The present application relates generally to wireless communication and, more specifically, to uses of tail-biting convolutional coding to encode control messages in wireless communication.
3 GPP Long Term Evolution (LTE) is a recent standard in mobile communication technology. 3 GPP LTE is a project of the 3rd Generation Partnership Project (3 GPP). In 3 GPP LTE systems, the physical downlink control channel (PDCCH) carries scheduling assignments and other control information. A PDCCH message may be encoded by a cyclic redundancy check (CRC) for error detection purposes. The CRC field is scrambled by an identifier of the intended user equipments (UEs). This UE identifier is also known as the Radio Network Temporary Identifier (RNTI) in 3 GPP LTE systems. There are different kinds of RNTIs in the 3 GPP LTE and LTE-A systems, e.g., cell RNTI (C-RNTI), random access RNTI (RA-RNTI), etc.
Time synchronization is one of the first steps in establishing communication between two devices. Existing wireless communication systems, including WiFi, CDMA/CDMA2000/1xEV-DO, GSM/WCDMA/HSPA, mobile WiMAX, and LTE/LTE-Advanced systems, all have carefully designed time synchronization signals and procedures.
A convolutional code is a type of error-correcting code in which each m-bit information symbol to be encoded is transformed into an n-bit symbol, where m/n is the code rate (n≧M).
For use in a multi-carrier wireless communication network, a transmitter configured to encode a control channel message is provided. The transmitter includes a CRC (cyclic redundancy check) encoder configured to encode the control channel message using a cyclic redundancy check. The transmitter also includes a CIF (carrier indication field) encoder coupled to the CRC encoder and configured to encode a carrier indication value in the control channel message, the carrier indication value configured to indicate an intended component carrier of the control channel message.
For use in a multi-carrier wireless communication network, a method for a transmitter to encode a control channel message is provided. The method includes encoding the control channel message using a cyclic redundancy check (CRC). The method also includes encoding a carrier indication value in the control channel message, the carrier indication value configured to indicate an intended component carrier of the control channel message.
For use in a wireless network, a transmitter configured to encode timing synchronization information is provided. The transmitter includes a CRC (cyclic redundancy check) encoder configured to encode a physical broadcast channel (PBCH) message using a cyclic redundancy check. The transmitter also includes a cyclic shift block configured to encode frame timing information in the PBCH message. The transmitter further includes a tail-biting convolutional code (TBCC) encoder configured to encode the PBCH message using a TBCC code.
For use in a wireless network, a method of timing synchronization at a transmitter is provided. The method includes encoding a physical broadcast channel (PBCH) message using a cyclic redundancy check (CRC). The method also includes encoding frame timing information in the PBCH message, and encoding the PBCH message using a tail-biting convolutional code (TBCC).
For use in a wireless communication network, a method for a receiver to detect frame timing is provided. The method includes receiving code symbols of a physical broadcast channel (PBCH) in a message. The method also includes decoding the received code symbols using a tail biting convolutional code (TBCC). The method further includes examining the TBCC-decoded symbols for a cyclic redundancy check (CRC). The method still further includes cyclically shifting the TBCC-decoded symbols. The method also includes repeating the examining and cyclically shifting steps until a CRC check is established. The method further includes determining a current frame number based on a number of times the TBCC-decoded symbols are cyclically shifted.
Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
For a more complete understanding of the present disclosure and its advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, in which like reference numerals represent like parts:
The following documents and standards descriptions are hereby incorporated into the present disclosure as if fully set forth herein:
3 GPP Technical Report No. 21.905, “Vocabulary for 3 GPP Specifications”;
3 GPP Technical Specification No. 36.201, “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Layer—General Description”;
3 GPP Technical Specification No. 36.211, “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical channels and modulation”;
3 GPP Technical Specification No. 36.212, “Evolved Universal Terrestrial Radio Access (E-UTRA); Multiplexing and channel coding”;
3 GPP Technical Specification No. 36.213, “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer procedures”;
3 GPP Technical Specification No. 36.214, “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer—Measurements”;
3 GPP Technical Specification No. 36.104, “Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) radio transmission and reception”;
3 GPP Technical Specification No. 36.101, “Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio transmission and reception”;
3 GPP Technical Specification No. 36.321, “Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification”;
3 GPP Technical Report No. 36.814, “Further Advancements for E-UTRA; Physical Layer Aspects”; and
3 GPP Technical Report No. 36.912, “Feasibility Study for Further Advancement for E-UTRA (LTE-Advanced)”.
Convolutional codes are used extensively in wireless communication applications in order to achieve reliable data transfer.
A convolution code can also be represented by a trellis.
The bold line in
To solve this problem, one or more extra bits are often used to force the trellis to reach all-zero state. This process is also referred to as trellis termination. The bits that are used to terminate the trellis are referred to as tail bits. Trellis termination requires extra bits and increases overhead. In the example shown in
In some embodiments, the encoder may also be initialized by the last one or more bits of the input stream of payload bits.
A cyclically shifted version of a TBCC codeword is still a valid TBCC codeword. For example, the TBCC codeword in
In accordance with exemplary embodiments of the present disclosure, tail biting convolutional codes may be used to encode and decode a carrier indication field in a control channel message. TBCC may also be used to encode and decode a physical broadcast channel (PBCH) for fast synchronization between two devices.
If the message is cyclically shifted to the left by one (1) bit, the input message to the TBCC encoder becomes c1, c2, c3, . . . , cK−1, c0. Accordingly, the first output branch of the TBCC encoder becomes d1(0), d2(0), d3(0), . . . , dK−1(0), d0(0), the second output branch of the TBCC encoder becomes d1(1), d2(1), d3(1), . . . , dK−1(1), d0(1), and the third output branch of the TBCC encoder becomes d1(2), d2(2), d3(2), . . . , dK−1(2), d0(2).
To achieve a cyclic shift along the trellis for a TBCC codeword, it is possible to either cyclically shift the input message, or cyclically shift the output branches of the TBCC encoder. Both operations are equivalent. In accordance with this disclosure, for the purpose of illustration, we may use either the cyclic shift of the message or the cyclic shift of the output branches to describe the embodiments. However, it will be understood that variations of the disclosed embodiments may be realized by exchanging the cyclic shift operation on the message with the cyclic shift of the output branches of the TBCC encoder.
In 3 GPP LTE systems, the physical downlink control channel (PDCCH) carries scheduling assignments and other control information. In an LTE or LTE-Advanced (LTE-A) system, a PDCCH message may be encoded by a CRC for error detection purposes.
The CRC encoded message that is output from the CRC encoder 602 is then encoded at a TBCC encoder 604 using a ⅓ rate TBCC.
A rate matcher 606 selects a number of coded bits from all the coded bits for the message generated by the TBCC encoder 604. A purpose of the rate matcher 606 is to match the number of transmitted coded bits of a PDCCH with the amount of resources allocated for transmission of that PDCCH. Multiple PDCCHs may be transmitted in one transmission time interval (TTI), and the multiple PDCCHs may be intended for one or multiple UEs. In LTE/LTE-A, one TTI is one subframe, which has a time span of 1 ms. The coded bits from multiple PDCCHs are multiplexed together at a multiplexer/aggregator 608, scrambled by a cell-specific scrambling sequence 610, and then modulated by a QPSK modulator 612.
MIMO processing (indicated at MIMO TX processor 614) may be applied to these modulation symbols if multiple antenna systems are deployed. For example, in LTE systems, SFBC or SFBC-FSTD scheme can be applied to PDCCH modulation symbols for a base station with two (2) transmit antennas or four (4) transmit antennas, respectively. After MIMO processing, a stream of modulation symbols are generated for each transmit antenna (or antenna port as defined in LTE systems). Upon further interleaving, the modulation symbols are mapped (using resource mapper 616) to resource elements (REs) on the time-frequency grid of a subframe that comprises of multiple OFDM symbols.
In certain embodiments, rate matching may be applied to the TBCC encoder output bit stream of a PDCCH to match the number of transmitted coded bits with the amount of resources allocated for the PDCCH. For example,
In LTE and LTE-A systems, multiple PDCCHs can be transmitted in one subframe.
One illustration of UE blind decoding of PDCCH is shown in (b) of
A physical control channel is transmitted on an aggregation of one or several consecutive control channel elements (CCEs), where a control channel element corresponds to nine (9) resource element groups. In other words, every CCE corresponds to nine (9) modulation symbol quadruplets, which in turn corresponds to thirty-six (36) modulation symbols. For example, as shown in
In LTE and LTE-A, the number of resource element groups not assigned to PCFICH or PHICH is NREG. The CCEs available in the system are numbered from zero (0) to NCCE−1, where NCCE└NREG/9┘. The PDCCH supports multiple formats as listed in Table 1 below. A PDCCH consisting of n consecutive CCEs may only start on a CCE fulfilling i mod n=0, where i is the CCE number and mod is the modulo operator. Multiple PDCCHs can be transmitted in a subframe.
The LTE system provides a number of mechanisms to prevent PDCCH detection error events. For example, scrambling the CRC of a PDCCH with the RNTI of the intended UE (or UEs) will only allow the intended UE (or UEs) to detect the PDCCH and pass the CRC error detection successfully while other UEs will either not be able to detect the PDCCH or not be able to pass the CRC error detection. In addition, measures are taken to limit the number of blind decoding, which reduces the probability of CRC false detection (the error event that CRC checks for an erroneous PDCCH detection). For example, a PDCCH consisting of n consecutive CCEs may only start on a CCE fulfilling i mod n=0, where i is the CCE number. In summary, the PDCCH is designed such that the intended UE (or UEs) can blindly detect the PDCCH successfully with high probability.
LTE-A systems support carrier aggregation and cross-carrier scheduling. In an LTE-A system with carrier aggregation, each carrier is called a component carrier. In order for the PDCCH messages in one downlink component carrier to schedule downlink transmission in another downlink component carrier, or to schedule uplink transmission in an uplink component carrier that is paired with another downlink component carrier, the carrier indication field (CIF) is needed in the PDCCH message for cross-carrier scheduling purpose.
In accordance with this disclosure, methods and apparatus to encode and decode a carrier indication field in a control channel message in a multi-carrier communication system are provided.
Denote the bits of the control channel message as m0, m1, . . . , mN−1, where N is the number of bits of the control channel message. Examples of a control channel message are the Downlink Control Information (DCI) or Uplink Control Information (UCI) as in a 3 GPP LTE-A system. More specifically, if carrier aggregation is deployed and cross-carrier scheduling is enabled, the downlink scheduling grant (one type of DCI) or uplink scheduling grant (one type of UCI) may need to allocate resources for transmission in different component carriers. Instead of carrying the carrier indication explicitly as payload in the control channel message, the transmitter 1100 may change the order of the control channel message depending on the intended component carrier. The step of changing the order of bits depending on the intended carrier is executed by the CIF encoder 1103.
In order to facilitate error detection, the CRC encoder 1102 attaches a CRC to the message before the CIF encoding. The CRC generator polynomial may be denoted as g(x)=g0xL−1+g1xL−2+ . . . +gL−2x+gL−1 where L is the length of the CRC. For example, for LTE systems, L equals sixteen (16). The CRC of the N-bit message m(x) is denoted by p(x). The CRC is the remainder of dividing m(x)·xL by g(x). Let q(x) be the quotient of dividing m(x)·xL by g(x). The CRC is computed such that m(x)·xL=q(x)·g(x)+p(x). For a binary system, the relationship can also be written as m(x)·xL+p(x)=q(x)·g(x). The CRC is often masked by the identifier of the intended receiver (or receivers). The identifier may be denoted as r(x). Thus, the CRC-encoded message is denoted as c(x)=m(x)·xL+p(x)+r(x) with total number of bits being N+L.
The CRC-encoded message is then encoded by the CIF encoder 1103. The total number of bits of the CRC encoded message is N+L, which serves as an input to the CIF encoder 1103. The CRC encoded message is denoted as c(x)=c0xN+L−1+c1N+L−2+ . . . +cN+L−2x+cN+L−1.
In one embodiment, the CRC-encoded message is cyclically shifted according to the intended carrier of the message. For example, if the intended carrier is carrier 0, c0(x)=c(x) is transmitted. If the intended carrier is carrier 1, a cyclically shifted version of the message is transmitted. For example, c1(x)=c1xN+L−1+c2xN+L−2+ . . . +cN+L−1x+c0 is transmitted. Similarly, if the intended carrier is carrier 2, c2(x)=c2xN+L−1+c3xN+L−2+ . . . +c0x+c1 is transmitted. If the intended carrier is carrier 3, c3(x)=c3xN+L−1+c4xN+L−2+ . . . +c1x+c2 is transmitted. If the intended carrier is carrier 4, c4(x)=c4xN+L−1+c5xN+L−2+ . . . +c2x+c3 is transmitted.
The transmitter 1100 is in communication with a receiver, such as the receiver 820 in
In this embodiment, the transmitter 1200 may encode the value of a CIF in a PDCCH message, append a CRC to the PDCCH message, cyclically shift the PDCCH message (including the CIF and the CRC fields) according to the value of the CIF (or equivalently, the intended component carrier of the PDCCH message), and then encode the output by a tail-biting convolutional code. The CIF encoder 1203 may perform encoding as simple as inserting the CIF field in the PDCCH message. In other embodiments, a more sophisticated CIF encoder may be used. For example, assume that the Carrier Indication Field is three (3) bits. A three-bit CRC may be generated based on the other fields of the PDCCH message. Then the three-bit CIF value is used to mask (i.e., bit-wise XOR) the three-bit CRC. The CRC encoder 1202 may be the same sixteen-bit CRC encoder as in LTE systems to maintain backward compatibility and to reduce implementation complexity.
The cyclic shift block 1205 performs the cyclic shift, which is driven by the CIF value. In other words, different amount of cyclic shift is applied for different CIF values. At the receiver side, because of the property of the TBCC, the receiver can decode the TBCC without the knowledge of the CIF value. Upon decoding of the TBCC, the receiver attempts blind decoding of the CRC assuming different possible hypotheses of the CIF value (or equivalently, the intended component carrier of the PDCCH message). If the CRC checks, the receiver can further compare the decoded CIF value that is embedded in the PDCCH message with the assumed hypothesis of the CIF value to ensure the PDCCH message is received correctly.
The transmitter 1300 also includes an interleaver block 1305. The interleaver block 1305 interleaves a PDCCH message using an interleaving pattern that is dependent on the intended component carrier (or the value of the Carrier Indication Field) of the PDCCH message.
To transmit a PDCCH message (“Msg_A” as shown in the figure), the transmitter 1300 may add CRC to the message, encode the message using FEC schemes such as TBCC, and rate-match the bit selection for transmission with the amount of resources allocated for the transmission. Additionally, the ordering of the bits selected is modified based on the intended component carrier of the PDCCH message.
The CRC encoder 1402 of transmitter 1400 uses a CRC that depends on the CIF field of the PDCCH message. Thus, the CRC encoder 1402 changes the CRC encoding depending on the intended component carrier of the PDCCH message. A first CRC generator polynomial is used to calculate the CRC for a first PDCCH that carries a scheduling grant for a first component carrier (CC). A second CRC generator polynomial that is different from the first CRC generator polynomial is used to calculate the CRC for a second PDCCH that carries a scheduling grant for a second component carrier. By doing so, the CIF field detection can be achieved by blind decoding between the two different CRC generator polynomials. Note that the first CRC generator polynomial and the second CRC generator polynomial may or may not have the same length.
In another embodiment, a transmitter uses different sequences to scramble the CRC of a PDCCH depending on the CIF value of the PDCCH message. For example, the transmitter transmits two PDCCHs to the same intended UE (or UEs). The first PDCCH carries a scheduling grant for a first component carrier while the second PDCCH carries scheduling grant for a second component carrier. These two PDCCHs may be transmitted either in the same subframe or in different subframes. The message of the first PDCCH may be denoted by:
d0(1), d1(1), . . . dM1−1(1)
and the message of the second PDCCH may be denoted by:
d0(2), d1(2), . . . dM2−1(2)
where M1 is the size of the message of the first PDCCH, and M2 is the size of the message of the second PDCCH. These two messages may or may not have the same size. The sixteen-bit CRC of the first PDCCH may be denoted by:
c0(1), c1(1), . . . , c15(1),
and the sixteen-bit CRC of the second PDCCH may be denoted by:
c0(2), c1(2), . . . , c15(2).
Generally, the first CRC should be generated such that the polynomial:
d
0
(1)
x
M
+15
+d
1
(1)
x
M
+14
+ . . . +d
M
−1
(1)
x
16
+c
0
(1)
x
15
+c
1
(1)
x
14
+ . . . +c
15
(1)
that represents the concatenation of the first message and the first CRC is divisible by the CRC generator polynomial. Likewise, the second CRC should be generated such that the polynomial:
d
0
(2)
x
M
+15
+d
1
(2)
x
M
+14
+ . . . +d
M
−1
(2)
x
16
+c
0
(2)
x
15
+c
1
(2)
x
14
+ . . . +c
15
(2)
that represents the concatenation of the second message and the second CRC is divisible by the CRC generator polynomial.
One example of using different CRC scrambling sequences for different component carriers is shown in Table 2. For example, for the first PDCCH that carries a first message intended for a first component carrier, upon generation of the first CRC, the 16-bit CRC is scrambled by a first sequence a0(1)a1(1) . . . a15(1). For example, the scrambling can be done by a bit-wise XOR operation. As a result, the first message including the scrambled CRC becomes
d0(1)xM
Similarly, for the second PDCCH that carries a second message intended for a second component carrier, upon generation of the second CRC, the 16-bit CRC is scrambled by a second sequence a0(2)a1(2) . . . a15(2). For example, the scrambling can be done by bit-wise a XOR operation. As a result, the second message including the scrambled CRC becomes
d
0
(2)
x
M
+15
+d
1
(2)
x
M
+14
+ . . . +d
M
−1
(2)
x
16+(c0(2)⊕a0(2))x15+(c1(2)⊕a1(2))x14+ . . . +(c15(2)⊕a15(2))
The scrambler block 1510 is configured to change scrambling depending on the CIF value. In an LTE/LTE-A system, when a first PDCCH message intended for a first component carrier is transmitted, N1 coded bits are selected from the circular buffer of the TBCC coded bits. These N1 coded bits, denoted by b0, b1, . . . , bN
When a second PDCCH message intended for a second component carrier is transmitted, N2 coded bits are selected from the circular buffer. These N2 bits, denoted by b0, b1, . . . , bN2−1, may be scrambled in the scrambler block 1510 using a second scrambling sequence. The second scrambling sequence may be denoted by c0(2), c1(2), . . . , cN
A receiver (e.g., a UE in LTE/LTE-A downlink) may attempt blind decoding of the message. In order to minimize a detection error of confusing the first PDCCH message with the second PDCCH message, the first scrambling sequence and the second scrambling sequence should be designed such that the bit sequence b0(1), b1(1), . . . , bN
Many scrambling sequences can achieve such a purpose. For example, the transmitter 1500 may cyclically shift an original scrambling sequence by a different offset depending on the intended component carrier of the PDCCH message. For example, the transmitter 1500 may cyclically shift the original scrambling sequence by zero (0) bits if a first component carrier is the intended component carrier of a PDCCH message. Alternatively, the transmitter 1500 may cyclically shift the original scrambling sequence by one (1) bit if a second component carrier is the intended component carrier of a PDCCH message, or by two (2) bits if a third component carrier is the intended component carrier of a PDCCH message. Then, the cyclically shifted scrambling sequence is used to scramble the selected coded bits of a PDCCH message.
Alternatively, the coded bits can be cyclically shifted before being scrambled by the original scrambling sequence. Similarly, at the receiver side, the receiver will cyclically shift the scrambling sequence before applying the scrambling sequence to descramble the received coded bits. Alternatively, the receiver can cyclically shift the received coded bits before applying the original scrambling sequence to descramble the received coded bits.
The resource mapper block 1610 may change the mapping from modulation symbol to resource element (RE) within each resource element group (REG) for a PDCCH message depending on the intended component carrier of the PDCCH message (e.g., as indicated by the CIF). One example will now be discussed.
In an embodiment, each resource element group has four (4) REs. The four (4) REs may be denoted by (k0, 1), (k1, 1), (k2, 1), and (k3, 1), with k0<k1<k2<k3 being the subcarrier indices of the four (4) REs in increasing order, and 1 being the index of the OFDM symbol in which the four (4) REs of the same resource element group are located. Mapping pattern 1 is used if the intended component carrier of the transmitted PDCCH message is the first component carrier. Mapping patterns 2, 3, and 4 are used if the intended component carrier of the transmitted PDCCH message is the second, third, and fourth component carrier, respectively.
In LTE/LTE-A systems, given the space-frequency block coding (SFBC) (for 2-TX systems) or SFBC with frequency shift time diversity (SFBC-FSTD) (for 4-TX systems) scheme used for PDCCH transmission, one example of four (4) mapping patterns compatible with such MIMO schemes is defined as in Table 3. The mapping patterns achieve different mapping from modulation symbols to REs for different component carriers.
The transmitter 1700 may shift (or cyclically shift) the starting position in the TBCC circular buffer for choosing the coded bits for transmission in the PDCCH. The shift depends on the intended component carrier (e.g., as indicated by the CIF) of the PDCCH message. The coded bits in the circular buffer at the output of TBCC (possibly undergoing further processing such as sub-block interleaving as shown in
In an LTE/LTE-A system, assume N coded bits are selected from the circular buffer of the TBCC coded bits to transmit a PDCCH message. If a first component carrier is the intended component carrier of a first PDCCH message, the transmitter 1700 may start with an offset position p0, and select the bit sequence wp
Similarly, if a second component carrier is the intended component carrier of a second PDCCH message, the transmitter 1700 may start with an offset position p1≠p0, and select the bit sequence for wp
An example of the offset positions is shown in Table 4.
As described in the various embodiments above, the CIF value may be encoded in PDCCH messages in LTE-A systems. It will be understood to a person of skill in the art that the embodiments of this disclosure may be applied to other message fields in other messages or packets in LTE-A systems or in other communication systems. It is intended that this disclosure cover those applications as well.
Time synchronization is one of the first steps in establishing communication between two devices. Existing wireless communication systems, including WiFi, CDMA/CDMA2000/1xEV-DO, GSM/WCDMA/HSPA, mobile WiMAX, and LTE/LTE-Advanced systems, all have carefully designed time synchronization signals and procedures.
For example,
The PSS and SSS are transmitted in both subframe #0 and subframe #5 in every 10 ms frame. In each occurrence, both the PSS and the SSS occupy the center 72 subcarriers (with five (5) subcarriers on each side reserved).
There are 504 unique physical-layer cell identities. The physical-layer cell identities are grouped into 168 unique physical-layer cell-identity groups, each group containing three unique identities. The grouping is such that each physical-layer cell identity is part of one and only one physical-layer cell-identity group. A physical-layer cell identity NIDcell=3NID(1)+NID(2) is thus uniquely defined by a number ID in the range of 0 to 167, representing the physical-layer cell-identity group; and a number NID(2) in the range of 0 to 2, representing the physical-layer identity within the physical-layer cell-identity group. The information of NID(2) is carried in the PSS while the information of NID(1) is carried in the SSS.
The sequence used for the PSS is generated from a frequency-domain Zadoff-Chu sequence. The Zadoff-Chu root sequence index is linked to NID(2) which allows the UEs to detect the value of NID(2) by detecting the PSS. The UEs are able to detect the 5 ms timing by detecting the PSS, because the PSS is transmitted periodically every 5 ms.
The sequence used for the SSS is an interleaved concatenation of two binary sequences, each having a length of thirty-one (31). The concatenated sequence is scrambled with a scrambling sequence given by the PSS. The combination of two thirty-one-length sequences defining the SSS differs between subframe 0 and subframe 5 in order for the UEs to detect the 10 ms frame timing. The choice of the two thirty-one-length binary sequences is linked to the physical-layer cell-identity group NID(1), which allows the UEs to detect the value of the physical-layer cell-identity group NID(1) by detecting the SSS.
Additionally, the frame boundary and the starting position of the 40 ms (four frames) boundary can be detected via a physical broadcast channel (PBCH). For example,
The receiver 2050 receives the transmitted symbols and processes the symbols by resource de-mapping 2052, reception MIMO/beamforming processing 2054, de-modulation 2056, de-scrambling 2058, rate de-matching 2060, channel decoding 2062, CRC detection 2064, and extraction of the MIB 2066.
In order to ensure high reliability of PBCH (and thus MIB) reception, each MIB is transmitted across four (4) consecutive frames 2030. In each frame, the PBCH (and thus the MIB) is transmitted in the first subframe. The SFN field in the MIB does not carrier the last two bits of the SFN. In order to facilitate the UE to detect the 40 ms timing, the transmission of the PBCH in each frame is scrambled differently. This is achieved by initializing the scrambling sequence generator by the cell ID once every 40 ms. As a result, the scrambling sequence applied to PBCH transmission in each of the four (4) subframes within a 40 ms interval is different.
When the receiver 2050 receives a PBCH transmission in a subframe, the receiver 2050 blindly detects the 40 ms timing (i.e., which one of the four (4) frames within the 40 ms interval the current subframe belongs to) by attempting decoding of the PBCH assuming different hypotheses of the frame number. In each hypothesis, the receiver 2050 descrambles the PBCH transmission differently and attempts the decoding. In addition, to increase the reliability, the receiver 2050 may combine with previous PBCH transmissions, which also utilizes different descrambling of previous PBCH transmissions for different hypotheses. As a result, this can lead to significant complexity in the 40 ms timing acquisition using a PBCH.
In accordance with embodiments of the present disclosure, fast timing synchronization in a mobile broadband system may be achieved by using cyclic shifts of tail-biting convolutional codes. For the purpose of illustration, the embodiments are described in the context of time synchronization for LTE systems. However, it will be understood that the embodiments are applicable to time or frequency synchronization in other wireless communication systems, including 4 G, beyond 4 G, and 5 G mobile broadband systems.
In the embodiment, the frame timing information (e.g., the last two bits of the SFN) of a frame is encoded in the PBCH transmission in the frame by cyclically shifting the PBCH message a number of times. The number of cyclic shifts is determined by the frame timing information. After the message in MIB is encoded with CRC 2104, the message is cyclically shifted in the timing dependent cyclic shift block 2105 by a number of times that equals the last two bits of the SFN. The cyclically shifted message will then go through the TBCC encoding block 2106, then rate matching, scrambling, modulation, transmission MIMO processing, and resource mapping. The message is then transmitted.
Preferably, in order to simplify the complexity of the receiver 2150, the other procedures in the PBCH transmission chain 2100 (including the TBCC encoding 2106, rate matching, scrambling, modulation, Tx MIMO processing, and resource mapping) should not depend on the last two bits of the SFN. For example, in an embodiment, the scrambling sequence generator may be initialized every frame, instead of every four (4) frames. Similarly, in an embodiment, the rate matching may also be done on a per frame basis to allow easy combining of the PBCH transmissions across frames.
Upon receiving a PBCH transmission, the receiver 2150 may attempt decoding of the PBCH with different hypotheses of the 40 ms frame timing (i.e., by attempting different values of the two least significant bits (LSBs) of the SFN). Since the scrambling sequence generator is initialized by the cell ID in each frame, the same scrambling sequence is used to scramble the PBCH transmission in each frame. The receiver 2150 does not need the 40 ms frame timing information to properly descramble the received symbols. After de-scrambling, the receiver 2150 may combine PBCH transmissions across frames by properly cyclically shifting the received coded symbols in these frames, without explicitly knowing the value of the last two LSBs of the SFN for the current frame. This method significantly reduces the complexity of the receiver 2150 in applying different scrambling or blind decoding of the PBCH transmissions.
As an example, assume the MIB is twenty-four (24) bits long, and the CRC is sixteen (16) bits long. The MIB message is denoted as a0, a1, a2, a3, . . . , aA−1, and the CRC is denoted as p0, p1, p2, p3, . . . , pL−1. After the CRC attachment, the CRC bits may be additionally scrambled with the sequence x0, x1, . . . , x15 to form the sequence of bits c0, c1, c2, c3, . . . , cK−1 where
c
k
=a
k for k=0, 1, 2, . . . , A−1
c
k
=p
k−A
⊕x
k−A for k=A, A+1, A+2, . . . , A+15.
The additional scrambling of the CRC may be used to carry information such as the base station transmit antenna configuration by using a different CRC scrambling sequence for each base station transmit antenna configuration. In order to avoid an all-zero message after scrambling, the scrambling sequence preferably should not be all-zero. In an embodiment, a non-zero scrambling sequence may be applied in addition to the scrambling sequences that are used to carry information. In other embodiment, all scrambling sequences that are used to carry information are non-zero. It is noted that a non-zero scrambling sequence is a scrambling sequence that has at least one bit being non-zero. Similarly, in order to avoid an all-ones message after scrambling, the scrambling sequence preferably should not be all-ones.
For a PBCH transmission in a frame with the two LSBs being ‘00 ’, no cyclic shift is applied to the message c0, c1, c2, c3, . . . , cK−1. For a PBCH transmission in a frame with the two LSBs being ‘01 ’, the message c0, c1, c2, c3, . . . , cK−1 is cyclically shifted by 1 bit. The cyclic shift may be either a right cyclic shift or a left cyclic shift. For a right cyclic shift, the resulting message is cK−1, c0, c1, c2, . . . , cK−2. For a left cyclic shift, the resulting message is c1, c2, c3, . . . , cK−1, c0. For the purpose of illustration, the embodiments described below use a left cyclic shift, although a right cyclic shift would also be applicable.
As shown in
Turning now to the receiver 2150, because the resource de-mapping, Rx MIMO processing, de-modulation, de-scrambling, rate de-matching, and de-coding are independent of the value of the 40 ms frame timing (i.e., the two LSBs of the SFN), the receiver 2150 may proceed with these steps without the information of the frame timing. Once the decoding is complete, the receiver 2150 proceeds with CRC detection assuming different values of cyclic shift. The receiver 2150 uses the CRC to detect which hypothesis of the value of the cyclic shift is correct (and thus detect the value of the two LSBs of the SFN in the 40 ms frame timing). With this method, the receiver 2150 only needs to attempt descrambling and TBCC decoding once per frame. The blind detection of the 40 ms frame timing is achieved by attempting CRC detection with multiple hypotheses of cyclic shift.
The timing dependant cyclic shift of the message may be implemented in different ways. For example,
In
It is mathematically equivalent to cyclically shift the message before the TBCC encoding or to cyclically shift the TBCC encoder output along the trellis. Therefore, it is also possible that the transmitter encodes the frame timing by cyclically shifting the message before the TBCC encoding with the number of cyclic shifts dependant on the frame timing while the receiver attempts detection of the frame timing by cyclically shifting the received coded symbols along the trellis before the TBCC decoding.
In other embodiments, it is possible that the transmitter encodes the frame timing by cyclically shifting the output of the TBCC encoder along the trellis with the number of cyclic shifts dependant on the frame timing, while the receiver attempts detection of the frame timing by cyclically shifting the output of the TBCC decoder according to multiple frame timing hypotheses and then using CRC detection to detect the correct frame timing hypothesis.
In such an embodiment, the cyclic shift operation of the message (or cyclic shift operation of the output branches along the trellis) can be combined with the rate matching procedure, which results in a rate matching procedure dependant on the frame timing. In addition, it is possible that the rate matching procedure may select a portion of the TBCC codeword or multiple repetitions of the TBCC codeword for transmission. However, it is straightforward for the receiver to perform rate de-matching to put the received symbols into the right positions of the TBCC codeword.
For the purpose of illustration, the cyclic shift operations and the rate matching/de-matching as considered separate procedures, although the embodiments described herein are applicable when the cyclic shift operations and the rate matching/de-matching procedures are combined in various ways.
With the frame timing (e.g., the two LSBs of the SFN) encoded in the cyclic shifts of the message (or cyclic shifts of the output branches of the TBCC codeword along the trellis), it is also possible for the receiver to reduce the complexity of PBCH decoding if the receiver attempts soft combining of multiple transmissions of PBCH across multiple frames.
The receiver 2450 does not need the information of frame timing to process a PBCH transmission in the resource de-mapping, Rx MIMO/beamforming processing, de-modulation, de-scrambling, and rate de-matching blocks as these blocks are independent of the frame timing information. In the TBCC decoding, the receiver 2450 may attempt soft combining with PBCH transmissions in previous frames to increase the reliability of the detection without knowing the frame timing information.
For example, using a hypothesis that the current frame is the third frame in the 40-ms interval (i.e., the value of the two LSBs of the current frame is ‘10 ’), the receiver 2450 may combine the received symbols in the current frame and the previous two frames as the input to the TBCC decoder 2462 because these three frames should carry the same MIB (i.e., PBCH transport block), assuming the hypothesis is correct. With the de-scrambling and other steps being independent of frame timing, the soft combining may be easily achieved by cyclically shifting the received symbols along the trellis to align the received symbols in different transmissions and then combining the aligned received symbols.
For a message c0, c1, c2, c3, . . . , cK−1, assuming a TBCC as shown in
In a frame with the value of the two (2) LSBs being ‘00 ’, the three branches go through further processing such as rate matching, scrambling, modulation, etc. as described earlier.
In a frame with the value of the two (2) LSBs being ‘01 ’, the three branches are cyclically shifted left by one (1) bit, resulting in three cyclically shifted branches, d1(0), d2(0), d3(0), . . . , dK−1(0), d0(0), d1(1), d2(1), d3(1), . . . , dK−1(1), d0(1), and d1(2), d2(2), d3(2), . . . , dK−1(2), d0(2). These three cyclically shifted branches then go through further processing such as rate matching, scrambling, modulation, etc. Equivalently, the cyclic shift of the three branches (or the cyclic shift of the trellis) can also be achieved by cyclically shifting the message itself.
In a frame with the value of the two (2) LSBs being ‘10 ’, the three branches are cyclically shifted left by two (2) bits, resulting in three cyclically shifted branches, d2(0), d3(0), d4(0), . . . , d0(0), d1(0), d2(1), d3(1), d4(1), . . . , d0(1), d1(1), and d2(2), d3(2), d4(2), . . . , d0(2), d1(2). These three cyclically shifted branches then go through further processing such as rate matching, scrambling, modulation, etc. Equivalently, the cyclic shift of the three branches (or the cyclic shift of the trellis) can also be achieved by cyclically shifting the message itself.
In a frame with the value of the two (2) LSBs being ‘11 ’, the three branches are cyclically shifted left by three (3) bits, resulting in three cyclically shifted branches, d3(0), d4(0), d5(0), . . . , d1(0), d2(0), d3(1), d4(1), d5(1), . . . , d1(1), d2(1), and d3(2), d4(2), d5(2), . . . , d1(2), d2(2). These three cyclically shifted branches then go through further processing such as rate matching, scrambling, modulation, etc. Equivalently, the cyclic shift of the three branches (or the cyclic shift of the trellis) can also be achieved by cyclically shifting the message itself.
The relationship between the cyclic shift in a frame may be established with the frame timing such that the number of cyclic shifts in the first frame of a 40 ms interval is zero (0), the number of cyclic shifts in the second frame of a 40 ms interval is one (1), the number of cyclic shifts in the third frame of a 40 ms interval is two (2), and the number of cyclic shifts in the fourth frame of a 40 ms interval is three (3).
At the receiver side, soft combining may be achieved without knowing the frame timing or the number of cyclic shifts in the current frame. For example, if the receiver is to combine the received symbols of the current frame with the received symbols of the previous frame, the receiver can cyclically shift the received symbols in the previous frame towards the left along the trellis by one (1) bit. The receiver can then combine the cyclically shifted received symbols in the previous frame with the received symbols in the current frame in the same position of the same branch. This method of combining will always achieve the correct combining regardless of the frame timing, as long as the two frames are in the same 40 ms time interval.
For example, if the current frame is the fourth frame of a 40 ms time interval, the received symbols after rate de-matching can be put in three branches along the trellis. These received symbols correspond to d3(0), d4(0), d5(0), . . . , d1(0), d2(0) for the first branch, d3(1), d4(1), d5(1), . . . , d1(1), d2(1) for the second branch, and d3(2), d4(2), d5(2), . . . , d1(2), d2(2) for the third branch. Similarly, in the previous frame, which is the third frame of a 40 ms time interval, the received symbols after rate de-matching can be put in three branches along the trellis. These received symbols correspond to d2(0), d3(0), d4(0), . . . , d0(0), d1(0) for the first branch, d2(1), d3(1), d4(1), . . . , d0(1), d1(1) for the second branch, and d2(2), d3(2), d4(2), . . . , d0(2), d1(2) for the third branch. In order to correctly combine the received symbols in these two frames, the receiver can cyclically shift the received symbols in the previous frame towards the left by one (1) bit, and combine the received symbols in the same position in the same branch across these two frames.
The same conclusion can be drawn if the current frame is the third frame or the second frame of a 40 ms time interval. If the current frame is the first frame of a 40 ms time interval, the receiver should not combine the received symbols in the current frame with the received symbols in any previous frame because the frames would belong to different 40 ms time intervals and thus carry different MIB information bits.
In an embodiment, if the receiver needs to combine the received symbols of the current frame with the received symbols of the previous two frames, the receiver can cyclically shift the received symbols in the previous frame towards the left along the trellis by one (1) bit, and cyclically shift the received symbols in the frame before the previous frame towards the left along the trellis by two (2) bits. The receiver can then combine the cyclically shifted received symbols in the previous two frames with the received symbols in the current frame in the same position in the same branch.
The receiver can correctly perform the aforementioned combining without knowing the actual value of the frame timing. In addition, the receiver can perform the combining without applying different descrambling sequences for each hypothesis. These advantages allow significant complexity reduction in the receiver detection of frame timing.
The method 2500 starts in block 2501, where the receiver receives the code symbols of the PBCH in the current transmission (including resource de-mapping, Rx MIMO processing, demodulation, descrambling, rate de-matching) and arranges the received symbols into three branches along the trellis. The received symbols may be denoted as r0(0), r1(0), r2(0), r3(0), . . . , rK−1(0) for the first branch, r0(1), r1(1), r2(1), r3(1), . . . , rK−1(1) for the second branch, and r0(2), r1(2), r2(2), r3(2), . . . , rK−1(2) for the third branch of the TBCC codeword.
In block 2502, the receiver decodes the received symbols using TBCC. The decoded bits may be denoted as b0, b1, b2, b3, . . . , bK−1.
In block 2503, the receiver attempts CRC detection for b0, b1, b2, b3, . . . , bK−1, bK−1, b0, b1, b2, . . . , bK−2, bK−2, bK−1, b0, b1, . . . , bK−3, and bK−3, bK−2, bK−1, b0, . . . , bK−4 in order to detect the frame timing. If the CRC checks for b0, b1, b2, b3, . . . , bK−1, the current frame is the first frame of a 40 ms time interval. If the CRC checks for bK−1, b0, b1, b2, . . . , bK−2, the current frame is the second frame of a 40 ms time interval. If the CRC checks for bK−3, bK−2, bK−1, b0, . . . , bK−4, the current frame is the third frame of a 40 ms time interval. If the CRC checks for bK−3, bK−2, bK−1, b0, . . . , bK−4, the current frame is the fourth frame of a 40 ms time interval. If the CRC does not check for any of the four hypotheses, the method proceeds to block 2504.
In block 2504, the receiver attempts soft combining of the received symbols in the current frame with the received symbols in the previous frame. The receiver may use the following soft combining process:
Part A.
The receiver assigns notations to the received symbols in the previous frame (after resource de-mapping, Rx MIMO processing, demodulation, descrambling, rate de-matching, and so forth). For example, the received symbols in the previous frame may be denoted as s0(0), s1(0), s2(0), s3(0), . . . , sK−1(0) for the first branch, s0(1), s1(1), s2(1), s3(1), . . . , sK−1(1) for the second branch, and s0(2), s1(2), s2(2), s3(2), . . . , sK−1(2) for the third branch of the TBCC codeword.
Part B.
The receiver cyclically shifts the received symbols in the previous frame towards the left along the trellis by one (1) bit, resulting in received symbols s1(0), s2(0), s3(0), . . . , sK−1(0), s0(0) for the first branch, s1(1), s2(1), s3(1), . . . , sK−1(1), s0(1) for the second branch, and s1(2), s2(2), s3(2), . . . , sK−1(2), s0(2) for the third branch of the TBCC codeword.
Part C.
The receiver adds the cyclically shifted received symbols of the previous frame with the received symbols in the current frame. The addition is applied to the two symbols in the same position in the same branch. After the addition, the resulting symbols are r0(0)+s1(0), r1(0)+s2(0), r2(0)+s3(0), . . . , rK−2(0)+sK−1(0), rK−1(0)+s0(0) for the first branch of the TBCC codeword, r0(1)+s1(1), r1(1)+s2(1), r2(1)+s3(1), . . . , rK−2(1)+sK−1(1), rK−1(1)+s0(1) for the second branch of the TBCC codeword, and r0(2)+s1(2), r1(2)+s2(2), r2(2)+s3(2), . . . , rK−2(2)+sK−1(2), rK−1(2)+s0(2) for the third branch of the TBCC codeword.
In block 2505, the receiver decodes the combined received symbols using TBCC. The decoded bits may be denoted as b0′, b1′, b2′, b3′, . . . , bK−1′.
In block 2506, the receiver attempts CRC detection for message bK−1′, b0′, b1′, b2′, . . . , bK−2′, message bK−2′, bK−1′, b0′, b1′, . . . , bK−3′, and message bK−3′, bK−2′, bK−1′, b0′, . . . , bK−4′. If the CRC checks for bK−1′, b0′, b1′, b2′, . . . , bK−2′, the current frame is the second frame of a 40 ms time interval. If the CRC checks for bK−2′, bK−1′, b0′, b1′, . . . , bK−3′, the current frame is the third frame of a 40 ms time interval. If the CRC checks for bK−3′, bK−2′, bK−1′, b0′, . . . , bK−4′, the current frame is the fourth frame of a 40 ms time interval. If the CRC does not check for any of the three hypotheses, the method proceeds to block 2507.
In block 2507, the receiver attempts soft combining of the received symbols in the current frame with the received symbols in the previous two frames. The receiver may use the following soft combining process:
Part A.
The receiver assigns notations to the received symbols in the frame before the previous frame (after resource de-mapping, Rx MIMO processing, demodulation, descrambling, rate de-matching, and so forth). For example, the received symbols in the frame before the previous frame may be denoted as t0(0), t1(0), t2(0), t3(0), . . . , tK−1(0) for the first branch, t0(1), t1(1), t2(1), t3(1), . . . , tK−1(1) for the second branch, and t0(2), t1(2), t2(2), t3(2), . . . , tK−1(2) for the third branch of the TBCC codeword.
Part B.
The receiver cyclically shift the received symbols in the frame before the previous frame towards the left along the trellis by two (2) bits, resulting in received symbols t2(0), t3(0), t4(0), . . . , t0(0), t1(0) for the first branch, t2(1), t3(1), t4(1), . . . , t0(1), t1(1), for the second branch, and t2(2), t3(2), t4(2), . . . , t0(2), t1(2) for the third branch of the TBCC codeword.
Part C.
The receiver adds the cyclically shifted received symbols of the frame before the previous frame with the received symbols in the current frame and the received symbols in the previous frame. The addition is applied to the three symbols in the same position in the same branch across the three frames.
After the addition, the resulting symbols are r0(0)+s1(0)+t2(0), r1(0)+s2(0)+t3(0), r2(0)+s3(0)+t4(0), . . . , rK−2(0)+sK−1(0)+t0(0), rK−1(0)+s0(0)+t1(0) for the first branch, r0(1)+s1(1)+t2(1), r1(1)+s2(1)+t3(1), r2(1)+s3(1)+t4(1), . . . , rK−2(1)+sK−1(1)+t0(1), rK−1(1)+s0(1)+t1(1) for the second branch, and r0(2)+s1(2)+t2(2), r1(2)+s2(2)+t3(2), r2(2)+s3(2)+t4(2), . . . , rK−2(2)+sK−1(2)+t0(2), rK−1(2)+s0(2)+t1(2) for the third branch of the TBCC codeword.
In step 2508, the receiver decodes the combined received symbols using TBCC. The decoded bits may be denoted as b0″, b1″, b2″, b3″, . . . , bK−1″.
In block 2509, the receiver attempt CRC detection for message bK−2″, bK−1″, b0″, b1″, . . . , bK−3″, and message bK−3″, bK−2″, bK−1″, b0″, . . . , bK−4″. If the CRC checks for bK−2″, bK−1″, b0″, b1″, . . . , bK−3″the current frame is the third frame of a 40 ms time interval. If the CRC checks for bK−3″, bK−2″, bK−1″, b0″, . . . , bK−4″, the current frame is the fourth frame of a 40 ms time interval. If the CRC does not check for either of the two hypotheses, the method proceeds to block 2510.
In block 2510, the receiver combines the received symbols in the current frame with the received symbols in the previous three (3) frames. The receiver may use a three-part process similar to the process described in block 2504 and block 2507.
In step 2511, the receiver decodes the combined received symbols using TBCC. The decoded bits may be denoted as b0′″, b1′″, b2′″, b3′″, . . . , bK−1′″. This block is similar to block 2505 and 2508.
In step 2512, the receiver attempts CRC detection for the message bK−3′″, bK−2′″, bK−1′″, b0′″, . . . , bK−4′″. If the CRC checks, the current frame is the fourth frame of a 40 ms time interval. If the CRC does not check, the receiver is not able to acquire PBCH in this frame. The receiver may save the received symbols in this frame and wait for a new PBCH transmission in the next frame.
Although
As another example, in blocks 2503, 2506, and 2509, the receiver may only attempt CRC detection for one hypothesis of cyclic shift. The receiver may only attempt CRC detection for cyclic shift 0 (corresponding to the hypothesis that the current frame is the first frame of a 40 ms time interval) in block 2503. The receiver may only attempt CRC detection for cyclic shift 1 (corresponding to the hypothesis that the current frame is the second frame of a 40 ms time interval) in block 2506. The receiver may only attempt CRC detection for cyclic shift 2 (corresponding to the hypothesis that the current frame is the third frame of a 40 ms time interval) in block 2509.
As yet another example, the soft combining with previous frames can be optimized by storing some of the values that have been calculated in block 2504 for use in block 2507, and by storing some of the values that have been calculated in block 2507 for use in block 2510. The soft combining with previous frames in blocks 2504, 2507, and 2510 can be further optimized by storing some of the values that have been calculated in previous frames to further reduce computational complexity. However, these techniques for computational complexity reduction may come at a price of increased memory.
Although the present disclosure has been described with exemplary embodiments, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims.
The present application is related to U.S. Provisional Patent Application No. 61/326,107, filed Apr. 20, 2010, entitled “METHODS AND APPARATUS TO ENCODE AND DECODE CARRIER INDICATION FIELD IN A CONTROL CHANNEL MESSAGE IN A MULTI-CARRIER COMMUNICATION SYSTEM”. Provisional Patent Application No. 61/326,107 is assigned to the assignee of the present application and is hereby incorporated by reference into the present application as if fully set forth herein. The present application hereby claims priority under 35 U.S.C. §119(e) to U.S. Provisional Patent Application No. 61/326,107. The present application is also related to U.S. Provisional Patent Application No. 61/434,687, filed Jan. 20, 2011, entitled “METHODS AND APPARATUS FOR FAST SYNCHRONIZATION USING TAIL BITING CONVOLUTIONAL CODES”. Provisional Patent Application No. 61/434,687 is assigned to the assignee of the present application and is hereby incorporated by reference into the present application as if fully set forth herein. The present application hereby claims priority under 35 U.S.C. §119(e) to U.S. Provisional Patent Application No. 61/434,687.
Number | Date | Country | |
---|---|---|---|
61326107 | Apr 2010 | US | |
61434687 | Jan 2011 | US |