The present invention relates to processing of encoded information. Particularly, the invention relates to a technique for selectively processing convolutionally encoded information in a wireless communication network based on decoding-reliability information.
In communication networks, particularly wireless networks, information is typically exchanged in transport blocks error-protected by a convolutional code, i.e., as code blocks. A receiver locates the code block in a received signal and Viterbi decoding is performed to retrieve the transport block.
Mobile communication standards, including the Long-Term Evolution (LTE, also known as Evolved Universal Terrestrial Radio Access, E-UTRA) and Universal Mobile Telecommunications System (UMTS) standards of 3GPP, convey control information to a User Equipment (UE) in transport blocks, which further comprise a Cyclic Redundancy Check (CRC) value of the control information for error detection. The UE has to completely decode the received signal before validating the control information in the transport block based on the CRC value. In case of a negative CRC, the control information will be discarded, i.e. computation time and power for the decoding has been wasted. This waste is particularly unfavourable for a battery-operated mobile receiver with limited computational and power resources.
The resource demands for decoding are particularly high for modern tail-biting convolutional codes having significantly increased decoding complexity. Moreover, for cellular networks addressing the UE by an identifier included in the transport block, the UE has to decode a large number of code blocks in order to identify the transport block actually addressed to the UE.
As stated above, a decision whether to process or discard the control information is conventionally based on the CRC value. Because of the finite number of bits reserved for the CRC value, there is a small but non-negligible probability of erroneously identifying control information as addressed to the UE or even noise signals as valid information, typically in the order of 10−4. Since content of the incorrect control information is close to random, processing the incorrect control information can lead to undefined receiver states and can cause further traffic of retransmission requests. For example, network throughput of useful data can be reduced, radio and computational resources may be wasted, a processing stage may enter an undefined state, and a communication partner may have to process positive or negative acknowledgements for transport blocks that were never sent.
It is an object of the present invention to provide a method and a device for more effectively processing error-prone information in mobile communication networks.
According to a first aspect, a method of processing information in a wireless communication network is provided. The method comprises the steps of receiving a signal encoded with a convolutional code and (at least partially) decoding the encoded signal using a Viterbi algorithm. The encoded signal comprises information and a check value. The information and the check value are derived using the Viterbi algorithm. The decoding includes (or can be limited to) computing a Viterbi state metric. The method further comprises the steps of deriving a reliability parameter and a reference value, and selectively processing the information depending on the check value, the reliability parameter, and the reference value. The reliability parameter is based on the Viterbi state metric. The reference value is based on the (received) signal.
Deriving the reliability parameter based on the Viterbi state metric can be implemented with minor additional computational complexity, since the Viterbi state metric may be a by-product of the Viterbi algorithm. The reference value may account for or compensate for absolute fluctuation (such as signal power). The reliability parameter may provide an additional criterion for a selective processing following the decoding, which can significantly reduce a probability rate for processing incorrect information. Computational power associated with a validation based on the check value can be saved if the reliability parameter (considered prior to the check value) indicates incorrect information. Computational complexity associated with the decoding can be reduced by interrupting the decoding, wherein the reliability parameter is based on the Viterbi state metric of a partial Viterbi path. Particularly, using the Viterbi algorithm to derive the information and the check value may encompass interrupting the Viterbi algorithm prior to completely deriving the information and the check value.
The selective processing of the information may comprise discarding the information if the reliability parameter fails to fulfil a predefined reliability criterion. The reliability criterion can be a threshold value. Identifying “false alarms” and/or discarding information (of false alarms) can prevent a receiver from entering an undefined state and can avoid requests for retransmission, thereby increasing an effective channel throughput.
The check value can be at least one of a check sum, a hash function value, a cyclic redundancy check (CRC) value, and a user terminal identifier; or any combination thereof. The combination can be an exclusive disjunction (XOR). The check value can be indicative of at least one of a correctness of the information and an address of the receiver. Alternatively, or in addition, the encoded signal can further comprise a (separate) user terminal identifier. The information can be processed further depending on the user terminal identifier. A probability rate of processing incorrect information is thus further reducible.
The information can comprise user data, control information or any other kind of information. The control information can be downlink control information as part of a receiver specific search space. Alternatively, the downlink control information can be part of a common search space (on a downlink shared channel or a dynamic broadcast channel). Further data communication is beneficially based on (communication parameters derived from) the selectively processed control information because of its high reliability.
When deriving the reliability parameter, a channel condition of a transmission channel for the encoded signal may be further considered. Alternatively, the reliability criterion can depend on the channel condition. Channel coefficients can indicate the channel condition. In the case of channel coefficients volatile in time or frequency, the reliability parameter can be reduced or the reliability criterion can be raised.
The Viterbi state metric can be computed for a final position of the received signal. For example, the reliability parameter can depend on a maximum of the Viterbi state metric of the final position. The reliability parameter can thus be indicative of the reliability of the decoded information based on a complete Viterbi path.
In one implementation, the Viterbi state metric for the final position is computed by a single Viterbi decoding process (“non-repetitive computation”). The single Viterbi decoding process can be limited to a single updating process. Relying on a single process can save computational and power resources, particularly if the signal is encoded by a terminated convolutional code.
In another implementation, the computation of the Viterbi state metric for the final position (i.e. the decoding or updating process from initial to final position of the received signal) can be repeated (“repeated computation”). The repeated computation can be initialized based on a Viterbi state metric previously computed for the final position of the received signal. Repeating the computation can provide a lower error rate and/or higher effective data throughput, particularly if the convolutional code is a tail-biting convolutional code.
The Viterbi state metric previously computed for the final position or the initial Viterbi state metric can be stored. The reliability parameter can depend on a maximum of the difference between the Viterbi state metric of the final position in the repeated computation and the stored Viterbi state metric. Basing the reliability parameters on the difference can provide a high quality reliability measure in the case of an a priori unknown initial Viterbi state, particularly in the case of a tail-biting convolutional code. The computation may be repeated once after storing, which may require minimal computational complexity. Optionally, the computation is repeated several times after storing, which may improve a numerical significance of the reliability parameter.
A convergence condition indicating that the Viterbi state metric computed for the final position essentially represents the initial condition of the tail-biting code can trigger the storing or the deriving steps. The convergence condition can be a consistent maximum condition requiring that the state having a maximum Viterbi state metric for the final position in a previous computation equals the state having a maximum Viterbi state metric for the final position in a current computation. Alternatively or additionally, the convergence condition can be a tail-biting condition.
The non-repetitive or the repeated computation can provide the reliability parameter or a basis for deriving the reliability parameter without a trace-back process (of the Viterbi decoding). Deriving the reliability parameter without or prior to the trace-back process can avoid the computational complexity associated with the trace-back process. Particularly, the decoding of the encoded signal using the Viterbi algorithm encompasses a partial Viterbi algorithm interrupted depending on the reliability parameter prior to the trace-back process. The selectively processing depending on both the check value and the reliability parameter encompasses the case of selectively deriving the information and the check value in the trace-back process depending on the reliability parameter based on the Viterbi state metric, and, if derived, selectively processing of the information depending on the check value. The computational complexity associated with the trace-back process is thus avoidable.
Soft bits can be used to represent the received signal. The reliability parameter can be computed by a summation including the soft bits. In this case, the Viterbi state metric can be understood as the summation or a partial sum of the summation. In one variant, the summation further includes signs (determined by transitions between Viterbi states) according to the decoded signal. Particularly, the summation can further include signs determined during the trace-back process of the decoding. Deriving the reliability parameter based on the received signal (represented by the soft bits) and the decoded signal can avoid storing the Viterbi state metric in or after the step of decoding. The reliability parameter can be flexibly derived (during or after the trace-back process). The flexibility saves memory and computational resources if the reliability parameter is not required for all decoded signals. Particularly, deriving the reliability parameter can be triggered by a negative check value.
Whenever soft bits represent the received signal, a second reliability parameter can be derived as a function of the derived reliability parameter and the reference value. The reference value can be based on the soft bit representation. Particularly, the reference value may be a sum of the soft bits, preferably a sum of absolute values of the soft bits. While the derived reliability parameter can depend on a scale of the soft bit representation, the second reliability parameter can be independent of the scale of the soft bit representation. The second reliability parameter may be a homogeneous function of degree zero. Denoting any derived reliability parameter by Λpathx and the (absolute) sum of soft bits by Γ, possible functions include at least one of the quotients R1=Λpathx/Γ, R2=(Γ−Λpathx)/(2Γ) and R3=(Γ−Λpathx)/(Γ+Λpathx), or any function thereof.
According to a further aspect, a computer program product is provided that comprises program code portions for performing the steps of any one of the methods described herein when executed by one or more computing devices. The computer program product can be stored on a computer readable recording medium.
According to a still further aspect, a device for processing information in a wireless communication network is provided. The device comprises a receiver, a decoder, and a processor. The receiver is adapted to receive a signal encoded with a convolutional code, wherein the signal comprises information and a check value. The decoder is adapted to decode the encoded signal using a Viterbi algorithm to derive the information and the check value. The decoder is adapted to compute a Viterbi state metric. The processor is further adapted to derive a reliability parameter based on the Viterbi state metric, to derive a reference value based on the (received) signal, and to selectively process the information depending on the check value, the reliability parameter, and the reference value. The decoder may be implemented on or by the processor.
The decoder can be adapted to compute the Viterbi state metric for a final position of the received signal. The processor can be further adapted to derive the reliability parameter depending on a maximum of the Viterbi state metric of the final position.
The receiver can be adapted to derive soft bits representative of the received signal. The processor can be further adapted to derive a second reliability parameter as a function of the derived reliability parameter and the reference value (which may be based of the soft bits).
In the following, the technique presented herein will be described in more detail with reference to exemplary embodiments illustrated in the drawings, wherein:
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as specific device configurations and specific scenarios of processing information in order to provide a thorough understanding of the technique disclosed herein. It will be apparent to one skilled in the art that the technique may be practiced in other embodiments that depart from these specific details. Moreover, while the following embodiments are primarily described in relation to the 3GPP standard Evolved Universal Terrestrial Radio Access (E-UTRA), also known as Long-Term Evolution (LTE), it will be readily apparent that the technique described herein may also be practiced in the context of other standards including UMTS W-CDMA. Furthermore, while in the following reference is made to downlink control information as defined for LTE, the technique discussed herein can also be applied to uplink control information, control information in general, and any other kind of information such as user data error-protected by a convolutional code.
Those skilled in the art will further appreciate that the methods, steps and functions explained herein may be implemented using individual hardware circuitry, using software functioning in conjunction with a programmed microprocessor or general purpose computer, using an Application Specific Integrated Circuit (ASIC) and/or using one or more Digital Signal Processors (DSPs). It will be also be appreciated that while the following embodiments are primarily described in the form of methods and devices, the technique disclosed herein may also be embodied in a computer processor and a memory coupled to the processor, wherein the memory stores one or more programs that perform the steps discussed herein when executed by the processor.
The decoder 108 is implemented as a separate hardware unit in the embodiment of the user terminal 104 shown in
An exemplary embodiment of the transport block 200 is schematically illustrated in
The encoder 300 is adapted to generate a tail-biting code, i.e. the register 306 is initialized by the values si=c(K−1−i). An encoding process comprises encoding steps from k=0 to k=K−1 with a cyclic interpretation of the indices (x) of the transport block (cx). At the encoding step k, the flip flops s0, . . . , s5 are set to the values ck−1, . . . , ck−6 of the transport block 200.
As the bits c0, . . . , cK−1 of the transport block 200 are shifted through the register 306 (on the encoder side), possible transitions (at the receiver side) are limited to so-called “butterflies” in each updating step k, as shown in
The updating process of the Viterbi algorithm initializes the Viterbi state metric Λ1,0 (s) according to an a priori probability of the states s=0, . . . , 63 before the first updating step k=0:
In the case of a tail-biting code (as is provided by the embodiment of the encoder 300 discussed above with reference to
The updating process runs through the decoding trellis from the first (k=0) to the last (k=K−1) transport block bit ck. It should be noted that the present technique is not limited to a convolutional code of 64 states, chosen as a numerical example of the explanatory embodiments shown in
There are always two incoming transition branches at each state. The state metric values are denoted “c” and “d” for the state f as well as “e” and “f” for the state 32+f in the exemplary updating step of
The updating process is repeated in the case of the tail-biting code, because the a priori initial condition for the Viterbi state metric Λ1, 0(s) is agnostic to the initial state of the register 306 of the encoder 300 applying a cyclic initial condition (also known as tail-bite condition) with respect to the transport block 200. According to a first embodiment of the decoder 108, the updating process is performed niterationmax times. At the end of each updating process i=1, . . . , niterationmax, the current Viterbi state metric memory 402 represents the final Viterbi state metric Λi, K(s) for all states s=0, . . . , 63, which is copied to the final Viterbi state metric memory 406. The initial Viterbi state metric Λi+1, 0(s) for a repetition of the updating process (following the i-th updating process) is obtained by subtracting the maximum of the final Viterbi state metric at the end of the previous updating process from all other states corresponding to a wrap-around Viterbi decoding with renormalization:
If a flag DVIT_use_stop_rule equals “1” indicating that a stopping rule is to be applied, the decoder 108 determines according to the stop rule whether the updating process is to be repeated.
The stopping rule involves a tail-biting condition in the case of tail-biting codes. Generally, a Viterbi path is uniquely indicated by a final state and the stored optimal incoming branches. A tail-biting path is required to fulfil the tail-biting condition. The tail-biting condition requires that, starting from the final state and following backwards the optimal incoming branches (as stored in the optimal incoming branch memory 404) during the trace-back process, an initial state determined by the trace-back process is identical to the final state.
Optionally, the stopping rule involves a consistent maximum condition, which requires that the state smax assuming the maximum state metric value of the final Viterbi state metric, Λi,K(smax)=maxs(Λi, K(s)), is equal to the maximum state of the previous final Viterbi state metric: Λi−1,K(smax)=maxs Λi−1,K(s). For determining the consistent maximum condition, the decoder 108 compares the final Viterbi state metric Λi, K(s) of the current updating process stored in the current Viterbi state metric memory 402 with the final Viterbi state metric Λi−1,K(s) of the previous updating process stored in the final Viterbi state metric memory 406.
For the case of a terminated code (also referred to as “trellis termination”), only a single updating process (iteration i=1) is performed.
The updating process is completed, if i=niterationmax (for tail-biting decoding), or the flag DVIT_use_stop_rule equals “1” and the stopping rule is fulfilled (also for tail-biting decoding), or the single updating process is completed (for the terminated code). Once the updating process is completed, the trace-back process of the Viterbi algorithm starts determining a “best path” based on the maximum state of the final Viterbi state metric Λi, K(s). The best path of the recent updating process (after the iteration i) is uniquely indicated by the final Viterbi state having the maximum state metric value in the final Viterbi state metric Λi, K(s). The explicit Viterbi path corresponding to this maximum final Viterbi state is derived by the decoder following the optimal incoming branches stored in the optimal incoming branch memory 404, starting from the final trellis (of the step k=K) backwards to the initial trellis (of the step k=0) in the trace-back process. The best path corresponds to the maximum likelihood sequence of states s, which sequence, in turn, corresponds to a decoded transport block 200. The decoded transport block 200 is output by the decoder 108.
Additionally, the decoder 108 derives a reliability parameter Λpath denoted by 118 as a quality measure of the decoded transport block 200 as a decoding result and, optionally, a reference value r denoted by 122. The reliability parameter 118 and, if derived, the reference value 122 are output to the processor 110 in case the decoder 108 is implemented as a separate unit. Three embodiments of reliability parameters 118 and corresponding approaches of deriving the embodiments of the reliability parameter 118 are described in more detail below. The decoder 108 or the processor 110 can derive one or all of these reliability parameters 118.
A first embodiment of a reliability parameter 118 denoted by Λpathstate is derived based on the final Viterbi state metric of the single updating process (i=1 in the case of the terminated code) or most recent updating process (i≧1 in the case of the tail-biting code). In the case of the terminated code, the first embodiment of the derived reliability parameter is the maximum of the final Viterbi state metric Λi, K(s), i.e. the metric value associated with the final state of the best path, which is
Λpathstate=Λ1,K(0).
If this maximum of the final Viterbi state metric is not consistent with the termination condition of the terminated code requiring the state s=0 to assume the maximum of the final Viterbi state metric, Λ1,K(0)=maxs=0 . . . 63(Λ1,K(s)), the decoder can output an error message instead of, or in addition to, the reliability parameter Λpathstate.
In the case of the tail-biting code, the first embodiment of the derived reliability parameter 118 is determined by searching for the best tail-biting path based on the final Viterbi state metric, which reads
Λpathstate=maxsεT(Λi,K(s)),
wherein T denotes the set of tail-biting paths, i.e. paths fulfilling the tail-biting condition. It is possible that the best state (maximizing Λi, K(s)) of the most recent update process is not identical to the best state (maximizing Λi−1, K(s)) of the previous updating process, in which case a warning message indicating insufficient convergence of the Viterbi state metric is generated.
The first embodiment of the reliability parameter 118 introduces a small error in the case of the tail-biting code, since in the updating process (as part of the decoding) the final Viterbi state metric is not exactly equal to a path metric. The error is small since the final Viterbi state metric typically converges after some repetitions of the updating process (sometimes referred to as “equilibration”). Only for an a priori known initial state, i.e., terminated convolutional codes, the final Viterbi state metric (exactly) represents the metric of the path associated by the trace-back process.
The first embodiment of the reliability parameter 118 is favourable because of its low computational requirements, since no specific initial conditions have to be considered in the computation, and since the first embodiment does not necessarily rely on repetitions of the updating process. Furthermore, the final Viterbi state metric memory 406 can be avoided. In case there are repetitions of the updating process, the initial condition for the repetition includes the renormalization by the best state of the previous final Viterbi state metric, which avoids a drift in the reliability parameter 118 according to the first embodiment.
A second embodiment of the reliability parameter 118, denoted by Λpathiterate, is derived computing an exact path metric corresponding to the decoded transport block 200. In more detail, the second embodiment of the reliability parameter 118 is derived by searching for the maximum of the difference between the final Viterbi state metric Λi, K(s) of the most recent updating process and the initial Viterbi state metric Λi, 0(s) among all tail-biting paths, which reads
Λpathiterate=maxsεT(Λi,K(s)−Λi,0(s)).
The initial Viterbi state metric can be stored in an initial Viterbi state metric memory or can be derived according to the initial conditions based on the final Viterbi state metric of the previous updating process stored in the final Viterbi state metric memory 406. The second embodiment of the reliability parameter 118 avoids the small error of the first embodiment. Furthermore, the second embodiment is preferred for an implementation in combination with the updating process of the Viterbi algorithm. In the preferred implementation, the decoder 108 or the processors 110 performing the updating process of the Viterbi algorithm also derives the reliability parameter 118 according to the second embodiment based on the initial and final Viterbi state metrics computed during the update process.
A third embodiment of the reliability parameter 118 also provides the exact path metric. While the second embodiment of the reliability parameter 118 is based on the initial and final Viterbi state metrics computed in the update process, the reliability parameter 118 according to the third embodiment is derived during a trace-back process (which can be the trace-back process of the Viterbi decoding or a later independent trace-back process). The reliability parameter 118 according to the third embodiment is based on the soft bit representation dk(j)(received) of the received signal and expected physical bits bk(j)(re-encoded) obtained by re-encoding. The expected physical bits bk(j)(re-encoded) can be obtained by re-encoding the decoded transport block 200 or by re-encoding along the Viterbi path (determined according to the stopping rule and the maximum of the final metric state), preferably by following the optimal incoming branches stored in the optimal incoming branch memory 404. The reliability parameter 118 according to the third embodiment is then derived according to
In a particularly beneficial embodiment for deriving the reliability parameter 118 (consistent with the third embodiment), the computation is implemented in two separate computations according to the decomposition
Λpathtraceback=Λpath,ctraceback−Λpath,etraceback,
wherein a correct-path sum is derived according to:
and an error-bit path sum is derived according to:
Each of the previous embodiments is extended to provide a reference value Γ denoted by 122, which is computed as the absolute sum of all soft bits of the soft bit representation of the received signal:
In a particularly beneficial embodiment of computing the reference value Γ, nested summation above is avoided by computing the reference value Γ according to:
Γ=Λpath,ctraceback+Λpath,etraceback.
An invertible relation between the reliability parameter 118 (comprehensively denoted by Λpath for all embodiments of the reliability parameter 118) and the reference value Γ, on the one hand, and the correct-bit path sum Λpath,c and the error-bit sum Λpath,e, on the other hand, is applicable to any one of the embodiments according to:
Above relation is bijective and has a geometric interpretation in terms two coordinate systems (Λpath,Γ) and (Λpath,c,Λpath,e), the coordinate systems being rotated by 45° with respect to another. The above relation can be in any one of the afore-mentioned embodiments in order to derive missing values (out of Λpath, Γ, Λpath,c, and Λpath,e).
The decoder 108 or the processor 110 further derives a second reliability parameter 120 (collectively denoted by R) as a function of the derived reliability parameter Λpath and the reference value Γ. The reliability parameter 118 is an absolute reliability measure. Choosing any homogeneous function f of degree zero depending on both Λpath and Γ, the second reliability parameter R=f(Λpath, Γ) provides a relative reliability measure, which is preferred for deciding upon further processing of the received or decoded signal.
A first embodiment of the second reliability parameter 120 is
R1=Λpath/Γ, with 0≦R1≦1.
The first embodiment of the second reliability parameter 120 can be interpreted as a normalized fraction of soft bit values that are co-linear with the decided tail-bite code word according to the Viterbi decoding (or at least the Viterbi path). The first embodiment R1 of the second reliability parameter 120 thus represents the “soft bit coherency”. If the second reliability parameter 120 indicates poor signal quality or decoding quality (e.g. R1<0.75, preferably R1<0.5), the code word decision of the Viterbi decoding is unreliable, since there is a large number of sign errors in the soft bit values dk(j)(received) as compared to the physical bits bk(j)(re-encoded) according to the re-encoded code word decision. If the second reliability parameter 120 would equal one (which would be an ideal limiting case), all soft bit values dk(j)(received) would have the correct sign, and such a code word decision of the Viterbi decoding could be judged as very reliable.
A second embodiment of the second reliability parameter 120 derives the second reliability parameter 120 by computing the ratio of error-bit path sum to the absolute sum of all received soft bit values:
The second embodiment can be interpreted as an error rate for soft bits.
A third embodiment of the second reliability parameter 120 derives the second reliability parameter 120 by computing the ratio of error-bit path sum to the correct-bit path sum:
The advantage of the second reliability parameter 120 is its increased robustness and invariance. The second reliability parameter 120 is independent of a signal-to-noise ratio, bit length K, an absolute power control of the node 102 for control information addressed to individual user terminals 104, or channels characteristics, like frequency-selective fading. Such channel characteristics can be extracted from channel coefficients and serve as a third reliability parameter, or can be combined with one of the reliability parameters 118, 120.
A further advantage of the second reliability parameter 120 in general as compared to bit-error measures (such as an Hamming distance) is that puncturing (for rate matching) does not influence the second reliability parameter 120. Conventional bit-error measures count zero-filling bits at a puncturing position as possible bit-errors, which cause a systematic error floor in the conventional bit-error measures. Puncturing is particularly present in high-rate control data at low levels of aggregation.
In more detail, step S1 comprises a step 502 of demapping a soft OFDM symbol representing the received OFDM signal after Fourier transformation (FFT) and, optionally, combining of two or more receive paths according to the channel coefficients. The soft OFDM symbol is demapped to QAM soft bits. The step S1 further comprises a step 504 of collecting Resource Element Groups (REGs) out of the OFDM symbol. The REGs belong to a control region of a downlink subframe. The resource elements collected in the REGs are assigned to a Physical Downlink Control Channel (PDCCH, see channel 306 in
Step S3 comprises a step 508 of rate de-matching, which is the reverse operation to rate matching in the node 102. At locations of punctured bits, zero values are inserted in the step 508. The step S3 further comprises the step of performing the Viterbi algorithm in step 510 (which may be limited to performing one or more updating process of the Viterbi algorithm, if the trace-back process is not yet required). In a step 512, one or both of the reliability parameters 118, 120 are derived based on the Viterbi state metric of the updating process in step 510 or based on an independent computation of the path metric in step 512.
In a step 514, it is decided based on at least one of the reliability parameters 118, the second reliability parameters 120, and the reference value 122, whether the candidate selected in step 506 should be further processed. In the case of a negative decision, the method proceeds in step 506 by selecting a further candidate or selecting a new candidate out of a further received signal.
In the case of a positive decision, the method proceeds with a step 516 by extracting the Cyclic Redundancy Check (CRC) value out of the check value 204 using the radio network temporary identifier of the user terminal 104. In case the CRC does not verify the downlink control information 202, a further candidate is selected in step 506. In case the cyclic redundancy check confirms the received downlink control information 202, the downlink control information is parsed in a step 518.
The logical or temporal order of steps 514 and 516 may be interchanged. Particularly, steps 514 and 516 can be parallelized.
In case a conflicting DCI is found, in a step 524 at least one of the reliability parameters 118, the second reliability parameter 120, and the reference value 122 is a numerical criterion for deciding which downlink control information is to be applied by comparing respective reliability parameters for DCI and DCI′. The second reliability parameter 120 (R(DCI) and R(DCI), respectively) is preferred for its numerical invariance. If the (second) reliability parameter for the recent downlink control information DCI is higher as compared to the (second) reliability parameter of the previous downlink control information DCI′, control parameters are derived from DCI in the step 522. Otherwise, the previous control information DCI′ is applied in a step 526.
Effective error detection as early as possible in a processing chain is of particular benefit in the context of the LTE standard, which applies tail-biting convolutional codes for the physical downlink control channel (PDCCH) and a physical broadcast channel (PBCH) at frequencies as high as one subframe every millisecond. The user terminal 104 thus has to perform a large number of blind decodes within a search space of potential locations for control data, which leads to a non-negligible probability for processing harmful incorrect control data. Applying the measure 118, 120, or 122, preferably by comparison against a threshold value Λthreshold, Rthreshold, and Γthreshold, respectively (according to step 514), eliminates the harmful incorrect control data caused by false alarms before entering the processing chain.
As has become apparent from the above embodiments, the technique presented herein provides various advantages. First of all, the technique provides a robust (absolute and relative) reliability parameter for the entire transport block 200, which can be independent of one or more of an instantaneous signal-to-noise ratio, the absolute power control or bit length K of different control data, channel conditions, and a code rate. A minor dependency on a transport block size can be quantified and compensated. Specifically for the LTE standard the technique can improve the decoding, increase physical layer robustness, increase the data throughput, and a user experience on an application layer.
In the foregoing, principles, embodiments and various modes of implementing the technique disclosed herein have exemplarily been described. The present invention should not be construed as being limited to the particular principles, embodiments and modes discussed above. Rather, it will be appreciated that variations and modifications may be made by a person skilled in the art without departing from the scope of the present invention as defined in the following claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2010/002796 | 5/6/2010 | WO | 00 | 11/28/2012 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2011/137918 | 11/10/2011 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6879267 | Yamazaki | Apr 2005 | B2 |
7251770 | Bottomley et al. | Jul 2007 | B2 |
7912028 | Arviv et al. | Mar 2011 | B2 |
8341486 | Rault et al. | Dec 2012 | B2 |
20090106637 | Kim et al. | Apr 2009 | A1 |
Number | Date | Country |
---|---|---|
0866589 | Sep 1998 | EP |
1517451 | Mar 2005 | EP |
1928094 | Jun 2008 | EP |
Entry |
---|
Jelena Nikolic-Popovic. “Using TMS320C6416 Coprocessors: Viterbi Coprocessor (VCP).” Texas Instruments Application Report SPRA750D, [online] Sep. 30, 2003, pp. 1-24, XP002591629, [retrieved on Jul. 9, 2010]. Retrieved from the Internet: <URL:http://focus.ti.com.cn/cn/lit/an/spra750d/spra750d.pdf>. |
Huang, Fu-hua. “Evaluaion of Soft Output Decoding for Turbo Codes.” [online] May 29, 1997, pp. 38-56, XP002591630, [retrieved on Jul. 12, 2010] retrieved from the Internet: <URL:http//scholar.lib.vt.edu/theses/available/etd-71897-15815/unrestricted/chap4.pdf>. |
Min et al. “Research on An-Based Decode of Tail-Biting Convolutional Codes and Their Performance Analyses Used in LTE System.” 2009 International Forum on Information Technology and Applications, May 15, 2009, pp. 303-306, XP031525040, IEEE, Piscataway, NJ, USA. |
Berrou et al. “A Low Complexity Soft-Output Viterbi Decoder Architecture.” Proceedings of the International Conference on Communications (ICC), Geneva, May 23-26, 1993, pp. 737-740, XP010137075, IEEE, New York, USA. |
Benthin et al. Viterbi Decoding of Convolutional Codes with Reliability Information for a Noncoherent RAKE-Receiver in a CDMA-Environment. Proceedings of the Global Telecommunications Conference, San Francisco, Nov. 28-Dec. 2, 1994, pp. 1758-1762, XP000488826, IEEE, New York, USA. |
3rd Generation Partnership Project. “Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation (Release 9).” 3GPP TS 36.211 V8.9.0, Dec. 2012, Sophia-Antipolis, Valbonne, France. |
3rd Generation Partnership Project. “Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Multiplexing and channel coding (Release 8).” 3GPP TS 36.212 V8.8.0, Dec. 2009, Sophia-Antipolis, Valbonne, France. |
3rd Generation Partnership Project. “Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer procedures (Release 8).” 3GPP TS 36.213, Sep. 2009, Sophia-Antipolis, Valbonne, France. |
3rd Generation Partnership Project. “Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio access capabilities (Release 8).” 3GPP TS 36.306 V8.6.0, Mar. 2010, Sophia-Antipolis, Valbonne, France. |
3rd Generation Partnership Project. “Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Acdess Network (E-UTRAN); Overall description; Stage 2 (Release 8).” 3GPP TS 36.300 V8.12.0, Mar. 2010, Sophia-Antipolis, Valbonne, France. |
3rd Generation Partnership Project. “Technical Specification Group Radio Access Network; Multiplexing and chennel coding (FDD) (Release 6).” 3GPP TS 25.212 V6.10.0, Dec. 2006, Sophia-Antipolis, Valbonne, France. |
3rd Generation Partnership Project. “Universal Mobile Telecommunications System (UMTS); Multiplexing and channel coding (FDD) (3GPP TS 25.212 version 6.6.0 Release 6).” 3GPP ETSI TS 125 212 V6.6.0 Sep. 2005, Sophia-Antipolis, Cedex, France. |
Number | Date | Country | |
---|---|---|---|
20130107993 A1 | May 2013 | US |