The invention concerns generally the technological field of conveying digital information over a wireless interface from a transmitting device to a receiving device. Especially the invention concerns the use of a certain selected signal processing scheme to carry meaningful information.
In standardized digital wireless systems like digital cellular radio networks there is a standardized form for each message that a transmitting device is allowed to transmit over the wireless interface to the receiving device. Due to the limited number of available transmission frequencies and the requirements for minimized delays each message should be as compact as possible. This has resulted in difficulties when extensions and additions to the existing standards are made afterwards.
In digital wireless systems the contents of all messages are basically sequences of bits with a limited sequence length. The specifications usually reserve some otherwise unspecified bit combinations for future additions and extensions, but it may happen that in the future so many additions and extensions are made that these simply run out. In such a situation it is usually required that a completely new kind of a message is specified, which has serious implications in the form of required upgrading of system hardware and software.
As an example we will examine the known packet access burst format which is defined in the specifications of the GSM system (Global System for Mobile telecommunications) for the use of mobile stations when they want to request resources for a dedicated packet data channel. The definition of a packet access burst covers 157 consecutive bits according to Table I.
The actual information content of the packet access request must be represented by the 11 information bits mentioned on the middle row of Table I. It is clear that the amount of information that can be represented with only 11 bits is quite limited. Table II shows the definitions which are currently given to the contents of the field of 11 information bits.
In the table a letter m represents a bit that is a part of a MS multislot class indicator (there are 29 classes, so 5 bits are required), a letter p represents a bit that is a part of a radio priority indicator (4 priorities, 2 bits), a letter n represents a bit that is a part of an indicator revealing the number of RLC (Radio Link Control) data blocks requested during a mobile-originated TBF (Temporary Block Flow) (max. 8 blocks, 3 bits) and a letter r represents a bit that is a part of a random reference in an otherwise unformatted field.
As a specific example, despite the relatively large number of “Reserved” bit combinations there appears to be no suitable and unspecified bit combinations that a mobile station could use to separately indicated its capability of using either the basic GPRS (General Packet Radio System), the EGPRS (Extended GPRS) with eight-level phase shift keying (8PSK) as the modulation method or the EGPRS without 8PSK as the modulation method, when the mobile station is making a One Phase Access Request (OPAR), a Short Access Request (SAR) or a Two Phase Access Request (TPAR). The possibility of even further similar needs is also foreseeable.
A proposal has been made to abandon the rule of having only one allowed form for the synchronization sequence (also known as the training sequence) and to use the selected form of the synchronization/training sequence as an indicator of a certain piece of information. However, this known solution has the drawback that it requires some complicated and potentially expensive changes to be made in some older devices existing in the networks that are to be used to provide the packet data services. Another proposal is to modulate the message to be transmitted with one of a set of alternative modulation methods so that the selection of the modulation method would indicate the modulation and demodulation capabilities of the device transmitting the message. This method is only applicable when there are several modulation methods to choose from, and it rules out the advantageous proposal of using always the simplest and robustest modulation method to modulate important messages like access requests.
It is an object of the present invention to provide a method for increasing the information transmission capacity of a message in a digital wireless system without the drawbacks of prior art solutions. It is also an object of the present invention to provide the hardware that is required to implement the method.
The objects of the invention are accomplished by defining a set of allowed signal processing methods that are used to prepare the contents of the message in the baseband domain before finally assembling it for transmission, and using a certain selection for the signal processing method to convey a certain piece of information.
The method according to the invention is characterized in that it comprises the steps of
The invention also applies to a transmitting device which comprises the characteristic features of
The invention applies further to a receiving device which comprises the characteristic features of
Additionally the invention applies to a digital wireless system which comprises the characteristic features of
In the research work resulting in the invention it was noticed that several coding schemes that are used to compose the encoded contents of an information field in a message have features resembling orthogonality, i.e. it is only possible to decode a certain encoded bit sequence with the correctly selected decoding method while the decoding methods associated with the other coding schemes do not give any meaningful results. Consequently it was found out that the selection of coding scheme, or in wider sense the selection of a baseband signal processing method, can be used to convey a piece of information.
When a set of allowed baseband signal processing methods with their associated reverse processing methods have been defined, we may define an unequivocal correspondence between each individual baseband signal processing (and reverse processing) method and the corresponding piece of information which is most advantageously taken from a set of mutually exclusive pieces of information: if only one baseband signal processing method is selected at a time, only one piece of information may be conveyed by the selection. The transmitting device makes its selection according to which piece of information it wants to transmit. The receiving device does not generally know the selection beforehand, so typically it has to experiment with the different reverse processing methods to find the one which gives meaningul results.
As the baseband signal processing methods referred to above we may take for example different scrambling patterns, so that only the correct descrambling pattern restores the scrambled message in its original form, or different convolutional encoding schemes, so that the correct decoding scheme has to be found. It is advantageous to calculate a certain checksum from the information bits of the message before the selected baseband signal processing method is applied so that recalculating the checksum at the receiving end reveals the correct reverse processing method: the receiving device tries different reverse processing methods and the one that facilitates the calculation of a matching checksum is most probably the correct one. Only if a very specific error has occurred during transmission may it happen that actually an incorrect reverse processing method gives the message in a form where the checksum seems to match.
A further possible allowed set of mutually exclusive baseband signal processing methods may be formed around the process of calculating a checksum: the formula used to calculate the checksum is selected from a set of mutually (nearly) orthogonal formulas according to the piece of “additional” information which is to be transmitted, and the receiving device tries the calculation formulas one at a time until it finds the one which gives a matching checksum.
The novel features which are considered as characteristic of the invention are set forth in particular in the appended claims. The invention itself, however, both as to its construction and its method of operation, together with additional objects and advantages thereof, will be best understood from the following description of specific embodiments when read in connection with the accompanying drawings.
a illustrates a known encoding principle,
b illustrates a known decoding principle,
a summarizes the known functions of
b illustrates an advantageous coding and decoding principle according to the invention,
a illustrates an encoding principle according to a first embodiment of the invention,
b illustrates a decoding principle according to the first embodiment of the invention,
a illustrates an encoding principle according to a second embodiment of the invention,
b illustrates a decoding principle according to the second embodiment of the invention,
a illustrates an encoding principle according to a third embodiment of the invention,
b illustrates a decoding principle according to the third embodiment of the invention,
a illustrates an encoding principle according to a fourth embodiment of the invention,
b illustrates a decoding principle according to the fourth embodiment of the invention,
a illustrates an encoding principle according to a fifth embodiment of the invention, and
b illustrates a decoding principle according to the fifth embodiment of the invention.
Similar parts in the drawing are referred to by the same reference designators.
a is a schematic block diagram that illustrates the known encoding scheme that is used to compose a packet access request message in accordance with the known GSM and GPRS specifications. To start with there is at the left of
The BTS ID provider block 104 provides six identifier bits B(0), B(1), . . . , B(5) to the modulo 2 adder block 107 which then performs a bitwise modulo 2 addition resulting in six colour bits C(0), C(1), . . . , C(5) so that C(k)=B(k)+p(k) for each k=0 to 5. The outputs of the information bit generator 103, the modulo 2 adder block 107 and the second tail bit generator 105 are coupled to the convolutional encoder 108 so that the twenty-one input bits u(0), u(1), . . . , u(20) thereof may be defined as follows: u(k)=d(k) for k=0 to 10, u(k)=C(k−11) for k=11 to 16 and u(k)=0 for k=17 to 20. From these twenty-one input bits u(0), u(1), . . . , u(20) the convolutional encoder 108 produces forty-two convolutionally encoded output bits c(0), c(1), . . . , c(41) by applying a convolutional code defined by the polynomials G0=1+D3+D4 and G1=1+D+D3+D4, i.e. c(2k)=u(k)+u(k−3)+u(k)and c(2k+1)=u(k)+u(k−1)+u(k−3)+u(k−4) for k=0 to 20 and u(k)=0 for k<0. These encoded bits are fed into the puncturing block 109 which removes the encoded bits c(0), c(2), c(5), c(37), c(39) and c(41) to produce the thirty-six encrypted bits mentioned in Table I. The outputs of the blocks 101, 102 and 109 are coupled to a burst formatter 110 which composes the actual transmission burst by putting the corresponding bits into the order shown in Table I.
b is a schematic block diagram illustrating a known decoder used to decode transmissions where the packet access requests haven been composed by an encoding arrangement shown in
a summarizes the known functions of
b shows how a second piece of information may be conveyed by selecting the coding scheme in a certain way. The first piece of information is actually conveyed through the encoder 251, the transmitter 252, the receiver 253 and the decoder 254 substantially similarly as in
The combination of two different pieces of information may naturally be used for conveying arbitrary messages, but the invention is particularly useful in situations where the first piece of information stays the same and the second piece of information is some additional information that should also be conveyed to the receiving device. A typical example is the signalling of the capabilities of the mobile station to the base station in association with a packet access request. The basic information stays the same: the mobile station wants to send a One Phase Access Request (OPAR), a Short Access Request (SAR) or a Two Phase Access Request (TPAR). However, simultaneously it wants to inform the base station about its eventual EGPRS capability with or without the 8PSK modulation method.
We may define the alternative coding schemes (or more generally the baseband signal processing schemes) that are used to signal the mobile station's capabilities so that the known coding scheme explained above in association with
a is a more detailed block diagram of an encoder according to a certain first embodiment of the invention. The blocks of the encoder which are known from
The capabilities indicator generator block 301 may give always the same indicator value that describes the full capability of the mobile station, or it may be programmable so that for example a user selection may cause the mobile station to act as if it did not have all the capabilities it actually has. For example if the pricing policy applied by the network operator favours basic GPRS mobile stations it may be advantageous to make a mobile station act like one.
The alternative scrambling functions implemented by the scrambling block should be “orthogonal” in the sense that if a set of parity bits is calculated for a set of information bits scrambled by a certain first scrambling function it is not possible that the same parity bits are obtained for a certain other set of information bits scrambled by another scrambling function. Suitable scrambling functions may be found through experimenting.
b is a schematic block diagram illustrating a decoder which should be used to decode transmissions where the packet access requests haven been composed by an encoding arrangement shown in
It is possible to have the decoder to try the different descrambling functions only until it finds a match, but this makes it impossible to detect an error which causes at least two descrambling functions to erroneously give positive results.
a shows an alternative embodiment where the capabilities indicator generator block 301 operates as described above but its output is led to scrambler 401 which scrambles the parity encoded bits u(k), k=0 to 16 instead of the information bits d(k), k=0 to 10 as in
a shows yet an alternative embodiment where the capabilities indicator generator block 301 again operates as described above but its output is led to scrambler 501 which scrambles the output of the convolutional encoder 108, i.e. the coded bits c(k), k=0 to 41, instead of the parity encoded bits u(k), k=0 to 16 as in
a shows yet an alternative embodiment where the capabilities indicator generator block 301 again operates as described above but its output is led to scrambler 601 which scrambles the output of the puncturing block 109, i.e. the coded and punctured bits c(k), k=1 to 40 but not 2, 5, 37 or 39, instead of the coded bits c(k), k=0 to 41 as in
The embodiments given above may be varied for example so that to indicate basic GPRS capabilities no scrambling is made at all, to indicate EGPRS capabilities with 8PSK a certain first scrambling function is applied at a certain first location in the encoding chain, and to indicate EGPRS capabilities without 8PSK a certain second scrambling function is applied at a certain second location in the encoding chain. Allowing several kinds of alternative scrambling functions to take place at several alternative locations in the encoding chain also increases the number of individual and distinctive pieces of information that can be conveyed by using solely the application of scrambling as an identifier, but simultaneously it makes the required decoder structure more complicated and the required decoder processing speed faster since a large number of decoding runs must be made to make sure that exactly one descrambling method gives the correct result.
a shows yet another embodiment of the invention in the form of a schematic block diagram of an encoder. Other parts of the encoder are as in
In addition to the scrambling/descrambling and convolutional coding/viterbi decoding alternatives described above it is possible to use different definitions for the blocks that calculate the parity bits in the transmitting end and verify them in the receiving end.
Number | Date | Country | Kind |
---|---|---|---|
991414 | Jun 1999 | FI | national |
Number | Name | Date | Kind |
---|---|---|---|
5230003 | Dent et al. | Jul 1993 | A |
5438590 | Tzukerman et al. | Aug 1995 | A |
5548834 | Suard et al. | Aug 1996 | A |
5642354 | Spear | Jun 1997 | A |
5696792 | Sudo et al. | Dec 1997 | A |
5751725 | Chen | May 1998 | A |
5909434 | Odenwalder et al. | Jun 1999 | A |
5917837 | Stein | Jun 1999 | A |
5991642 | Watanabe et al. | Nov 1999 | A |
6014374 | Paneth et al. | Jan 2000 | A |
6052408 | Trompower et al. | Apr 2000 | A |
6122310 | Ziemer et al. | Sep 2000 | A |
6167031 | Olofsson et al. | Dec 2000 | A |
6256487 | Bruhn | Jul 2001 | B1 |
6377640 | Trans | Apr 2002 | B1 |
6377797 | Schreib et al. | Apr 2002 | B1 |
6393064 | Nagai et al. | May 2002 | B1 |
6567475 | Dent et al. | May 2003 | B1 |
6870858 | Sebire | Mar 2005 | B1 |
20040062269 | Western | Apr 2004 | A1 |
Number | Date | Country |
---|---|---|
1 052 821 | Nov 2000 | EP |
10247955 | Mar 1997 | JP |
409186635 | Jul 1997 | JP |