage matrix is pre-determined/fixed.
In one example, the linkage matrix is configured via higher-layer signaling (e.g., RRC).
In one example, NTRP (or NTRP−1) linkage matrices each with size of Sr×Q (Q×Sr) are used to indicate/refer linking pairs between {αn} and (M,β) combinations, where each linkage matrix r corresponds to the linkage matrix for NTRP=r, and r=1, . . . , 4 (or r=2, . . . , 4). For example, each entry (s,q) of each linkage matrix r has either 0 or 1, where 0 refers to “not supported” for the linkage between s-th {αn} combination for NTRP=r and q-th (M,β) combination, or 1 refers to “supported” for the linkage between s-th {αn} combination for NTRP=r and q-th (M,β) combination.
In one example, Sr is the number of supported {αn} combinations for NTRP=r.
In one example, the UE is not expected to configure the combination pair of {αn} and (M,β) corresponding to any of the “not supported” entries of the linkage matrix.
In one example, the UE is expected to configure the combination pair of {αn} and (M,β) corresponding to one (any) of the “supported” entries of the linkage matrix.
In one example, the linkage matrix is pre-determined/fixed.
In one example, the linkage matrix is configured via higher-layer signaling (e.g., RRC).
The term linkage matrix is used herein for the sake of convenience, but it can be under a different name, e.g., linkage pair, linkage combination, (linkage/supported) pair/combination or linkages between {αn} and (M,β) etc.
In one example, a supported number of linkages/pairs between {αn} and (M,β) for each NTRP is at most J, e.g., J=8 (as shown in the following table). In another example, J=12 or J=16, J=9 or J=40.
For example, in the table above, the ones with ‘linked’ are supported linkages/pairs between {αn} and (M,β) for each NTRP, wherein the number of supported linkages/pairs for each NTRP is at most 16.
In one example, possible values of NL are determined/restricted by the linkages for a given (M,β) and for each NTRP. For example, using the table above as an example, for the case of (M,β) corresponding to (2,½) for NTRP=2, the possible {αn} combinations are {½,1}, {1,½}, {¾,¾}, {1,1}. In this case, the possible values of NL are 1 and/or 2 and/or 4. That is, the number of rows with ‘linked’ for each column determines the possible {αn} combinations and the possible values of NL. We denote possible values of NL in the last row for each NTRP in the table above.
In one example, NL=4 can be supported only for NTRP=3.
In one example, for all NTRP=1,2,3,4, the possible values of NL are 1 and 2 only.
In one example, the possible values of NL are 1, 2, and 4, but NL=4 is only for NTRP=2.
In one example, the possible values of NL are 1, 2, and 4, but NL=4 is only for NTRP=3.
In one example, the possible values of NL are 1, 2, and 4, but NL=4 is only for NTRP=4.
In one example, the possible values of NL are 1, 2, and 4, but NL=4 is only for NTRP=2, 3.
In one example, the possible values of NL are 1, 2, and 4, but NL=4 is only for NTRP=3, 4.
In one example, the possible values of NL are 1, 2, and 4, but NL=4 is only for NTRP=2, 4.
In one example, the possible values of NL are 1, 2, and 4, but NL=4 is only for NTRP=2,3,4.
In one example, the supported linkages/pairs between {αn} and (M,β) include all of the ‘linked’ ones described in one of the linkage tables that can be constructed or are described in the present disclosure.
In one example, the supported linkages/pairs between {αn} and (M,β) include a subset of the ‘linked’ ones described in one of the linkage tables that can be constructed or are described in the present disclosure.
In one example, the supported linkages/pairs between {αn} and (M,β) include at least one of the ‘linked’ ones described in one of the linkage tables that can be constructed or are described in the present disclosure.
In one example, for a given (M,β) and for each NTRP, the linkages for {αn} combinations that are in permutation relationship (e.g., {½,½,1}, {½,1,½}, {1,½,½} for NTRP=3) are either ‘all linked or ‘all not linked’.
In one example, for each NTRP, the supported linkages/pairs between {αn} and (M,β) include at least one of the highlighted ones (denoted by ‘W #’) described in the following table.
For example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include at least one of the highlighted ones labelled from W1 to W11. For example, J1 linkages selected from W1-W11 are supported linkages, where 1≤J1≤J, and J2 linkages selected from the ones other than W1-W11 (for NTRP=2) are supported linkages, where 0≤J2≤J−J1.
For example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include at least one of the highlighted ones labelled from W12 to W27. For example, J1 linkages selected from W12-W27 are supported linkages, where 1≤J1≤J, and J2 linkages selected from the ones other than W12-W27 (for NTRP=3) are supported linkages, where 0≤J2≤J−J1.
For example, for NTRP=4, the supported linkages/pairs between {αn} and (M,β) include at least one of the highlighted ones labelled from W28 to W42. For example, J1 linkages selected from W28-W42 are supported linkages, where 1≤J1≤J, and J2 linkages selected from the ones other than W28-W42 (for NTRP=4) are supported linkages, where 0≤J2≤J−J1.
In one example, for each NTRP, the supported linkages/pairs between {αn} and (M,β) include at least one of the highlighted ones (denoted by ‘S #, R #, T #’) described in the following table.
For example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include at least one of the ones labelled S1 to S9 and R1 to R3 and T1 to T3.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled S1 to S9 and R1 to R3 and T1 to T3.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S1 to S9 and R1 to R3.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S1 to S9 and R1 to R3 and at least one of the ones labelled T1 to T3.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S11 to S9.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S11 to S9 and at least one of the ones labelled R1 to R3.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S11 to S9 and at least one of the ones labelled T1 to T3.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include the highlighted ones labelled S1 to S9 and at least one of the ones labelled R1 to R3 and at least one of the ones labelled T1 to T3.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S1 to S9 and based on J, they further include J1 linkages from the ones labelled R1 to R3 and T1 to T3, where 0≤J1≤J−9.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S1 to S9 and R1 to R3, and based on J, they further include J1 linkages from the ones labelled T1 to T3, where 0≤J1≤J−12.
For example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include at least one of the ones labelled S10 to S25 and R4 to R5 and T4 to T14.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled S10 to S25 and R4 to R5 and T4 to T14.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S10 to S25 and R4 to R5.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S10 to S25 and R4 to R5 and at least one of the ones labelled T4 to T14.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S10 to S25.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S10 to S25 and at least one of the ones labelled R4 to R5.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S10 to S25 and at least one of the ones labelled T4 to T14.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S10 to S25 and at least one of the ones labelled R4 to R5 and at least one of the ones labelled T4 to T14.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S10 to S25 and based on J, they further include J1 linkages from the ones labelled R4 to R5 and T4 to T14, where 0≤J1≤J−16.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S10 to S25 and R4 to R5, and based on J, they further include J1 linkages from the ones labelled T4 to T14, where 0≤J1≤J−18.
For example, for NTRP=4, the supported linkages/pairs between {αn} and (M,β) include at least one of the ones labelled S26 to S35 and R6 to R17.
In one example, for NTRP=4, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled S26 to S35 and R6 to R17.
In one example, for NTRP=4, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S26 to S35 and at least one of the ones labelled R6 to R17.
In one example, for NTRP=4, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S26 to S35.
In one example, for NTRP=4, the supported linkages/pairs between {αn} and (M,β) include the ones labelled S26 to S36 and based on J, they further include J1 linkages from the ones labelled R6 to R17, where 0≤J1≤J−11.
In one example, for each NTRP, the supported linkages/pairs between {αn} and (M,β) include at least one of the ones (denoted by ‘A #, B #’) described in the following table.
For example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include at least one of the ones labelled A1 to A6 and B1 to B2.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled A1 to A6 and B1.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled A1 to A6 and B2.
In one example, for NTRP=2, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled A1 to A6 and B1 and B2.
For example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include at least one of the ones labelled A7 to A18 and B3 to B4.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled A7 to A18 and B3.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled A7 to A18 and B4.
In one example, for NTRP=3, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled A7 to A18 and B3 and B4.
For example, for NTRP=4, the supported linkages/pairs between {αn} and (M,β) include at least one of the ones labelled A19 to A25.
In one example, for NTRP=4, the supported linkages/pairs between {αn} and (M,β) include all of the ones labelled A19 to A25.
In one example, the supported linkages/pairs between {αn} and (M,β) including NTRP=1 (legacy) can be as follows:
In one example, the UL can report UL capability on αtot. Then, the NW (needs to follow and) can configure a combination of {αn} under the UL capability, e.g., a combination of {αn} such that Σnαn=Ltot.
For example, αtot≤t is a basic feature and αtot>t is UE-optional. In one example, t=2. In one example, t=3. In one example, t=1. In one example, t=1.5. For αtot>t, the UE reports its capability to support it or not and the NW can configure one of the parameter combinations in the table only associated with the {αn} that the UE supports (based on the UE capability and the basic feature).
For example, αtot<t is a basic feature and αtot≥t is UE-optional. In one example, t=2. In one example, t=3. In one example, t=1. In one example, t=1.5. For αtot≥t, the UE reports its capability to support it or not and the NW can configure one of the parameter combinations in the table only associated with the {αn} that the UE supports (based on the UE capability and the basic feature).
In one example, the UE capability on αtot in each example above can be a separate capability.
In one example, the UE capability on αtot in each example above can be one component of a capability.
The method 1700 begins with the UE receiving information about a CSI report (1710). For example, in 1710, the information indicates codebook parameters NL≥1 combinations of values of {α1, . . . , αN
Thereafter, the UE determines the CSI report based on the information (1720) and transmits the CSI report, report (1730).
In various embodiments, a first RRC parameter indicates the NL combinations of values of {α1, . . . , αN
In various embodiments, a second RRC parameter indicates the value of (M,β) from the second table. The value of (M,β) is indicated via a value of the second RRC parameter that is configured from a set of values including B1, B2, . . . , and B5.
In various embodiments, a first radio resource control (RRC) parameter is associated with the first table, a second RRC parameter is associated with the second table, the third table includes configurable combinations between a value of {α1, . . . , αN
In various embodiments, a value of NL is configured by a RRC parameter.
In various embodiments, each of the NTRP groups of ports corresponds to CSI-RS antenna ports associated with a CSI-RS resource.
In various embodiments, the UE is not expected to be configured with NTRP and a first RRC parameter corresponding to {α1, . . . , αN
In various embodiments, a the UE is expected to be configured with R=1 when M=1, where R is a parameter configured with a higher-layer parameter numberOfPMI-SubbandsPerCQI-Subband.
Any of the above variation embodiments can be utilized independently or in combination with at least one other variation embodiment. The above flow charts illustrate example methods that can be implemented in accordance with the principles of the present disclosure and various changes could be made to the methods illustrated in the flow charts herein. For example, while shown as a series of steps, various steps in each figure could overlap, occur in parallel, occur in a different order, or occur multiple times. In another example, steps may be omitted or replaced by other steps.
Although the figures illustrate different examples of user equipment, various changes may be made to the figures. For example, the user equipment can include any number of each component in any suitable arrangement. In general, the figures do not limit the scope of this disclosure to any particular configuration(s). Moreover, while figures illustrate operational environments in which various user equipment features disclosed in this patent document can be used, these features can be used in any other suitable system.
Although the present disclosure has been described with exemplary embodiments, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims. None of the description in this application should be read as implying that any particular element, step, or function is an essential element that must be included in the claims scope. The scope of patented subject matter is defined by the claims.
This application claims priority under 35 U.S.C. § 119(e) to U.S. Provisional Patent Application No. 63/444,837 filed on Feb. 10, 2023, U.S. Provisional Patent Application No. 63/444,842 filed on Feb. 10, 2023, U.S. Provisional Patent Application No. 63/447,283 filed on Feb. 21, 2023, U.S. Provisional Patent Application No. 63/447,292 filed on Feb. 21, 2023, U.S. Provisional Patent Application No. 63/448,852 filed on Feb. 28, 2023, U.S. Provisional Patent Application No. 63/461,106 filed on Apr. 21, 2023, U.S. Provisional Patent Application No. 63/465,441 filed on May 10, 2023, U.S. Provisional Patent Application No. 63/466,902 filed on May 16, 2023, U.S. Provisional Patent Application No. 63/472,167 filed on Jun. 9, and 2023, and U.S. Provisional Patent Application No. 63/472,179 filed on Jun. 9, 2023. The above-identified provisional patent applications are hereby incorporated by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
63444837 | Feb 2023 | US | |
63444842 | Feb 2023 | US | |
63447283 | Feb 2023 | US | |
63447292 | Feb 2023 | US | |
63448852 | Feb 2023 | US | |
63461106 | Apr 2023 | US | |
63465441 | May 2023 | US | |
63466902 | May 2023 | US | |
63472167 | Jun 2023 | US | |
63472179 | Jun 2023 | US |