WO2025189600A1 - Method and apparatus for uplink control channel configuration - Google Patents
Method and apparatus for uplink control channel configurationInfo
- Publication number
- WO2025189600A1 WO2025189600A1 PCT/CN2024/100047 CN2024100047W WO2025189600A1 WO 2025189600 A1 WO2025189600 A1 WO 2025189600A1 CN 2024100047 W CN2024100047 W CN 2024100047W WO 2025189600 A1 WO2025189600 A1 WO 2025189600A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mcs
- payload
- ran
- data
- intra
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0002—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
- H04L1/0003—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0009—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the channel coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0015—Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the adaptation strategy
- H04L1/0016—Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the adaptation strategy involving special memory structures, e.g. look-up tables
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0023—Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the signalling
- H04L1/0025—Transmission of mode-switching indication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0041—Arrangements at the transmitter end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/007—Unequal error protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0072—Error control for data other than payload data, e.g. control data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
Definitions
- the present disclosure relates to wireless communications. Specifically, the present disclosure relates to a method and apparatus for configuration of an uplink channel.
- Future wireless communication networks will provide new features which will require new types of signaling. For example, future wireless communication networks will need to accommodate signaling carrying Artificial Intelligence (AI) information, sensing information, and enhanced Channel State Information (CSI) information between mobile devices and network elements.
- AI Artificial Intelligence
- CSI Channel State Information
- a method comprising receiving control information from a base station, the control information comprising an uplink resource and a Modulation and Coding Scheme (MCS) flag; when the MCS flag is set, selecting an MCS from a table based on an index from the control information; and encoding a message with the selected MCS; and transmitting the encoded message to the base station on the uplink resource.
- MCS Modulation and Coding Scheme
- the method further comprises, when the MCS flag is not set, selecting a legacy MCS, and encoding the message with the legacy MCS.
- the table is a dedicated table for Intra-RAN messages.
- the table is an Ultra Reliable Low Latency Communications (URLLC) table.
- URLLC Ultra Reliable Low Latency Communications
- the table is a data MCS table.
- the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- AI Artificial Intelligence
- CSI Channel State Information
- a method comprising receiving control information from a base station, the control information comprising an uplink resource and a Modulation and Coding Scheme flag, when the MCS flag is set, selecting an MCS from a dedicated Intra-RAN MCS table based on an index from the control information; when the MCS flag is not set, selecting the MCS from a data MCS table; encoding a message with the selected MCS; and transmitting the encoded message to the base station on the uplink resource.
- the Intra-RAN MCS table is an Ultra Reliable Low Latency Communications (URLLC) table.
- URLLC Ultra Reliable Low Latency Communications
- the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- AI Artificial Intelligence
- CSI Channel State Information
- a method comprising receiving control information from a base station, the control information comprising an uplink resource, selecting an Intra-RAN Modulation and Coding Scheme (MCS) from a first table based on an Intra-RAN index from the control information; encoding a message with the Intra-RAN MCS; and transmitting the encoded message on the uplink resource.
- MCS Intra-RAN Modulation and Coding Scheme
- control information comprises the Intra-RAN index and a data index.
- the first table is a dedicated Intra-RAN MCS table.
- the method further comprises selecting a data MCS from a second table based on the data index, and encoding the data payload with the data MCS.
- the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- AI Artificial Intelligence
- CSI Channel State Information
- a method comprising: when a length of a payload is greater than a threshold, creating blocks having a length equal to the threshold until a remaining payload is shorter than the threshold; creating a last block with the remaining payload; encoding the blocks and the last block with a polar code; and transmitting the blocks and the last block to a base station.
- the threshold is based on a mother code length for the polar code.
- the threshold is 1013 for a mother code length of 1024, the threshold is 2026 for a mother code length of 2048, the threshold is 4052 for a mother code length of 4096, the threshold is 8104 for a mother code length of 8192, and the threshold is 16208 for a mother code length of 16384.
- the payload comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- AI Artificial Intelligence
- CSI Channel State Information
- a method comprising dividing a payload into high-priority bits and low-priority bits, encoding the high-priority bits with a first MCS, encoding the low priority bits with a second MCS; and transmitting the encoded high-priority bits and the encoded low-priority bits to a base station, wherein the first MCS is a lower order MCS than the second MCS.
- the method further comprises segmenting the high-priority bits into a plurality of blocks based on a threshold size and segmenting the low-priority bits into a second plurality of blocks based on the threshold size.
- the payload comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- AI Artificial Intelligence
- CSI Channel State Information
- a method comprising, when a payload type of a payload is an intra-RAN payload type, when a length of the payload is greater than a length threshold or a coding rate of the payload is greater than a rate threshold, selecting a Low Density Parity Check (LDPC) code; and when the length of the payload is less than the length threshold and the coding rate of the payload is less than the rate threshold, selecting a polar code or a Reed-Muller code, encoding the payload with the selected code; and transmitting the payload to a base station.
- LDPC Low Density Parity Check
- the method further comprises, when the payload type is not an intra-RAN payload type, selecting a polar code.
- Intra-RAN payload types include Artificial Intelligence (AI) related information, sensing related information, and enhanced Channel State Information (CSI) components.
- AI Artificial Intelligence
- CSI Channel State Information
- payload types that are not intra-RAN payload types include Acknowledgments (ACKs) , Negative Acknowledgements (NACKs) , Scheduling Requests (SRs) , and Channel State Information (CSI) .
- ACKs Acknowledgments
- NACKs Negative Acknowledgements
- SRs Scheduling Requests
- CSI Channel State Information
- a computing device comprising a processor and a communications subsystem, wherein the computing device is configured to perform the method of any embodiment of any aspect described above.
- a computer readable medium having stored thereon executable code for execution by a processor of a computing device, the executable code comprising instructions for performing the method of any embodiment of any aspect described above.
- Figure 1 is a trellis graph of an exemplary polar code.
- Figure 2 is a graphical representation of a networking environment according to at least one embodiment of the present disclosure.
- Figure 3 is a graphical representation of a communications system according to at least one embodiment of the present disclosure.
- Figure 4 is a graphical representation of an electronic device communicating with a base station according to at least one embodiment of the present disclosure.
- Figure 5 is a block diagram of a device according to at least one embodiment of the present disclosure.
- Figure 6 is a graphical representation of a process for determining UCI formats and configurations in 5G.
- Figure 7 is a call flow diagram of a method according to at least one embodiment of the present disclosure.
- Figure 8 is a flow diagram of a method according to at least one embodiment of the present disclosure.
- Figure 9 is a flow diagram of a method according to at least one embodiment of the present disclosure.
- Figure 10 is a flow diagram of a method according to at least one embodiment of the present disclosure.
- Figure 11 is a flow diagram of a method according to at least one embodiment of the present disclosure.
- Figure 12 is a flow diagram of a method according to at least one embodiment of the present disclosure.
- Figure 13 is a flow diagram of a method according to at least one embodiment of the present disclosure.
- Figure 14 is a block diagram of a user equipment according to at least one embodiment of the present disclosure.
- the present disclosure is directed to a method and apparatus for configuration of an uplink channel.
- Channel coding is an indispensable module in communications systems that encode K source bits into N code bits to provide error correction capability against adversary channel condition such as noise and interference.
- the code rate R is selected according to channel quality.
- Polar codes are capacity-achieving codes and thus a great breakthrough in coding theory.
- the synthesized channels or subchannels
- the noiseless subchannels are utilized to transport information, and their proportion is proven to achieve the channel capacity defined by Shannon.
- the above-mentioned channel polarization phenomenon occurs under successive cancellation (SC) or SC-based decoding, which has a relatively low complexity.
- Low-density parity-check (LDPC) codes are capacity-approaching codes.
- LDPC codes are usually defined by a parity-check matrix, which has far more zeros than ones, thus having low density. By properly designing the positions of ones in the matrix, the decoding performance can be improved.
- LDPC codes can be viewed as a type of random codes, introducing structures can facilitate its hardware implementations of both encoder and decoder. Quasi-cyclic is such a structure that first defines a smaller base matrix or base graph (BG) , and then perform “lifting” by replacing its ones with a cyclic shifted version of identity matrix.
- BG base matrix or base graph
- Rate matching is performed after channel encoding, by either puncturing/shortening or repeating some code bits.
- the purpose is to obtain a code bit sequence of desired length for transmission over limited channel resources.
- a channel interleaver is applied after channel encoding and rate matching by permuting the code bits.
- the purpose is to provide stable or superior performance under high-order modulation or in a fading channel.
- Hybrid automatic repeat request is a mechanism to provide reliable wireless transmission. It combines forward error correction (FEC) and automatic repeat request (ARQ) .
- FEC forward error correction
- ARQ automatic repeat request
- the initial transmission is a FEC code word with CRC bits to support error detection at the receiver. If a decoding error is detected, the receiver will send back a NACK signaling to inform the transmitter of the error, and request a retransmission.
- the retransmitted bits can be directly selected from the initially transmitted bits, or can be incrementally generated code bits which form a longer code word with the initially transmitted bits.
- the former is called chase-combining HARQ (CC-HARQ) and the latter is called incremental-redundancy HARQ (IR-HARQ) .
- IR-HARQ incremental-redundancy HARQ
- Modulation coding scheme (MCS) adaptation is a powerful method to combat varying channel states, in which the modulation order and code length and coding rate can be changed in real time. Therefore, it requires that a channel coding scheme can flexibly change the code length and code rate in a fine-grained way, and at the same time achieve good error correction performance in all possible configurations. This fine-grained flexibility of channel codes is one of the most challenging problems for engineers in this domain.
- KPIs Key Performance Indicators
- the Key Performance Indicators (KPIs) that are related to channel coding include coding gain, reliability, throughput, latency and their tradeoffs.
- the throughput requirement of future wireless communication networks may reach above 1Tbps, and the energy efficiency should decrease to 1pJ/bit.
- the coding scheme should preferably support flexible rate matching and IR-HARQ schemes. It is required, but a very challenging task, to design a code ensemble to fulfill all these KPIs and capabilities.
- Polar codes are linear block codes.
- G N its generator matrix
- G N its encoding process is where is the binary information vector, and is the binary code vector.
- the code length M may not always be the power of 2, i.e., M ⁇ N.
- puncturing and shortening are used to reduce transmitted code bits from N to M.
- N the mother code length
- M the code length from now on.
- punctured bits are untransmitted bits unknown to the decoder, but shortened bits are untransmitted bits known to the decoder (usually all zeros) .
- the information vector is multiplied by the generator matrix G 8 .
- G 8 is obtained by successively applying the Kronecker product to F 2 .
- the Kronecker product of F 2 with another binary matrix may be viewed as replacing every 1 in the matrix by a copy of F 2 and every 0 in the matrix by a 4x4 matrix containing all 0s. Therefore, may be represented as follows:
- the resulting codeword may therefore be expressed as ⁇ u 1 +u 2 +u 3 +u 4 +u 5 +u 6 +u 7 +u 8 , u 2 +u 4 +u 6 +u 8 , u 3 +u 4 +u 7 +u 8 , u 4 +u 8 , u 5 +u 6 +u 7 +u 8 , u 6 +u 8 , u 7 +u 8 , u 8 ⁇ .
- Successive cancellation is the basic decoding algorithm for polar codes, where all the frozen bits and information bits are decoded sequentially, i.e., bit by bit. The preceding bits are always decoded first.
- Successive Cancellation List is an enhanced decoding algorithm for polar codes, where multiple (let’s say L) SC decoding instances are executed. Each instance is called a “decoding path” .
- decoding path When decoding each binary bit, both “0” and “1” branches are extended to each path, creating 2L paths. Then, all 2L paths are compared, where the most likely L paths are kept, and the least likely L paths are discarded (or pruned) . This path extension and pruning operations are performed during decoding every information bit, until all information bits are decoded. At last, the most likely path is selected as the decoding output.
- CA-SCL CRC-aided Successive Cancellation List
- PC-SCL Parity-check Successive Cancellation List
- LDPC Low Density Parity Check
- the LDPC code is encoded using a parity-check matrix.
- a widely-adopted LDPC code has a Quasi-Cyclic (QC) structure, and a shifting value of each block is designed to avoid a bad structure such as a short circle, and improve code distance.
- the main decoding algorithms for LDPC codes are Min-Sum (MS) and Belief Propagation (BP) .
- MS Min-Sum
- BP Belief Propagation
- the BP decoding algorithm is better, but it has a large amount of information storage and a complex computation overhead, which is not convenient to hardware implementation. Therefore, Offset-MS and Normalized-MS decoding algorithms are used in realistic communication systems.
- the LDPC codes implemented in practice extend the “1” in the basic graph (BG) by a square matrix, which is a cyclic shifted version of an identity matrix.
- Z c
- Z c
- Z
- 5G data channels support information block length ranging from 1 to 8448.
- the standard describes two parity-check matrices: BG1 and BG2.
- the same base graph, lifted by different lifting sizes, can adapt to a wide set of different code rates and lengths. To achieve this, one only needs to store the Lifting Size and Shifting Value lists in look-up tables, and perform rate matching and IR-HARQ based on the tables.
- a codeword before rate matching typically consists of three disjoint portions or parts, i.e., systematic bits, core parity check bits and extended parity check bits.
- RVs redundancy versions
- RV0, RV1, RV2 and RV3 redundancy versions
- RV0, RV1, RV2 and RV3 redundancy versions
- RV0, RV1, RV2 and RV3 redundancy versions
- RV0, RV1, RV2 and RV3 redundancy versions
- RV0 is normally selected in which most of the systematic bits are included in the set of coded bits.
- some of the core parity bits or all the core parity check bits and extended parity bits are included in RV0.
- RV0 has the highest self-decodable ability among all RVs (i.e., RV0 can be self-decodable at highest code rate) .
- the transmitter may select RV1, RV2 or RV3.
- RV3 is self-decodable, while RV1 and RV2 are not self-decodable at a high code rate.
- RV1 and RV2 may only include parity check bits, resulting in unsuccessful decoding at the receiver.
- Uplink Control Information (UCI)
- uplink control information in 5G New Radio (NR) incorporates a multifaceted approach.
- the Physical Uplink Control Channel utilizes format-specific rules for multiplexing and resource mapping, offering flexibility to cater to diverse UCI requirements. These rules govern aspects such as frequency division multiplexing schemes and cyclic prefix allocation techniques within each format.
- UCI transmitted on the Physical Uplink Shared Channel adheres to a more unified approach, aligning with data traffic for streamlined implementation.
- 5.5G a significant trend emerges in so-called “5.5G, ” which may represent an enhancement of the initial 5G standard release.
- Previously format-specific features such as multi-user multiplexing capability, are becoming increasingly prevalent across all PUCCH formats. This convergence signifies a move towards a more unified and versatile UCI transmission scheme, blurring the lines between formats. This trend suggests a potential future where a single, configurable PUCCH design might be sufficient.
- Embodiments described in the present disclosure may be used in conjunction with, or part of, an operating environment, which is now described.
- the communication system 100 comprises a radio access network 120.
- the radio access network 120 may be a future generation radio access network, or a legacy (e.g. 5G, 4G, 3G or 2G) radio access network.
- One or more communication electronic devices (ED) 110a, 110b, 110c, 110d, 110e, 110f, 110g, 110h, 110i, 110j (generically referred to as 110) may be interconnected to one another or connected to one or more network nodes (170a, 170b, generically referred to as 170) in the radio access network 120.
- a core network 130 may be a part of the communication system and may be dependent or independent of the radio access technology used in the communication system 100.
- the communication system 100 comprises a public switched telephone network (PSTN) 140, the Internet 150, and other networks 160.
- PSTN public switched telephone network
- FIG. 3 illustrates an example communication system 100.
- the communication system 100 enables multiple wireless or wired elements to communicate data and other content.
- the purpose of the communication system 100 may be to provide content, such as voice, data, video, and/or text, via broadcast, multicast, groupcast, unicast, etc.
- the communication system 100 may operate by sharing resources, such as carrier spectrum bandwidth, between its constituent elements.
- the communication system 100 may include a terrestrial communication system and/or a non-terrestrial communication system.
- the communication system 100 may provide a wide range of communication services and applications (such as earth monitoring, remote sensing, passive sensing and positioning, navigation and tracking, autonomous delivery and mobility, etc. ) .
- the communication system 100 may provide a high degree of availability and robustness through a joint operation of a terrestrial communication system and a non-terrestrial communication system.
- integrating a non-terrestrial communication system (or components thereof) into a terrestrial communication system can result in what may be considered a heterogeneous network comprising multiple layers.
- the heterogeneous network may achieve better overall performance through efficient multi-link joint operation, more flexible functionality sharing, and faster physical layer link switching between terrestrial networks and non-terrestrial networks.
- the communication system 100 includes electronic devices (ED) 110a, 110b, 110c, 110d (generically referred to as ED 110) , radio access networks (RANs) 120a, 120b, a non-terrestrial communication network 120c, a core network 130, a public switched telephone network (PSTN) 140, the Internet 150, and other networks 160.
- the RANs 120a, 120b include respective base stations (BSs) 170a, 170b, which may be generically referred to as terrestrial transmit and receive points (T-TRPs) 170a, 170b.
- the non-terrestrial communication network 120c includes an access node 172, which may be generically referred to as a non-terrestrial transmit and receive point (NT-TRP) 172.
- N-TRP non-terrestrial transmit and receive point
- Any ED 110 may be alternatively or additionally configured to interface, access, or communicate with any T-TRP 170a, 170b and NT-TRP 172, the Internet 150, the core network 130, the PSTN 140, the other networks 160, or any combination of the preceding.
- ED 110a may communicate an uplink and/or downlink transmission over a terrestrial air interface 190a with T-TRP 170a.
- the EDs 110a, 110b, 110c, and 110d may also communicate directly with one another via one or more sidelink air interfaces 190b.
- ED 110d may communicate an uplink and/or downlink transmission over a non-terrestrial air interface 190c with NT-TRP 172.
- the air interfaces 190a and 190b may use similar communication technology, such as any suitable radio access technology.
- the communication system 100 may implement one or more channel access methods, such as code division multiple access (CDMA) , space division multiple access (SDMA) , time division multiple access (TDMA) , frequency division multiple access (FDMA) , orthogonal FDMA (OFDMA) , or single-carrier FDMA (SC-FDMA, also known as discrete Fourier transform spread OFDMA, DFT-s-OFDMA) in the air interfaces 190a and 190b.
- CDMA code division multiple access
- SDMA space division multiple access
- TDMA time division multiple access
- FDMA frequency division multiple access
- OFDMA orthogonal FDMA
- SC-FDMA single-carrier FDMA
- the air interfaces 190a and 190b may utilize other higher dimension signal spaces, which may involve a combination of orthogonal and/or non-orthogonal dimensions.
- the non-terrestrial air interface 190c can enable communication between the ED 110d and one or multiple NT-TRPs 172 via a wireless link or simply a link.
- the link is a dedicated connection for unicast transmission, a connection for broadcast transmission, or a connection between a group of EDs 110 and one or multiple NT-TRPs 172 for multicast transmission.
- the RANs 120a and 120b are in communication with the core network 130 to provide the EDs 110a, 110b, and 110c with various services such as voice, data, and other services.
- the RANs 120a and 120b and/or the core network 130 may be in direct or indirect communication with one or more other RANs (not shown) , which may or may not be directly served by core network 130, and may or may not employ the same radio access technology as RAN 120a, RAN 120b or both.
- the core network 130 may also serve as a gateway access between (i) the RANs 120a and 120b or EDs 110a, 110b, and 110c or both, and (ii) other networks (such as the PSTN 140, the Internet 150, and the other networks 160) .
- the EDs 110a, 110b, and 110c may include functionality for communicating with different wireless networks over different wireless links using different wireless technologies and/or protocols. Instead of wireless communication (or in addition thereto) , the EDs 110a, 110b, and 110c may communicate via wired communication channels to a service provider or switch (not shown) , and to the Internet 150.
- PSTN 140 may include circuit switched telephone networks for providing plain old telephone service (POTS) .
- Internet 150 may include a network of computers and subnets (intranets) or both, and incorporate protocols, such as Internet Protocol (IP) , Transmission Control Protocol (TCP) , User Datagram Protocol (UDP) .
- IP Internet Protocol
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- EDs 110a, 110b, and 110c may be multimode devices capable of operation according to multiple radio access technologies, and incorporate multiple transceivers necessary to support such.
- FIG. 4 illustrates another example of an ED 110 and a base station 170a, 170b and/or 170c.
- the ED 110 is used to connect persons, objects, machines, etc.
- the ED 110 may be widely used in various scenarios including, for example, cellular communications, device-to-device (D2D) , vehicle to everything (V2X) , peer-to-peer (P2P) , machine-to-machine (M2M) , machine-type communications (MTC) , internet of things (IoT) , virtual reality (VR) , augmented reality (AR) , mixed reality (MR) , metaverse, digital twin, industrial control, self-driving, remote medical, smart grid, smart furniture, smart office, smart wearable, smart transportation, smart city, drones, robots, remote sensing, passive sensing, positioning, navigation and tracking, autonomous delivery and mobility, etc.
- D2D device-to-device
- V2X vehicle to everything
- P2P peer-to-
- Each ED 110 represents any suitable end user device for wireless operation and may include such devices (or may be referred to) as a user equipment/device (UE) , a wireless transmit/receive unit (WTRU) , a mobile station, a fixed or mobile subscriber unit, a cellular telephone, a station (STA) , a machine type communication (MTC) device, a personal digital assistant (PDA) , a smartphone, a laptop, a computer, a tablet, a wireless sensor, a consumer electronics device, a smart book, a vehicle, a car, a truck, a bus, a train, or an IoT device, wearable devices (such as a watch, a pair of glasses, head mounted equipment, etc.
- UE user equipment/device
- WTRU wireless transmit/receive unit
- MTC machine type communication
- PDA personal digital assistant
- the base station 170a and 170b is a T-TRP and will hereafter be referred to as T-TRP 170. Also shown in FIG. 4, a NT-TRP will hereafter be referred to as NT-TRP 172.
- Each ED 110 connected to T-TRP 170 and/or NT-TRP 172 can be dynamically or semi-statically turned-on (i.e., established, activated, or enabled) , turned-off (i.e., released, deactivated, or disabled) and/or configured in response to one of more of: connection availability and connection necessity.
- the ED 110 includes a transmitter 201 and a receiver 203 coupled to one or more antennas 204. Only one antenna 204 is illustrated to avoid congestion in the drawing. One, some, or all of the antennas 204 may alternatively be panels.
- the transmitter 201 and the receiver 203 may be integrated, e.g. as a transceiver.
- the transceiver is configured to modulate data or other content for transmission by at least one antenna 204 or network interface controller (NIC) .
- NIC network interface controller
- the transceiver is also configured to demodulate data or other content received by the at least one antenna 204.
- Each transceiver includes any suitable structure for generating signals for wireless or wired transmission and/or processing signals received wirelessly or by wire.
- Each antenna 204 includes any suitable structure for transmitting and/or receiving wireless or wired signals.
- the ED 110 includes at least one memory 208.
- the memory 208 stores instructions and data used, generated, or collected by the ED 110.
- the memory 208 could store software instructions or modules configured to implement some or all of the functionality and/or embodiments described herein and that are executed by one or more processing unit (s) (e.g., a processor 210) .
- Each memory 208 includes any suitable volatile and/or non-volatile storage and retrieval device (s) . Any suitable type of memory may be used, such as random access memory (RAM) , read only memory (ROM) , hard disk, optical disc, subscriber identity module (SIM) card, memory stick, secure digital (SD) memory card, on-processor cache, and the like.
- RAM random access memory
- ROM read only memory
- SIM subscriber identity module
- SD secure digital
- the ED 110 may further include one or more input/output devices (not shown) or interfaces (such as a wired interface to the Internet 150 in FIG. 2) .
- the input/output devices or interfaces permit interaction with a user or other devices in the network.
- Each input/output device or interface includes any suitable structure for providing information to or receiving information from a user, and/or for network interface communications. Suitable structures include, for example, a speaker, microphone, keypad, keyboard, display, touch screen, etc.
- the ED 110 includes the processor 210 for performing operations including those operations related to preparing a transmission for uplink transmission to the NT-TRP 172 and/or the T-TRP 170; those operations related to processing downlink transmissions received from the NT-TRP 172 and/or the T-TRP 170; and those operations related to processing sidelink transmission to and from another ED 110.
- Processing operations related to preparing a transmission for uplink transmission may include operations such as encoding, modulating, transmit beamforming, and generating symbols for transmission.
- Processing operations related to processing downlink transmissions may include operations such as receive beamforming, demodulating and decoding received symbols.
- a downlink transmission may be received by the receiver 203, possibly using receive beamforming, and the processor 210 may extract signaling from the downlink transmission (e.g. by detecting and/or decoding the signaling) .
- An example of signaling may be a reference signal transmitted by the NT-TRP 172 and/or by the T-TRP 170.
- the processor 210 implements the transmit beamforming and/or the receive beamforming based on the indication of beam direction, e.g. beam angle information (BAI) , received from the T-TRP 170.
- the processor 210 may perform operations relating to network access (e.g.
- the processor 210 may perform channel estimation, e.g. using a reference signal received from the NT-TRP 172 and/or from the T-TRP 170.
- the processor 210 may form part of the transmitter 201 and/or part of the receiver 203.
- the memory 208 may form part of the processor 210.
- the processor 210, the processing components of the transmitter 201, and the processing components of the receiver 203 may each be implemented by the same or different one or more processors that are configured to execute instructions stored in a memory (e.g. in the memory 208) .
- some or all of the processor 210, the processing components of the transmitter 201, and the processing components of the receiver 203 may each be implemented using dedicated circuitry, such as a programmed field-programmable gate array (FPGA) , an application-specific integrated circuit (ASIC) , or a hardware accelerator such as a graphics processing unit (GPU) or an artificial intelligence (AI) accelerator.
- FPGA programmed field-programmable gate array
- ASIC application-specific integrated circuit
- AI artificial intelligence
- the T-TRP 170 may be known by other names in some implementations, such as a base station, a base transceiver station (BTS) , a radio base station, a network node, a network device, a device on the network side, a transmit/receive node, a Node B, an evolved NodeB (eNodeB or eNB) , a Home eNodeB, a next Generation NodeB (gNB) , a transmission point (TP) , a site controller, an access point (AP) , a wireless router, a relay station, a terrestrial node, a terrestrial network device, a terrestrial base station, a base band unit (BBU) , a remote radio unit (RRU) , an active antenna unit (AAU) , a remote radio head (RRH) , a central unit (CU) , a distributed unit (DU) , a positioning node, among other possibilities.
- BBU base band unit
- RRU remote radio unit
- the T-TRP 170 may be a macro BS, a pico BS, a relay node, a donor node, or the like, or combinations thereof.
- the T-TRP 170 may refer to the forgoing devices or refer to apparatus (e.g. a communication module, a modem, or a chip) in the forgoing devices.
- the parts of the T-TRP 170 may be distributed.
- some of the modules of the T-TRP 170 may be located remote from the equipment that houses the antennas 256 for the T-TRP 170, and may be coupled to the equipment that houses the antennas 256 over a communication link (not shown) sometimes known as front haul, such as common public radio interface (CPRI) .
- the term T-TRP 170 may also refer to modules on the network side that perform processing operations, such as determining the location of the ED 110, resource allocation (scheduling) , message generation, and encoding/decoding, and that are not necessarily part of the equipment that houses the antennas 256 of the T-TRP 170.
- the modules may also be coupled to other T-TRPs.
- the T-TRP 170 may actually be a plurality of T-TRPs that are operating together to serve the ED 110, e.g. through the use of coordinated multipoint transmissions.
- the T-TRP 170 includes at least one transmitter 252 and at least one receiver 254 coupled to one or more antennas 256. Only one antenna 256 is illustrated to avoid congestion in the drawing. One, some, or all of the antennas 256 may alternatively be panels.
- the transmitter 252 and the receiver 254 may be integrated as a transceiver.
- the T-TRP 170 further includes a processor 260 for performing operations including those related to: preparing a transmission for downlink transmission to the ED 110, processing an uplink transmission received from the ED 110, preparing a transmission for backhaul transmission to the NT-TRP 172, and processing a transmission received over backhaul from the NT-TRP 172.
- Processing operations related to preparing a transmission for downlink or backhaul transmission may include operations such as encoding, modulating, precoding (e.g. multiple input multiple output (MIMO) precoding) , transmit beamforming, and generating symbols for transmission.
- Processing operations related to processing received transmissions in the uplink or over backhaul may include operations such as receive beamforming, demodulating received symbols, and decoding received symbols.
- the processor 260 may also perform operations relating to network access (e.g. initial access) and/or downlink synchronization, such as generating the content of synchronization signal blocks (SSBs) , generating the system information, etc.
- the processor 260 also generates an indication of beam direction, e.g.
- the processor 260 performs other network-side processing operations described herein, such as determining the location of the ED 110, determining where to deploy the NT-TRP 172, etc.
- the processor 260 may generate signaling, e.g. to configure one or more parameters of the ED 110 and/or one or more parameters of the NT-TRP 172. Any signaling generated by the processor 260 is sent by the transmitter 252.
- signaling may be transmitted in a physical layer control channel, e.g. a physical downlink control channel (PDCCH) , in which case the signaling may be known as dynamic signaling.
- PDCCH physical downlink control channel
- Signaling transmitted in a downlink physical layer control channel may be known as Downlink Control Information (DCI) .
- DCI Downlink Control Information
- UCI Uplink Control Information
- SCI Sidelink Control Information
- Signaling may be included in a higher-layer (e.g., higher than physical layer) packet transmitted in a physical layer data channel, e.g. in a physical downlink shared channel (PDSCH) , in which case the signaling may be known as higher-layer signaling, static signaling, or semi-static signaling.
- Higher-layer signaling may also refer to Radio Resource Control (RRC) protocol signaling or Media Access Control -Control Element (MAC-CE) signaling.
- RRC Radio Resource Control
- MAC-CE Media Access Control -Control Element
- the scheduler 253 may be coupled to the processor 260.
- the scheduler 253 may be included within or operated separately from the T-TRP 170.
- the scheduler 253 may schedule uplink, downlink, sidelink, and/or backhaul transmissions, including issuing scheduling grants and/or configuring scheduling-free (e.g., “configured grant” ) resources.
- the T-TRP 170 further includes a memory 258 for storing information and data.
- the memory 258 stores instructions and data used, generated, or collected by the T-TRP 170.
- the memory 258 could store software instructions or modules configured to implement some or all of the functionality and/or embodiments described herein and that are executed by the processor 260.
- the processor 260 may form part of the transmitter 252 and/or part of the receiver 254. Also, although not illustrated, the processor 260 may implement the scheduler 253. Although not illustrated, the memory 258 may form part of the processor 260.
- the processor 260, the scheduler 253, the processing components of the transmitter 252, and the processing components of the receiver 254 may each be implemented by the same or different one or more processors that are configured to execute instructions stored in a memory, e.g. in the memory 258.
- some or all of the processor 260, the scheduler 253, the processing components of the transmitter 252, and the processing components of the receiver 254 may be implemented using dedicated circuitry, such as a programmed FPGA, a hardware accelerator (e.g., a GPU or AI accelerator) , or an ASIC.
- the NT-TRP 172 is illustrated as a drone only as an example, the NT-TRP 172 may be implemented in any suitable non-terrestrial form, such as satellites and high altitude platforms, including international mobile telecommunication base stations and unmanned aerial vehicles, for example. Also, the NT-TRP 172 may be known by other names in some implementations, such as a non-terrestrial node, a non-terrestrial network device, or a non-terrestrial base station.
- the NT-TRP 172 includes a transmitter 272 and a receiver 274 coupled to one or more antennas 280. Only one antenna 280 is illustrated to avoid congestion in the drawing. One, some, or all of the antennas may alternatively be panels.
- the transmitter 272 and the receiver 274 may be integrated as a transceiver.
- the NT-TRP 172 further includes a processor 276 for performing operations including those related to: preparing a transmission for downlink transmission to the ED 110, processing an uplink transmission received from the ED 110, preparing a transmission for backhaul transmission to T-TRP 170, and processing a transmission received over backhaul from the T-TRP 170.
- Processing operations related to preparing a transmission for downlink or backhaul transmission may include operations such as encoding, modulating, precoding (e.g. MIMO precoding) , transmit beamforming, and generating symbols for transmission.
- precoding e.g. MIMO precoding
- Processing operations related to processing received transmissions in the uplink or over backhaul may include operations such as receive beamforming, demodulating received symbols, and decoding received symbols.
- the processor 276 implements the transmit beamforming and/or receive beamforming based on beam direction information (e.g. BAI) received from the T-TRP 170.
- the processor 276 may generate signaling, e.g. to configure one or more parameters of the ED 110.
- the NT-TRP 172 implements physical layer processing, but does not implement higher layer functions such as functions at the medium access control (MAC) or radio link control (RLC) layer. As this is only an example, more generally, the NT-TRP 172 may implement higher layer functions in addition to physical layer processing.
- MAC medium access control
- RLC radio link control
- the NT-TRP 172 further includes a memory 278 for storing information and data.
- the processor 276 may form part of the transmitter 272 and/or part of the receiver 274.
- the memory 278 may form part of the processor 276.
- the processor 276, the processing components of the transmitter 272, and the processing components of the receiver 274 may each be implemented by the same or different one or more processors that are configured to execute instructions stored in a memory, e.g. in the memory 278.
- some or all of the processor 276, the processing components of the transmitter 272, and the processing components of the receiver 274 may be implemented using dedicated circuitry, such as a programmed FPGA, a hardware accelerator (e.g., a GPU or AI accelerator) , or an ASIC.
- the NT-TRP 172 may actually be a plurality of NT-TRPs that are operating together to serve the ED 110, e.g. through coordinated multipoint transmissions.
- the T-TRP 170, the NT-TRP 172, and/or the ED 110 may include other components, but these have been omitted for the sake of clarity.
- FIG. 5 illustrates units or modules in a device 500, such as in the ED 110, in the T-TRP 170, or in the NT-TRP 172.
- a signal may be transmitted or output by a transmitting unit or by a transmitting module 520.
- a signal may be received or input by a receiving unit or by a receiving module 530.
- a signal may be processed by a processing unit or a processing module 540.
- Other steps may be performed by an artificial intelligence (AI) or machine learning (ML) module 550.
- the respective units or modules may be implemented using hardware, one or more components or devices that execute software, or a combination thereof.
- one or more of the units or modules may be a circuit such as an integrated circuit. Examples of an integrated circuit includes a programmed FPGA, a GPU, or an ASIC.
- one or more of the units or modules may be logical such as a logical function performed by a circuit, by a portion of an integrated circuit, or by software instructions executed by a processor. It will be appreciated that where the modules are implemented using software for execution by a processor for example, the modules may be retrieved by a processor, in whole or part as needed, individually or together for processing, in single or multiple instances, and that the modules themselves may include instructions for further deployment and instantiation.
- transceiver module may also be known as an interface module, or simply an interface, for inputting and outputting operations.
- Device 500 may further comprise operating system module 510.
- UCI uplink control information
- HARQ Hybrid Automatic Repeat Request
- SR Scheduling Request
- CSI Channel State Information
- DCI Downlink Control Information
- 5G NR Physical Uplink Control Channel utilizes five distinct UCI formats. This section analyzes the potential for simplification in future wireless communication networks to achieve a more efficient and adaptable design.
- Payload Size The current approach dedicates formats (0 and 1) for payloads less than or equal to 2 bits (typically ACK/NACK and Scheduling Request) .
- Symbol Duration The existing design employs formats with varying symbol durations (1 or 2 symbols for formats 0 and 2, and 4 to 14 symbols for formats 1, 3, and 4) .
- DCI Downlink Control Information
- Resource Block Allocation Similar to symbol duration, the current scheme assigns specific numbers of Resource Blocks (PRBs) to each format. This can be simplified in future wireless communication networks. DCI-based configuration can dynamically allocate PRBs based on payload size and channel characteristics, rendering multiple pre-defined options unnecessary.
- PRBs Resource Blocks
- DCI Downlink Control Information
- PAPR peak-to-average power ratio
- the current format-specific hopping patterns can be replaced with a DCI-based configuration. This allows the system to dynamically select the appropriate hopping behavior based on channel characteristics and interference scenarios. For example, sequence hopping might be suitable for low-mobility scenarios, while frequency hopping could be beneficial in high-mobility environments.
- DFT-precoding The current support for Discrete Fourier Transform (DFT) -precoding in specific formats (3 and 4) can be extended to a fully configurable approach in future wireless communication networks.
- DCI can be used to explicitly signal the desired precoding configuration based on the specific transmission requirements.
- precoding can be implicitly determined based on the allocated symbol duration, with longer symbols potentially benefiting from precoding for improved channel performance.
- the system can achieve significant efficiency gains. Dynamic allocation of resources based on real-time requirements can optimize spectrum utilization and cater to diverse UCI demands.
- the resource allocation scheme for uplink control information (UCI) in future wireless communication networks is expected to retain a similar structure as in 5G NR.
- This approach leverages a combination of semi-static configuration through Radio Resource Control (RRC) signaling and dynamic allocation via Downlink Control Information (DCI) and may include the following features.
- RRC Radio Resource Control
- DCI Downlink Control Information
- Dynamic Allocation for HARQ-ACK Dynamic allocation using DCI remains crucial for Hybrid Automatic Repeat Request (HARQ) ACK/NACK signals. This ensures timely and accurate feedback on the success or failure of downlink data transmissions. This may comprise the following.
- Common PUCCH Resource Allocation In scenarios where an RRC connection is not yet established, a common PUCCH resource allocation for HARQ-ACKs might be pre-configured and signaled through System Information Block 1 (SIB1) .
- SIB1 System Information Block 1
- Dedicated PUCCH Resource Allocation Once an RRC connection is established, dedicated PUCCH resources can be dynamically signaled by DCI. These resources are selected from a pool of pre-configured PUCCH resource sets defined by RRC. Each resource set may contain multiple (typically 8 or more) individual resource configurations. Finally, the specific UCI payload itself can further influence the selection of the appropriate PUCCH resource within the chosen set through DCI.
- future wireless communication networks can achieve efficient utilization of uplink control channels while ensuring timely transmission of critical control information like HARQ feedback and periodic reports.
- PUCCH Physical Uplink Control Channel
- Format 1 dictates that UCI symbols occupy odd-numbered symbols within the PUCCH allocation.
- Formats 3 and 4 define the number of Demodulation Reference Signals (DMRS) based on PUCCH length and hopping behavior. While this approach offers a degree of simplicity, it lacks flexibility in adapting to diverse channel conditions.
- DMRS Demodulation Reference Signals
- RRC Radio Resource Control
- the pattern can specify the number of DMRS symbols for different PUCCH lengths. This aligns with the current behavior of formats 3 and 4 for lengths 10 to 14, allowing for adaptation based on channel estimation requirements.
- the pattern can define the specific locations of DMRS symbols within the PUCCH allocation. This could include options for placing them in specific slots or subcarriers, offering flexibility beyond the current format-specific rules in formats 1, 3, and 4.
- the number of UCI payload bits 601 and a resource indicator 602 are used to select a PUCCH resource at block 603.
- a format 604 may then be selected from among formats 0, 1, 2, 3, or 4. Further processing may then occur based on the selected format at block 605.
- 5G NR Physical Uplink Control Channel utilizes five distinct UCI formats for transmitting various control information elements. While this approach offers some level of functionality, it suffers from limitations that could hinder future flexibility and efficiency, discussed below.
- the current design relies on a predefined set of nine combinations of UCI content. This approach becomes increasingly complex as new control information types emerge (e.g., sensing reports, AI-driven control signals, enhanced CSI) . With the addition of just a few new content types, the number of combinations could potentially explode to around 40, significantly increasing the complexity of format selection and resource allocation.
- new control information types e.g., sensing reports, AI-driven control signals, enhanced CSI
- Format 4 was initially distinguished from formats 2 and 3 by its specific multi-user multiplexing capability with a length-2, 4 spreading factor.
- formats 2 and 3 now offer similar capabilities. This convergence suggests the potential for a more unified approach to format design.
- the current approach utilizes distinct methods for code bit generation, signal formation, and resource mapping for PUCCH and PUSCH. This can be further simplified by exploring a unified design with flexible configuration capabilities for both channels.
- Extended Polar Codes Utilizing longer polar code constructions could be an option for moderately larger payloads.
- Code Block Segmentation For very large payloads, segmenting the data into smaller code blocks before applying polar coding could be beneficial. This allows for efficient use of channel coding resources and potentially enables parallel decoding for faster processing.
- Joint UCI Code Selection and Code Block Segmentation A more advanced approach could involve jointly considering code selection and code block segmentation. New coding schemes such as LDPC codes and Woven codes may be adopted. This would involve dynamically selecting the most suitable coding schemes based on factors like payload size, channel quality, and desired decoding latency.
- Intra-RAN data involves larger payloads than legacy UCI data, and usually does not require the same high reliability.
- extended UCI or “E-UCI” may in some cases be used to refer to Intra-RAN data.
- Intra-RAN data may be lossless or lossy.
- traffic types such as scheduling request, HARQ/ACK, DCI indicators or some CSI
- CRC bits may be attached to the payload to detect any error. In the case of a detected error, the data cannot be used.
- Other traffic types such as extended CSI, and AI or sensing data, are error-tolerant, and thus need not to be lossless. For these data, fewer CRC bits or no CRC bits are attached to the data.
- Intra-RAN data may include, without limitation, Artificial Intelligence (AI) related data, and sensing data.
- AI Artificial Intelligence
- AI related data may include, without limitation, datasets and related information, which may include indexes, identifiers, group indexes, group identifiers, and type indexes, amongst others.
- AI related data may further include, without limitation, models, weights, and gradients, and their related information which may also include indexes, identifiers, group indexes, group identifiers, and type indexes, amongst others.
- AI related data may further include, without limitation, mapping relationships between dataset information, model and weights information, and gradients information. Mapping relationships may be represented as tables or pairs of identifiers, in at least some embodiments.
- AI related data may further include, without limitation, convergence status, and maximum time allowed for training and inference.
- AI related data may further include, without limitation, beam management information, enhanced positioning information, CSI prediction information, CSI compression information, and life cycle management information for AI-related procedures.
- Sensing data may include, without limitation, multipath indications such as, a number of paths, a path index, a path direction, a power value of each path, and a time delay of each path. Multipath indications may be relative to a reference value, or absolute values. Sensing data may further include, without limitation, angle indications, phase indications (per path, and per path group) , doppler indications, position indications, range indications, and trajectory indications. Sensing data may further include, without limitation, environmental data, such as ground truth data, anchor point data, point cloud data, clutter data, norm direction, reflection direction, and location, shape, and size of objects.
- Intra-RAN data for sensing and AI applications
- other applications may use Intra-RAN data formats described herein and the present disclosure is not limited in this respect.
- MCS modulation and coding scheme
- the UCI transmitted on PUCCH employs a fixed QPSK modulation, while the UCI transmitted on PUSCH uses the same MCS index as the data traffic.
- this approach has limitations when considering the diverse requirements of Intra-RAN data in future wireless communication networks.
- some examples of the present disclosure involve defining a separate MCS index field for Intra-RAN traffic or reusing the MCS index field of the data traffic but adding an additional flag to distinguish between Intra-RAN and data channels. This new method enables explicit specification of modulation order and coding rate for Intra-RAN transmissions.
- Intra-RAN traffic requires higher reliability compared to data traffic, it is prudent to ensure a more conservative MCS selection in these cases.
- One approach could involve creating a new MCS table with carefully chosen modulation orders and code rates, which are generally lower than those in the standard MCS table. This tailored MCS table would prioritize reliable Intra-RAN transmission over data throughput.
- the URLLC MCS table typically offers more conservative modulation orders and code rates, making it a suitable candidate for ensuring high-reliability Intra-RAN transmissions in future wireless communication networks.
- some example solutions include a dedicated MCS field in the downlink control information (DCI) payload specifically designed for Intra-RAN transmission. This field would signal the appropriate MCS index to be used by the user equipment (UE) , ensuring that both the UE and the base station use consistent parameters during Intra-RAN communications.
- DCI downlink control information
- PUCCH Physical Uplink Control Channel
- MCS Modulation and Coding Scheme
- Intra-RAN Content on PUSCH For new, Intra-RAN content types with potentially larger payloads or more complex requirements, future wireless communication networks might introduce an explicit MCS selection method based on an MCS index transmitted within the control signaling (e.g., DCI) . This approach offers greater flexibility and control over the air interface for these new content types.
- MCS index transmitted within the control signaling (e.g., DCI)
- DCI Field for MCS Selection Flag Alternatively, a new Downlink Control Information (DCI) field, such as "UCI_MCS_flag, " could be introduced. This flag would signal to the UE whether to use the explicit MCS selection method based on the MCS index or rely on the legacy UCI modulation and rate matching schemes from 5G NR. This approach provides flexibility for the network to determine the most appropriate MCS selection method on a per-transmission basis, considering factors like payload size, content type, and channel conditions.
- DCI Downlink Control Information
- a more flexible and adaptive MCS selection strategy may be tailored explicitly for Intra-RAN data in future wireless communication networks.
- example solutions can enable explicit modulation order and code rate specification for Intra-RAN transmissions.
- example solutions may ensure that Intra-RAN data benefits from higher reliability in future wireless communication networks.
- a UCI payload refers to both legacy UCI data types found in 5G and to Intra-RAN payloads.
- FIG. 7 a call flow diagram between a User Equipment (UE) and a Base Station (BS) implementing one embodiment of the present disclosure is shown.
- UE User Equipment
- BS Base Station
- a UE 701 may receive a Downlink Control Information (DCI) message as message 710 from base station 702. UE 701 may decode the DCI and obtain information from the DCI about what MCS to use for sending an Uplink Control Information (UCI) message 720 back to the base station 702.
- DCI Downlink Control Information
- UCI message 720 may comprise legacy UCI data or Intra-RAN data.
- FIG. 8 illustrates a method at a UE according to at least one embodiment of the present disclosure.
- the method starts at block 800 and proceeds to block 810 in which the UE receives a DCI message.
- the method then proceeds to block 820 in which a resource is determined from the DCI message to transmit a UCI message.
- the UCI message may comprise legacy UCI data or Intra-RAN data.
- the method then proceeds to block 830 in which it is determined whether the DCI message includes a flag set indicating to use an indexed MCS.
- the method proceeds to block 840 in which an index is retrieved from the DCI message.
- the index is used to retrieve an MCS from a table.
- the MCS table may be a separate dedicated table indexing different MCS for use in UCI messages.
- the MCS table may be the same table used to index MCS for data messages.
- the table may be the URLLC MCS table.
- the UCI message is encoded with the indexed MCS.
- the method proceeds to block 860, in which the UCI message is encoded using a legacy MCS.
- the UCI message could be encoded according to the 5G standard.
- the method then proceeds to block 870 in which the encoded UCI message is transmitted on the resource, and the method ends at block 880.
- FIG. 9 illustrates a method at a UE according to at least one other embodiment of the present disclosure.
- the method starts at block 900 and proceeds to block 910 in which the UE receives a DCI message.
- the method then proceeds to block 920 in which a resource is determined from the DCI message to transmit a UCI message.
- the UCI message may comprise legacy UCI data or Intra-RAN data.
- the method then proceeds to block 930 in which an MCS index is retrieved from the DCI message.
- the method then proceeds to block 940 in which it is determined whether the DCI message includes a flag set indicating to use an indexed MCS for the UCI.
- the method proceeds to block 950 in which the UCI MCS table is selected.
- the UCI MCS table may be a separate dedicated table indexing different MCS for use in UCI messages or the URLCC MCS table.
- the method proceeds to block 960, in which the data MCS table is selected.
- the method then proceeds to block 970 in which an MCS is retrieved from the selected table based on the index from the DCI.
- the method then proceeds to block 980 in which the UCI message is encoded with the retrieved MCS, and then to block 990 in which the encoded UCI message is transmitted on the resource.
- the method then ends at block 995.
- the DCI contains two indices, one index for UCI, and one index for data.
- the method starts at block 1000 and proceeds to block 1010 in which the UE receives a DCI message.
- the method then proceeds to block 1020 in which a resource is determined from the DCI message to transmit a UCI message.
- the UCI message may comprise legacy UCI data or Intra-RAN data.
- the method then proceeds to block 1030 in which a UCI MCS index is retrieved from the DCI message.
- the method then proceeds to block 1040 in which a data MCS index is retrieved from the DCI message.
- the UE may discard the data MCS index unless the UE has data scheduled for upload.
- the method then proceeds to block 1050 in which the UCI MCS index is used to retrieve a UCI MCS from a table.
- the MCS table may be a separate dedicated table indexing different MCS for use in UCI messages.
- the MCS table may be the same table used to index MCS for data messages.
- the table may be the URLLC MCS table.
- the method then proceeds to block 1060 in which the UCI message is encoded with the retrieved MCS.
- the method then proceeds to block 1070 in which the encoded UCI message is transmitted on the resource.
- the method then ends at block 1080.
- Intra-RAN transmission in future wireless communication networks relates to enhancement of polar codes and code block segmentation. These improvements aim to accommodate long payload bit sequences while maintaining reliable communication.
- Maximum mother code length increase To accommodate longer payloads in future wireless communication networks for Intra-RAN data, example solutions involve increasing the maximum mother code length from 1024 to higher values such as 2048, 4096, 8192, or 16384. Specifically, 2048 and 4096 are particularly suitable choices since polar codes perform better than LDPC codes below these lengths.
- New polar reliability sequence With an increased mother code length, a polar reliability sequence of corresponding length must be defined. This new sequence may be extended from the current length-1024 polar reliability sequence used in 5G NR, ensuring backward compatibility by nesting the 5G sequence within the new polar sequence.
- New polar code block segmentation Given the possibility of extremely long payload sequences, example solutions redefine the polar code block segmentation method.
- the information block length threshold for segmenting a payload bit sequence into multiple blocks is 1013. With a maximum mother code length of up to 4096, this threshold may be increased proportionally-for example, to 4052 (i.e., 1013 ⁇ 4) -to ensure efficient segmentation and decoding for long payloads.
- This code block segmentation method takes into account the priority levels of the payload bits. By considering the priority of the information, the payload bits with similar importance can be encoded in the same code block. In this way, high-priority data is more likely to be accurately decoded even under challenging channel conditions, ensuring reliable communication for critical control information in future wireless communication networks.
- these methods enhance polar codes and include code block segmentation for uplink control information in future wireless communication networks.
- increasing the maximum mother code length defining a new polar reliability sequence, redefining the code block segmentation method, and introducing priority-based payload bit segmentation, example solutions can effectively handle longer payloads while maintaining reliable communication in future wireless communication networks.
- the UE has a payload of UCI to be transmitted to a base station.
- the UCI payload may be an Intra-RAN payload, or a legacy 5G UCI payload.
- the method starts at block 1100 and proceeds to block 1110 in which the UE determines the size of the payload to be transmitted.
- the method then proceeds to block 1120 where the size of the payload is compared to a threshold.
- the threshold may be a maximum block length. As discussed above, in 5G NR, the threshold is 1013 bits. When using a mother code length for polar codes of 4096, the threshold may be set at 4052. As seen in Table 1, below, other options are possible, based on the mother code length used.
- Table 1 Relationship between Mother Code Length and Information Block Length Threshold
- the method proceeds to block 1130, where a block of the threshold size is created by selecting a threshold number of bits from the payload.
- the method then proceeds to block 1140 where the payload size (for comparison purposes) is reduced by the threshold to reflect the creation of the information block at block 1130.
- the method then returns to block 1120 where the new payload size is again compared to the threshold. These steps may be repeated until the payload size is less than the threshold, and the method proceeds to block 1150.
- the remaining bits of the payload are used to create another information block. As this number is less than the threshold, all remaining bits of the payload can be included in one block.
- the method then proceeds to block 1160 where all blocks are encoded, and then to block 1170 where all blocks are transmitted. The method then ends at block 1180.
- FIG. 12 illustrates a method at a UE according to at least one other embodiment of the present disclosure.
- the UE has an Intra-RAN payload to be transmitted to a base station, where some bits of the payload are high-priority bits, and some bits of the payload are low-priority bits.
- high-priority bits are bits relating to information which is critical to the proper functioning of the network, whereas low-priority bits relate to information which is not critical.
- the present disclosure is not limited in this regard.
- the method starts at block 1200 and proceeds to block 1210 where the payload is divided into high-priority bits and low-priority bits. As discussed above, this division may be performed using any relevant method as would be appreciated by those skilled in the art.
- the method then proceeds to block 1220 where high-priority bits are segmented into information blocks, based on a threshold size for information blocks.
- the segmentation may be performed according to the method illustrated in FIG. 11 discussed above.
- the method then proceeds to block 1230 where low-priority bits are segmented into information blocks, based on a threshold size for information blocks. Again, the segmentation may be performed according to the method illustrated in FIG. 11 discussed above.
- the method then proceeds to block 1240 where an MCS is selected for the high-priority blocks created at block 1220.
- the MCS selected for high-priority blocks is a more conservative MCS, providing a very low error rate.
- the method then proceeds to block 1250 where an MCS is selected for the low-priority blocks created at block 1230.
- the MCS selected for low-priority blocks is a higher order MCS, as the transmission of low-priority bits can tolerate a greater error rate than the transmission of high-priority bits.
- the method then proceeds to block 1260 where all blocks are encoded according to their selected MCS.
- high-priority blocks are encoded with a conservative MCS, whereas low-priority blocks may be encoded with a higher order MCS.
- the method then proceeds to block 1270 where all encoded blocks are transmitted, and the method ends at block 1280.
- Intra-RAN transmission in future wireless communication networks relates to joint UCI code selection and code block segmentation. These techniques optimize encoding based on payload size, content, and code type to enhance performance and ensure reliable communication.
- Intra-RAN code selection based on payload size For payloads with length A larger than a certain threshold or code rate R higher than a predefined value, LDPC codes are chosen for encoding. Otherwise, Reed-Muller (RM) and/or polar codes are selected as the encoding method. This approach ensures that the optimal code type is used depending on the payload size and code rate requirements.
- LDPC codes For payloads with length A larger than a certain threshold or code rate R higher than a predefined value, LDPC codes are chosen for encoding. Otherwise, Reed-Muller (RM) and/or polar codes are selected as the encoding method. This approach ensures that the optimal code type is used depending on the payload size and code rate requirements.
- RM Reed-Muller
- the above code selection may apply only to Intra-RAN content, and does not apply to legacy 5G UCI types and content. For example, only polar codes are selected for UCI types: ACK/NACK, SR, CSI part 1, CSI part 2.
- Intra-RAN code selection based on payload content influences the choice of code for encoding.
- AI-related information e.g., model weights or data sets
- ISAC/sensing-related information e.g., radio frequency maps or location details
- LDPC codes are selected due to their better performance in these scenarios.
- ACK/NACK, SR, and CSI ACK/NACK, SR, and CSI
- RM and polar codes can be chosen.
- certain enhanced CSI components like CSI part 2 or specific CSI elements with longer lengths (e.g., enhanced PMI) , may also benefit from LDPC encoding instead of polar codes for improved performance.
- Code block segmentation based on code type With both polar codes and LDPC codes suitable for long sequences, code block segmentation now depends on the chosen code type. This tailored approach ensures efficient decoding and improves overall system performance.
- Adjusting the maximum payload length of polar codes By offloading larger payloads to LDPC codes, example solutions can limit the maximum payload length for polar codes to maintain an optimal balance between encoding efficiency and decoding complexity. In future wireless communication networks, this maximum number may increase to 4, 6, or 8 code blocks, compared to 2 code blocks in 5G. In contrast, there is no upper limit on the maximum number of LDPC code blocks: Although LDPC codes can be used for encoding UCI bits in future wireless communication networks, there is no fixed upper limit on the maximum number of code blocks to provide greater flexibility and accommodate various payload sizes and requirements.
- LDPC base graph (BG) selection If LDPC is selected for encoding Intra-RAN payload bits, only the base graph (BG2) of 5G LDPC code will be used because it has better performance at lower code rate. Alternatively, considering that large payloads are assigned to LDPC codes, a new LDPC base graph (BG) may be developed to optimize encoding performance for these scenarios. This new LDPC BG may enhance the overall efficiency of Intra-RAN data transmission in future wireless communication networks.
- methods for joint code selection and code block segmentation may be used in Intra-RAN transmissions in future wireless communication networks.
- example solutions may ensure or facilitate optimal encoding performance while maintaining a balance between decoding complexity and reliability, further enhancing the capabilities of future wireless communication networks.
- FIG. 13 illustrates a method at a UE for code selection according to at least one embodiment of the present disclosure.
- the payload type may be an Intra-RAN payload type or a 5G payload type, however the present disclosure is not limited in this respect.
- an Intra-RAN payload type may include Artificial Intelligence (AI) related information, sensing related information, and enhanced CSI components amongst others.
- a 5G payload type may include ACK/NACK, Scheduling Requests (SR) , and CSI, amongst others.
- the method then proceeds to block 1320 to check if the payload type is an Intra-RAN payload type. If the payload type is an Intra-RAN payload type, the method proceeds to block 1330 where the length of the payload is determined, and then to block 1340 where the coding rate of the payload is determined.
- the coding rate may be known from a MCS index provided by a base station in a DCI message, or the coding rate may be deduced from the payload size and available resources for transmitting the payload.
- the method then proceeds to block 1350 to check if the length of the payload is greater than a length threshold T L , or if the coding rate is greater than a rate threshold T R . If the length of the payload is found to be greater than T L , or if the coding rate for the payload is found to be greater than T R , the method proceeds to block 1360, where an LDPC code is selected for the payload. The method then proceeds to block 1390 and ends.
- the thresholds T L and T R may be fixed by a standard.
- T L may be set to 1013 or 1026 in some embodiments
- T R may be set to 1/2 or 2/3 in some embodiments.
- the method proceeds to block 1370 where a Reed-Muller code or a polar code is selected.
- the choice between a Reed-Muller code or a polar code may be governed by payload length, in at least some embodiments. The method then proceeds to block 1390 and ends.
- the method proceeds to block 1380 where a polar code is selected. The method then proceeds to block 1390 and ends.
- the UE may encode the payload according to the selected code, and transmit the encoded payload to a base station or network element.
- aspects related to MCS selection for Intra-RAN data may include introducing explicit modulation order and coding rate specification, using a new MCS table or the URLLC MCS table.
- a new MCS field in DCI indicates the MCS for UCI.
- This tailored MCS selection for Intra-RAN data may allow for more efficient signaling and flexible modulation schemes.
- Some aspects relate to increasing maximum mother code length for polar codes, defining a new polar reliability sequence of larger length, and implementing new polar code block segmentation based on payload size. High-priority and low-priority payload bit segmentation is also introduced. Some examples include longer polar codes, optimized reliability sequences, and adaptive segmentation for varying Intra-RAN payload sizes.
- Some aspects relate to joint Intra-RAN code selection and code block segmentation based on payload length and code rate.
- LDPC codes will be used if the payload length or code rate exceeds specific thresholds. The maximum number of polar code blocks increases, while there is no upper limit for LDPC code blocks.
- This adaptive coding scheme that accounts for various Intra-RAN payload lengths and code rates may provide more flexible and efficient channel encoding.
- aspects of the present disclosure include:
- FIG. 14 is a block diagram of a computing device 1400 that may be used for implementing the devices and methods disclosed herein. Specific devices may utilize all of the components shown, or only a subset of the components, and levels of integration may vary from device to device. Furthermore, a device may contain multiple instances of a component, such as multiple processing units, processors, memories, transmitters, receivers, etc.
- the computing device 1400 may comprise a processor 1410, memory 1420, a mass storage device 1440, and peripherals 1430. Peripherals 1430 may comprise, amongst others one or more input/output devices, such as a speaker, microphone, mouse, touchscreen, keypad, keyboard, printer, display, network interfaces, and the like. Communications between processor 1410, memory 1420, mass storage device 1440, and peripherals 1430 may occur through one or more buses 1450.
- the bus 1450 may be one or more of any type of several bus architectures including a memory bus or memory controller, a peripheral bus, video bus, or the like.
- the processor 1410 may comprise any type of electronic data processor.
- the memory 1420 may comprise any type of system memory such as static random-access memory (SRAM) , dynamic random-access memory (DRAM) , synchronous DRAM (SDRAM) , read-only memory (ROM) , a combination thereof, or the like.
- the memory 1420 may include ROM for use at boot-up, and DRAM for program and data storage for use while executing programs.
- the mass storage device 1440 may comprise any type of storage device configured to store data, programs (e.g. instructions or code) , and other information and to make the data, programs, and other information accessible via the bus.
- the mass storage device 1440 may comprise, for example, one or more of a solid-state drive, hard disk drive, a magnetic disk drive, an optical disk drive, or the like.
- the memory 1420 or mass storage device 1440 may store instructions, which when executed by a processor or processing unit, cause or configure the computing device 1400 to perform any of the methods described herein.
- Computing device 1400 may further comprise a communications subsystem 1460 for communicating with other computing devices or for connecting computing device 1400 to a computer network.
- Communications subsystem 1460 may comprise one or more network interfaces (not shown) , which may comprise wired links, such as an Ethernet cable or the like, and/or wireless links to access nodes or different networks.
- the network interface allows the processing unit to communicate with remote units via the networks.
- the network interface may provide wireless communication via one or more transmitters/transmit antennas 1470 and one or more receivers/receive antennas 1470.
- the processing unit is coupled to a local-area network or a wide-area network, for data processing and communications with remote devices, such as other processing units, the Internet, remote storage facilities, or the like.
- Computing device may further comprise a power source 1480.
- the present disclosure encompasses various embodiments, including not only method embodiments, but also other embodiments such as apparatus embodiments and embodiments related to non-transitory computer readable storage media. Embodiments may incorporate, individually or in combinations, the features disclosed herein.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
There is provided methods and devices for transmitting new data types in future wireless communication networks. The new data types are termed Intra-RAN data and originate in the physical layer, and do not reach the application layers. A Downlink Control Information (DCI) message may provide a User Equipment with an index indicating a Modulation and Coding Scheme (MCS) for the transmission. Legacy UCI transmissions may use predetermined MCS whereas Intra-RAN transmissions may use an MCS based on a field of the DCI. Large Intra-RAN payloads may be segmented based on an increased maximum size based on an increased mother code length for polar codes. Very large Intra-RAN payloads may be encoded using LDPC codes.
Description
OTHER APPLICATIONS
The present application claims priority from U.S. Provisional Patent Application No. 63/565,354, filed March 14th, 2024 and incorporated herein by reference in its entirety.
The present disclosure relates to wireless communications. Specifically, the present disclosure relates to a method and apparatus for configuration of an uplink channel.
Future wireless communication networks will provide new features which will require new types of signaling. For example, future wireless communication networks will need to accommodate signaling carrying Artificial Intelligence (AI) information, sensing information, and enhanced Channel State Information (CSI) information between mobile devices and network elements.
These data types generally originate in the physical layer, and are used to assist physical layer functions only. Thus, this data generally does not reach higher layers such as application layers. However, this data is distinct from control signaling, which is used to coordinate transmissions between mobile devices and network elements.
It is an object of the present disclosure to provide an improved method for configuration of an uplink control channel.
According to a first aspect, there is provided a method comprising receiving control information from a base station, the control information comprising an uplink resource and a Modulation and Coding Scheme (MCS) flag; when the MCS flag is set, selecting an MCS from a table based on an index from the control information; and encoding a message with the selected MCS; and transmitting the encoded message to the base station on the uplink resource.
According to an embodiment of the first aspect, the method further comprises, when the MCS flag is not set, selecting a legacy MCS, and encoding the message with the legacy MCS.
According to another embodiment of the first aspect, the table is a dedicated table for Intra-RAN messages.
According to yet another embodiment of the first aspect, the table is an Ultra Reliable Low Latency Communications (URLLC) table.
According to yet another embodiment of the first aspect, the table is a data MCS table.
According to yet another embodiment of the first aspect, the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
According to a second aspect, there is provided a method comprising receiving control information from a base station, the control information comprising an uplink resource and a Modulation and Coding Scheme flag, when the MCS flag is set, selecting an MCS from a dedicated Intra-RAN MCS table based on an index from the control information; when the MCS flag is not set, selecting the MCS from a data MCS table; encoding a message with the selected MCS; and transmitting the encoded message to the base station on the uplink resource.
According to an embodiment of the second aspect, the Intra-RAN MCS table is an Ultra Reliable Low Latency Communications (URLLC) table.
According to another embodiment of the second aspect, the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
According to a third aspect, there is provided a method comprising receiving control information from a base station, the control information comprising an uplink resource, selecting an Intra-RAN Modulation and Coding Scheme (MCS) from a first table based on an Intra-RAN index from the control information; encoding a message with the Intra-RAN MCS; and transmitting the encoded message on the uplink resource.
According to an embodiment of the third aspect, the control information comprises the Intra-RAN index and a data index.
According to another embodiment of the third aspect, the first table is a dedicated Intra-RAN MCS table.
According to yet another embodiment of the third aspect, the method further comprises selecting a data MCS from a second table based on the data index, and encoding the data payload with the data MCS.
According to yet another embodiment of the third aspect, the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
According to a fourth aspect, there is provided a method comprising: when a length of a payload is greater than a threshold, creating blocks having a length equal to the threshold until a remaining payload is shorter than the threshold; creating a last block with the remaining payload; encoding the blocks and the last block with a polar code; and transmitting the blocks and the last block to a base station.
According to an embodiment of the fourth aspect, the threshold is based on a mother code length for the polar code.
According to another embodiment of the fourth aspect, the threshold is 1013 for a mother code length of 1024, the threshold is 2026 for a mother code length of 2048, the threshold is 4052 for a mother code length of 4096, the threshold is 8104 for a mother code length of 8192, and the threshold is 16208 for a mother code length of 16384.
According to yet another embodiment of the fourth aspect, the payload comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
According to a fifth aspect, there is provided a method comprising dividing a payload into high-priority bits and low-priority bits, encoding the high-priority bits with a first MCS, encoding the low priority bits with a second MCS; and transmitting the encoded high-priority bits and the encoded low-priority bits to a base station, wherein the first MCS is a lower order MCS than the second MCS.
According to an embodiment of the fifth aspect, the method further comprises segmenting the high-priority bits into a plurality of blocks based on a threshold size and segmenting the low-priority bits into a second plurality of blocks based on the threshold size.
According to another embodiment of the fifth aspect, the payload comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
According to a sixth aspect, there is provided a method comprising, when a payload type of a payload is an intra-RAN payload type, when a length of the payload is greater than a length threshold or a coding rate of the payload is greater than a rate threshold, selecting a Low Density Parity Check (LDPC) code; and when the length of the payload is less than the length threshold and the coding rate of
the payload is less than the rate threshold, selecting a polar code or a Reed-Muller code, encoding the payload with the selected code; and transmitting the payload to a base station.
According to an embodiment of the sixth aspect, the method further comprises, when the payload type is not an intra-RAN payload type, selecting a polar code.
According to another embodiment of the sixth aspect, Intra-RAN payload types include Artificial Intelligence (AI) related information, sensing related information, and enhanced Channel State Information (CSI) components.
According to yet another embodiment of the sixth aspect, payload types that are not intra-RAN payload types include Acknowledgments (ACKs) , Negative Acknowledgements (NACKs) , Scheduling Requests (SRs) , and Channel State Information (CSI) .
According to a seventh aspect, there is provided a computing device comprising a processor and a communications subsystem, wherein the computing device is configured to perform the method of any embodiment of any aspect described above.
According to an eight aspect, there is provided a computer readable medium having stored thereon executable code for execution by a processor of a computing device, the executable code comprising instructions for performing the method of any embodiment of any aspect described above.
The present disclosure will be better understood with reference to the drawings in which:
Figure 1 is a trellis graph of an exemplary polar code.
Figure 2 is a graphical representation of a networking environment according to at least one embodiment of the present disclosure.
Figure 3 is a graphical representation of a communications system according to at least one embodiment of the present disclosure.
Figure 4 is a graphical representation of an electronic device communicating with a base station according to at least one embodiment of the present disclosure.
Figure 5 is a block diagram of a device according to at least one embodiment of the present disclosure.
Figure 6 is a graphical representation of a process for determining UCI formats and configurations in 5G.
Figure 7 is a call flow diagram of a method according to at least one embodiment of the present disclosure.
Figure 8 is a flow diagram of a method according to at least one embodiment of the present disclosure.
Figure 9 is a flow diagram of a method according to at least one embodiment of the present disclosure.
Figure 10 is a flow diagram of a method according to at least one embodiment of the present disclosure.
Figure 11 is a flow diagram of a method according to at least one embodiment of the present disclosure.
Figure 12 is a flow diagram of a method according to at least one embodiment of the present disclosure.
Figure 13 is a flow diagram of a method according to at least one embodiment of the present disclosure.
Figure 14 is a block diagram of a user equipment according to at least one embodiment of the present disclosure.
The present disclosure is directed to a method and apparatus for configuration of an uplink channel.
Throughout this disclosure, the following acronyms, abbreviations, and initialisms may be used.
Channel coding is an indispensable module in communications systems that encode K source bits into N code bits to provide error correction capability against adversary channel condition such as noise and interference. The code rate is R=K/N. In practice, the code rate R is selected according to channel quality.
Polar codes are capacity-achieving codes and thus a great breakthrough in coding theory. As code length approaches infinity, the synthesized channels (or subchannels) become either noiseless or pure noise. The noiseless subchannels are utilized to transport information, and their proportion is proven to achieve the channel capacity defined by Shannon. The above-mentioned channel polarization phenomenon occurs under successive cancellation (SC) or SC-based decoding, which has a relatively low complexity.
Low-density parity-check (LDPC) codes are capacity-approaching codes. LDPC codes are usually defined by a parity-check matrix, which has far more zeros than ones, thus having low density. By properly designing the positions of ones in the matrix, the decoding performance can be improved. Although LDPC codes can be viewed as a type of random codes, introducing structures can facilitate its hardware implementations of both encoder and decoder. Quasi-cyclic is such a structure that first defines a smaller base matrix or base graph (BG) , and then perform “lifting” by replacing its ones with a cyclic shifted version of identity matrix.
Rate matching is performed after channel encoding, by either puncturing/shortening or repeating some code bits. The purpose is to obtain a code bit sequence of desired length for transmission over limited channel resources.
A channel interleaver is applied after channel encoding and rate matching by permuting the code bits. The purpose is to provide stable or superior performance under high-order modulation or in a fading channel.
Hybrid automatic repeat request (HARQ) is a mechanism to provide reliable wireless transmission. It combines forward error correction (FEC) and automatic repeat request (ARQ) . In HARQ, the initial transmission is a FEC code word with CRC bits to support error detection at the receiver. If a decoding error is detected, the receiver will send back a NACK signaling to inform the transmitter of the error, and request a retransmission. The retransmitted bits can be directly selected from the initially transmitted bits, or can be incrementally generated code bits which form a longer code word with the initially transmitted bits. The former is called chase-combining HARQ (CC-HARQ) and the latter is called incremental-redundancy HARQ (IR-HARQ) . Typically, IR-HARQ outperforms CC-HARQ with the additional coding gain from incremental redundancy.
In wireless communications, channel quality is constantly changing due to fading effects at both fast and slow scale. Accordingly, channel coding has traditionally always been designed to adapt to the channel states. Modulation coding scheme (MCS) adaptation is a powerful method to combat varying channel states, in which the modulation order and code length and coding rate can be changed in real time. Therefore, it requires that a channel coding scheme can flexibly change the code length and code rate in a fine-grained way, and at the same time achieve good error correction performance in all possible
configurations. This fine-grained flexibility of channel codes is one of the most challenging problems for engineers in this domain.
At the same time, the complexity of both encoding and decoding algorithms needs to be sufficiently low. In hardware, complexity can be evaluated through measuring chip area and energy efficiency. They are related to algorithmic complexity, but are more closely related to cell phone’s cost and battery life. Therefore, it is generally desirable to reduce implementation complexity when designing coding schemes.
In future wireless communication networks, there are several scenarios to be supported, such as immersive communication, massive communication and hyper reliable and low-latency communication. The Key Performance Indicators (KPIs) that are related to channel coding include coding gain, reliability, throughput, latency and their tradeoffs. For example, the throughput requirement of future wireless communication networks may reach above 1Tbps, and the energy efficiency should decrease to 1pJ/bit. Meanwhile, the coding scheme should preferably support flexible rate matching and IR-HARQ schemes. It is required, but a very challenging task, to design a code ensemble to fulfill all these KPIs and capabilities.
Polar Codes
Polar codes are linear block codes. For a polar code of length N, its generator matrix is GN, and its encoding process iswhereis the binary information vector, and is the binary code vector. The N×N binary matrix is computed bywhere is the polarization kernel matrix, n=log2N, andis Kronecker product.
Typically, there are K information bits to be encoded into N code bits. Obviously, we have K<N to obtain a code rateThat implies only part ofis used to carry information bits, and the rest are called frozen bits. Denote by I the information bit set (or information set) , and F the frozen bit set (or frozen set) , respectively. Sometimes, there is an additional PC bit set, denoted by P. The frozen bits are known (usually all zeros) before decoding, so they do not carry any information. The PC bits are parity-check bits of a subset of information bits, and therefore are known once the associated information bits are decoded. The decoding of polar codes is actually trying to recover all information bits.
The code length M may not always be the power of 2, i.e., M<N. In practice, puncturing and shortening are used to reduce transmitted code bits from N to M. For convenience, we call N the mother code length, and M the code length from now on. In particular, punctured bits are untransmitted bits unknown to the decoder, but shortened bits are untransmitted bits known to the decoder (usually all zeros) .
An example of a polar code with N=8, and K=4 is shown in the trellis graph illustrated in Figure 1. Each “butterfly” in the graph is a polarization, i.e., In this example, the information set is I= {u4, u6, u7, u8} , and the frozen set is F= {u1, u2, u3, u5} .
As illustrated in Figure 1, the information vectoris multiplied by the generator matrix G8. G8 is obtained by successively applying the Kronecker product to F2. The Kronecker product of F2 with another binary matrix may be viewed as replacing every 1 in the matrix by a copy of F2 and every 0 in the matrix by a 4x4 matrix containing all 0s. Therefore, may be represented as follows:
In these operations, ui+uj is defined as modulo 2, or exclusive OR (XOR) , such that 0+0=0, 1+0=1, 1+0=1, and 1+1=0.
The resulting codewordmay therefore be expressed as {u1+u2+u3+u4+u5+u6+u7+u8, u2+u4+u6+u8, u3+u4+u7+u8, u4+u8, u5+u6+u7+u8, u6+u8, u7+u8, u8} .
Successive cancellation (SC) is the basic decoding algorithm for polar codes, where all the frozen bits and information bits are decoded sequentially, i.e., bit by bit. The preceding bits are always decoded first.
Successive Cancellation List (SCL) is an enhanced decoding algorithm for polar codes, where multiple (let’s say L) SC decoding instances are executed. Each instance is called a “decoding path” . When decoding each binary bit, both “0” and “1” branches are extended to each path, creating 2L paths. Then, all 2L paths are compared, where the most likely L paths are kept, and the least likely L paths are discarded (or pruned) . This path extension and pruning operations are performed during decoding every information bit, until all information bits are decoded. At last, the most likely path is selected as the decoding output.
CRC-aided Successive Cancellation List (CA-SCL) works almost the same as SCL, except that in the last step, the most likely path that passes CRC check is selected as the decoding output.
Parity-check Successive Cancellation List (PC-SCL) works almost the same as SCL, except that when decoding parity-check (PC) bits, the parity check value of its associated preceding bits is used as the bit decision result. PC bits are a new type of bits in addition to frozen bits and information bits.
Low Density Parity Check (LDPC) Codes
Low Density Parity Check (LDPC) code is a channel coding scheme very close to the Shannon line, and features good performance and low complexity. Currently, LDPC has been adopted as data channel coding schemes by 3GPP 5G New Radio (NR) and IEEE 802.11 systems.
The LDPC code is encoded using a parity-check matrix. A widely-adopted LDPC code has a Quasi-Cyclic (QC) structure, and a shifting value of each block is designed to avoid a bad structure such as a short circle, and improve code distance. At present, the main decoding algorithms for LDPC codes are Min-Sum (MS) and Belief Propagation (BP) . In terms of decoding performance, the BP decoding algorithm is better, but it has a large amount of information storage and a complex computation overhead, which is not convenient to hardware implementation. Therefore, Offset-MS and Normalized-MS decoding algorithms are used in realistic communication systems. The LDPC codes implemented in practice extend the “1” in the basic graph (BG) by a square matrix, which is a cyclic shifted version of an identity matrix. The BG of QC-LDPC code can be defined by BG= (X, Y, F) , where X corresponds to a variable, Y corresponds to a check equation, and F corresponds to edge connections. The Tanner graph is obtained after QC lifting with an expansion factor Zc. That is, a bipartite graph G= (V, C, E) , where V is a variable node, C is a check node, E is a connected edge, and a corresponding parity matrix column quantity N= |V|=Zc|X|. The quantity of rows of the check matrix is M=|C|=Zc|Y|, and the quantity of non-zero elements of the check matrix is |E|=Z|F|.
5G data channels support information block length ranging from 1 to 8448. The standard describes two parity-check matrices: BG1 and BG2. The same base graph, lifted by different lifting sizes, can adapt to a wide set of different code rates and lengths. To achieve this, one only needs to store the Lifting Size and Shifting Value lists in look-up tables, and perform rate matching and IR-HARQ based on the tables.
In NR LDPC codes, a codeword before rate matching (referred to as a mother codeword) typically consists of three disjoint portions or parts, i.e., systematic bits, core parity check bits and extended parity check bits. In NR LDPC code, four different redundancy versions (RVs) including RV0, RV1, RV2 and RV3 are generated after rate matching. In initial transmission, RV0 is normally selected in which most of the systematic bits are included in the set of coded bits. Meanwhile, depending on the effective code rate, some of the core parity bits or all the core parity check bits and extended parity bits are included in RV0. As a result, RV0 has the highest self-decodable ability among all RVs (i.e., RV0 can be self-decodable at highest code rate) . For a retransmission, the transmitter may select RV1, RV2 or RV3. Nevertheless, only RV3 is self-decodable, while RV1 and RV2 are not self-decodable at a high code rate. The main reason is that, at some code rates, RV1 and RV2 may only include parity check bits, resulting in unsuccessful decoding at the receiver.
Uplink Control Information (UCI)
The design of uplink control information (UCI) in 5G New Radio (NR) incorporates a multifaceted approach. The Physical Uplink Control Channel (PUCCH) utilizes format-specific rules for multiplexing and resource mapping, offering flexibility to cater to diverse UCI requirements. These rules govern aspects such as frequency division multiplexing schemes and cyclic prefix allocation techniques within each format. Conversely, UCI transmitted on the Physical Uplink Shared Channel (PUSCH) adheres to a more unified approach, aligning with data traffic for streamlined implementation.
As the 5G NR standard continues to evolve, a significant trend emerges in so-called “5.5G, ” which may represent an enhancement of the initial 5G standard release. Previously format-specific features, such as multi-user multiplexing capability, are becoming increasingly prevalent across all PUCCH formats. This convergence signifies a move towards a more unified and versatile UCI transmission scheme, blurring the lines between formats. This trend suggests a potential future where a single, configurable PUCCH design might be sufficient.
The ongoing shift towards unification in 5.5G UCI design is likely to extend into future wireless communication networks. By adopting a more unified approach, future wireless communication networks can potentially achieve significant efficiency gains. A single, configurable UCI transmission scheme could simplify system design, reduce processing overhead, and enhance resource utilization. This evolution aligns with the broader goals of future wireless communication networks, which include ultra-high reliability, low latency, and support for a multitude of diverse applications.
Operating Environment
Embodiments described in the present disclosure may be used in conjunction with, or part of, an operating environment, which is now described.
Referring to FIG. 2, as an illustrative example without limitation, a simplified schematic illustration of a communication system is provided. The communication system 100 comprises a radio access network 120. The radio access network 120 may be a future generation radio access network, or a legacy (e.g. 5G, 4G, 3G or 2G) radio access network. One or more communication electronic devices (ED) 110a, 110b, 110c, 110d, 110e, 110f, 110g, 110h, 110i, 110j (generically referred to as 110) may be
interconnected to one another or connected to one or more network nodes (170a, 170b, generically referred to as 170) in the radio access network 120. A core network 130 may be a part of the communication system and may be dependent or independent of the radio access technology used in the communication system 100. Also the communication system 100 comprises a public switched telephone network (PSTN) 140, the Internet 150, and other networks 160.
FIG. 3 illustrates an example communication system 100. In general, the communication system 100 enables multiple wireless or wired elements to communicate data and other content. The purpose of the communication system 100 may be to provide content, such as voice, data, video, and/or text, via broadcast, multicast, groupcast, unicast, etc. The communication system 100 may operate by sharing resources, such as carrier spectrum bandwidth, between its constituent elements. The communication system 100 may include a terrestrial communication system and/or a non-terrestrial communication system. The communication system 100 may provide a wide range of communication services and applications (such as earth monitoring, remote sensing, passive sensing and positioning, navigation and tracking, autonomous delivery and mobility, etc. ) . The communication system 100 may provide a high degree of availability and robustness through a joint operation of a terrestrial communication system and a non-terrestrial communication system. For example, integrating a non-terrestrial communication system (or components thereof) into a terrestrial communication system can result in what may be considered a heterogeneous network comprising multiple layers. Compared to conventional communication networks, the heterogeneous network may achieve better overall performance through efficient multi-link joint operation, more flexible functionality sharing, and faster physical layer link switching between terrestrial networks and non-terrestrial networks.
The terrestrial communication system and the non-terrestrial communication system could be considered sub-systems of the communication system. In the example shown in FIG. 3, the communication system 100 includes electronic devices (ED) 110a, 110b, 110c, 110d (generically referred to as ED 110) , radio access networks (RANs) 120a, 120b, a non-terrestrial communication network 120c, a core network 130, a public switched telephone network (PSTN) 140, the Internet 150, and other networks 160. The RANs 120a, 120b include respective base stations (BSs) 170a, 170b, which may be generically referred to as terrestrial transmit and receive points (T-TRPs) 170a, 170b. The non-terrestrial communication network 120c includes an access node 172, which may be generically referred to as a non-terrestrial transmit and receive point (NT-TRP) 172.
Any ED 110 may be alternatively or additionally configured to interface, access, or communicate with any T-TRP 170a, 170b and NT-TRP 172, the Internet 150, the core network 130, the PSTN 140, the other networks 160, or any combination of the preceding. In some examples, ED 110a may communicate an uplink and/or downlink transmission over a terrestrial air interface 190a with T-TRP 170a. In some examples, the EDs 110a, 110b, 110c, and 110d may also communicate directly with one another via one or more sidelink air interfaces 190b. In some examples, ED 110d may communicate an uplink and/or downlink transmission over a non-terrestrial air interface 190c with NT-TRP 172.
The air interfaces 190a and 190b may use similar communication technology, such as any suitable radio access technology. For example, the communication system 100 may implement one or more channel access methods, such as code division multiple access (CDMA) , space division multiple access (SDMA) , time division multiple access (TDMA) , frequency division multiple access (FDMA) , orthogonal FDMA (OFDMA) , or single-carrier FDMA (SC-FDMA, also known as discrete Fourier transform spread OFDMA, DFT-s-OFDMA) in the air interfaces 190a and 190b. The air interfaces 190a and 190b
may utilize other higher dimension signal spaces, which may involve a combination of orthogonal and/or non-orthogonal dimensions.
The non-terrestrial air interface 190c can enable communication between the ED 110d and one or multiple NT-TRPs 172 via a wireless link or simply a link. For some examples, the link is a dedicated connection for unicast transmission, a connection for broadcast transmission, or a connection between a group of EDs 110 and one or multiple NT-TRPs 172 for multicast transmission.
The RANs 120a and 120b are in communication with the core network 130 to provide the EDs 110a, 110b, and 110c with various services such as voice, data, and other services. The RANs 120a and 120b and/or the core network 130 may be in direct or indirect communication with one or more other RANs (not shown) , which may or may not be directly served by core network 130, and may or may not employ the same radio access technology as RAN 120a, RAN 120b or both. The core network 130 may also serve as a gateway access between (i) the RANs 120a and 120b or EDs 110a, 110b, and 110c or both, and (ii) other networks (such as the PSTN 140, the Internet 150, and the other networks 160) . In addition, some or all of the EDs 110a, 110b, and 110c may include functionality for communicating with different wireless networks over different wireless links using different wireless technologies and/or protocols. Instead of wireless communication (or in addition thereto) , the EDs 110a, 110b, and 110c may communicate via wired communication channels to a service provider or switch (not shown) , and to the Internet 150. PSTN 140 may include circuit switched telephone networks for providing plain old telephone service (POTS) . Internet 150 may include a network of computers and subnets (intranets) or both, and incorporate protocols, such as Internet Protocol (IP) , Transmission Control Protocol (TCP) , User Datagram Protocol (UDP) . EDs 110a, 110b, and 110c may be multimode devices capable of operation according to multiple radio access technologies, and incorporate multiple transceivers necessary to support such.
FIG. 4 illustrates another example of an ED 110 and a base station 170a, 170b and/or 170c. The ED 110 is used to connect persons, objects, machines, etc. The ED 110 may be widely used in various scenarios including, for example, cellular communications, device-to-device (D2D) , vehicle to everything (V2X) , peer-to-peer (P2P) , machine-to-machine (M2M) , machine-type communications (MTC) , internet of things (IoT) , virtual reality (VR) , augmented reality (AR) , mixed reality (MR) , metaverse, digital twin, industrial control, self-driving, remote medical, smart grid, smart furniture, smart office, smart wearable, smart transportation, smart city, drones, robots, remote sensing, passive sensing, positioning, navigation and tracking, autonomous delivery and mobility, etc.
Each ED 110 represents any suitable end user device for wireless operation and may include such devices (or may be referred to) as a user equipment/device (UE) , a wireless transmit/receive unit (WTRU) , a mobile station, a fixed or mobile subscriber unit, a cellular telephone, a station (STA) , a machine type communication (MTC) device, a personal digital assistant (PDA) , a smartphone, a laptop, a computer, a tablet, a wireless sensor, a consumer electronics device, a smart book, a vehicle, a car, a truck, a bus, a train, or an IoT device, wearable devices (such as a watch, a pair of glasses, head mounted equipment, etc. ) , an industrial device, or an apparatus in (e.g. communication module, modem, or chip) or comprising the forgoing devices, among other possibilities. Future generation EDs 110 may be referred to using other terms. The base station 170a and 170b is a T-TRP and will hereafter be referred to as T-TRP 170. Also shown in FIG. 4, a NT-TRP will hereafter be referred to as NT-TRP 172. Each ED 110 connected to T-TRP 170 and/or NT-TRP 172 can be dynamically or semi-statically turned-on (i.e., established, activated, or enabled) , turned-off (i.e., released, deactivated, or disabled) and/or configured in response to one of more of: connection availability and connection necessity.
The ED 110 includes a transmitter 201 and a receiver 203 coupled to one or more antennas 204. Only one antenna 204 is illustrated to avoid congestion in the drawing. One, some, or all of the antennas 204 may alternatively be panels. The transmitter 201 and the receiver 203 may be integrated, e.g. as a transceiver. The transceiver is configured to modulate data or other content for transmission by at least one antenna 204 or network interface controller (NIC) . The transceiver is also configured to demodulate data or other content received by the at least one antenna 204. Each transceiver includes any suitable structure for generating signals for wireless or wired transmission and/or processing signals received wirelessly or by wire. Each antenna 204 includes any suitable structure for transmitting and/or receiving wireless or wired signals.
The ED 110 includes at least one memory 208. The memory 208 stores instructions and data used, generated, or collected by the ED 110. For example, the memory 208 could store software instructions or modules configured to implement some or all of the functionality and/or embodiments described herein and that are executed by one or more processing unit (s) (e.g., a processor 210) . Each memory 208 includes any suitable volatile and/or non-volatile storage and retrieval device (s) . Any suitable type of memory may be used, such as random access memory (RAM) , read only memory (ROM) , hard disk, optical disc, subscriber identity module (SIM) card, memory stick, secure digital (SD) memory card, on-processor cache, and the like.
The ED 110 may further include one or more input/output devices (not shown) or interfaces (such as a wired interface to the Internet 150 in FIG. 2) . The input/output devices or interfaces permit interaction with a user or other devices in the network. Each input/output device or interface includes any suitable structure for providing information to or receiving information from a user, and/or for network interface communications. Suitable structures include, for example, a speaker, microphone, keypad, keyboard, display, touch screen, etc.
The ED 110 includes the processor 210 for performing operations including those operations related to preparing a transmission for uplink transmission to the NT-TRP 172 and/or the T-TRP 170; those operations related to processing downlink transmissions received from the NT-TRP 172 and/or the T-TRP 170; and those operations related to processing sidelink transmission to and from another ED 110. Processing operations related to preparing a transmission for uplink transmission may include operations such as encoding, modulating, transmit beamforming, and generating symbols for transmission. Processing operations related to processing downlink transmissions may include operations such as receive beamforming, demodulating and decoding received symbols. Depending upon the embodiment, a downlink transmission may be received by the receiver 203, possibly using receive beamforming, and the processor 210 may extract signaling from the downlink transmission (e.g. by detecting and/or decoding the signaling) . An example of signaling may be a reference signal transmitted by the NT-TRP 172 and/or by the T-TRP 170. In some embodiments, the processor 210 implements the transmit beamforming and/or the receive beamforming based on the indication of beam direction, e.g. beam angle information (BAI) , received from the T-TRP 170. In some embodiments, the processor 210 may perform operations relating to network access (e.g. initial access) and/or downlink synchronization, such as operations relating to detecting a synchronization sequence, decoding and obtaining the system information, etc. In some embodiments, the processor 210 may perform channel estimation, e.g. using a reference signal received from the NT-TRP 172 and/or from the T-TRP 170.
Although not illustrated, the processor 210 may form part of the transmitter 201 and/or part of the receiver 203. Although not illustrated, the memory 208 may form part of the processor 210.
The processor 210, the processing components of the transmitter 201, and the processing components of the receiver 203 may each be implemented by the same or different one or more processors that are configured to execute instructions stored in a memory (e.g. in the memory 208) . Alternatively, some or all of the processor 210, the processing components of the transmitter 201, and the processing components of the receiver 203 may each be implemented using dedicated circuitry, such as a programmed field-programmable gate array (FPGA) , an application-specific integrated circuit (ASIC) , or a hardware accelerator such as a graphics processing unit (GPU) or an artificial intelligence (AI) accelerator.
The T-TRP 170 may be known by other names in some implementations, such as a base station, a base transceiver station (BTS) , a radio base station, a network node, a network device, a device on the network side, a transmit/receive node, a Node B, an evolved NodeB (eNodeB or eNB) , a Home eNodeB, a next Generation NodeB (gNB) , a transmission point (TP) , a site controller, an access point (AP) , a wireless router, a relay station, a terrestrial node, a terrestrial network device, a terrestrial base station, a base band unit (BBU) , a remote radio unit (RRU) , an active antenna unit (AAU) , a remote radio head (RRH) , a central unit (CU) , a distributed unit (DU) , a positioning node, among other possibilities. The T-TRP 170 may be a macro BS, a pico BS, a relay node, a donor node, or the like, or combinations thereof. The T-TRP 170 may refer to the forgoing devices or refer to apparatus (e.g. a communication module, a modem, or a chip) in the forgoing devices.
In some embodiments, the parts of the T-TRP 170 may be distributed. For example, some of the modules of the T-TRP 170 may be located remote from the equipment that houses the antennas 256 for the T-TRP 170, and may be coupled to the equipment that houses the antennas 256 over a communication link (not shown) sometimes known as front haul, such as common public radio interface (CPRI) . Therefore, in some embodiments, the term T-TRP 170 may also refer to modules on the network side that perform processing operations, such as determining the location of the ED 110, resource allocation (scheduling) , message generation, and encoding/decoding, and that are not necessarily part of the equipment that houses the antennas 256 of the T-TRP 170. The modules may also be coupled to other T-TRPs. In some embodiments, the T-TRP 170 may actually be a plurality of T-TRPs that are operating together to serve the ED 110, e.g. through the use of coordinated multipoint transmissions.
The T-TRP 170 includes at least one transmitter 252 and at least one receiver 254 coupled to one or more antennas 256. Only one antenna 256 is illustrated to avoid congestion in the drawing. One, some, or all of the antennas 256 may alternatively be panels. The transmitter 252 and the receiver 254 may be integrated as a transceiver. The T-TRP 170 further includes a processor 260 for performing operations including those related to: preparing a transmission for downlink transmission to the ED 110, processing an uplink transmission received from the ED 110, preparing a transmission for backhaul transmission to the NT-TRP 172, and processing a transmission received over backhaul from the NT-TRP 172. Processing operations related to preparing a transmission for downlink or backhaul transmission may include operations such as encoding, modulating, precoding (e.g. multiple input multiple output (MIMO) precoding) , transmit beamforming, and generating symbols for transmission. Processing operations related to processing received transmissions in the uplink or over backhaul may include operations such as receive beamforming, demodulating received symbols, and decoding received symbols. The processor 260 may also perform operations relating to network access (e.g. initial access) and/or downlink synchronization, such as generating the content of synchronization signal blocks (SSBs) , generating the system information, etc. In some embodiments, the processor 260 also generates an indication of beam direction, e.g. BAI, which may be scheduled for transmission by a scheduler 253. The
processor 260 performs other network-side processing operations described herein, such as determining the location of the ED 110, determining where to deploy the NT-TRP 172, etc. In some embodiments, the processor 260 may generate signaling, e.g. to configure one or more parameters of the ED 110 and/or one or more parameters of the NT-TRP 172. Any signaling generated by the processor 260 is sent by the transmitter 252. Note that “signaling” , as used herein, may alternatively be called control signaling. Signaling may be transmitted in a physical layer control channel, e.g. a physical downlink control channel (PDCCH) , in which case the signaling may be known as dynamic signaling. Signaling transmitted in a downlink physical layer control channel may be known as Downlink Control Information (DCI) . Signaling transmitted in an uplink physical layer control channel may be known as Uplink Control Information (UCI) . Signaling transmitted in a sidelink physical layer control channel may be known as Sidelink Control Information (SCI) . Signaling may be included in a higher-layer (e.g., higher than physical layer) packet transmitted in a physical layer data channel, e.g. in a physical downlink shared channel (PDSCH) , in which case the signaling may be known as higher-layer signaling, static signaling, or semi-static signaling. Higher-layer signaling may also refer to Radio Resource Control (RRC) protocol signaling or Media Access Control -Control Element (MAC-CE) signaling.
The scheduler 253 may be coupled to the processor 260. The scheduler 253 may be included within or operated separately from the T-TRP 170. The scheduler 253 may schedule uplink, downlink, sidelink, and/or backhaul transmissions, including issuing scheduling grants and/or configuring scheduling-free (e.g., “configured grant” ) resources. The T-TRP 170 further includes a memory 258 for storing information and data. The memory 258 stores instructions and data used, generated, or collected by the T-TRP 170. For example, the memory 258 could store software instructions or modules configured to implement some or all of the functionality and/or embodiments described herein and that are executed by the processor 260.
Although not illustrated, the processor 260 may form part of the transmitter 252 and/or part of the receiver 254. Also, although not illustrated, the processor 260 may implement the scheduler 253. Although not illustrated, the memory 258 may form part of the processor 260.
The processor 260, the scheduler 253, the processing components of the transmitter 252, and the processing components of the receiver 254 may each be implemented by the same or different one or more processors that are configured to execute instructions stored in a memory, e.g. in the memory 258. Alternatively, some or all of the processor 260, the scheduler 253, the processing components of the transmitter 252, and the processing components of the receiver 254 may be implemented using dedicated circuitry, such as a programmed FPGA, a hardware accelerator (e.g., a GPU or AI accelerator) , or an ASIC.
Although the NT-TRP 172 is illustrated as a drone only as an example, the NT-TRP 172 may be implemented in any suitable non-terrestrial form, such as satellites and high altitude platforms, including international mobile telecommunication base stations and unmanned aerial vehicles, for example. Also, the NT-TRP 172 may be known by other names in some implementations, such as a non-terrestrial node, a non-terrestrial network device, or a non-terrestrial base station. The NT-TRP 172 includes a transmitter 272 and a receiver 274 coupled to one or more antennas 280. Only one antenna 280 is illustrated to avoid congestion in the drawing. One, some, or all of the antennas may alternatively be panels. The transmitter 272 and the receiver 274 may be integrated as a transceiver. The NT-TRP 172 further includes a processor 276 for performing operations including those related to: preparing a transmission for downlink transmission to the ED 110, processing an uplink transmission received from the ED 110, preparing a transmission for backhaul transmission to T-TRP 170, and processing a
transmission received over backhaul from the T-TRP 170. Processing operations related to preparing a transmission for downlink or backhaul transmission may include operations such as encoding, modulating, precoding (e.g. MIMO precoding) , transmit beamforming, and generating symbols for transmission. Processing operations related to processing received transmissions in the uplink or over backhaul may include operations such as receive beamforming, demodulating received symbols, and decoding received symbols. In some embodiments, the processor 276 implements the transmit beamforming and/or receive beamforming based on beam direction information (e.g. BAI) received from the T-TRP 170. In some embodiments, the processor 276 may generate signaling, e.g. to configure one or more parameters of the ED 110. In some embodiments, the NT-TRP 172 implements physical layer processing, but does not implement higher layer functions such as functions at the medium access control (MAC) or radio link control (RLC) layer. As this is only an example, more generally, the NT-TRP 172 may implement higher layer functions in addition to physical layer processing.
The NT-TRP 172 further includes a memory 278 for storing information and data. Although not illustrated, the processor 276 may form part of the transmitter 272 and/or part of the receiver 274. Although not illustrated, the memory 278 may form part of the processor 276.
The processor 276, the processing components of the transmitter 272, and the processing components of the receiver 274 may each be implemented by the same or different one or more processors that are configured to execute instructions stored in a memory, e.g. in the memory 278. Alternatively, some or all of the processor 276, the processing components of the transmitter 272, and the processing components of the receiver 274 may be implemented using dedicated circuitry, such as a programmed FPGA, a hardware accelerator (e.g., a GPU or AI accelerator) , or an ASIC. In some embodiments, the NT-TRP 172 may actually be a plurality of NT-TRPs that are operating together to serve the ED 110, e.g. through coordinated multipoint transmissions.
The T-TRP 170, the NT-TRP 172, and/or the ED 110 may include other components, but these have been omitted for the sake of clarity.
One or more steps of the embodiment methods provided herein may be performed by corresponding units or modules, according to FIG. 5. FIG. 5 illustrates units or modules in a device 500, such as in the ED 110, in the T-TRP 170, or in the NT-TRP 172. For example, a signal may be transmitted or output by a transmitting unit or by a transmitting module 520. A signal may be received or input by a receiving unit or by a receiving module 530. A signal may be processed by a processing unit or a processing module 540. Other steps may be performed by an artificial intelligence (AI) or machine learning (ML) module 550. The respective units or modules may be implemented using hardware, one or more components or devices that execute software, or a combination thereof. For instance, one or more of the units or modules may be a circuit such as an integrated circuit. Examples of an integrated circuit includes a programmed FPGA, a GPU, or an ASIC. For instance, one or more of the units or modules may be logical such as a logical function performed by a circuit, by a portion of an integrated circuit, or by software instructions executed by a processor. It will be appreciated that where the modules are implemented using software for execution by a processor for example, the modules may be retrieved by a processor, in whole or part as needed, individually or together for processing, in single or multiple instances, and that the modules themselves may include instructions for further deployment and instantiation.
While not shown, the transmitting module and the receiving module may be part of, or combined into, a transceiver module. A transceiver module may also be known as an interface module, or simply an interface, for inputting and outputting operations.
Device 500 may further comprise operating system module 510.
Additional details regarding the EDs 110, the T-TRP 170, and the NT-TRP 172 are known to those of skill in the art. As such, these details are omitted here.
5G NR UCI
The current design of 5G NR uplink control information (UCI) payloads offers support for a predefined set of combinations, including Hybrid Automatic Repeat Request (HARQ) ACK/NACK only, Scheduling Request (SR) only, Channel State Information (CSI) without two-part reporting, and combinations of these elements. These combinations are rigidly defined within the standard:
● HARQ ACK/NACK only
● SR only
● CSI (not of two part)
● HARQ ACK/NACK + SR
● HARQ-ACK/NACK + CSI (not of two part)
● HARQ-ACK/NACK + SR + CSI (not of two part)
● CSI (part 1 + part 2)
● HARQ ACK/NACK + CSI (part 1 + part 2)
● HARQ ACK/NACK + SR + CSI (part 1 + part 2)
However, the anticipated introduction of new UCI content types in future wireless communication networks, such as sensing information, presents a challenge. The number of potential payload combinations will significantly increase, rendering the current fixed approach inefficient. To address this challenge, some aspects of the present disclosure relate to a mechanism for flexible configuration of the order of UCI payload bits in future wireless communication networks. This approach leverages Downlink Control Information (DCI) to dynamically specify the order of bits within the UCI payload, akin to how data channels handle information. This shift towards flexible configuration aligns with the broader trend of unified and adaptable resource utilization in future wireless communication networks.
The current design of 5G NR Physical Uplink Control Channel (PUCCH) utilizes five distinct UCI formats. This section analyzes the potential for simplification in future wireless communication networks to achieve a more efficient and adaptable design.
Payload Size: The current approach dedicates formats (0 and 1) for payloads less than or equal to 2 bits (typically ACK/NACK and Scheduling Request) .
Symbol Duration: The existing design employs formats with varying symbol durations (1 or 2 symbols for formats 0 and 2, and 4 to 14 symbols for formats 1, 3, and 4) . In future wireless communication networks, a fully configurable approach can be explored. By dynamically allocating symbols based on payload size and channel conditions through Downlink Control Information (DCI) , the need for multiple pre-defined durations can be eliminated.
Resource Block Allocation: Similar to symbol duration, the current scheme assigns specific numbers of Resource Blocks (PRBs) to each format. This can be simplified in future wireless communication networks. DCI-based configuration can dynamically allocate PRBs based on payload size and channel characteristics, rendering multiple pre-defined options unnecessary.
Modulation: The current use of π/2 BPSK modulation across all formats can be supplemented with higher-order Quadrature Amplitude Modulation (QAM) in future wireless communication networks. This aligns with the anticipated advancements in modulation techniques and can potentially improve spectral efficiency.
Multi-user Transmission: The existing approach utilizes spreading sequences for simultaneous multi-user transmissions. In future wireless communication networks, this functionality can be directly associated with the payload size. For instance, a format can be designed for payloads less than or equal to 2 bits using a length-12 cyclic shift sequence, while another format can handle larger payloads with Nsf=2, 4 pre-DFT orthogonal cover code (OCC) . This eliminates the need for separate formats solely based on multi-user capabilities.
Dynamic Demodulation Reference Signal (DMRS) Configuration: The existing scheme dictates the presence or absence of DMRS based on the format. In future wireless communication networks, Downlink Control Information (DCI) can be leveraged to dynamically configure the DMRS ratio (over both frequency and time) based on real-time channel conditions. This allows for a more adaptable approach, balancing peak-to-average power ratio (PAPR) reduction with reference signal availability for channel estimation. For instance, formats handling smaller payloads might require less aggressive PAPR reduction and could utilize a lower DMRS ratio.
Flexible Hopping Behavior: Similar to DMRS, the current format-specific hopping patterns (sequence/cyclic shift or frequency) can be replaced with a DCI-based configuration. This allows the system to dynamically select the appropriate hopping behavior based on channel characteristics and interference scenarios. For example, sequence hopping might be suitable for low-mobility scenarios, while frequency hopping could be beneficial in high-mobility environments.
Configurable DFT-precoding: The current support for Discrete Fourier Transform (DFT) -precoding in specific formats (3 and 4) can be extended to a fully configurable approach in future wireless communication networks. DCI can be used to explicitly signal the desired precoding configuration based on the specific transmission requirements. Alternatively, precoding can be implicitly determined based on the allocated symbol duration, with longer symbols potentially benefiting from precoding for improved channel performance.
By adopting a more flexible and configurable approach to UCI format design in future wireless communication networks, the system can achieve significant efficiency gains. Dynamic allocation of resources based on real-time requirements can optimize spectrum utilization and cater to diverse UCI demands.
The resource allocation scheme for uplink control information (UCI) in future wireless communication networks is expected to retain a similar structure as in 5G NR. This approach leverages a combination of semi-static configuration through Radio Resource Control (RRC) signaling and dynamic allocation via Downlink Control Information (DCI) and may include the following features.
Semi-static Configuration for Periodic UCI: Similar to 5G, certain periodic UCI content, particularly Scheduling Requests (SR) and Channel State Information (CSI) reports, will likely continue to be semi-statically configured in RRC. This configuration includes parameters such as periodicity, offset, and for periodic CSI/SR reports, partial information derived from the specific CSI or SR configuration itself. This approach provides a foundation for predictable and efficient transmission of recurring control information.
Dynamic Allocation for HARQ-ACK: Dynamic allocation using DCI remains crucial for Hybrid Automatic Repeat Request (HARQ) ACK/NACK signals. This ensures timely and accurate feedback on the success or failure of downlink data transmissions. This may comprise the following.
Common PUCCH Resource Allocation: In scenarios where an RRC connection is not yet established, a common PUCCH resource allocation for HARQ-ACKs might be pre-configured and signaled through System Information Block 1 (SIB1) .
Dedicated PUCCH Resource Allocation: Once an RRC connection is established, dedicated PUCCH resources can be dynamically signaled by DCI. These resources are selected from a pool of pre-configured PUCCH resource sets defined by RRC. Each resource set may contain multiple (typically 8 or more) individual resource configurations. Finally, the specific UCI payload itself can further influence the selection of the appropriate PUCCH resource within the chosen set through DCI.
By maintaining a balance between semi-static configuration and dynamic allocation, future wireless communication networks can achieve efficient utilization of uplink control channels while ensuring timely transmission of critical control information like HARQ feedback and periodic reports.
The current design of 5G NR Physical Uplink Control Channel (PUCCH) utilizes format-specific rules for resource mapping. Format 1 dictates that UCI symbols occupy odd-numbered symbols within the PUCCH allocation. Formats 3 and 4 define the number of Demodulation Reference Signals (DMRS) based on PUCCH length and hopping behavior. While this approach offers a degree of simplicity, it lacks flexibility in adapting to diverse channel conditions.
In contrast, PUCCH in future wireless communication networks can benefit from a unified resource mapping scheme with dynamic pattern selection. This approach leverages Radio Resource Control (RRC) signaling to pre-define a set of DMRS resource patterns. These patterns can encompass various configurations, including:
Number of DMRS Symbols: The pattern can specify the number of DMRS symbols for different PUCCH lengths. This aligns with the current behavior of formats 3 and 4 for lengths 10 to 14, allowing for adaptation based on channel estimation requirements.
DMRS Symbol Placement: The pattern can define the specific locations of DMRS symbols within the PUCCH allocation. This could include options for placing them in specific slots or subcarriers, offering flexibility beyond the current format-specific rules in formats 1, 3, and 4.
The procedures to determine UCI formats and configurations in 5G are illustrated with respect to FIG. 6.
As seen in FIG. 6, the number of UCI payload bits 601 and a resource indicator 602 are used to select a PUCCH resource at block 603. A format 604 may then be selected from among formats 0, 1, 2, 3, or 4. Further processing may then occur based on the selected format at block 605.
The current design of 5G NR Physical Uplink Control Channel (PUCCH) utilizes five distinct UCI formats for transmitting various control information elements. While this approach offers some level of functionality, it suffers from limitations that could hinder future flexibility and efficiency, discussed below.
The current design relies on a predefined set of nine combinations of UCI content. This approach becomes increasingly complex as new control information types emerge (e.g., sensing reports, AI-driven control signals, enhanced CSI) . With the addition of just a few new content types, the number of combinations could potentially explode to around 40, significantly increasing the complexity of format selection and resource allocation.
The distinction between some formats has diminished with evolving standards. For instance, Format 4 was initially distinguished from formats 2 and 3 by its specific multi-user multiplexing capability with a length-2, 4 spreading factor. However, with the introduction of Release 17, formats 2 and 3 now
offer similar capabilities. This convergence suggests the potential for a more unified approach to format design.
Several properties of the UCI transmission, such as payload size, symbol duration, bandwidth, modulation scheme, spreading sequence usage, and resource mapping, are currently tied to specific formats. While some of these properties offer flexibility within their respective formats, others lack the ability for dynamic configuration.
The current approach utilizes distinct methods for code bit generation, signal formation, and resource mapping for PUCCH and PUSCH. This can be further simplified by exploring a unified design with flexible configuration capabilities for both channels.
Addressing these limitations in UCI design of future wireless communication networks can pave the way for a more scalable, adaptable, and efficient control channel architecture.
The introduction of larger payload sizes and diverse new UCI content types in future wireless communication networks necessitates a redesign of the coding and modulation scheme for UCI transmission. This redesign aims to efficiently support the control signaling requirements of future applications, such as native on-device AI processing for wireless networks and integrated sensing and communication (ISAC) systems.
Four design aspects for consideration include:
MCS Selection for UCI: Modulation and Coding Scheme (MCS) selection for UCI transmission plays a crucial role in balancing data rate, transmission reliability, and resource utilization. The current 5G NR approach might need to be revisited to accommodate the potential for larger payloads and diverse content types. This could involve exploring new MCS options (by introducing new MCS tables) or adapting existing ones based on payload size, content type, and real-time channel condition.
Maximum Mother Code Length for Polar Code and Code Block Segmentation: The current reliance on polar codes in 5G NR might not be optimal for very large payloads. A design in future wireless communication networks can explore options such as:
Extended Polar Codes: Utilizing longer polar code constructions could be an option for moderately larger payloads.
Code Block Segmentation: For very large payloads, segmenting the data into smaller code blocks before applying polar coding could be beneficial. This allows for efficient use of channel coding resources and potentially enables parallel decoding for faster processing.
Joint UCI Code Selection and Code Block Segmentation: A more advanced approach could involve jointly considering code selection and code block segmentation. New coding schemes such as LDPC codes and Woven codes may be adopted. This would involve dynamically selecting the most suitable coding schemes based on factors like payload size, channel quality, and desired decoding latency.
Intra-RAN Data
The present disclosure is directed to configuring uplink channels for new traffic types in future wireless communication networks. These new traffic types originate in the physical layer, and are used to assist physical layer functions only. Thus, this data generally does not reach higher layers. Throughout this disclosure, this traffic type will be termed “Intra-RAN data” , where RAN stands for Radio Access Network. Generally, Intra-RAN data involves larger payloads than legacy UCI data, and usually does not require the same high reliability. The terms “Extended UCI” or “E-UCI” may in some cases be used to refer to Intra-RAN data.
Depending on the application for which it is intended, Intra-RAN data may be lossless or lossy. For some traffic types, such as scheduling request, HARQ/ACK, DCI indicators or some CSI, transmission needs to be lossless. In these cases, CRC bits may be attached to the payload to detect any error. In the case of a detected error, the data cannot be used. Other traffic types, such as extended CSI, and AI or sensing data, are error-tolerant, and thus need not to be lossless. For these data, fewer CRC bits or no CRC bits are attached to the data.
Intra-RAN data may include, without limitation, Artificial Intelligence (AI) related data, and sensing data.
AI related data may include, without limitation, datasets and related information, which may include indexes, identifiers, group indexes, group identifiers, and type indexes, amongst others. AI related data may further include, without limitation, models, weights, and gradients, and their related information which may also include indexes, identifiers, group indexes, group identifiers, and type indexes, amongst others. AI related data may further include, without limitation, mapping relationships between dataset information, model and weights information, and gradients information. Mapping relationships may be represented as tables or pairs of identifiers, in at least some embodiments. AI related data may further include, without limitation, convergence status, and maximum time allowed for training and inference. AI related data may further include, without limitation, beam management information, enhanced positioning information, CSI prediction information, CSI compression information, and life cycle management information for AI-related procedures.
Sensing data may include, without limitation, multipath indications such as, a number of paths, a path index, a path direction, a power value of each path, and a time delay of each path. Multipath indications may be relative to a reference value, or absolute values. Sensing data may further include, without limitation, angle indications, phase indications (per path, and per path group) , doppler indications, position indications, range indications, and trajectory indications. Sensing data may further include, without limitation, environmental data, such as ground truth data, anchor point data, point cloud data, clutter data, norm direction, reflection direction, and location, shape, and size of objects.
While the above describes the use of Intra-RAN data for sensing and AI applications, other applications may use Intra-RAN data formats described herein and the present disclosure is not limited in this respect.
MCS Selection for Intra-RAN Data
One aspect of the Intra-RAN data design for future wireless communication networks relates to modulation and coding scheme (MCS) selection. The MCS is an essential parameter that determines the efficiency and reliability of transmissions. It is generally represented by an index that indicates a specific combination of modulation order and code rate. Generally, a higher MCS index corresponds to a higher modulation order and code rate, leading to increased data throughput but potentially reduced reliability.
In 5G, the UCI transmitted on PUCCH employs a fixed QPSK modulation, while the UCI transmitted on PUSCH uses the same MCS index as the data traffic. However, this approach has limitations when considering the diverse requirements of Intra-RAN data in future wireless communication networks. To address these challenges, some examples of the present disclosure involve defining a separate MCS index field for Intra-RAN traffic or reusing the MCS index field of the data traffic but adding an additional flag to distinguish between Intra-RAN and data channels. This new method enables explicit specification of modulation order and coding rate for Intra-RAN transmissions.
In some scenarios, Intra-RAN traffic requires higher reliability compared to data traffic, it is prudent to ensure a more conservative MCS selection in these cases.
One approach could involve creating a new MCS table with carefully chosen modulation orders and code rates, which are generally lower than those in the standard MCS table. This tailored MCS table would prioritize reliable Intra-RAN transmission over data throughput.
Another possible solution is to reuse the ultra-reliable low-latency communication (URLLC) MCS table for Intra-RAN traffic, given its emphasis on reliability. The URLLC MCS table typically offers more conservative modulation orders and code rates, making it a suitable candidate for ensuring high-reliability Intra-RAN transmissions in future wireless communication networks.
To indicate the new MCS index, some example solutions include a dedicated MCS field in the downlink control information (DCI) payload specifically designed for Intra-RAN transmission. This field would signal the appropriate MCS index to be used by the user equipment (UE) , ensuring that both the UE and the base station use consistent parameters during Intra-RAN communications.
The design of Physical Uplink Control Channel (PUCCH) in future wireless communication networks might incorporate a new, data-like approach to Modulation and Coding Scheme (MCS) selection for Intra-RAN transmission. This new approach can coexist with the existing uplink control MCS selection used in 5G NR.
Conventional UCI Content on PUCCH: For traditional UCI content transmitted on PUCCH, the current scheme using QPSK modulation and resource calculation methods defined in 5G NR would likely be maintained. This ensures compatibility with existing user equipment (UE) and avoids unnecessary complexity for well-established control signaling formats.
Intra-RAN Content on PUSCH: For new, Intra-RAN content types with potentially larger payloads or more complex requirements, future wireless communication networks might introduce an explicit MCS selection method based on an MCS index transmitted within the control signaling (e.g., DCI) . This approach offers greater flexibility and control over the air interface for these new content types.
DCI Field for MCS Selection Flag: Alternatively, a new Downlink Control Information (DCI) field, such as "UCI_MCS_flag, " could be introduced. This flag would signal to the UE whether to use the explicit MCS selection method based on the MCS index or rely on the legacy UCI modulation and rate matching schemes from 5G NR. This approach provides flexibility for the network to determine the most appropriate MCS selection method on a per-transmission basis, considering factors like payload size, content type, and channel conditions.
In summary, a more flexible and adaptive MCS selection strategy may be tailored explicitly for Intra-RAN data in future wireless communication networks. By defining a separate MCS index field or reusing the data traffic's MCS index field with an additional flag, example solutions can enable explicit modulation order and code rate specification for Intra-RAN transmissions. Furthermore, by employing a more conservative MCS table or reusing the URLLC MCS table, example solutions may ensure that Intra-RAN data benefits from higher reliability in future wireless communication networks.
In the following description, a UCI payload refers to both legacy UCI data types found in 5G and to Intra-RAN payloads.
Reference is now made to FIG. 7, in which a call flow diagram between a User Equipment (UE) and a Base Station (BS) implementing one embodiment of the present disclosure is shown.
As seen in FIG. 7, a UE 701 may receive a Downlink Control Information (DCI) message as message 710 from base station 702. UE 701 may decode the DCI and obtain information from the DCI
about what MCS to use for sending an Uplink Control Information (UCI) message 720 back to the base station 702. UCI message 720 may comprise legacy UCI data or Intra-RAN data.
Reference is now made to FIG. 8, which illustrates a method at a UE according to at least one embodiment of the present disclosure.
The method starts at block 800 and proceeds to block 810 in which the UE receives a DCI message.
The method then proceeds to block 820 in which a resource is determined from the DCI message to transmit a UCI message. The UCI message may comprise legacy UCI data or Intra-RAN data.
The method then proceeds to block 830 in which it is determined whether the DCI message includes a flag set indicating to use an indexed MCS.
If the flag is set, the method proceeds to block 840 in which an index is retrieved from the DCI message. The index is used to retrieve an MCS from a table. For example, the MCS table may be a separate dedicated table indexing different MCS for use in UCI messages. Alternatively, the MCS table may be the same table used to index MCS for data messages. According to at least one embodiment, the table may be the URLLC MCS table.
At block 850, the UCI message is encoded with the indexed MCS.
Alternatively, if the flag is not set, the method proceeds to block 860, in which the UCI message is encoded using a legacy MCS. For example, the UCI message could be encoded according to the 5G standard.
In both cases, the method then proceeds to block 870 in which the encoded UCI message is transmitted on the resource, and the method ends at block 880.
Reference is now made to FIG. 9, which illustrates a method at a UE according to at least one other embodiment of the present disclosure.
The method starts at block 900 and proceeds to block 910 in which the UE receives a DCI message.
The method then proceeds to block 920 in which a resource is determined from the DCI message to transmit a UCI message. The UCI message may comprise legacy UCI data or Intra-RAN data.
The method then proceeds to block 930 in which an MCS index is retrieved from the DCI message.
The method then proceeds to block 940 in which it is determined whether the DCI message includes a flag set indicating to use an indexed MCS for the UCI.
If the flag is set, the method proceeds to block 950 in which the UCI MCS table is selected. For example, the UCI MCS table may be a separate dedicated table indexing different MCS for use in UCI messages or the URLCC MCS table.
Alternatively, if the flag is not set, the method proceeds to block 960, in which the data MCS table is selected.
The method then proceeds to block 970 in which an MCS is retrieved from the selected table based on the index from the DCI. The method then proceeds to block 980 in which the UCI message is encoded with the retrieved MCS, and then to block 990 in which the encoded UCI message is transmitted on the resource. The method then ends at block 995.
Reference is now made to FIG. 10, which illustrates a method at a UE according to at least one other embodiment of the present disclosure. In this embodiment, the DCI contains two indices, one index for UCI, and one index for data.
The method starts at block 1000 and proceeds to block 1010 in which the UE receives a DCI message.
The method then proceeds to block 1020 in which a resource is determined from the DCI message to transmit a UCI message. The UCI message may comprise legacy UCI data or Intra-RAN data.
The method then proceeds to block 1030 in which a UCI MCS index is retrieved from the DCI message.
The method then proceeds to block 1040 in which a data MCS index is retrieved from the DCI message. In at least some embodiments, the UE may discard the data MCS index unless the UE has data scheduled for upload.
The method then proceeds to block 1050 in which the UCI MCS index is used to retrieve a UCI MCS from a table. For example, the MCS table may be a separate dedicated table indexing different MCS for use in UCI messages. Alternatively, the MCS table may be the same table used to index MCS for data messages. According to at least one embodiment, the table may be the URLLC MCS table.
The method then proceeds to block 1060 in which the UCI message is encoded with the retrieved MCS. The method then proceeds to block 1070 in which the encoded UCI message is transmitted on the resource. The method then ends at block 1080.
Maximum Mother Code Length for Polar Code and Code Block Segmentation
One aspect of Intra-RAN transmission in future wireless communication networks relates to enhancement of polar codes and code block segmentation. These improvements aim to accommodate long payload bit sequences while maintaining reliable communication.
Maximum mother code length increase: To accommodate longer payloads in future wireless communication networks for Intra-RAN data, example solutions involve increasing the maximum mother code length from 1024 to higher values such as 2048, 4096, 8192, or 16384. Specifically, 2048 and 4096 are particularly suitable choices since polar codes perform better than LDPC codes below these lengths.
New polar reliability sequence: With an increased mother code length, a polar reliability sequence of corresponding length must be defined. This new sequence may be extended from the current length-1024 polar reliability sequence used in 5G NR, ensuring backward compatibility by nesting the 5G sequence within the new polar sequence.
New polar code block segmentation: Given the possibility of extremely long payload sequences, example solutions redefine the polar code block segmentation method. In 5G NR, the information block length threshold for segmenting a payload bit sequence into multiple blocks is 1013. With a maximum mother code length of up to 4096, this threshold may be increased proportionally-for example, to 4052 (i.e., 1013 × 4) -to ensure efficient segmentation and decoding for long payloads.
Segmentation between high-priority (HP) and low-priority (LP) payload bits: This code block segmentation method takes into account the priority levels of the payload bits. By considering the priority of the information, the payload bits with similar importance can be encoded in the same code block. In this way, high-priority data is more likely to be accurately decoded even under challenging channel conditions, ensuring reliable communication for critical control information in future wireless communication networks.
In summary, these methods enhance polar codes and include code block segmentation for uplink control information in future wireless communication networks. By increasing the maximum mother code length, defining a new polar reliability sequence, redefining the code block segmentation method, and introducing priority-based payload bit segmentation, example solutions can effectively handle longer payloads while maintaining reliable communication in future wireless communication networks.
Reference is now made to FIG. 11 which illustrates a method at a UE according to at least one other embodiment of the present disclosure. In this embodiment, the UE has a payload of UCI to be transmitted to a base station. Again, the UCI payload may be an Intra-RAN payload, or a legacy 5G UCI payload.
The method starts at block 1100 and proceeds to block 1110 in which the UE determines the size of the payload to be transmitted. The method then proceeds to block 1120 where the size of the payload is compared to a threshold. In at least some embodiments, the threshold may be a maximum block length. As discussed above, in 5G NR, the threshold is 1013 bits. When using a mother code length for polar codes of 4096, the threshold may be set at 4052. As seen in Table 1, below, other options are possible, based on the mother code length used.
Table 1: Relationship between Mother Code Length and Information Block Length Threshold
If the payload size is greater than the threshold, the method proceeds to block 1130, where a block of the threshold size is created by selecting a threshold number of bits from the payload. The method then proceeds to block 1140 where the payload size (for comparison purposes) is reduced by the threshold to reflect the creation of the information block at block 1130. The method then returns to block 1120 where the new payload size is again compared to the threshold. These steps may be repeated until the payload size is less than the threshold, and the method proceeds to block 1150.
At block 1150, the remaining bits of the payload are used to create another information block. As this number is less than the threshold, all remaining bits of the payload can be included in one block.
The method then proceeds to block 1160 where all blocks are encoded, and then to block 1170 where all blocks are transmitted. The method then ends at block 1180.
Reference is now made to FIG. 12 which illustrates a method at a UE according to at least one other embodiment of the present disclosure. In this embodiment, the UE has an Intra-RAN payload to be transmitted to a base station, where some bits of the payload are high-priority bits, and some bits of the payload are low-priority bits. Generally high-priority bits are bits relating to information which is critical to the proper functioning of the network, whereas low-priority bits relate to information which is not critical. However, the present disclosure is not limited in this regard.
The method starts at block 1200 and proceeds to block 1210 where the payload is divided into high-priority bits and low-priority bits. As discussed above, this division may be performed using any relevant method as would be appreciated by those skilled in the art.
The method then proceeds to block 1220 where high-priority bits are segmented into information blocks, based on a threshold size for information blocks. The segmentation may be performed according to the method illustrated in FIG. 11 discussed above.
The method then proceeds to block 1230 where low-priority bits are segmented into information blocks, based on a threshold size for information blocks. Again, the segmentation may be performed according to the method illustrated in FIG. 11 discussed above.
The method then proceeds to block 1240 where an MCS is selected for the high-priority blocks created at block 1220. Generally, the MCS selected for high-priority blocks is a more conservative MCS, providing a very low error rate.
The method then proceeds to block 1250 where an MCS is selected for the low-priority blocks created at block 1230. Generally, the MCS selected for low-priority blocks is a higher order MCS, as the transmission of low-priority bits can tolerate a greater error rate than the transmission of high-priority bits.
The method then proceeds to block 1260 where all blocks are encoded according to their selected MCS. As discussed above, high-priority blocks are encoded with a conservative MCS, whereas low-priority blocks may be encoded with a higher order MCS.
The method then proceeds to block 1270 where all encoded blocks are transmitted, and the method ends at block 1280.
Joint UCI Code Selection and Code Block Segmentation
One aspect of Intra-RAN transmission in future wireless communication networks relates to joint UCI code selection and code block segmentation. These techniques optimize encoding based on payload size, content, and code type to enhance performance and ensure reliable communication.
Intra-RAN code selection based on payload size: For payloads with length A larger than a certain threshold or code rate R higher than a predefined value, LDPC codes are chosen for encoding. Otherwise, Reed-Muller (RM) and/or polar codes are selected as the encoding method. This approach ensures that the optimal code type is used depending on the payload size and code rate requirements.
The above code selection may apply only to Intra-RAN content, and does not apply to legacy 5G UCI types and content. For example, only polar codes are selected for UCI types: ACK/NACK, SR, CSI part 1, CSI part 2.
Intra-RAN code selection based on payload content: The payload type influences the choice of code for encoding. For AI-related information (e.g., model weights or data sets) or ISAC/sensing-related information (e.g., radio frequency maps or location details) , LDPC codes are selected due to their better performance in these scenarios. Alternatively, for traditional UCI payload types in 5G, such as ACK/NACK, SR, and CSI, RM and polar codes can be chosen. Moreover, certain enhanced CSI components, like CSI part 2 or specific CSI elements with longer lengths (e.g., enhanced PMI) , may also benefit from LDPC encoding instead of polar codes for improved performance.
Code block segmentation based on code type: With both polar codes and LDPC codes suitable for long sequences, code block segmentation now depends on the chosen code type. This tailored approach ensures efficient decoding and improves overall system performance.
Adjusting the maximum payload length of polar codes: By offloading larger payloads to LDPC codes, example solutions can limit the maximum payload length for polar codes to maintain an optimal balance between encoding efficiency and decoding complexity. In future wireless communication networks, this maximum number may increase to 4, 6, or 8 code blocks, compared to 2 code blocks in
5G. In contrast, there is no upper limit on the maximum number of LDPC code blocks: Although LDPC codes can be used for encoding UCI bits in future wireless communication networks, there is no fixed upper limit on the maximum number of code blocks to provide greater flexibility and accommodate various payload sizes and requirements.
LDPC base graph (BG) selection: If LDPC is selected for encoding Intra-RAN payload bits, only the base graph (BG2) of 5G LDPC code will be used because it has better performance at lower code rate. Alternatively, considering that large payloads are assigned to LDPC codes, a new LDPC base graph (BG) may be developed to optimize encoding performance for these scenarios. This new LDPC BG may enhance the overall efficiency of Intra-RAN data transmission in future wireless communication networks.
In summary, methods for joint code selection and code block segmentation may be used in Intra-RAN transmissions in future wireless communication networks. By considering payload size, content, and code type, example solutions may ensure or facilitate optimal encoding performance while maintaining a balance between decoding complexity and reliability, further enhancing the capabilities of future wireless communication networks.
Reference is now made to FIG. 13, which illustrates a method at a UE for code selection according to at least one embodiment of the present disclosure.
The method starts at block 1300 and proceeds to block 1310 where the UE determines the type of payload to be transmitted. According to at least some embodiments, the payload type may be an Intra-RAN payload type or a 5G payload type, however the present disclosure is not limited in this respect. For example, an Intra-RAN payload type may include Artificial Intelligence (AI) related information, sensing related information, and enhanced CSI components amongst others. A 5G payload type may include ACK/NACK, Scheduling Requests (SR) , and CSI, amongst others.
The method then proceeds to block 1320 to check if the payload type is an Intra-RAN payload type. If the payload type is an Intra-RAN payload type, the method proceeds to block 1330 where the length of the payload is determined, and then to block 1340 where the coding rate of the payload is determined. For example, the coding rate may be known from a MCS index provided by a base station in a DCI message, or the coding rate may be deduced from the payload size and available resources for transmitting the payload.
The method then proceeds to block 1350 to check if the length of the payload is greater than a length threshold TL, or if the coding rate is greater than a rate threshold TR. If the length of the payload is found to be greater than TL, or if the coding rate for the payload is found to be greater than TR, the method proceeds to block 1360, where an LDPC code is selected for the payload. The method then proceeds to block 1390 and ends.
According to at least some embodiments, the thresholds TL and TR may be fixed by a standard. For example, TL may be set to 1013 or 1026 in some embodiments, and TR may be set to 1/2 or 2/3 in some embodiments.
Alternatively, if the length of the payload is less than TL and the code rate for the payload is less than TR, the method proceeds to block 1370 where a Reed-Muller code or a polar code is selected. The choice between a Reed-Muller code or a polar code may be governed by payload length, in at least some embodiments. The method then proceeds to block 1390 and ends.
Returning to block 1320, if the payload is a 5G type payload, the method proceeds to block 1380 where a polar code is selected. The method then proceeds to block 1390 and ends.
Once the method of FIG. 13 ends, the UE may encode the payload according to the selected code, and transmit the encoded payload to a base station or network element.
Aspects related to MCS selection for Intra-RAN data may include introducing explicit modulation order and coding rate specification, using a new MCS table or the URLLC MCS table. A new MCS field in DCI indicates the MCS for UCI. This tailored MCS selection for Intra-RAN data may allow for more efficient signaling and flexible modulation schemes.
Some aspects relate to increasing maximum mother code length for polar codes, defining a new polar reliability sequence of larger length, and implementing new polar code block segmentation based on payload size. High-priority and low-priority payload bit segmentation is also introduced. Some examples include longer polar codes, optimized reliability sequences, and adaptive segmentation for varying Intra-RAN payload sizes.
Some aspects relate to joint Intra-RAN code selection and code block segmentation based on payload length and code rate. LDPC codes will be used if the payload length or code rate exceeds specific thresholds. The maximum number of polar code blocks increases, while there is no upper limit for LDPC code blocks. This adaptive coding scheme that accounts for various Intra-RAN payload lengths and code rates may provide more flexible and efficient channel encoding.
Aspects of the present disclosure include:
● Adaptive MCS selection and signaling for Intra-RAN data.
● Extended polar codes with larger mother code length and optimized reliability sequences.
● Flexible code block segmentation based on payload size, priority, and type.
● Adaptive coding scheme selection accounting for payload length and code rate.
The above functionality may be implemented on any one or combination of computing devices. Figure 14 is a block diagram of a computing device 1400 that may be used for implementing the devices and methods disclosed herein. Specific devices may utilize all of the components shown, or only a subset of the components, and levels of integration may vary from device to device. Furthermore, a device may contain multiple instances of a component, such as multiple processing units, processors, memories, transmitters, receivers, etc. The computing device 1400 may comprise a processor 1410, memory 1420, a mass storage device 1440, and peripherals 1430. Peripherals 1430 may comprise, amongst others one or more input/output devices, such as a speaker, microphone, mouse, touchscreen, keypad, keyboard, printer, display, network interfaces, and the like. Communications between processor 1410, memory 1420, mass storage device 1440, and peripherals 1430 may occur through one or more buses 1450.
The bus 1450 may be one or more of any type of several bus architectures including a memory bus or memory controller, a peripheral bus, video bus, or the like. The processor 1410 may comprise any type of electronic data processor. The memory 1420 may comprise any type of system memory such as static random-access memory (SRAM) , dynamic random-access memory (DRAM) , synchronous DRAM (SDRAM) , read-only memory (ROM) , a combination thereof, or the like. In an embodiment, the memory 1420 may include ROM for use at boot-up, and DRAM for program and data storage for use while executing programs.
The mass storage device 1440 may comprise any type of storage device configured to store data, programs (e.g. instructions or code) , and other information and to make the data, programs, and other information accessible via the bus. The mass storage device 1440 may comprise, for example, one or more of a solid-state drive, hard disk drive, a magnetic disk drive, an optical disk drive, or the like. The
memory 1420 or mass storage device 1440 may store instructions, which when executed by a processor or processing unit, cause or configure the computing device 1400 to perform any of the methods described herein.
Computing device 1400 may further comprise a communications subsystem 1460 for communicating with other computing devices or for connecting computing device 1400 to a computer network. Communications subsystem 1460 may comprise one or more network interfaces (not shown) , which may comprise wired links, such as an Ethernet cable or the like, and/or wireless links to access nodes or different networks. The network interface allows the processing unit to communicate with remote units via the networks. For example, the network interface may provide wireless communication via one or more transmitters/transmit antennas 1470 and one or more receivers/receive antennas 1470. In an embodiment, the processing unit is coupled to a local-area network or a wide-area network, for data processing and communications with remote devices, such as other processing units, the Internet, remote storage facilities, or the like.
Computing device may further comprise a power source 1480.
The present disclosure encompasses various embodiments, including not only method embodiments, but also other embodiments such as apparatus embodiments and embodiments related to non-transitory computer readable storage media. Embodiments may incorporate, individually or in combinations, the features disclosed herein.
Although this disclosure refers to illustrative embodiments, this is not intended to be construed in a limiting sense. Various modifications and combinations of the illustrative embodiments, as well as other embodiments of the disclosure, will be apparent to persons skilled in the art upon reference to the description.
Features disclosed herein in the context of any particular embodiments may also or instead be implemented in other embodiments. Method embodiments, for example, may also or instead be implemented in apparatus, system, and/or computer program product embodiments. In addition, although embodiments are described primarily in the context of methods and apparatus, other implementations are also contemplated, as instructions stored on one or more non-transitory computer-readable media, for example. Such media could store programming or instructions to perform any of various methods consistent with the present disclosure.
Claims (28)
- A method comprising:receiving control information from a base station, the control information comprising an uplink resource and a Modulation and Coding Scheme (MCS) flag;when the MCS flag is set:selecting an MCS from a table based on an index from the control information; andencoding a message with the selected MCS; andtransmitting the encoded message to the base station on the uplink resource.
- The method of claim 1, further comprising:when the MCS flag is not set:selecting a legacy MCS; andencoding the message with the legacy MCS.
- The method of claim 1 or claim 2, wherein the table is a dedicated table for Intra-RAN messages.
- The method of claim 1 or claim 2, wherein the table is an Ultra Reliable Low Latency Communications (URLLC) table.
- The method of claim 1 or claim 2, wherein the table is a data MCS table.
- The method of any one of claims 1 to 5, wherein the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- A method comprising:receiving control information from a base station, the control information comprising an uplink resource and a Modulation and Coding Scheme (MCS) flag;when the MCS flag is set:selecting an MCS from a dedicated Intra-RAN MCS table based on an index from the control information;when the MCS flag is not set:selecting the MCS from a data MCS table;encoding a message with the selected MCS; andtransmitting the encoded message to the base station on the uplink resource.
- The method of claim 7, wherein the Intra-RAN MCS table is an Ultra Reliable Low Latency Communications (URLLC) table.
- The method of claim 7 or claim 8, wherein the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- A method comprising:receiving control information from a base station, the control information comprising an uplink resource;selecting an Intra-RAN Modulation and Coding Scheme (MCS) from a first table based on an Intra-RAN index from the control information;encoding a message with the Intra-RAN MCS; andtransmitting the encoded message on the uplink resource.
- The method of claim 10, wherein the control information comprises the Intra-RAN index and a data index.
- The method of claim 10 or claim 11, wherein the first table is a dedicated Intra-RAN MCS table.
- The method of claim 10 or claim 11, wherein the first table is an Ultra Reliable Low Latency Communications (URLLC) table.
- The method of claim 11, further comprising:selecting a data MCS from a second table based on the data index; andencoding a data payload with the data MCS.
- The method of any one of claims 10 to 14, wherein the message comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- A method comprising:when a length of a payload is greater than a threshold, creating blocks having a length equal to the threshold until a remaining payload is shorter than the threshold;creating a last block with the remaining payload;encoding the blocks and the last block with a polar code; andtransmitting the blocks and the last block to a base station.
- The method of claim 16, wherein the threshold is based on a mother code length for the polar code.
- The method of claim 17, wherein the threshold is 1013 for a mother code length of 1024, the threshold is 2026 for a mother code length of 2048, the threshold is 4052 for a mother code length of 4096, the threshold is 8104 for a mother code length of 8192, and the threshold is 16208 for a mother code length of 16384.
- The method of any one of claims 16 to 18, wherein the payload comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- A method comprising:dividing a payload into high-priority bits and low-priority bits;encoding the high-priority bits with a first MCS;encoding the low-priority bits with a second MCS; andtransmitting the encoded high-priority bits and the encoded low-priority bits to a base station; wherein the first MCS is a lower order MCS than the second MCS.
- The method of claim 20, further comprising:segmenting the high-priority bits into a plurality of blocks based on a threshold size; andsegmenting the low-priority bits into a second plurality of blocks based on the threshold size.
- The method of claim 20 or claim 21, wherein the payload comprises Artificial Intelligence (AI) data, sensing data, or enhanced Channel State Information (CSI) components.
- A method comprising:when a payload type of a payload is an intra-RAN payload type:when a length of the payload is greater than a length threshold or a coding rate of the payload is greater than a rate threshold:selecting a Low Density Parity Check (LDPC) code; andwhen the length of the payload is less than the length threshold and the coding rate of the payload is less than the rate threshold:selecting a polar code or a Reed-Muller code;encoding the payload with the selected code; andtransmitting the payload to a base station.
- The method of claim 23, further comprising:when the payload type is not an intra-RAN payload type:selecting a polar code.
- The method of claim 23 or claim 24, wherein Intra-RAN payload types include Artificial Intelligence (AI) related information, sensing related information, and enhanced Channel State Information (CSI) components.
- The method of any one of claims 23 to 25, payload types that are not intra-RAN payload types include Acknowledgments (ACKs) , Negative Acknowledgements (NACKs) , Scheduling Requests (SRs) , and Channel State Information (CSI) .
- A computing device comprising:a processor; anda communications subsystem;wherein the computing device is configured to perform the method of any one of claims 1 to 26.
- A computer readable medium having stored thereon executable code for execution by a processor of a computing device, the executable code comprising instructions for performing the method of any one of claims 1 to 26.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202463565354P | 2024-03-14 | 2024-03-14 | |
| US63/565,354 | 2024-03-14 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2025189600A1 true WO2025189600A1 (en) | 2025-09-18 |
| WO2025189600A9 WO2025189600A9 (en) | 2025-11-27 |
Family
ID=97062611
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2024/100047 Pending WO2025189600A1 (en) | 2024-03-14 | 2024-06-19 | Method and apparatus for uplink control channel configuration |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025189600A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190313426A1 (en) * | 2018-04-04 | 2019-10-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and Systems for Performance Enhancement of Downlink Shared Channels |
| WO2020003542A1 (en) * | 2018-06-29 | 2020-01-02 | 株式会社Nttドコモ | User equipment and base station |
| US20210345366A1 (en) * | 2018-09-27 | 2021-11-04 | Sharp Kabushiki Kaisha | User equipment and base stations that achieve ultra reliable and low latency communications |
| US20230284139A1 (en) * | 2020-12-24 | 2023-09-07 | Huawei Technologies Co., Ltd. | Apparatuses and methods for communicating on ai enabled and non-ai enabled air interfaces |
-
2024
- 2024-06-19 WO PCT/CN2024/100047 patent/WO2025189600A1/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190313426A1 (en) * | 2018-04-04 | 2019-10-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and Systems for Performance Enhancement of Downlink Shared Channels |
| WO2020003542A1 (en) * | 2018-06-29 | 2020-01-02 | 株式会社Nttドコモ | User equipment and base station |
| US20210345366A1 (en) * | 2018-09-27 | 2021-11-04 | Sharp Kabushiki Kaisha | User equipment and base stations that achieve ultra reliable and low latency communications |
| US20230284139A1 (en) * | 2020-12-24 | 2023-09-07 | Huawei Technologies Co., Ltd. | Apparatuses and methods for communicating on ai enabled and non-ai enabled air interfaces |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2025189600A9 (en) | 2025-11-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR102670713B1 (en) | Apparatus and method for encoding and decoding in communication or broadcasting system | |
| US20240380420A1 (en) | Method and apparatus for low-density parity-check (ldpc) coding | |
| EP3954072B1 (en) | Method and apparatus for data transmission in wireless communication system | |
| KR102559502B1 (en) | Apparatus and method for transport block size determination in communication or broadcasting system | |
| KR102264719B1 (en) | Mapping of Channel Encoded Bits to Symbols for Retransmission | |
| KR102414531B1 (en) | Apparatus and method for encoding and decoding in communication or broadcasting system | |
| KR102559171B1 (en) | Method and apparatus for data transmission in wirelss cellular communication system | |
| KR102517960B1 (en) | Method and apparatus for data transmission in wirelss cellular communication system | |
| KR102445151B1 (en) | Apparatus and method for encoding and decoding in communication or broadcasting system | |
| KR102530968B1 (en) | Apparatus and method for encoding and decoding in communication or broadcasting system | |
| WO2025189600A9 (en) | Method and apparatus for uplink control channel configuration | |
| WO2025189554A1 (en) | Methods, apparatuses, and systems for configuring and transmitting uplink control information | |
| WO2025189627A1 (en) | Method, apparatus, and system for uplink control information retransmission | |
| WO2025102585A1 (en) | Methods, systems, and apparatus for adaptive transport block size determination and code block segmentation | |
| WO2025145503A1 (en) | Method and apparatus for communications | |
| WO2025123490A1 (en) | Methods, apparatus, and system for parity-check polar coding | |
| WO2025200174A9 (en) | Communication method, apparatus and system | |
| WO2025200174A1 (en) | Communication method, apparatus and system | |
| WO2025118429A1 (en) | Method, apparatus, and system for blockwise channel interleaving for error correction coding | |
| WO2025200209A1 (en) | Method for data transmission, communication apparatus and communication system | |
| WO2025118414A1 (en) | Methods, apparatus, and systems for polar code construction | |
| WO2025123499A1 (en) | Methods, apparatus, and systems of code bit selection for an error correction code | |
| WO2025102555A1 (en) | Methods, systems, and apparatus for determination of mother code length | |
| WO2025200189A1 (en) | Method and apparatus for communications | |
| WO2024245007A1 (en) | Error-correction coding methods for mixed traffic in wireless communications, and apparatuses, systems, and non-transitory computer-readable storage devices employing same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24929058 Country of ref document: EP Kind code of ref document: A1 |