Claims
- 1. A method for channel encoding and decoding data bits for transmission via a wireless communication channel a frame at a time, each frame consisting of a predetermined number of the data bits, each of the data bits predetermined to belong to one or another of a plurality of ordered predetermined different protection classes including a first class CA and one or more other classes CB, . . . , CZ including a last class Clast, the different protection classes having predetermined different desired levels of error protection, the first class CA having the strongest predetermined desired level of error protection, the method characterized by puncturing steps (10b) including:
a step (51e) of determining how many bits to puncture in each protection class so as to achieve either the predetermined desired level of error protection for the protection class or a different desired level of error protection arrived at by iteration to avoid determining a negative value of bits to puncture from any class; and a step (52) of identifying which bits to puncture for each class so as to provide relatively strong and uniform protection for all bits in the first class CA, and so as to provide for each other class CB, . . . , CZ protection that decreases in the same manner as the subjective importance decreases from the beginning of the class to the end of the class, and for then providing information indicating which bits to puncture and in which order to puncture the bits.
- 2. The method of claim 1, wherein each class CA, CB, . . . , CZ includes bits provided by one or more respective generator polynomials each of which provides bits of possibly different importance in respect to error protection and so each of the generator polynomials for the class is more or less important than others of the generator polynomials of the class, and wherein in the step (52) of identifying which bits to puncture for each class, at least some bits originating from the less important generator polynomials are selected for puncturing out before bits originating from the more important generator polynomials.
- 3. The method of claim 1, further characterized by:
a step (51b) of resizing the predetermined first two classes so as to enlarge the first class by a number of bits approximately equal to 10% of the size of the first class, and to decrease the second class by the same number of bits.
- 4. The method of claim 1, further characterized by:
a step (51) of determining how many weak bits to allocate to each class CA, CB, . . . , CZ so as to maintain the predetermined desired level of error protection; and a step (52) of identifying which weak bits to allocate to each class CA, CB, . . . , CZ so as to provide relatively strong and uniform protection for all bits in the first class CA, and so as to provide for each other class CB, . . . , CZ protection that decreases in the same manner as the subjective importance decreases from the beginning of the class to the end of the class.
- 5. The method of claim 1, further characterized by a step (53) of either constructing a puncturing table and performing the puncturing using the puncturing table, or performing the puncturing without using a puncturing table.
- 6. The method of claim 1, further comprising inverse puncturing steps (11b), responsive to information indicating which bits to puncture and in what order.
- 7. An apparatus for channel encoding a data bits for transmission via a wireless communication channel a frame at a time, each frame consisting of a predetermined number of the data bits, each of the data bits predetermined to belong to one or another of a plurality of ordered predetermined different protection classes including a first class CA and one or more other classes CB, . . . , CZ including a last class Clast, the different protection classes having predetermined different desired levels of error protection, the first class CA having the strongest predetermined desired level of error protection, the apparatus characterized by:
means (10b) for determining (51e) how many bits to puncture in each protection class so as to achieve either the predetermined desired level of error protection for the protection class or a different desired level of error protection arrived at by iteration to avoid determining a negative value of bits to puncture from any class; and means (10b) for identifying (52) which bits to puncture for each class so as to provide relatively strong and uniform protection for all bits in the first class CA, and so as to provide for each other class CB, . . . , CZ protection that decreases in the same manner as the subjective importance decreases from the beginning of the class to the end of the class.
- 8. The apparatus of claim 7, wherein each class CA, CB, . . . , CZ includes bits provided by one or more respective generator polynomials each of which provides bits of possibly different importance in respect to error protection and so each of the generator polynomials for the class is more or less important than others of the generator polynomials of the class, and wherein in identifying (52) which bits to puncture for each class, at least some bits originating from the less important generator polynomials are selected for puncturing out before bits originating from the more important generator polynomials.
- 9. The apparatus of claim 7, further characterized by:
means (10b) for resizing (51b) the predetermined first two classes so as to enlarge the first class by a number of bits approximately equal to 10% of the size of the first class, and to decrease the second class by the same number of bits.
- 10. The apparatus of claim 7, further characterized by:
means (10b) for determining (51) how many weak bits to allocate to each class CA, CB, . . . , CZ so as to maintain the predetermined desired level of error protection; and means (10b) for identifying (52) which weak bits to allocate to each class CA, CB, . . . , CZ so as to provide relatively strong and uniform protection for all bits in the first class CA, and so as to provide for each other class CB, . . . , CZ protection that decreases in the same manner as the subjective importance decreases from the beginning of the class to the end of the class.
- 11. The apparatus of claim 7, further characterized by means (10b) for either constructing (53) a puncturing table and performing the puncturing using the puncturing table, or for performing (53) the puncturing without using a puncturing table.
- 12. The apparatus of claim 7, further comprising inverse puncturing means (11b), responsive to information indicating which bits to puncture and in what order.
- 13. A system, comprising a plurality of wireless terminals and a base station, at least one of the wireless terminals and the base station each including:
a channel encoder (10), responsive to input bits, for providing transmitter side symbol waveforms, characterized in that it includes an apparatus as in claim 7; and a channel decoder (11), responsive to the transmitter side symbol waveforms as modified by a communication channel, including means for performing steps undoing any puncturing performed on bits conveyed by the transmitter side symbol waveforms.
CROSS REFERENCE TO RELATED APPLICATION
[0001] Reference is made to and priority claimed from U.S. provisional application Ser. No. 60/390,257, filed Jun. 18, 2002, and entitled ADAPTIVE PUNCTURING ALGORITHM UTILIZING UNEQUAL ERROR PROTECTION SCHEME.
[0002] The present invention is related to the following co-pending and co-owned U.S. application:
[0003] U.S. Ser. No. 10/040,885, entitled “METHOD AND SYSTEM FOR ALLOCATING CONVOLUTIONAL ENCODED BITS INTO SYMBOLS BEFORE MODULATION FOR WIRELESS COMMUNICATION,” and filed on Jan. 2, 2002.
[0004] The subject matter of the related application is hereby incorporated by reference in its entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60390257 |
Jun 2002 |
US |