The present invention relates to methods for controlling wireless transmissions and to corresponding devices, systems, and computer programs.
In wireless communication networks, it is known to utilize frequency division multiplexing to enable efficient sharing of a wireless medium. For example in the case of WLAN (Wireless Local Area Network) systems according to the IEEE 802.11 standards family, the IEEE 802.11ax technology introduces various enhancements to the Physical Layer (PHY) and Medium Access Control (MAC), including Orthogonal Frequency Division Multiple Access (OFDMA) based sharing of a carrier. Further, the IEEE 802.11ax technology supports preamble puncturing and Dual Carrier Modulation (DCM). Details of the IEEE 802.11ax technology are for example specified in IEEE P802.11ax™/D6.0 Draft Standard for Information technology— Telecommunications and information exchange between systems Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High Efficiency WLAN (November 2019), in the following denoted as “IEEE 802.11ax Draft”.
In OFDMA the available bandwidth of the shared transmission medium is divided into different parts which are allocated to different users. In the IEEE 802.11ax technology these parts are referred to as “Resource Unit” (RU). Preamble puncturing refers to the possibility to mute one or more RUs if at the time of transmission it is determined that there are ongoing transmissions overlapping in the frequency domain with some RUs. These RUs are muted, and the remaining RUs may be transmitted.
DCM is a modulation technique intended to enhance the robustness of wireless transmissions. With DCM the same user code bits are modulated onto a pairs of subcarriers in order to increase the received SNR (Signal-to-Noise Ratio) through gains in power and frequency diversity. The IEEE 802.11ax technology supports DCM in both Single User (SU) and MultiUser (MU) modes. In either case, a given user is allocated one RU comprising N subcarriers, and bit sequences are mapped to a pair of symbols (dk,dq(k)) where k is a subcarrier index in the range 0≤k<N/2 and q(k) is in the range N/2≤q(k)<N, see section 27.3.12.9 of the IEEE 8021.11ax draft.
Further, an enhancement of the WLAN technology according to the IEEE 802.11 standards family, denoted as EHT (Extremely High Throughput), proposes to increase the channel bandwidth to 320 MHz, as well as introduce support for multi-link operation. With multi-link operation, the total aggregated bandwidth using several channels could exceed 1 GHz. Since the bandwidth allocated to a single user can be very large, and as a consequence the probability of a user experiencing interference increases. The interference can be either static or intermittent. In the static case the interference arises from external sources, such as radars or fixed microwave links, which may occupy a bandwidth portion for long time periods and have priority over WLANs. In these cases the interference may be avoided by the transmitter since it can refrain from transmitting any information in the interfered bandwidth portions. In the intermittent case, the interference arises from other WLANs, and the transmitter may detect the interference just prior to transmission. If this happens, it may not have time to reformat the transmission to avoid sending information in the interfered bandwidth portion. For example, if many stations in overlapping BSSs (BSS: basic service set) are sharing the medium, the probability of intermittent, high interference levels in some bandwidth parts is not negligible. In view of this situation, “Preamble Puncturing and RU Aggregation″, Internet document IEEE 802.11-19/1869r0 (URL:”https://mentor.ieee.org/802.11/dcn/19/11-19-1869-00-00be-preamble-puncturing-and-ru-aggregation.pptx”, November 2019) proposes to introduce the possibility to assign more than one RU to a single user. Further, “Multi-RU Support”, Internet document IEEE 802.11-19/1908r0 (URL: “https://mentor.ieee.org/802.11/dcn/19/11-19-1908-00-00be-multi-ru-support.pptx”, November 2019) proposes to allow preamble puncturing for only a subset of the RUs assigned to a single user. In particular, it is proposed to introduce a new transmitter block denoted as RU parser, which distributes encoded data bits of a user to multiple RUs. In case intermittent interference is detected, it is possible to puncture one or more RUs, and if the channel code is strong enough, it is still possible for the receiver to decode the data.
When preamble puncturing is applied to a SU transmission as proposed above, as much as 50% of the code bits may be punctured. Since the lowest code rate specified for the IEEE 802.11 standards family is 1/2, the EHT technology may require new codes with lower rate to support puncturing of SU transmissions, in case of intermittent interference. Further, DCM as specified in the IEEE 802.11ax Draft is not designed for multi-RU transmissions.
Accordingly, there is a need for techniques which allow for redundantly utilizing multiple subcarriers when performing OFDM based wireless transmissions that may be subject to puncturing in the presence of intermittent interference.
According to an embodiment, a method of controlling wireless transmissions in a wireless communication system is provided. According to the method, a wireless transmitter transmits user data using OFDM modulation on a shared wireless medium having a bandwidth organized in multiple RUs. Based on a mapping of the user data to the RUs, the wireless transmitter modulates a symbol of the user data onto a first set of subcarriers of a first RU of the RUs and redundantly modulates the symbol onto a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the RUs.
According to a further embodiment, a method of controlling wireless transmissions in a wireless communication system is provided. According to the method, a wireless receiver receives user data using OFDM modulation on a shared wireless medium having a bandwidth organized in multiple RUs. Based on a mapping of the user data to the RUs, the wireless receiver demodulates a symbol of the user data from a first set of subcarriers of a first RU of the RUs and redundantly demodulates the symbol from a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the RUs.
According to a further embodiment, a wireless transmitter for a wireless communication system is provided. The wireless transmitter is configured to transmit user data using OFDM modulation on a shared wireless medium having a bandwidth organized in multiple RUs. Further, the wireless transmitter is configured to, based on a mapping of the user data to the RUs, modulate a symbol of the user data onto a first set of subcarriers of a first resource unit of the RUs and redundantly modulate the symbol onto a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the RUs.
According to a further embodiment, a wireless transmitter for a wireless communication system is provided. The wireless transmitter comprises at least one processor and a memory. The memory contains instructions executable by said at least one processor, whereby the wireless transmitter is operative to transmit user data using OFDM modulation on a shared wireless medium having a bandwidth organized in multiple RUs. Further, the memory contains instructions executable by said at least one processor, whereby the wireless transmitter is operative to, based on a mapping of the user data to the RUs, modulate a symbol of the user data onto a first set of subcarriers of a first resource unit of the RUs and redundantly modulate the symbol onto a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the RUs.
According to a further embodiment, a wireless receiver for a wireless communication system is provided. The wireless receiver is configured to receive user data using OFDM modulation on a shared wireless medium having a bandwidth organized in multiple RUs. Further, the wireless receiver is configured to, based on a mapping of the user data to the RUs, demodulate a symbol of the user data from a first set of subcarriers of a first RU of the RUs and redundantly demodulate the symbol from a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the resource RUs.
According to a further embodiment, a wireless transmitter for a wireless communication system is provided. The wireless transmitter comprises at least one processor and a memory. The memory contains instructions executable by said at least one processor, whereby the wireless transmitter is operative to receive user data using OFDM modulation on a shared wireless medium having a bandwidth organized in multiple RUs. Further, the memory contains instructions executable by said at least one processor, whereby the wireless transmitter is operative to, based on a mapping of the user data to the RUs, demodulate a symbol of the user data from a first set of subcarriers of a first RU of the RUs and redundantly demodulate the symbol from a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the resource RUs.
According to a further embodiment of the invention, a computer program or computer program product is provided, e.g., in the form of a non-transitory storage medium, which comprises program code to be executed by at least one processor of a wireless transmitter. Execution of the program code causes the wireless transmitter to transmit user data using OFDM modulation on a shared wireless medium having a bandwidth organized in multiple RUs. Further, execution of the program code causes the wireless transmitter to, based on a mapping of the user data to the RUs, modulate a symbol of the user data onto a first set of subcarriers of a first resource unit of the RUs and redundantly modulate the symbol onto a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the RUs.
According to a further embodiment of the invention, a computer program or computer program product is provided, e.g., in the form of a non-transitory storage medium, which comprises program code to be executed by at least one processor of a wireless receiver. Execution of the program code causes the wireless receiver to receive user data using OFDM modulation on a shared wireless medium having a bandwidth organized in multiple RUs. Further, execution of the program code causes the wireless receiver to, based on a mapping of the user data to the RUs, demodulate a symbol of the user data from a first set of subcarriers of a first RU of the RUs and redundantly demodulate the symbol from a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the resource RUs
Details of such embodiments and further embodiments will be apparent from the following detailed description of embodiments.
In the following, concepts in accordance with exemplary embodiments of the invention will be explained in more detail and with reference to the accompanying drawings. The illustrated embodiments relate to controlling of OFDM based wireless transmissions in a wireless communication system. The wireless communication system may be a WLAN (Wireless Local Area Network) system based on a IEEE 802.11 technology, i.e., according to the IEEE 802.11 standards family. However, it is noted that the illustrated concepts could also be applied to other wireless communication technologies, e.g., to the LTE (Long Term Evolution) or NR (New Radio) technology specified by 3GPP (3rd Generation Partnership Project). The wireless transmissions are from a wireless transmitter to a wireless receiver. By way of example, the wireless transmitter could be an access point (AP) of the wireless communication system and the wireless receiver a station (STA) associated with the AP. Alternatively, the wireless receiver could be an AP of the wireless communication system and the wireless transmitter a STA associated with the AP. In some scenarios, the same device could act both as a wireless transmitter a wireless receiver, e.g., an AP or STA engaged in bidirectional wireless transmissions.
In the example of
Each AP 10 may provide data connectivity of the stations 11 connected to the AP 10. As further illustrated, the APs 10 may be connected to a data network (DN) 110. In this way, the APs 10 may also provide data connectivity of stations 11 connected to different APs 10. Further, the APs 10 may also provide data connectivity of the stations 11 to other entities, e.g., to one or more servers, service providers, data sources, data sinks, user terminals, or the like. Accordingly, the radio link established between a given station 11 and its serving AP 10 may be used for providing various kinds of services to the station 11, e.g., a voice service, a multimedia service, or other data service. Such services may be based on applications which are executed on the station 11 and/or on a device linked to the station 11. By way of example,
In the illustrated concepts, it is assumed that OFDM modulation is utilized for transmissions on a shared wireless medium. A bandwidth of the wireless medium, e.g., in the range of 20 MHz to 320 MHz, is organized in multiple RUs. Each of the RUs includes multiple subcarriers which can be used in the OFDM modulation. The RUs can be allocated to different users. However, in some situations the entire bandwidth, i.e., all RUs, could also be allocated to a single user. For example, the allocation of the bandwidth could be dynamically or semi-statically changed between configurations where the RUs are allocated to two or more different users, and configurations where the RUs are allocated to a single user.
Based on the OFDM modulation, user data is transmitted from a wireless transmitter to a wireless receiver. For transmitting the user data, the user data may first be encoded, e.g., using an LDPC (Low Density Parity Check Code), to generate a stream or sequence of bits, which is mapped to a first RU and to a second RU. For transmitting the user data, a symbol of the user data is modulated onto a first set of subcarriers of the first RU and redundantly modulated onto a second set of subcarriers of the second RU. The mapping of the user data to the RUs, i.e., the selection of the first RU and the second RU among the available RUs, is based on possible puncturing patterns applied to the RUs. The puncturing patterns may be applied by the wireless transmitter to mute certain RUs in response to detecting intermittent interference. Accordingly, the transmission of the user data may utilize DCM, with two copies of code bits generated by DCM being mapped to different RUs. The mapping of user data to the RUs is determined in such a way that, in case of puncturing the RUs, at least one of the copies will not be punctured. In this way, gains from DCM can be used to effectively support preamble puncturing.
When considering that at most 50% of the total bandwidth is allowed to be punctured, it is always possible to configure the mapping to the RUs in such a way that one full copy of the code bits is mapped to non-punctured RUs. This task may be further simplified if some of the possible puncturing patterns are forbidden, e.g., by specifying a set of allowed puncturing patterns like in the example of
As illustrated, in the processes of
Further, the STA 11 may receive configuration data 902. The configuration data 902 may dynamically or semi-statically configure the STA 11 with information indicating allowed puncturing patterns, e.g., as illustrated in
As further illustrated, the AP 10 transmits a wireless transmission 903 to the STA 11. The wireless transmission 903 transmits user data using OFDM modulation on the shared wireless medium, which is organized in multiple RUs. This involves that, based on a mapping of the user data to the resource units, the AP 10 modulates symbols of the user data onto a first set of subcarriers of a first RU of the RUs and redundantly modulates the symbols onto a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the RUs, such as the above-mentioned allowed or forbidden puncturing patterns.
Based on the mapping of the user data to the resource units, the STA 11 may then demodulate the symbols of the user data of the wireless transmission 903 from the first set of subcarriers and redundantly demodulates the symbol from the second set of subcarriers.
As further illustrated, the STA 10 transmits a wireless transmission 904 to the AP 10. The wireless transmission 904 transmits user data using OFDM modulation on the shared wireless medium, which is organized in multiple RUs. This involves that, based on a mapping of the user data to the resource units, the STA 11 modulates symbols of the user data onto a first set of subcarriers of a first RU of the RUs and redundantly modulates the symbols onto a second set of subcarriers of a second RU of the RUs. The mapping of the user data to the RUs is based on possible puncturing patterns applied to the RUs, such as the above-mentioned allowed or forbidden puncturing patterns.
Based on the mapping of the user data to the resource units, the AP 10 demodulates the symbol of the user data of the wireless transmission 904 from the first set of subcarriers and redundantly demodulates the symbol from the second set of subcarriers.
As can be seen, in the example of
If a processor-based implementation of the wireless transmitter is used, at least some of the steps of the method of
At step 1010, the wireless transmitter may determine possible puncturing patterns. The puncturing patterns may be applied by the wireless transmitter to mute certain RUs in response to detecting intermittent interference. This may for example be based on information indicating allowed puncturing patterns, e.g., as illustrated in
At step 1020, the wireless transmitter may determine interference levels on the RUs. This may involve that the wireless transmitter performs measurements on the RUs and/or receives information on interference levels on the RUs.
At step 1030, the wireless transmitter may determine a mapping of user data to the RUs. The mapping is based on possible puncturing patterns applied to the RUs, e.g., as determined at step 1010. Further, the mapping may be based on interference levels on the RUs, e.g., as determined at step 1020. By considering the interference levels, it can be taken into account that RUs with high interference level, e.g., with an interference level above a certain threshold have a higher likelihood of being subject to puncturing.
Accordingly, the method may utilize a mapping of the user data to the RUs, which is based on possible puncturing patterns applied to the RUs, in particular on allowed puncturing patterns and/or forbidden puncturing patterns. Further, the mapping may be based on interference levels on the RUs.
At step 1040, the wireless transmitter transmits the user data on the wireless medium, using OFDM modulation. This involves modulating the user data onto subcarriers of the shared medium in accordance with step 1050.
At step 1050, the wireless transmitter modulates a symbol of the user data onto a first set of subcarriers of a first RU of the RUs and redundantly modulates the symbol onto a second set of subcarriers of a second RU of the RUs, e.g., based on DCM. This is accomplished based on the above mapping of the user data to the RUs. In particular, the mapping determines selection of the first RU and the second RU. The mapping of the user data to the RUs may be configured to prevent that both the first RU and the second RU are subject to puncturing.
It is noted that the wireless transmitter 1100 may include further modules for implementing other functionalities, such as known functionalities of WLAN AP or WLAN station. Further, it is noted that the modules of the wireless transmitter 1100 do not necessarily represent a hardware structure of the wireless transmitter 1100, but may also correspond to functional elements, e.g., implemented by hardware, software, or a combination thereof.
If a processor-based implementation of the wireless receiver is used, at least some of the steps of the method of
At step 1210, the wireless receiver may determine possible puncturing patterns. This may for example be based on information indicating allowed puncturing patterns, e.g., as illustrated in
At step 1220, the wireless receiver may determine interference levels on the RUs. This may involve that the wireless receiver performs measurements on the RUs and/or receives information on interference levels on the RUs.
At step 1230, the wireless receiver may determine a mapping of user data to the RUs. The mapping is based on possible puncturing patterns applied to the RUs, e.g., as determined at step 1210. Further, the mapping may be based on interference levels on the RUs, e.g., as determined at step 1220. By considering the interference levels, it can be taken into account that RUs with high interference level, e.g., with an interference level above a certain threshold have a higher likelihood of being subject to puncturing.
Accordingly, the method may utilize a mapping of the user data to the RUs, which is based on possible puncturing patterns applied to the RUs, in particular on allowed puncturing patterns and/or forbidden puncturing patterns. Further, the mapping may be based on interference levels on the RUs.
At step 1240, the wireless transmitter receives the user data from the wireless medium, using OFDM modulation. This involves demodulating the user data from subcarriers of the shared medium in accordance with step 1250.
At step 1250, the wireless receiver demodulates a symbol of the user data from a first set of subcarriers of a first RU of the RUs and redundantly demodulates the symbol from a second set of subcarriers of a second RU of the RUs, e.g., based on DCM. This is accomplished based on the above mapping of the user data to the RUs. In particular, the mapping determines selection of the first RU and the second RU. The mapping of the user data to the RUs may be configured to prevent that both the first RU and the second RU are subject to puncturing.
It is noted that the wireless receiver 1300 may include further modules for implementing other functionalities, such as known functionalities of WLAN AP or WLAN station. Further, it is noted that the modules of the wireless receiver 1300 do not necessarily represent a hardware structure of the wireless receiver 1300, but may also correspond to functional elements, e.g., implemented by hardware, software, or a combination thereof.
It is noted that the functionalities as described in connection with
As illustrated, the wireless transmitter 1400 includes one or more radio interfaces 1410. The radio interface(s) 1410 may for example be based on a WLAN technology, e.g., according to an IEEE 802.11 family standard. However, other wireless technologies could be supported as well, e.g., the LTE technology or the NR technology. The radio interface(s) 1410 may be based on multiple antennas of the wireless transmitter 1400.
Further, the wireless transmitter 1400 may include one or more processors 1450 coupled to the radio interface(s) 1410 and a memory 1460 coupled to the processor(s) 1450. By way of example, the radio interface(s) 1410, the processor(s) 1450, and the memory 1460 could be coupled by one or more internal bus systems of the access point 1400. The memory 1460 may include a Read-Only-Memory (ROM), e.g., a flash ROM, a Random Access Memory (RAM), e.g., a Dynamic RAM (DRAM) or Static RAM (SRAM), a mass storage, e.g., a hard disk or solid state disk, or the like. As illustrated, the memory 1460 may include software 1470 and/or firmware 1480. The memory 1460 may include suitably configured program code to be executed by the processor(s) 1450 so as to implement the above-described functionalities for controlling wireless transmissions, such as explained in connection with
It is to be understood that the structures as illustrated in
As illustrated, the wireless receiver 1500 includes one or more radio interfaces 1510. The radio interface(s) 1510 may for example be based on a WLAN technology, e.g., according to an IEEE 802.11 family standard. However, other wireless technologies could be supported as well, e.g., the LTE technology or the NR technology. The radio interface(s) 1510 may be based on multiple antennas of the wireless receiver 1500.
Further, the wireless receiver 1500 may include one or more processors 1550 coupled to the radio interface(s) 1510 and a memory 1560 coupled to the processor(s) 1550. By way of example, the radio interface(s) 1510, the processor(s) 1550, and the memory 1560 could be coupled by one or more internal bus systems of the access point 1500. The memory 1560 may include a ROM, e.g., a flash ROM, a RAM, e.g., a DRAM or SRAM, a mass storage, e.g., a hard disk or solid state disk, or the like. As illustrated, the memory 1560 may include software 1570 and/or firmware 1580. The memory 1560 may include suitably configured program code to be executed by the processor(s) 1550 so as to implement the above-described functionalities for controlling wireless transmissions, such as explained in connection with
It is to be understood that the structures as illustrated in
As can be seen, the concepts as described above may be used for efficiently controlling OFDM based wireless transmissions with redundant utilization of multiple carriers, in particular OFDM based transmissions utilizing DCM and preamble puncturing. More specifically, the illustrated concepts may enable efficient use of unlicensed spectrum by enabling the use of preamble puncturing for DCM. Further, since DCM duplicates the code bits, combining DCM with the channel code, e.g., an LDPC, the code rate is effectively halved. For example, the concatenation of existing channel codes, e.g., such as LDPC codes, and DCM may yield effective code rates as low as 1/4. Accordingly, the illustrated concepts may also be used to increase the robustness of a punctured transmission, without a need to design, evaluate and implement new, low-rate codes. Rather, the existing codes can be re-used. Further, the illustrated concepts can be implemented with low complexity.
It is to be understood that the examples and embodiments as explained above are merely illustrative and susceptible to various modifications. For example, the illustrated concepts may be applied in connection with various kinds of wireless technologies, without limitation to WLAN technologies. Further, it is noted that the concepts may be applied with respect to various configurations of separating the bandwidth of the wireless medium into RUs or bandwidth segments. Further, the concepts may be applied with respect to various types of APs and stations. Moreover, it is to be understood that the above concepts may be implemented by using correspondingly designed software to be executed by one or more processors of an existing device or apparatus, or by using dedicated device hardware. Further, it should be noted that the illustrated apparatuses or devices may each be implemented as a single device or as a system of multiple interacting devices or modules.
In view of the above, embodiments provided in the present disclosure include:
A method of controlling wireless transmissions in a wireless communication system, the method comprising:
The method according to embodiment 1,
wherein the mapping of the user data to the resource units is configured to prevent that both the first resource unit and the second resource unit are subject to puncturing.
The method according to embodiment 1 or 2,
wherein the mapping of the user data to the resource units is based on information indicating allowed puncturing patterns.
The method according to embodiment 3,
wherein at least a part of the information indicating the allowed puncturing patterns is preconfigured in the wireless transmitter (10,11; 1100; 1400).
The method according to any one of embodiments 1 to 4,
wherein the mapping of the user data to the resource units is based on information indicating forbidden puncturing patterns.
The method according to embodiment 5,
wherein at least a part of the information indicating the forbidden puncturing patterns is preconfigured in the wireless transmitter (10,11; 1100; 1400).
The method according to any one of embodiments 1 to 6,
wherein the mapping of the user data to the resource units is based on interference levels on the resource units.
The method according to any one of embodiments 1 to 7,
wherein the said modulating of the symbol to the first set of subcarriers and redundantly modulating the symbol to the second set of subcarriers is based on Dual Carrier Modulation.
The method according to any one of embodiments 1 to 8,
wherein the multiple resource units are allocated to different users.
The method according to any one of embodiments 1 to 9,
wherein the wireless transmitter (10; 1100; 1400) is an access point of the wireless communication system.
The method according to any one of embodiments 1 to 9,
wherein the wireless transmitter (11; 1100; 1400) is a wireless device in communication with an access point of the wireless communication system.
The method according to any one of embodiments 1 to 11,
wherein the wireless communication system is based on a Wireless Local Area Network technology according to the IEEE 802.11 standards family.
A method of controlling wireless transmissions in a wireless communication system, the method comprising:
The method according to embodiment 13,
wherein the mapping of the user data to the resource units is configured to prevent that both the first resource unit and the second resource unit are subject to puncturing.
The method according to embodiment 13 or 14,
wherein the mapping of the user data to the resource units is based on information indicating allowed puncturing patterns.
The method according to embodiment 15,
wherein at least a part of the information indicating the allowed puncturing patterns is preconfigured in the wireless receiver (10, 11; 1300; 1500).
The method according to any one of embodiments 13 to 16,
wherein the mapping of the user data to the resource units is based on information indicating forbidden puncturing patterns.
The method according to embodiment 17,
wherein at least a part of the information indicating the forbidden puncturing patterns is preconfigured in the wireless receiver (10, 11; 1300; 1500).
The method according to any one of embodiments 13 to 18,
wherein the mapping of the user data to the resource units is based on interference levels on the resource units.
The method according to any one of embodiments 13 to 19,
wherein the said demodulating of the symbol from the first set of subcarriers and redundantly modulating the symbol from the second set of subcarriers is based on Dual Carrier Modulation.
The method according to any one of embodiments 13 to 20,
wherein the multiple resource units are allocated to different users.
The method according to any one of embodiments 13 to 21,
wherein the wireless receiver (10; 1300; 1500) is an access point of the wireless communication system.
The method according to any one of embodiments 13 to 21,
wherein the wireless receiver (11; 1300; 1500) is a wireless device in communication with an access point of the wireless communication system.
The method according to any one of embodiments 13 to 23,
wherein the wireless communication system is based on a Wireless Local Area Network technology according to the IEEE 802.11 standards family.
A wireless transmitter (10,11; 1100; 1400) for a wireless communication system, the wireless transmitter (10,11; 1100; 1400) being configured to:
The wireless transmitter (10,11; 1100; 1400) according to embodiment 25,
wherein the wireless transmitter (10,11; 1100; 1400) is configured to perform a method according to any one of embodiments 2 to 12.
The wireless transmitter (10,11; 1100; 1400) according to embodiment 25 or 26, comprising: at least one processor (1450), and
a memory (1460) containing program code executable by the at least one processor (1450), whereby execution of the program code by the at least one processor (1450) causes the wireless transmitter (10,11; 1100; 1400) to perform a method according to any one of embodiments 1 to 12.
A wireless receiver (10, 11; 1300; 1500) for a wireless communication system, the wireless receiver (10, 11; 1300; 1500) being configured to:
The wireless receiver (10, 11; 1300; 1500) according to embodiment 28,
wherein the wireless receiver (10, 11; 1300; 1500) is configured to perform a method according to any one of embodiments 14 to 24.
The wireless receiver (10, 11; 1300; 1500) according to embodiment 24 or 25, comprising:
A system, comprising:
A computer program or computer program product comprising program code to be executed by at least one processor (1450) of a wireless transmitter (10,11; 1100; 1400), whereby execution of the program code causes the wireless transmitter (10,11; 1100; 1400) to perform a method according to any one of embodiments 1 to 12.
A computer program or computer program product comprising program code to be executed by at least one processor (1550) of a wireless receiver (10, 11; 1300; 1500), whereby execution of the program code causes the wireless receiver (10, 11; 1300; 1500) to perform a method according to any one of embodiments 13 to 24.
| Filing Document | Filing Date | Country | Kind |
|---|---|---|---|
| PCT/EP2021/056055 | 3/10/2021 | WO |
| Number | Date | Country | |
|---|---|---|---|
| 62989103 | Mar 2020 | US |