RESOURCE REMAPPING AND REGROUPING IN A WIRELESS COMMUNICATION SYSTEM
First Claim
Patent Images
1. A method for communication in a communication network, the method comprising the steps of:
- establishing a mapping scheme between N resource combinations in a first time slot and N resource combinations in a second time slot in dependence upon a certain parameter n, with the mapping scheme established by;
j=g(i,n),where i denotes the index of a resource combination in the first time slot and i=1, 2, . . . , N, j denotes the index of a resource combination in the second time slot and j=1, 2, . . . , N, and g(a,b) is a pseudo-random function;
selecting a first resource combination from among the N resource combinations in the first time slot;
selecting a second resource combination from among the N resource combinations in the second time slot in accordance with the mapping scheme; and
transmitting information using the first resource combination in the first time slot during the first time slot and the second resource combination during the second time slot.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for remapping and regrouping transmission resources in a wireless communication system. First, a set of new permutation algorithms based on Galois field operation is proposed. Then the proposed algorithms and the known Pruned Bit Reversal Ordering (PBRO) algorithm are applied to several of various resource mapping schemes, including slot or symbol level Orthogonal Cover (OC)/Cyclic Shift (CS) mapping, cell-specific slot-level and symbol-level CS hopping patterns, and subframe and slot level base sequence hopping patterns.
132 Citations
89 Claims
-
1. A method for communication in a communication network, the method comprising the steps of:
-
establishing a mapping scheme between N resource combinations in a first time slot and N resource combinations in a second time slot in dependence upon a certain parameter n, with the mapping scheme established by;
j=g(i,n),where i denotes the index of a resource combination in the first time slot and i=1, 2, . . . , N, j denotes the index of a resource combination in the second time slot and j=1, 2, . . . , N, and g(a,b) is a pseudo-random function; selecting a first resource combination from among the N resource combinations in the first time slot; selecting a second resource combination from among the N resource combinations in the second time slot in accordance with the mapping scheme; and transmitting information using the first resource combination in the first time slot during the first time slot and the second resource combination during the second time slot. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for communication in a communication network, the method comprising the steps of:
-
dividing N resource combinations within each of a plurality of time slots into K subsets, with a k-th subset comprising Nk resource combinations, where k=1, 2, . . . , K; establishing a mapping scheme between the resource combinations in the subsets in a first time slot and the resource combinations in the subsets in a second time slot in dependent upon a certain parameter vector {right arrow over (n)}=[n1, n2, . . . , nK], where nk corresponds to a k-th subset, with the mapping scheme being established by;
ik,d=g(i,{right arrow over (n)})=gk(ik,c,nk), for k=1, 2, . . . , Kwhere i=ik,c, ik,c denotes the index of a resource combination within the N resource combinations in the first time slot, k denotes the index of the subset where the ik,c-th resource combination is located, c denotes the index of the ik,c-th resource combination within the k-th subset, ik,d denotes the index of a resource combination within the N resource combinations in the second time slot, k denotes the index of the subset where the ik,d-th resource combination is located, d denotes the index of the ik,d-th resource combination within the k-th subset, ik,c=(k−
1)×
Nk+c, ik,d=(k−
1)×
Nk+d, and g(a,b) is a pseudo-random function;selecting a first resource combination from among Nk resource combinations in a k-th subset in the first time slot; selecting a second resource combination from among Nk resource combinations in a k-th subset in the second time slot in accordance with the mapping scheme; and transmitting information using the first resource combination during the first time slot and the second resource combination during the second time slot. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
when the input and output resource indices starts from 1, such that c=1, 2, . . . Nk and d=1 . . . , Nk, and 1≦
nk≦
Nk; andestablishing the mapping scheme in accordance with a Galois Field based permutation function established by;
d′
=PG(c′
+1,nk,Nk)−
1when the input and output resource indices starts from 0, such that c′
=0, . . . , Nk−
1 and d′
=0, . . . , Nk−
1, and 1≦
nk≦
Nk.
-
-
22. The method of claim 20, comprised of establishing the mapping scheme in accordance with a Pruned Bit Reversal Ordering (PBRO) function established by:
d=PBRO(mod(c+nk−
1)+1,Nk).
-
23. The method of claim 20, comprised of assigning the same parameter vector n for all cells in the communication network.
-
24. The method of claim 20, comprised of assigning one parameter vector n for each cell in the communication network in dependence upon an identification of the cell.
-
25. The method of claim 20, comprised of each of the resource combinations comprising an orthogonal cover selected from a plurality of orthogonal covers and a cyclic shift of a base sequence selected from a plurality of cyclic shifts.
-
26. The method of claim 25, comprised of shifting the index of the cyclic shift within at least one resource combination on a modulation symbol in a subframe in a cell by an amount specified by h_sym(c_id,s_id,l_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_sym(c_id,s_id,l_id),K)where c_id denotes the identification of the cell, s_id denotes the identification of the subframe, l_id denotes the identification of the modulation symbol, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
27. The method of claim 26, comprised of h_sym(c_id,s_id,l_id) being one of a Galois Field based permutation function established by:
-
h_sym(c_id,s_id,l_id)=PG(x(l_id,K),r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_sym(c_id,s_id,l_id)=PBRO(mod(l_id+c_id+n−
1,K)+1,K),where x(l_id,K)=mod(l_id−
1,K)+1, and r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
28. The method of claim 25, comprised of shifting the index of the cyclic shift within at least one resource combination in a time slot in a cell by an amount specified by h_slot(c_id,sl_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_slot(c_id,sl_id),K)where c_id denotes the identification of the cell, sl_id denotes the identification of the time slot, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
29. The method of claim 28, comprised of h_slot(c_id,sl_id) being one of a Galois Field based permutation function established by:
-
h_slot(c_id,sl_id)=PG(sl_id,r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_slot(c_id,sl_id)=PBRO(mod(sl_id+c_id+n−
1,K)+1,K),where r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
30. A method for communication in a communication network, the method comprising the steps of:
-
dividing N resource combinations within each of a plurality of time slots into K subsets, with a k-th subset comprising Nk resource combinations, where k=1, 2, . . . , K, and N1=N=N2= . . . =NK; establishing an inter-subset interleaving scheme in at least one time slot in accordance with an interleaving parameter PG[s1, s2, sK], with the inter-subset interleaving scheme being established by;
j=w(i,PG[s1, s2, . . . , sK]), for k=1, 2, . . . , K,where w(i,PG[s1, s2, . . . , sK]) denotes the i-th resource combination in the time slot after the interleaving in accordance with the interleaving parameter PG[s1, s2, . . . , sK], and the interleaving parameter PG[s1, s2, . . . , sK] indicates that a subset having a pre-interleaving index of sk has a post-interleaving index of k, and 1≦
s1, . . . , sK≦
K;selecting a first resource combination from among the N resource combinations in a first time slot that has not been interleaved; selecting a second resource combination from among the N resource combinations in a second time slot that has been interleaved in accordance with the inter-subset interleaving scheme; and transmitting information using the first resource combination during the first time slot and the j-th resource combination during the second time slot. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37)
where c_id denotes the identification of the cell, s_id denotes the identification of the subframe, l_id denotes the identification of the modulation symbol, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
-
-
35. The method of claim 34, comprised of h_sym(c_id,s_id,l_id) being one of a Galois Field based permutation function established by:
-
h_sym(c_id,s_id,l_id)=PG(x(l_id,K),r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_sym(c_id,s_id,l_id)=PBRO(mod(l_id+c_id+n−
1,K)+1,K),where x(l_id,K)=mod(l_id−
1,K)+1, and r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
36. The method of claim 33, comprised of shifting the index of the cyclic shift within at least one resource combination in a time slot in a cell by an amount specified by h_slot(c_id, sl_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_slot(c_id,sl_id),K)where c_id denotes the identification of the cell, sl_id denotes the identification of the time slot, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
37. The method of claim 36, comprised of h_slot(c_id,sl_id) being one of a Galois Field based permutation function established by:
-
h_slot(c_id,sl_id)=PG(sl_id,r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_slot(c_id,sl_id)=PBRO(mod(sl_id+c_id+n−
1,K)+1,K),where r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
38. A method for communication in a communication network, the method comprising the steps of:
-
dividing N resource combinations within each of a plurality of time slots into K subsets, with a k-th subset comprising Nk resource combinations, where k=1, 2, . . . , K, and N1=N2= . . . =NK; establishing an intra-subset remapping scheme between the resource combinations in the subsets in a first time slot and the resource combinations in the subsets in a second time slot in dependent upon a certain parameter vector {right arrow over (n)}=[n1, n2, . . . , nK], where nk corresponds to a k-th subset, with the mapping scheme being established by;
ik,d=g(i,{right arrow over (n)})=gk(ik,c,nk), for k=1, 2, . . . , Kwhere i=ik,c, ik,c denotes the index of a resource combination within the N resource combinations in the first time slot, k denotes the index of the subset where the ik,c-th resource combination is located, c denotes the index of the ik,c-th resource combination within the k-th subset, ik,d denotes the index of a resource combination within the N resource combinations in the second time slot, k denotes the index of the subset where the ik,d-th resource combination is located, d denotes the index of the ik,d-th resource combination within the k-th subset, ik,c=(k−
1)×
Nk+c, ik,d=(k−
1)×
Nk+d, and g(a,b) is a pseudo-random function;establishing an inter-subset interleaving scheme for the subsets in at least one time slot in accordance with an interleaving parameter PG[s1, s2, . . . , sK], with 1≦
s1, . . . , sK≦
K, and the inter-subset interleaving scheme being established by;
j=w(i,PG[s1, s2, . . . , sK]), for k=1, 2, . . . , K,where w(i,PG[s1, s2, . . . , sK]) denotes the i-th resource combination in the time slot after interleaving the subsets in the time slots in accordance with the interleaving parameter PG[s1, s2, . . . , sK], and the interleaving parameter PG[s1, s2, . . . , sK] indicates that a subset having a pre-interleaving index of sk has a post interleaving index of k, where k=1, 2, . . . , K, and; selecting a first resource combination from among the N resource combinations in the first time slot; selecting a second resource combination from among the N resource combinations in the second time slot in accordance with the intra-subset remapping scheme and the inter-subset interleaving scheme, with j=g(w(i,PG[s1, s2, . . . , sK]),{right arrow over (n)}); and transmitting information using the first resource combination during the first time slot and the second resource combination during the second time slot. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45)
where c_id denotes the identification of the cell, s_id denotes the identification of the subframe, l_id denotes the identification of the modulation symbol, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
-
-
43. The method of claim 42, comprised of h_sym(c_id,s_id,l_id) being one of a Galois Field based permutation function established by:
-
h_sym(c_id,s_id,l_id)=PG(x(l_id,K),r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_sym(c_id,s_id,l_id)=PBRO(mod(l_id+c_id+n−
1,K)+1,K),where x(l_id,K)=mod(l_id−
1,K)+1, and r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
44. The method of claim 41, comprised of shifting the index of the cyclic shift within at least one resource combination in a time slot in a cell by an amount specified by h_slot(c_id,sl_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_slot(c_id,sl_id),K)where c_id denotes the identification of the cell, sl_id denotes the identification of the time slot, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
45. The method of claim 44, comprised of h_slot(c_id,sl_id) being one of a Galois Field based permutation function established by:
-
h_slot(c_id,sl_id)=PG(sl_id,r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_slot(c_id,sl_id)=PBRO(mod(sl_id+c_id+n−
1,K)+1,K),where r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
46. A method for communication in a communication network, the method comprising the steps of:
-
establishing a symbol-level cyclic shift mapping scheme between M cyclic shifts in a first modulation symbol in a transmission channel and M cyclic shifts in a second modulation symbol in the transmission channel in dependence upon a certain parameter n, with the first modulation symbol having an identification number of 1, the second modulation symbol having an identification number of more than 1, and with the symbol-level cyclic shift mapping scheme being established by;
m′
=t(m,l_id,n), for l_id>
1,where m denotes the index of a cyclic shift within the first modulation symbol and m=1, 2, . . . , M, m′
denotes the index of a cyclic shift within the second modulation symbol and m′
=1, 2, . . . , M, l_id denotes the identification number the second modulation symbol, and t(a, b, c) is a pseudo-random function;selecting a first cyclic shift from among the M cyclic shifts in the first modulation symbol; selecting a second cyclic shift from among the M cyclic shifts in the second modulation symbol in accordance with the mapping scheme; and transmitting information using the first cyclic shift in the first modulation symbol and the second cyclic shift in the second modulation symbol. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54)
where c_id denotes the identification of the cell, s_id denotes the identification of the subframe, l_id denotes the identification of the modulation symbol, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
-
-
52. The method of claim 51, comprised of h_sym(c_id,s_id,l_id) being one of a Galois Field based permutation function established by:
-
h_sym(c_id,s_id,l_id)=PG(x(l_id,K),r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_sym(c_id,s_id,l_id)=PBRO(mod(l_id+c_id+n−
1,K)+1,K),where x(l_id,K)=mod(l_id−
1,K)+1, and r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
53. The method of claim 46, comprised of shifting the index of at least one cyclic shift in a time slot in a cell by an amount specified by h_slot(c_id,sl_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_slot(c_id,sl_id),K)where c_id denotes the identification of the cell, sl_id denotes the identification of the time slot, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
54. The method of claim 53, comprised of h_slot(c_id,sl_id) being one of a Galois Field based permutation function established by:
-
h_slot(c_id,sl_id)=PG(sl_id,r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_slot(c_id,sl_id)=PBRO(mod(sl_id+c_id+n−
1,K)+1,K),where r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
55. A method for communication in a communication network, the method comprising the steps of:
-
establishing a slot-level cyclic shift mapping scheme between M cyclic shifts in a first time slot in a transmission channel and M cyclic shifts in a second time slot in the transmission channel in dependence upon a certain parameter n, with the slot-level cyclic shift mapping scheme being established by;
m′
=g(m,n),where m denotes the index of a cyclic shift within the first time slot and m=1, 2, . . . , M, m′
denotes the index of a cyclic shift within the second time slot and m′
=1, 2, . . . , M, and g(a,b) is a pseudo-random function;selecting a first cyclic shift from among the M cyclic shifts in the first time slot; selecting a second cyclic shift from among the M cyclic shifts in the second time slot in accordance with the mapping scheme; and transmitting information using the first cyclic shift in the first time slot and the second cyclic shift in the second time slot. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63)
when the input and output resource indices starts from 1, such that m=1, 2, . . . M and m′
=1 . . . , M; andthe pseudo-random function being a Galois Field based permutation function established by;
t′
=g(t,n)=PG(t+1,n,M)−
1when the input and output resource indices starts from 0, such that t=0, . . . , M−
1 and t′
=0, . . . , M−
1.
-
-
57. The method of claim 55, comprised of the pseudo-random function being a Pruned Bit Reversal Ordering (PBRO) function established by:
g(m,n)=PBRO(mod(m+n−
1,M)+1,M).
-
58. The method of claim 55, comprised of assigning the same parameter n for all cells in the communication network.
-
59. The method of claim 55, comprised of assigning one parameter n for each cell in the communication network in dependence upon an identification of the cell.
-
60. The method of claim 55, comprised of shifting the index of at least one cyclic shift on a modulation symbol in a subframe in a cell by an amount specified by h_sym(c_id,s_id,l_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_sym(c_id,s_id,l_id),K)where c_id denotes the identification of the cell, s_id denotes the identification of the subframe, l_id denotes the identification of the modulation symbol, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
61. The method of claim 60, comprised of h_sym(c_id,s_id,l_id) being one of a Galois Field based permutation function established by:
-
h_sym(c_id,s_id,l_id)=PG(x(l_id,K),r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_sym(c_id,s_id,l_id)=PBRO(mod(l_id+c_id+n−
1,K)+1,K),where x(l_id,K)=mod(l_id−
1,K)+1, and r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
62. The method of claim 55, comprised of shifting the index of at least one cyclic shift in a time slot in a cell by an amount specified by h_slot(c_id,sl_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_slot(c_id,sl_id),K)where c_id denotes the identification of the cell, sl_id denotes the identification of the time slot, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
63. The method of claim 62, comprised of h_slot(c_id,sl_id) being one of a Galois Field based permutation function established by:
-
h_slot(c_id,sl_id)=PG(sl_id,r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_slot(c_id,sl_id)=PBRO(mod(sl_id+c_id+n−
1,K)+1K),where r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
64. A method for communication in a communication network, the method comprising the steps of:
-
dividing a plurality of cyclic shifts within each of a plurality of time slots into two subsets, with each time slot comprising a plurality of resource combinations, and each resource combination comprising an orthogonal cover selected from a plurality of orthogonal covers and a cyclic shift selected from the plurality of cyclic shifts; allocating a first subset of cyclic shifts to channel quality indicator channels, and allocating a second subset of cyclic shifts to acknowledgement channels; selecting a first cyclic shift from the first subset of cyclic shifts in a first time slot for a channel quality indicator channel, and selecting a second cyclic shift from a first subset of cyclic shifts in a second time slot for the channel quality indicator channel in accordance with one of a symbol-level cyclic shift mapping scheme and a slot-level cyclic shift mapping scheme; selecting a third cyclic shift from the second subset of cyclic shifts in the first time slot for an acknowledgement channel, and selecting a fourth cyclic shift from the second subset of cyclic shifts in the second time slot for the acknowledgement channel in accordance with one of the symbol-level cyclic shift mapping scheme, the slot-level cyclic shift mapping scheme, a global resource mapping scheme, an intra-subset resource mapping scheme, an inter-subset interleaving scheme, an combination of the intra-subset resource mapping scheme and the inter-subset interleaving scheme; transmitting information regarding channel quality indicators by using the first cyclic shift during the first time slot and the second cyclic shift during the second time slot; and transmitting acknowledgement information by using the third cyclic shift during the first time slot and the fourth cyclic shift during the second time slot. - View Dependent Claims (65, 66, 67, 68, 69)
-
-
70. A method for communication in a communication network, the method comprising the steps of:
-
establishing a subframe-level base sequence mapping scheme between Z base sequences in a first subframe in a transmission channel and Z base sequences in a second subframe in the transmission channel in dependence upon a certain parameter n, with the first subframe having an identification number of 1, the second subframe having an identification number of more than 1, and with the subframe-level base sequence mapping scheme being established by;
z′
=s(z,s_id,n), for s_id>
1,where z denotes the index of a base sequence within the first subframe and z=1, 2, . . . Z, z′
denotes the index of a base sequence within the second subframe and z′
=1, 2, . . . , Z, s_id denotes the identification number the second subframe, and s(a, b, c) is a pseudo-random function;selecting a first base sequence from among the Z base sequences in the first subframe; selecting a second base sequence from among the Z base sequences in the second subframe in accordance with the mapping scheme; and transmitting information using the first base sequence during the first subframe and the second base sequence in the second subframe. - View Dependent Claims (71)
and a Pruned Bit Reversal Ordering (PBRO) function established by;
s(z,s_id,n)=PBRO(mod(z+s_id+n−
1,Z)+1,Z),where r(s_id,n,Z)=mod(s_id+n−
1,Z)+1.
-
-
72. A method for communication in a communication network, the method comprising the steps of:
-
establishing a slot-level base sequence mapping scheme between Z base sequences in a first time slot and Z base sequences in a second time slot 1 in dependence upon a certain parameter n, with the first time slot having an identification number of 1, the second time slot having an identification number of more than 1, and with the slot-level base sequence mapping scheme being established by;
z′
=s(z,sl_id,n), for sl_id>
1,where z denotes the index of a base sequence within the first time slot and z=1, 2, . . . , Z, z′
denotes the index of a base sequence within the second time slot and z′
=1, 2, . . . , Z, sl_id denotes the identification number the second time slot, and s(a, b, c) is a pseudo-random function;selecting a first base sequence from among the Z base sequences in the first time slot; selecting a second base sequence from among the Z base sequences in the second time slot in accordance with the mapping scheme; and transmitting information using the first base sequence during the first time slot and the second base sequence in the second time slot. - View Dependent Claims (73)
and a Pruned Bit Reversal Ordering (PBRO) function established by;
s(z,sl_id,n)=PBRO(mod(z+sl_id+n−
1,Z)+1,Z),where r(s_id,n,Z)=mod(s_id+n−
1,Z)+1.
-
-
74. A wireless terminal in a communication system, comprising a mapping unit establishing and broadcasting a mapping scheme between N resource combinations in a first time slot and N resource combinations in a second time slot in dependence upon a certain parameter n, with the mapping scheme established by:
-
j=g(i,n),where i denotes the index of a resource combination in the first time slot and i=1, 2, . . . , N, j denotes the index of a resource combination in the second time slot and j=1, 2, . . . , N, and g(a,b) is a pseudo-random function. - View Dependent Claims (75, 76, 77, 78, 79, 80, 81, 82, 83)
when the input and output resource indices starts from 1, such that i=1, 2, . . . N and j=1 . . . , N, and n is selected from a set of integers {1, 2, . . . , N}; and the pseudo-random function being a Galois Field based permutation function established by;
j′
=g(i′
,n)=PG(i′
+1,n,N)−
1when the input and output resource indices starts from 0, such that i′
=0, . . . , N−
1 and j′
=0, . . . , N−
1.
-
-
76. The wireless terminal of claim 74, comprised of the pseudo-random function being a Pruned Bit Reversal Ordering (PBRO) function established by:
j=g(i,n)=PRBO(mod(i+n−
1,N)+1,N).
-
77. The wireless terminal of claim 74, comprised of the parameter n being the same for all cells in the communication network.
-
78. The wireless terminal of claim 74, comprised of the parameter n being assigned to each cell in the communication network in dependence upon an identification of the cell.
-
79. The wireless terminal of claim 74, comprised of each of the resource combinations comprising an orthogonal cover selected from a plurality of orthogonal covers and a cyclic shift of a base sequence selected from a plurality of cyclic shifts.
-
80. The wireless terminal of claim 79, comprised of the mapping unit shifting the index of the cyclic shift within at least one resource combination on a modulation symbol in a subframe in a cell by an amount specified by h_sym(c_id,s_id,l_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_sym(c_id,s_id,l_id),K)where c_id denotes the identification of the cell, s_id denotes the identification of the subframe, l_id denotes the identification of the modulation symbol, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
81. The wireless terminal of claim 80, comprised of h_sym(c_id,s_id,l_id) being one of a Galois Field based permutation function established by:
-
h_sym(c_id,s_id,l_id)=PG(x(l_id,K),r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_sym(c_id,s_id,l_id)=PBRO(mod(l_id+c_id+n−
1,K)+1,K),where x(l_id,K)=mod(l_id−
1,K)+1, and r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
82. The wireless terminal of claim 79, comprised of the mapping unit shifting the index of the cyclic shift within at least one resource combination in a time slot in a cell by an amount specified by h_slot(c_id,sl_id), with the post-shifting index vi′
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
vi′
=cyclic_shift(vi,h_slot(c_id,sl_id),K)where c_id denotes the identification of the cell, sl_id denotes the identification of the time slot, K denotes the total number of the plurality of cyclic shifts, and cyclic_shift(a,b,N)=mod(a+b−
1,N)+1 when the plurality of cyclic shifts are indexed as 1, 2, . . . , N.
- of the cyclic shift having a pre-shifting index of vi within an i-th resource combination being established by;
-
83. The wireless terminal of claim 82, comprised of h_slot(c_id,sl_id) being one of a Galois Field based permutation function established by:
-
h_slot(c_id,sl_id)=PG(sl_id,r(c_id,n,K),K),and a Pruned Bit Reversal Ordering (PBRO) function established by;
h_slot(c_id,sl_id)=PBRO(mod(sl_id+c_id+n−
1,K)+1,K),where r(c_id,n,K)=mod(c_id+n−
1,K)+1.
-
-
84. A wireless terminal in a communication network, comprising a mapping unit, with the mapping unit:
-
dividing N resource combinations within each of a plurality of time slots into K subsets, with a k-th subset comprising Nk resource combinations, where k=1, 2, . . . , K; and establishing and broadcasting a mapping scheme between the resource combinations in the subsets in a first time slot and the resource combinations in the subsets in a second time slot in dependent upon a certain parameter vector {right arrow over (n)}=[n1, n2, . . . , nK], where nk corresponds to a k-th subset, with the mapping scheme being established by;
ik,d=g(i,{right arrow over (n)})=gk(ik,c,nk), for k=1, 2, . . . , Kwhere i=ik,c, ik,c denotes the index of a resource combination within the N resource combinations in the first time slot, k denotes the index of the subset where the ik,c-th resource combination is located, c denotes the index of the ik,c-th resource combination within the k-th subset, ik,d denotes the index of a resource combination within the N resource combinations in the second time slot, k denotes the index of the subset where the ik,d-th resource combination is located, d denotes the index of the ik,d-th resource combination within the k-th subset, ik,c=(k−
1)×
Nk+c, ik,d=(k−
1)×
Nk+d, and g(a,b) is a pseudo-random function.
-
-
85. A wireless terminal in a communication network, comprising a mapping unit, with the mapping unit:
-
dividing N resource combinations within each of a plurality of time slots into K subsets, with a k-th subset comprising Nk resource combinations, where k=1, 2, . . . , K, and N1=N2= . . . =NK; and establishing and broadcasting an inter-subset interleaving scheme in at least one time slot in accordance with an interleaving parameter PG[s1, s2, . . . , sK], with the inter-subset interleaving scheme being established by;
j=w(i,PG[s1, s2, . . . , sK]), for k=1, 2, . . . , K,where w(i,PG[s1, s2, . . . , sK]) denotes the i-th resource combination in the time slot after the interleaving in accordance with the interleaving parameter PG[s1, s2, . . . , sK], and the interleaving parameter PG[s1, s2, . . . , sK] indicates that a subset having a pre-interleaving index of sk has a post-interleaving index of k, and 1≦
s1, . . . , sK≦
K.
-
-
86. A wireless terminal in a communication network, comprising a mapping unit, with the mapping unit establishing and broadcasting a symbol-level cyclic shift mapping scheme between M cyclic shifts in a first modulation symbol in a transmission channel and M cyclic shifts in a second modulation symbol in the transmission channel in dependence upon a certain parameter n, with the first modulation symbol having an identification number of 1, the second modulation symbol having an identification number of more than 1, and with the symbol-level cyclic shift mapping scheme being established by:
-
m′
=t(m,l_id,n), for l_id>
1,where m denotes the index of a cyclic shift within the first modulation symbol and m=1, 2, . . . , M, m′
denotes the index of a cyclic shift within the second modulation symbol and m′
=1, 2, . . . , M, l_id denotes the identification number the second modulation symbol, and t(a, b, c) is a pseudo-random function.
-
-
87. A wireless terminal in a communication network, comprising a mapping unit, with the mapping unit establishing and broadcasting a slot-level cyclic shift mapping scheme between M cyclic shifts in a first time slot in a transmission channel and M cyclic shifts in a second time slot in the transmission channel in dependence upon a certain parameter n, with the slot-level cyclic shift mapping scheme being established by:
-
m′
=g(m,n),where m denotes the index of a cyclic shift within the first time slot and m=1, 2, . . . , M, m′
denotes the index of a cyclic shift within the second time slot and m′
=1, 2, . . . , M, and g(a,b) is a pseudo-random function.
-
-
88. A wireless terminal in a communication network, comprising a mapping unit, with the mapping unit establishing and broadcasting a subframe-level base sequence mapping scheme between Z base sequences in a first subframe in a transmission channel and Z base sequences in a second subframe in the transmission channel in dependence upon a certain parameter n, with the first subframe having an identification number of 1, the second subframe having an identification number of more than 1, and with the subframe-level base sequence mapping scheme being established by:
-
z′
=s(z,s_id,n), for s_id>
1,where z denotes the index of a base sequence within the first subframe and z=1, 2, . . . , Z, z′
denotes the index of a base sequence within the second subframe and z′
=1, 2, . . . , Z, s_id denotes the identification number the second subframe, and s(a, b, c) is a pseudo-random function.
-
-
89. A wireless terminal in a communication network, comprising a mapping unit, with the mapping unit establishing and broadcasting a slot-level base sequence mapping scheme between Z base sequences in a first time slot and Z base sequences in a second time slot 1 in dependence upon a certain parameter n, with the first time slot having an identification number of 1, the second time slot having an identification number of more than 1, and with the slot-level base sequence mapping scheme being established by:
-
z′
=s(z,sl_id,n), for sl_id>
1,where z denotes the index of a base sequence within the first time slot and z=1, 2, . . . , Z, z′
denotes the index of a base sequence within the second time slot and z′
=1, 2, . . . , Z, sl_id denotes the identification number the second time slot, and s(a, b, c) is a pseudo-random function.
-
Specification