Method and apparatus for conveying antenna configuration information via masking

FIELD: physics, communications.

SUBSTANCE: invention relates to interaction between a network entity, such as a base station, and a recipient, such as mobile terminal, and can be used to convey antenna configuration information. The method of providing antenna configuration information via masking involves: selecting a bit mask associated with an antenna configuration and a transmission diversity scheme, the bit mask being selected from a set of bit masks including a first bit mask associated with a single-antenna configuration, a second bit mask associated with a two-antenna configuration, and a third bit mask associated with a four-antenna configuration, wherein selecting the bit mask involves selecting the bit mask from the set of bit masks, the first bit mask having a maximum Hamming distance from the second bit mask; and applying the bit mask associated with the antenna configuration and the transmission diversity scheme to a set of predetermined bits within a plurality of bits.

EFFECT: reducing data loss due to high reliability of determining antenna configuration.

20 cl, 5 dwg

 

The technical FIELD

Embodiments of the present invention, in General, relate to the interaction between the network object, such as a base station, and a receiver, such as a mobile terminal, and more specifically to a method and device for transmitting information about the configuration of the antenna.

BACKGROUND of INVENTION

In traditional wireless communication systems, mobile devices or other user equipment to transmit information to the network and receive information from the network, for example, through the base station. In some networks, a base station or other network objects, which convey information to the user equipment can have a different configuration of antennas, including a different number of antennas, for example, one antenna two antennas four antennas, and/or can transmit information in accordance with various schemes spaced transmission. In this regard, the base station with a single antenna can transmit information without the use of spaced transmission, while the base station with two or four antennas can transmit information in accordance with the scheme exploded transfer or concrete exploded diagram of the transmission of a set of different available schemes spaced transmission. In order to effectively receive information from the base station equipment is the W user for example, should know or recognize the configuration of the antenna and/or an exploded diagram of transmission used by the base station. The mobile device is able to perform demodulation of a received signal only after correct identification of the configuration of the antenna, i.e. the number of transmitting antennas and/or exploded diagram of the transmission base station. Since the information about the configuration of the antenna required for proper demodulation of the received signal, the user equipment should identify the information about the configuration of the antenna with very high reliability.

For example, in a developed network of terrestrial radio access universal mobile communication system (E-UTRAN, Evolved Universal Mobile Telecommunication System (UMTS) Terrestrial Radio Access Network) equipment user may collect information about the configuration of the antenna of the base station, which is on the network E-UTRAN is called advanced node B (eNodeB), through the use of data contained in the characters of the message OFDM (Orthogonal Frequency Division Multiplexing, multiplexing orthogonal frequency division signals). For example, the specification of the partnership project third generation 3GPP (Third Generation Partnership Project), in particular, TS 3GPP 36.211, REL 8 and TS 36.212 3GPP, REL 8, provide information about the configuration of the antenna. In this regard, the user equipment can extract information is the situation about the configuration of the antenna of the transmitted reference signals or by attempting to decode data of a physical broadcast channel (SRF, Physical Broadcast Channel).

Network E-UTRAN node eNodeB does not explicitly informs the user equipment of the number of antennas and the exploded diagram of the transmission. Instead, the user equipment can analyze the provided reference signals to determine the number of antennas and/or schematic exploded transfer used by the node eNodeB. In General, the reference signals are placed in subcode channel SRF or other channel in accordance with the number of transmitting antennas of the base station. The reference signals are mainly intended to assess the channels. Regardless of the position reference signal inside Subhadra, presence detection reference signal allows the user equipment to determine the number of transmitting antennas of the base station. However, this procedure is unreliable in conditions of low signal-to-noise ratio, which should work channel of the strategic missile forces.

While information about the configuration of the antenna can be extracted from the reference signals, the user equipment, at least initially, has no information about the configuration of the antenna and/or exploded diagram of the transmission until the reception and demodulation of the channel of the strategic missile forces. Since the information about the configuration of the antenna is required for correct demodulation of the data channels and control channels, there may be a delay and data loss, if the equipment uses the user does not correctly set the configuration of the antenna and/or an exploded diagram of the transfer or if the user equipment is slow during the determination of the configuration of the antenna and/or schematic exploded transfer. As a consequence, the user equipment is sometimes designed to make assumptions about the configuration of the antenna and/or schematic exploded transfer. Such assumptions about the configuration of the antenna and/or exploded diagram of the transmission can be made before or during demodulation channel of the strategic missile forces and are not always correct. Therefore, the user equipment can make an assumption about the configuration of the antenna and/or exploded diagram of the transmission based on a subset of information from the channel of the strategic missile forces. For example, in some cases, you may apply the scheme early decoding channel of the strategic missile forces, which uses the information obtained from the first four packets (burst) information, including the strategic missile forces.

However, even if the configuration of the antenna and/or schematic exploded transfer was made the incorrect assumption that this error is not always apparent immediately after demodulation and decoding. In some cases, the channel of SRF can be correctly demodulated and decoded, even if you have made an incorrect assumption. This is called a false definition. In such situations, the user equipment does not have any means for detecting that the assumption was wrong. Thus, the user equipment may continue to use the incorrect assumption when further with the ides, that leads to bad performance.

In addition to the problems that arise due to the fact that the choice of the configuration of the antenna and/or schematic exploded transmission in the user equipment is carried out "at random", the noise in the signal associated with the channel of the strategic missile forces, can also be a cause of errors. At low signal-to-noise combination of incorrect assumptions and data distorted by noise, may cause demodulated and decoded channel SRF may seem correct. In the same conditions the correct assumption about the configuration of the antenna and/or exploded diagram of the transmission may appear incorrect due to the presence of noise. However, some of these cases can be identified by the user equipment, since the channel of SRF is protected bits cyclic redundancy check (CRC). Usually CRC code associated with the channel of the strategic missile forces, contains 16 bits. However, some errors due to low signal-to-noise ratio can be detected during the verification CRC. However, noise can also be affected by the bits of the CRC, which may lead to incorrect conclusions about the configuration of the antenna and/or exploded diagram of the transmission.

Thus, in order to eliminate or reduce data loss and latency connection, it is expedient to provide an improved method for more reliable determination the s configuration of the antenna and/or schematic exploded transmission network object, such as a base station. In particular, it is desirable to provide a mechanism for determining the configuration of the antenna and/or schematic exploded transmission base station, such as a node eNodeB network E-UTRAN, which will provide high reliability determine whether you have made the right assumption about the configuration of the antenna and/or schematic exploded transfer

A BRIEF DESCRIPTION of the INVENTION

In accordance with the variants of implementation of the present invention offers a method, device and computer program product for providing additional information about the configuration of the antenna and/or exploded diagram of the transmission. Essentially, embodiments of the method and device allow the receiver to reliably distinguish between the many configurations of the antenna and/or diagrams exploded transfer that allows you to more reliably perform demodulation and data interpretation. In addition, embodiments of the method and device provide this additional information without transmitting additional bits or other added service information associated with the transfer of these data.

In accordance with various aspects of the invention offers a method, device and computer program product for determining a set of bit masks based on the Hamming distances between the masks and the different is th bits between these masks, where each bit mask associated with the configuration of the antenna and the exploded diagram of the transmission. In some embodiments of the invention, the set of masks can be defined to maximize the Hamming distance between the mask and the difference of bits between these masks. In addition, in some embodiments of the invention such factors as the likelihood of false positives and false negatives and the likelihood of distortion of the blocks of bits can also be taken into account when determining the set of masks. One mask set can be selected based on the configuration of the antenna and/or schematic exploded transfer. In one embodiment of the invention, for example, set masked bits may be many bits CRC. In another embodiment, the bitmask is sufficient for unambiguous recognition of at least three different antenna configurations and/or diagrams exploded transfer.

In accordance with another aspect proposes a method, device and computer program product for analysis of the set of received bits to determine which mask from a set of predefined bit masks were applied to the data bits, and then determine a configuration of the antenna or exploded diagram of the transmission on the basis of the respective bit mask that is defined as a mask applied to the data bits. To determine which mask from a set of predefined bit masks has been applied to bits, the mask can be selected from a set of bit masks defined on the basis of the Hamming distances between the masks and the difference of bits between the two masks, where each bit mask set is associated with the configuration of the antenna and the exploded diagram of the transmission. In some embodiments of the invention, the set of masks can be defined to maximize the Hamming distance between the mask and the difference of bits between these masks. In addition, in some embodiments of the invention such factors as the likelihood of false positives and false negatives and the likelihood of distortion of the blocks of bits can also be taken into account when determining the set of masks. The selected mask can be applied to the received sequence of bits, and then the result can be analyzed to determine whether the correct mask. If you select an incorrect mask, can be made new selection mask, the mask can be applied (imposed on bits) and the result can be analyzed similarly. Lots of bits that are analyzed may be bits of the physical broadcast channel. In one embodiment, for example, a lot of bits that need to be analysed may be many bits CRC. In a variant of the westline bitmask is sufficient for unambiguous recognition of at least three different antenna configurations or schemes exploded transfer.

In one embodiment, the invention features a method of transferring information about the configuration of the antenna by masking. The method may include selecting a bit mask associated with the configuration of the antenna and the exploded diagram of the transmission. The bit mask is selected from a set of bit masks. This set may include the first bit mask associated with odnoimennoi configuration, the second bit mask associated with dvuhantennoy configuration, and the third bit mask associated with chetyrehstennoy configuration. The method may also include applying a bit mask associated with the antenna configuration and the circuit posted transmitting, to the set of predetermined bits from the set of bits.

In another embodiment, the invention features a device for transmitting information about the configuration of the antenna by masking. The device may contain a processor, configured to select the bit mask associated with the configuration of the antenna and the exploded diagram of the transmission, the bit mask is selected from a set of bit masks, including the first bit mask associated with odnoimennoi configuration, the second bit mask associated with dvuhantennoy configuration, and the third bit mask associated with chetyrehstennoy configuration. The processor may also be configured to apply the bit mask SV is related to the configuration of the antenna and the exploded diagram of the transmission, to the set of predetermined bits from the set of bits.

In another embodiment, the invention features a computer program product for transmitting information about the configuration of the antenna by masking. The computer software product may contain at least one machine-readable medium with stored therein executable commands of the program code. Commands can be configured to select the bit mask associated with the configuration of the antenna and the exploded diagram of the transmission. The bit mask is selected from a set of bit masks. This set may include the first bit mask associated with odnoimennoi configuration, the second bit mask associated with dvuhantennoy configuration, and the third bit mask associated with chetyrehstennoy configuration. Commands can also be configured to apply the bit mask associated with the antenna configuration and the circuit posted transmitting, to the set of predetermined bits from the set of bits.

In yet another embodiment, the invention features a device for use in the field of communications. The device may include means for selecting a bit mask associated with the configuration of the antenna and the exploded diagram of the transmission. The bit mask is selected from a set of bit masks. This set may include the first bit mask associated with one of the antenna configuration, the second bit mask associated with dvuhantennoy configuration, and the third bit mask associated with chetyrehstennoy configuration. The device may also include means for applying a bit mask associated with the antenna configuration and the circuit posted transmitting, to the set of predetermined bits from the set of bits.

BRIEF DESCRIPTION of DRAWINGS

After a General description of embodiments of the present invention further describes the accompanying drawings, which are not necessarily made to scale.

Figure 1 presents the block diagram of the mobile terminal in accordance with the embodiment of the present invention.

Figure 2 presents the block diagram of a communication system in accordance with the embodiment of the present invention.

On figa presents an example of a 16-bit CRC field in accordance with the embodiment of the present invention.

On fig.3d presents an example further subdivided 16-bit CRC field in accordance with the embodiment of the present invention.

Figure 4 presents a flowchart of the procedure of data transmission in accordance with the embodiment of the present invention.

DETAILED description of the INVENTION

Further embodiments of the present invention are described in more detail with reference to the drawings, in which is represented by some but not all, options for implementation. The present invention can be implemented in many different forms and is not limited considered in this description and implementation options; these options for implementation shall be submitted to the disclosure of the invention satisfy the legislative requirements. In all the drawings the same reference numbers refer to identical elements.

Figure 1 presents the block diagram of the mobile terminal 10, which can realize the benefits of embodiments of the present invention. You must understand, however, that the mobile phone shown in the drawing and described in this description is only an example of one type of mobile terminal (also called a user equipment), which can realize the benefits of embodiments of the present invention, and, therefore, does not limit the present invention. Along with the embodiment of the mobile terminal 10, which is shown in the drawing and is described in the example embodiments of the present invention can also be applied to other types of mobile terminals, such as portable digital assistants (PDAs), pagers, mobile computers, mobile TV stations, gaming device, a laptop computer is, cameras, video recorders, GPS devices and other types of voice and text. In addition, embodiments of the present invention can be used in the user equipment, which is not mobile.

The system and method proposed in the variants of implementation of the present invention are described below primarily in connection with applications for mobile communications. However, you must understand that the system and method proposed in the variants of implementation of the present invention can be used in conjunction with many other applications, both in the field of mobile communications and beyond.

The mobile terminal 10 includes an antenna 12 (or multiple antennas)that communicates with a transmitter 14 and receiver 16. The mobile terminal 10 also includes a device such as a controller 20 or other processing element, which transmits the signals to the transmitter 14 and receives signals from the receiver 16. These signals include information of an alarm in accordance with the standard radio interface applicable cellular system, and the speech of the user, received data and/or data generated by the user. In this regard, the mobile terminal 10 is able to operate in accordance with one or more radio interface standards, communication protocols, modulation types, and types are available in the and. For example, the mobile terminal 10 is able to operate in accordance with any communication Protocol of the first, second, third and/or fourth generation or similar. For example, the mobile terminal 10 is able to operate in accordance with the wireless protocols for second generation (2G) IS-136 (Time Division Multiple Access (TDMA), multiple access with time division multiple access), GSM (Global System for Mobile Communication, global system for mobile communications) and is-95 (Code Division Multiple Access (CDMA)multiple access code division multiple access)protocols wireless third generation (3G), such as universal mobile telecommunications system (Universal Mobile Telecommunications System (UMTS)), including UMTS LTE (UMTS Long Term Evolution, long term development of the system UMTS), CDMA2000, broadband CDMA (Wideband CDMA (WCDMA)and access synchronous time division CDMA (Time Division-Synchronous CDMA (TD-SCDMA)wireless protocols fourth generation (4G) or equivalent.

It is obvious that a device such as the controller 20 includes means, such as the schema required for implementing the audio and logic functions of the mobile terminal 10. For example, the controller 20 may include a processor, digital signal processing, microprocessor, and various analog-to-digital and digital-analog converters, and other support schemes. The functions of the mobile terminal 10 associated with the panel is the pressure and signal processing, are allocated between these devices according to their respective functionality. The controller 20 may also include functions convolutional encoding and interleaving of messages and data prior to modulation and transmission. The controller 20 can thus additionally include an internal voice coder and an internal modem for data transmission. In addition, the controller 20 may include functionality to operate one or more programs that are stored in memory. For example, the controller 20 is able to interact with the software for communication, such as a standard web browser. The program allows for communication of the mobile terminal 10 to transmit and receive web content, such as a distributed content and/or other web page in accordance with, for example, application Protocol for wireless (WAP, Wireless Application Protocol, hypertext transfer Protocol (HTTP, Hypertext Transfer Protocol) and/or similar.

The mobile terminal 10 may also include a user interface that includes an output device, such as a standard earphone or speaker 24, a microphone 26, a display 28 and a user input interface, all of these devices are connected to the controller 20. The user input interface, which allows the mobile terminal 10 to receive data, can certainly enhance the be any number of devices, allows the mobile terminal 10 to receive data, such as a keypad 30, a touch display (not shown) or other input device. Options for implementation, including the keypad 30, the keypad 30 may include a standard numeric keys (0-9) and related keys (#, *), as well as other conventional and programmable keys used to control the mobile terminal 10. Alternatively, the keypad 30 may be configured as a standard QWERTY keyboard. The keyboard 30 can also include various programmable keys with associated functions. In addition, or alternatively, the mobile terminal 10 may include an interface device such as a joystick or other user input interface. The mobile terminal 10 also includes a battery 34, such as a vibrating battery pack, which serves to supply power to the various circuits necessary for the operation of the mobile terminal 10, and also provides mechanical vibration as well distinguishable output.

The mobile terminal 10 may also include a module 38 to identify the user (UIM, User Identity Module). Module 38 UIM is usually a storage device with an embedded processor. Module UIM 38 may include, for example, a subscriber identity module (SIM, Subscriber Identity Module)of the University of the universal smart card (UICC, Universal Integrated Circuit Card universal subscriber identity module (USIM Universal Subscriber Identity Module), a removable subscriber identity module (R-UIM, Removable User Identity Module), and others. Module 38 UIM typically stores information elements related to a mobile subscriber. In addition to module 38 UIM of the mobile terminal 10 may be equipped with memory. For example, the mobile terminal 10 may include volatile memory 40, such as a volatile memory RAM, including the area of the cache for temporary storage of data. The mobile terminal 10 may also include non-volatile memory 42, which may be embedded and/or removable. Additionally or alternatively, non-volatile memory 42 may include electrically erasable EEPROM, flash memory or similar. In such a memory may store various items of information and data used by the mobile terminal 10 to perform the functions of the mobile terminal 10. For example, such memory may include an identifier, such as the international code identification mobile equipment (IMEI, International Mobile Equipment Identification), which allows unique identification of the mobile terminal 10.

Figure 2 illustrates an example of one of the types of systems that can be used advantages of embodiments of the present izopet the deposits. The system includes multiple network devices, such as mobile terminal 10 or the user equipment of another type. As shown in the drawing, each of the mobile terminal 10 includes an antenna 12 for transmitting signals to a base site or base station 44 (BS, Base Station), such as a node eNodeB in the network, E-UTRAN, and for receiving signals. The base station 44 may belong to one or more cellular or mobile networks, each of which includes the elements necessary for the operation of the network, such as the center 46 of the mobile communication switching (MSC, Mobile Switching Center). As is well known to specialists in this field of technology, the mobile network is also called BMI (BS / MSC / Interworking function - base station / mobile switching center communication / function interconnectivity). In operation, when the mobile terminal 10 performs or receives the call center 46 MSC is capable of routing calls to the mobile terminal 10 and from him. Center 46 MSC can also provide connectivity to terrestrial backbones, if the mobile terminal 10 is involved in this call. In addition, the center 46 of the switching MSC is capable of controlling the forwarding of messages to the mobile terminal 10 and from him, as well as to control the forwarding of messages for the mobile terminal 10 from the center of the message transfer and to transfer messages. It should be noted that, although t is STD 46 switching the MSC shown in the system of figure 1, center 46 MSC is only an example of a network device, and embodiments of the present invention is not limited to use in a network that uses MSC.

In one embodiment, the center 46 MSC may be associated with a data transmission network such as a local area network (LAN), a regional network (MAN) and/or wide area network (WAN). Center 46 MSC may be connected directly to the data network. However, in one typical embodiment, the center 46 MSC connects to the gateway GTW 48, and the gateway GTW 48 connects to a WAN such as the Internet 50. In turn, devices such as processing elements (e.g., personal computers, servers, etc)can connect to the mobile terminal 10 via the Internet 50. For example, as will be shown hereinafter, the processing elements can include one or more processing elements associated with the computing system 52, the server 54 of the source and/or similar devices.

The base station 44 BS may also be associated with the signaling node 56 support GPRS Signaling GPRS (General Packet Radio Service, the General packet radio service destination) Support Node (SGSN)). As is well known to specialists in this field of technology, the node SGSN 56 is typically capable of performing functions similar to the functions of the center 46 MSC, for services to packet-switched networks. Node SGSN 56 similarly, the center 46 of the MSC may be connected to the transmission network Yes the data such as the Internet 50. Node SGSN 56 may be connected directly to the data network. However, in a more typical embodiment, the node SGSN 56 is connected to the core network to packet-switched networks, such as core network 58 GPRS. Basic packet switched data network is then connected to another gateway GTW 48, for example Shluzovaya node 60 support GPRS (GGSN), and the node GGSN 60 is connected to the Internet 50. In addition to the node GGSN 60, the base packet switched data network may also be connected to the gateway GTW 48. Also the node GGSN 60 may connect to the Central messaging. When nodes 60 GGSN and SGSN 56, and the center 46 MSC, is capable of controlling the forwarding of messages, such as multimedia messages. Nodes GGSN 60 and SGSN 56 can also control the forwarding of messages for the mobile terminal 10 in the center of the message transfer and from the centre of message transmission in a mobile terminal.

In addition, by connecting the node 56 SGSN core network 58 GPRS and node 60 GGSN device, such as computing system 52 and/or the server 54 source can communicate with the mobile terminal 10 via the Internet 50, the node SGSN 56 and node GGSN 60. With this device, such as computing system 52 and/or the server 54 source can communicate with the mobile terminal 10 via the node SGSN 56, core network 58 GPRS and node GGSN 60. By directly or indirectly connecting the mobile terminals 10 and the other device the TV (for example, the computing system 52, the server 54 source etc) to the Internet 50, the mobile terminals 10 can communicate with other devices and with one another, for example, HTTP and/or a similar Protocol, to implement various functions of the mobile terminals 10.

It should be noted that although in the present description are presented and described not all elements of all possible mobile networks, the mobile terminal 10 may communicate with one or more different networks via base station 44 BS. In this regard, the network (s) may communicate in accordance with any of a variety of communication protocols, such as one or more mobile communication protocols of the first generation (1G), second generation (2G), 2.5G, third-generation (3G), 3,9G, fourth generation (4G) or similar. For example, one or more networks capable of supporting communication in accordance with the protocols wireless connectivity 2G: IS-136 (TDMA), GSM and is-95 (CDMA). Also, for example, one or more networks capable of supporting communication in accordance with 2.5G wireless protocols: GPRS, EDGE (Enhanced Data GSM Environment, enhanced GSM data) or similar. Further, for example, one or more networks capable of supporting communication in accordance with 3G wireless protocols, such as E-UTRAN or the UMTS network that uses a radio access technology WCDMA. In some the networks narrowband analog mobile phone service (Narrow-Band Analog Mobile Phone Service (NAMPS)) and communication systems of collective access (Total Access Communication System (army fans the leather)) can also apply the advantages of embodiments of the present the invention, as the mobile stations with two or more modes (e.g., digital/analog or TDMA/CDMA/analog phones).

The mobile terminal 10 may also connect to one or more points 62 of the wireless access Point (AP)). Point 62 of the access points may include access points, configured for communication with the mobile terminal 10 in such a way as via RF channel (RF), Bluetooth (BT), standard data transmission in the infrared (IrDA) or any other of the many different standards of wireless networks, including wireless local area network (WLAN)such as IEEE 802.11 (e.g., 802.11a, 802.11b, 802.11g, 802.11n, etc.), WiMAX (World Interoperability for Microwave Access, worldwide interoperability for wireless microwave access), such as IEEE 802.16, and/or technology ultrawideband radio UWB (Ultra Wideband), such as IEEE 802.15 and/or similar. Point 62 of the access points may be connected to the Internet 50. Similarly, the center 46 MSC, point 62 access points may connect directly to the Internet 50. However, in one embodiment, the point 62 access the AR connected to the Internet 50 indirectly through a gateway GTW 48. In addition, in one embodiment, the base station 44 BS is considered as another point 62 access AR. Obviously, in direct or indirect connection mob is selected terminals 10, the computing system 52, the server 54 of the source and/or other devices to the Internet 50, the mobile terminals 10 can communicate with each other, with the computing system and with other devices, which allows the various functions of the mobile terminal 10, such as data transfer, content and the like of the computing system 52 and/or receiving data, content and the like from the computing system 52. In this description, the terms "data", "content", "information" and similar terms are used interchangeably and are used to indicate data that can send, receive and/or store in accordance with the variants of implementation of the present invention. Thus, the use of any of these terms does not limit the nature and scope of embodiments of the present invention.

Obviously, through direct or indirect connection of the mobile terminal 10, computing system 52, the server 54 of the source and/or other devices to the Internet 50, the mobile terminals 10 can communicate with one another, the computing system server 54 source or other device that allows the various functions of the mobile terminal 10, such as data transfer, content and the like of the computing system 52, the server 54 IP the student etc. and/or receiving data, content and the like from the computing system 52, the server 54 source etc.

With regard to communication between the base station 44 and the mobile terminal 10, the base station 44 BS may apply different configuration of antennas and/or schematic exploded transfer. The configuration of the antenna may include equipping the base station BS 44 one or more antennas that use different schemas spaced transmission. For example, in some embodiments, the base station 44 BS may include one transmitting antenna. In other typical embodiments, the base station 44 BS may include two transmitting antennas, which use space-frequency block codes (SFBC, Space-Frequency Block Codes) as a schematic exploded transfer. In other typical embodiments, the base station 44 BS may include four transmitting antennas that use the exploded diagram of the transmission switching frequency (frequency Switched Transmit Diversity, training devices even beyond SFBC codes.

After receiving information from the base station 44, the mobile terminal 10 may "blind" to make an assumption about the configuration of the antenna and the circuit explode, used by the base station 44. The mobile terminal 10 makes this assumption about the configuration of the antenna and the circuit explode, used by the base station, at random, as is the interaction between the base station 44 and the mobile terminal 10, the mobile terminal may not have information about the characteristics of the base station 44. In essence, the mobile terminal 10 uses this assumption about the configuration of the antenna and the circuit explode for demodulation and decoding information transmitted by the base station 44. In some cases, the information transmitted by the base station 44 may include strategic missile forces in subcode data, which is transmitted to the mobile terminal batch (discontinuous) method. Information transmitted by the base station 44 may also contain bits of CRC associated with the strategic missile forces. The mobile terminal 10 may demodulate and decode the strategic missile forces and the associated CRC bits, using his assumption about the configuration of the antenna and the circuit explode.

As mentioned above, there can be a situation in which the mobile terminal has made an incorrect assumption, but the data demodulated and decoded by the mobile terminal correctly. Thus, it is a false definition. To really make sure that the mobile terminal has made a correct assumption about the configuration of the antenna and the exploded diagram of the transmission base station 44, according to the invention can be used a process comprising masking the CRC bits associated with the strategic missile forces. In some embodiments of the invention the bits of the CRC can be masked by performing an exclusive OR operation between the bits and the predetermined mask, connected to the concrete exploded diagram of the transmission and the configuration of the antenna. The mask associated with the exploded diagram of the transmission and the configuration of the antenna of the base station 44 may be imposed on the CRC bits to the base station before transmission of the strategic missile forces and the associated CRC bits. After taking the strategic missile forces and the CRC bits, the mobile terminal can make an assumption about the configuration of the antenna and the circuit explode, used by the base station 44. Based on this assumption, the mobile terminal may select the appropriate mask and unmask bits CRC. If demaskirovanie CRC bits are consistent with the control channel of the strategic missile forces with CRC, it is possible to identify what made the correct assumption about the configuration of the antenna and the circuit explode, used by the base station 44. Otherwise, if demaskirovanie CRC bits are not consistent with the control channel of the strategic missile forces with CRC, it is possible to identify what was done wrong assumption about the configuration of the antenna and the circuit explode, used by the base station 44, and may be made other assumptions.

For more information on masking bits in connection with the configurations of the antenna and/or diagrams exploded transfer can be found in the patent application U.S. 11/969794, entitled "Method and apparatus for transmitting information about the configuration of the antenna" and filed January 4, 2008, which is fully incorporated into this description by reference.

On figa shown note the R 16-bit CRC field according to various embodiment of the invention. Field 300 CRC may include 16 bits (0 to 15) information and can be used to verify the accuracy of the data associated with these bits CRC. In some embodiments of the invention, the data channel SRF can be used to determine the CRC bits and the CRC bits may be transmitted together with the strategic missile forces. Although the example shows a 16-bit CRC field 300, it is assumed that in various embodiments of the invention can be used any number of CRC bits. The bits of the CRC, which populate the CRC can be used to ensure the sincerity of the data in the channel of SRF. However, in various embodiments, implementation of the present invention bits CRC mask, to thereby transmit information regarding the configuration of the antenna and the exploded diagram of the transmission base station, or node eNodeB, the mobile terminal without the need for additional service information, such as additional bits of information.

Before applying the mask bits are a CRC of the first mask can be properly developed. In the conventional system E-UTRAN can be used in three configurations of the antenna and the corresponding schematic exploded transfer. E-UTRAN may include a configuration with a single antenna without an exploded transmission configuration with two antennas, use the exploded diagram of the transmission with a simple antenna-frequency block codes (SFBC), and configuration with four antennas using circuit training devices even beyond with SFBC. Although these examples relate to E-UTRAN with three antenna configurations and related schemes spaced transmission, it is assumed that the present invention can be used in other systems and/or systems with any number of antenna configurations and associated circuits spaced transmission. In the case of use in a conventional system E-UTRAN invention may include the creation of three masks associated with each of the three antenna configurations E-UTRAN and the corresponding diagrams exploded transfer.

When creating masks placed on the CRC bits may be used by the Hamming distance between the two masks. The Hamming distance can describe the number of substitutions or other operations that need to be taken to convert the first object, such as a sequence of the first mask, the second object, such as a sequence of the second mask. For example, the first sequence of bits 1111 and the second bit sequence 0000 have a Hamming distance equal to 4, because it requires 4 operations to replace the 4 units of the first sequence with zeros to obtain the second sequence. The Hamming distance is also equal to four, if you perform operations with the second sequence to receive the deposits of the first sequence. Due to the presence of noise in wireless communication in some cases it may be appropriate to increase and/or maximize the Hamming distance between two masks to reduce the likelihood of distortion of the CRC bits noise to such an extent that there is a situation in which incorrect mask can lead to a correct result control CRC.

Thus, when using the invention in conventional systems E-UTRAN three masks can be tailored to the Hamming distance between them. One of the ways to develop three masks according to the invention can be described on the basis of fig.3b. On fig.3b shows an example of 16-bit fields 310 CRC, which is divided into three parts, namely a first part 320, the second part 330 and the third part 340. In this example, the field 310 CRC first part contains 6 bits, the second part contains 5 bits, and the third part contains 5 bits. Note that the number of parts and the number of bits in each part of the field 310 CRC is shown merely for example, and can be used any number of parts and bits in each part, provided that each bit position of the CRC field is contained within only one part.

In various embodiments of the invention, the first mask MASK1 can be zero mask. In some respects the zero mask may be preferred because of the imposition of a mask on the sequence b is tov results in a sequence of bits, identical to the original. In some embodiments of the invention, to reduce the amount of unnecessary computation, the mask overlay on the sequence of zeros is not required, because the result is identical to the original data. Similarly, in some embodiments of the invention it is convenient to specify a mask that contains one unit, because computationally imposition of a mask requires simply a bitwise replacement values of the bits of the sequence, which also reduces the amount of calculation when applying this mask and its removal.

In addition, taking into account the Hamming distance, so in this case, to obtain essentially equal to the Hamming distance between the mask, the second mask MASK2 is possible according to the invention to form by filling units of the first part 320 CRC field. The second part 330 may also be filled with ones. Finally, the third part 340 may be filled with zeros. From the same reasons, to form the third mask MASK3, the first portion 320 can be filled units, the second part 330 may be filled with zeros, and the third part 340 can be filled units. As a result of this process will have the following three masks:

MASK1=0000000000000000

MASK2=1111111111100000

MASK3=1111110000011111

Having created a set of masks, it is possible to estimate the Hamming distance between them. One way to determine the races of the situation Hamming between the two masks is to summarize the number of different bits in each part. Therefore, in this example, the Hamming distance between the MASK1 and MASK2 can be determined by adding the bit length of the first part, ie 6, with a bit length of the second part, ie 5, since all the bits in the first and second parts of these masks are different, and all the bits in the third parts of these masks are the same. Thus, the Hamming distance between the MASK1 and MASK2 is 11. Similarly, the Hamming distance between MASK2 and MASK3 can be determined by adding the bit length of the second part, ie 5, with a bit length of the third part, ie 5, since all the bits in the second and third parts of these masks are different, and all bits in the first part of these masks are the same. Thus, the Hamming distance between MASK2 and MASK3 is 10. The Hamming distance between the two masks can also be calculated by applying the exclusive OR operation to the two masks and then counting the number of ones in the result set. These masks can be associated with configurations of antennas and circuits spaced transmission so that the mask MASK1 is associated with odnoimennoi configuration, the mask MASK2 is associated with dvuhantennoy configuration, and mask MASK3 associated with chetyrehstennoy configuration. The Hamming distance between these three masks can be described as 11-11-10, or x-y-z, where x is the Hamming distance between the mask odnoimennoi shape and mask dvuhantennoy configuration, y is the Hamming distance between the mask odnoimennoi configuration and mask chetyrehstennoy configuration and z is the Hamming distance between the mask dvuhantennoy configuration and mask chetyrehstennoy configuration.

When choosing a mask based on the Hamming distance between the masks can be taken into account additional factors. For example, the study of conventional systems E-UTRAN indicates that false definition, that is, situations in which not identified incorrect assumptions about the antenna configuration and the circuit split transmission, the most easily occur in cases where wrongly selected oceanana configuration, and node eNodeB uses the configuration with two antennas, and also in those cases when incorrectly configured with two antennas, and the node eNodeB uses odnobannoyu configuration. In addition, the probability of a false definition between odnoimennoi configuration and chetyrehstennoy configuration is higher than the probability of a false definition between dvuhantennoy configuration and chetyrehstennoy configuration. Thus, in some embodiments of the invention it may be desirable to select a series of masks with the Hamming distance between the masks given these statistics, so as to increase the likelihood that incorrect assumptions will be identified. In this regard, according to the of the invention the set of masks can be designed the largest Hamming distance between masks odnoimennoi configuration and chetyrehstennoy configuration, and the smallest Hamming distance between masks dvuhantennoy configuration and chetyrehstennoy configuration. Thus, in relation to the above example 11-11-10 Hamming distance will correspond to the probabilities.

In addition, using the process described above, it is possible to generate a variety of additional sets of masks, which can be achieved the desired Hamming distance. For example, there may be formed a set of masks, where the bit length of the first part of the CRC field is equal to 8, the bit length of the second part of the CRC field is equal to 4 and the bit length of the third part of the CRC field is equal to 4. Using the above procedure, regarding the placement of zeros and ones in parts of the field and the CRC, will get a set of masks, described as 12-12-8. Additionally, using the same method, but with a bit length of the first part, equal to 10, the bit length of the second part, equal to 3, and the bit length of the third side is 3, you can specify a set of masks, described as 13-13-6.

An additional factor that may be included in various embodiments of the invention, is that the noise in wireless communication systems has a tendency to distort the data blocks following each other. Often this takes place in respect of which posledovatelnostei, that use convolutional coding, such as the strategic missile forces. In other words, errors in bits not normally distributed across the set of coded bits, and often are concentrated in blocks or sequences of erroneous bits, i.e. all errors are often at a small distance from each other. If the distortion of the bits wrong, the mask is correct, there is likely a false definition. To minimize the possibility of this situation in some embodiments of the invention it may be desirable to distribute the bits having different values in different masks throughout the mask, and not to use large parts of the masks, which are essentially the same. For this purpose, in some embodiments of the invention, the difference in at least one bit can take place within a predefined block of bits within the sequence. For example, in blocks of two bits these bits can be different, or in blocks of four bits of the third bit may be different from others, etc. in Addition, the bits within each block need not have the same distribution. This set of masks can be evaluated on a bitwise basis, to ensure the difference between the positions of bits in each mask. This reduces the likelihood of distortion of the unit will lead to a false determination is s, but still Hamming distance between the masks. For example, consider the following set of masks:

MASK1=0000000000000000

MASK2=1111111111111111

MASK3=0000000011111111

This set of masks can be described as a 16-8-8 in respect of the Hamming distances between them. However, it should be noted that the distortion of the block of the first eight bits of the mask MASK3 can lead to a likely false detection mask MASK2. A similar situation occurs when a unit is damaged from the last eight bits of the mask MASK3, which leads to a likely false detection mask MASK1.

However, if the ones and zeros in the mask MASK3 distribute mask MASK3 on a bitwise basis for creating differences between the positions of bits in each mask, you can create the following set of masks having the same description of the Hamming distances 16-8-8:

MASK1=0000000000000000

MASK2=1111111111111111

MASK3=0101010101010101

Note that if such modification mask MASK3 required distortion almost all the bit mask length, likely to cause a false definition. It should also be noted that this set of masks satisfies the considerations of the probability of erroneous choice between different configurations of antennas in the E-UTRAN, if the mask MASK1 is associated with odnoimennoi configuration, the mask MASK2 is associated with dvuhantennoy configuration, and the mask MASK3 associated with chetyrehstennoy configuration. In this case, the distance is hemminga 16-8-8 give maximum distance between odnoimennoi configuration and dvuhantennoy configuration, which, as has been said, the most problematic in relation to false positives and false negatives. Similarly, the mask MASK3 can be replaced by a combination of 1010101010101010 with the same Hamming distance and the difference of bits.

In this respect, it can be seen that the rotation of combinations of one-zero or zero-one gives the optimal difference bits within the mask. However, the mask containing additional units or zeros, can lead to identical values of the neighboring bits. One means of forming a mask having the maximum difference between bits, but still with more than eight units or eight zeros, would be to start with a mask of all zeros and two identical masks having a striped structure, for example 1010101010101010. In these two identical masks with alternating structure in the position of the first mask may be inserted one or more unit, and the same number of zeros can be inserted in the same positions of the second mask, so that the newly introduced bits were placed evenly or as evenly as possible over the entire sequence of bits. Next, the excess bits at the end or at the beginning of the sequence can be deleted. Similarly, the start or end bits can be removed before a uniformly distributed insert new bits in the mask. Next, as a test, those who embodiments of the invention, where one of the masks is a mask of all zeros, the difference between the two other masks can be determined by performing a logical exclusive OR operation between the two masks and the analysis of the obtained results, showing the difference between bits.

Taking into account the probability of false definitions and considerations regarding the differences between bits, you can create additional masks, where, for example, the Hamming distance between the first mask and the second mask will be more of Hamming distances, and supported the maximum difference between bits masks. An additional example may be the structure of the Hamming distances 14-9-9 different bits. This may be formed by the following mask:

MASK1=0000000000000000

MASK2=1111011111110111

MASK3=0101101010101101

Likewise, there may be formed the following set of masks that meet the same conditions:

MASK1=0000000000000000

MASK2=1110111111111011

MASK3=0101101010101101

In some embodiments of the invention these sets of masks may also be desirable, as research has shown that a further reduction of false positives and false negatives, when the Hamming distance exceeds 8 becomes not so significant. In some embodiments of the invention it may be desirable to reduce the Hamming distance between the mask MASK1 and MASK2, the EU is ü the distance between odnoimennoi and dvuhantennoy configurations, to increase the distance between the mask MASK1 and MASK3, and mask MASK2 and MASK3. In some embodiments of the invention can be used difference of Hamming distances between the masks smaller than a predetermined number, for example 2 or 3. An additional set of masks, which leads to a more balanced structure, can be described as 12-10-10. This set of masks may be as follows:

MASK1=0000000000000000

MASK2=1011101110111011

MASK3=0110110101101101

In addition to creating sets of different masks with regard to the factors described above, in some embodiments, implementation of the present invention is formed by a set of masks can be manipulated to create a new set of masks, where a new set of masks retains some or all of the characteristics of the original set of masks. The manipulation of sets of masks may be desirable for various reasons. One of those reasons may be related to situations in which the signal strength is low or there are other types of distortion, such as, for example, the shift to direct current, which may occur after demodulation signal consisting of all zeros. After decoding, you may receive a sequence of all zeros, which may also correspond to the CRC code of all zeros. In such situations, when using a mask of some n the lei may have a false definition. In such cases, it may be reasonable to manipulate a set of masks, which takes into account the factors discussed above, and has a mask of all zeros. In this way it is possible to generate a set of masks, which does not contain a mask of all zeros, but preserves the Hamming distance and the difference of bits of the original set of masks.

According to some versions of the invention to transform the original set of masks in a new set of masks that preserves the Hamming distance and the difference of bits of the original set of masks may be used in the scrambling mask. Mask scrambling can be a sequence of bits equal to the bit length of the lengths of masks and applied to each mask set to create a new set of masks. In some embodiments of the invention the mask overlay scrambling may include performing a logical exclusive OR operation on the original mask using mask scrambling to create a new mask. This process can be repeated for each mask from the original set of masks.

For example, consider the mask overlay scrambling 0011001100110011 on the following set of masks, which can be described as a 16-8-8, using the logical operation "exclusive OR":

MASK1=0000000000000000

MASK2=1111111111111111

MASK3=0101010101010101

The resulting set Issa is, where the exclusive OR operation performed on each bit of each mask using the corresponding bit mask scrambling, is as follows:

MASK1=0011001100110011

MASK2=1100110011001100

MASK3=0110011001100110

Note that the resulting set of masks preserves the structure of distances 16-8-8, but bits are changed to obtain a new set of masks. Also note that a mask of all zeros has been excluded from the set of masks. As for the exclusion of the zero mask from a set of masks that can be taken into account, as mentioned above, that the imposition of a zero mask does not require additional computational cost, since the resulting mask will be the same as the original. With this in mind, it may be desirable to select a scrambling mask so that it was equivalent to the existing mask set masks. After applying the mask scrambling to set masks the result of applying mask scrambling on an identical mask is a mask of all zeros. If, for example, it is expected that the case of four antennas will be the primary mode of operation, it may be appropriate to choose a mask of all zeros for the case of four antennas to use the reduction of the computational complexity associated with such a mask, as often as possible.

In addition, in some embodiments of the invention to set musicmagic to be applied to the permutation function or alternation, to create a new set of masks that have the same attributes as the original masks, but the modified bit sequence. Function permutation or alternation can perform bitwise reordering of the set of masks to obtain a new set of masks. In some embodiments, the permutation function or alternations may result in a set of masks having the same Hamming distance, but another difference between bits. For example, the function cyclic permutations can move the last bit (s) of each mask in the position of the first bit (bits) and shift the remaining bits in positions more bits (right). Note that the resulting mask will have the same distribution of Hamming distances, but the difference between bits of the masks can be changed. Thus, in some embodiments of the invention, the permutation function or alternations may be used for forming masks having modified the differences between bits, but keeping the distribution of Hamming distances associated with the original set of masks.

4 shows a flowchart of a procedure of transmitting and receiving SRF in accordance with the embodiment of the present invention. Procedure figure 4 is directed to the use of the mask to the CRC bits with the purpose of providing information about the configuration ante the us, and can also be used to verify that the equipment user defined correct configuration of the antenna.

In short, pre-defined separate mask for each configuration of the antenna and/or schematic exploded transfer, for example, the first mask configuration with a single antenna, the second mask configuration with two antennas using SFBC, and the third mask configuration with four antennas using training devices even beyond. At least a few bits transmitted by the network object, such as a base station 44, and received by the user equipment, impose a mask associated with a particular antenna configuration of the network object. In one embodiment, impose a mask on the bits of the channel of the strategic missile forces. In particular, typically the channel of SRF includes information bits and CRC bits, which are calculated on the basis of information bits to verify the above information bits. In this embodiment, masking the bits of the CRC.

In one embodiment, where the mask is superimposed on the CRC bits, the procedure of transmission and reception of the strategic missile forces, shown in figure 4, includes at step 400, the definition of a set of masks based on Hamming distances and differences of bits, the calculation of bits, such as CRC bits, at step 405, the receiving of the mask based on the configuration of the antenna and/or exploded diagram of the transmission network is on the object, for example, base station or node eNodeB, in step 410, the application of the bits resulting mask in step 415, the combination of masked bits and information bits of the strategic missile forces with the purpose of generating package SRF at step 420 and a data packet SRF at step 430. As shown in figure 4, after a transfer, the user equipment receives the packets of the strategic missile forces in step 440, and then specifies the mask that was used before checking information bits, for example, in some embodiments, implement, through the implementation of control procedures CRC for zamaskirovannyj CRC bits. In one embodiment, at step 450 determines the mask by selecting the intended configuration of the antenna and/or schematic exploded transfer and the associated mask, then at step 460 is demaskirovanie received bits based on the selected mask to the analysis of received bits at step 470, and at step 480 determines the configuration of the antenna and/or exploded diagram of the transmission. On the basis of the mask, which is defined by the user equipment as used by the base station, is determined associated with the mask information about the configuration of the antenna that allows you to properly and accurately perform demodulation information bits and/or allows you to confirm a preliminary assumption about the configuration of the antenna.

In step 400 according to one the of the embodiments of the invention define a set of masks. The set of masks can be defined by any object, i.e. the object associated with the communication network, or any other. In addition, regardless of which object defines a set of masks, in some embodiments of the invention, the corresponding mask for the base station, that is, the mask associated with the configuration of the antenna of the base station and exploded diagram of the transmission may be known to the base station, and the entire set of available masks may be known to the mobile terminal. The set of masks can be defined on the basis of the Hamming distances between the masks, the differences between bits or a combination of these approaches. In addition, in some embodiments of the invention, the set of masks can be defined on the basis of such factors as additional computational costs, the probability of false positives and false negatives and the likelihood of distortion of the bits of the block. In some embodiments of the invention, the mask may be defined so that the overlay is one of at least three different antenna configurations and/or diagrams exploded transfer can be uniquely identified. In addition, a set of masks and connectivity masks with antenna configurations and diagrams exploded transfer can be known not only to the base station, but also the user equipment with which the base station Bud is t to interact. In some embodiments of the invention a set of masks may be stored in the user equipment before the implementation of any communication between the base station and the user equipment, for example, during the initial configuration of the user equipment. When the user equipment receives the data, it can make a choice from this set of masks. In some embodiments of the invention, the mask may be a bitmask, with the length of the sequence of bits equal to the number of masked bits, for example the number of bits in the CRC associated with the strategic missile forces.

In step 405 calculates bits, such as CRC bits. The bits of the CRC is calculated on the basis of information bits channel of the strategic missile forces. CRC for strategic missile forces can be calculated by any known method. The bits of the CRC can calculate a base station, such as BS 44, computing device connected to the base station, or any other means.

In step 410, the mask can be obtained from a predetermined set of masks. The mask can be obtained from a predetermined set of masks, where each mask is associated with a different antenna configuration and/or separate schematic exploded transfer. In some embodiments, the implementation of the mask can be obtained so that, when its application was provided unambiguous razpoznavam the e at least three different antenna configurations and/or diagrams exploded transfer. Since the mask in a predetermined set of masks may be associated with different antenna configurations and diagrams exploded transmission, in some embodiments, the implementation of the mask can be obtained based on the antenna configuration and the circuit posted transmitting base station.

At step 415 the bits of the mask by applying the obtained mask these bits. Use of the mask in step 410, for example, the CRC bits can be performed by any known method, for example, the logical operation "exclusive OR". Because in some embodiments, the implementation of the mask is selected based on the antenna configuration and/or schematic exploded transfer, the mask makes the resulting signal information relative to at least configuration of the antenna and/or schematic exploded transfer. While this alternative implementation is aimed at the application of the mask to the CRC bits, in other embodiments, the implementation may use any other sequence of bits. In some embodiments, the implementation of the created mask is applied to the bits of the channel of the strategic missile forces.

In step 420 the masked bits are combined with the information of the strategic missile forces to generate the package of the strategic missile forces. In some embodiments, the implementation of the CRC bits are attached to the information bits channel SRF after applying the mask. In other embodiments implement the Oia application of the CRC mask in step 410 is performed after attaching the CRC bits to the information bits of the channel of the strategic missile forces. In addition, in some embodiments, the implementation of step 420 may perform the operation of encoding to provide forward error correction (FEC), which is applied to the information bits of the channel of the strategic missile forces and the masked CRC bits. Data bits of the channel of the strategic missile forces and the masked CRC bits can be encoded with a low rate code, such as one-ninth. In addition, in some embodiments, the implementation of the overlay mask is performed after the encoding procedure for providing forward error correction FEC, which leads to masking of the encoded data about the configuration of the antenna in a special way, sometimes referred to as scrambling.

In addition, at step 420 may be performed by channel coding and matching speed. In some embodiments of the invention the masking bits can be performed after channel coding or speed negotiation, as this is a linear operation. Since channel coding and matching speed can affect the values of the masked bits, such as CRC bits of the channel of the strategic missile forces, the mask can be changed, for example, by using the scrambling or functions permutations or alternations. In this case the formation and mask overlay will also consider the impact of channel coding and/or SOG is osowania speed in bits, which will be eventually transferred. In this case, the Hamming distance between the masks generated and set the blend mask, as such, can be defined taking into account the impact of channel coding and/or speed negotiation. That is, can be selected such set of masks, in which the Hamming distance and the difference bits take into account how these masks will be affected channel coding and/or speed matching.

For example, let's use a very simple channel encoder, which adds a parity bit between each of the data bits in the sequence. After adding parity bits mask of all zeros will still contain only zeros. Mask of all ones, which is before encoding the largest Hamming distance from a mask of all zeros is encoded in such a coder in the mask 1010101... But the mask 1010101...that is before encoding a smaller Hamming distance is encoded in the mask 1101110111...which is after the encoding, the greater the Hamming distance than the mask of all ones. This example shows that the Hamming distance between the masks before and after encoding may vary and, therefore, can be optimized in different ways before and after encoding. It is obvious that the encoders can be more complex than in this simple example, but PR is narc remains the same. Similarly, gouging will remove some of the coded bits and a different influence on the Hamming distance and differences bits. In essence, the desired Hamming distance and differences bits can be obtained for bits immediately before the transfer, in which a high probability of data corruption. This mask can be formed and superimposed after channel coding and speed negotiation, if your mask is, for example, coded mask. Similarly, the mask can be formed and superimposed before channel coding and/or negotiation speed, when the mask take into account the impact of channel coding and/or negotiation speed has on the resulting transmitted sequence of bits. In some embodiments of the invention, to determine the set of masks having the desired Hamming distance after channel coding and/or speed negotiation, you can search for all potential masks, a significant number of masks can be randomly selected or may be selected masks that have at least a suitable Hamming distance before encoding. The mask having the desired Hamming distance can be selected from this set. In addition, a set of masks mo is et to be determined according to any other described herein variant embodiment of the invention.

In step 430 is transferred to the service of the strategic missile forces. Package SRF may be broadcast by the base station, such as BS 44, or by other means. In some embodiments, the implementation of the package of the strategic missile forces are transmitted in the form of four imagecolormatch packages. In some embodiments, the implementation of the transfer of the strategic missile forces may include the mapping of the resource elements reserved for a channel of the strategic missile forces, and the transfer package SRF wireless interface in accordance with the configuration of the antenna and the exploded diagram of the transmission that are associated with the selected mask. In addition, in some embodiments, the implementation of step 430 is also modulation package SRF and coding explode transfer.

In step 440, the user equipment such as mobile terminal 10 or other device that receives a packet of the strategic missile forces. In some embodiments, the implementation of the package of the strategic missile forces can be accepted in the form of four imagecolormatch packages. In some embodiments, the transaction following the acceptance of the package SRF in step 440 may be performed, for example, in the mobile terminal, the mirror means to the operations 405, 410, 415 and 420, carried out by the base station.

In step 450, the assumption about the configuration of the antenna and/or exploded diagram of the transmission and selects the associated mask (the mask associated with the proposed configuration is with their antenna and exploded diagram of the transmission) from a predetermined set of masks. In step 450 is performed demodulation package SRF by using information about the intended configuration of the antenna. In some embodiments, the implementation to perform demodulation can be used the assumption that the most reliable configuration of the antenna, i.e. the configuration with the largest number of antennas. In addition, in some embodiments, implementation of the proposed antenna configuration is determined based on the mapping of the resource elements. In the variants of implementation, where the FEC encoding, user equipment can perform the FEC decoding after performing demodulation. In addition, in some embodiments, implementation at step 450, the user equipment may also be channel decoding and matching speed.

In step 460, the user equipment performs demaskirovanie received bits. When the operation is used for enabling IRQ-unmasking the mask that is associated with the proposed configuration of the antenna of the base station. In some embodiments, the implementation of operation enabling IRQ-unmasking is applied to the masked bits, such as the masked CRC bits, by any known method, for example, by a logical exclusive OR operation.

In step 470 analyzes the received bits to determine the mask was and is used to mask bits before transmission. In some embodiments, the implementation of the analysis of the received bits includes control bits for CRC. In some embodiments, the implementation of the CRC can be calculated according to the information bits of the channel of the strategic missile forces. The bits of the CRC calculated from received information bits channel SRF, then compare with zamaskirovannymi bits CRC, as part of this analysis. In some embodiments, the implementation of the comparison can be performed by applying the exclusive OR operation for zamaskirovannyj the CRC bits and the CRC bits calculated by the user equipment according to information bits of the channel of the strategic missile forces. In other variants of implementation, the analysis may include a comparison between the CRC bits, which were calculated by the user equipment, and received still masked CRC bits, for example, through the exclusive OR operation. If the result of exclusive OR operation coincides with the mask associated with the proposed configuration of the antenna and the exploded diagram of the transmission, the assumption that the configuration of the antenna is correct, and determines which mask from a variety of predefined bit masks has been applied to the data bits.

In step 480 determines the configuration of the antenna and/or exploded diagram of the transmission. If the result of analysis in step 470 is a match, the mask used for masked the I bits, known, and it is determined that the assumption of the user equipment about the configuration of the antenna was correct. In some embodiments, the implementation, if the CRCs shows a match, the configuration of the antenna and/or exploded diagram of the transmission selected by the user equipment, may be considered highly reliable.

If at step 470 matches in the result of the analysis is not detected, in some embodiments, the implementation to determine the configuration of the antenna and/or schematic exploded transfer procedure returns to operation 450, the demodulation package SRF on the basis of the other of the mask and, therefore, other information about the intended configuration of the antenna. In other embodiments, the implementation if there is no match in the result of analysis in step 470, the procedure returns to operation 460 and using another mask for enabling IRQ-unmasking the CRC bits. Additional demodulation of the received packet SRF is not performed. In some embodiments, implementation, using masking the CRC bits, the CRC calculation with different masks can be very effective. First CRC bits are calculated without a mask, which is equivalent to a mask containing all zeros. If the CRC bits are all zeros, then used a mask to all zeros, and is determined by the corresponding configuration is tion of the antenna. Otherwise, the CRC bits are compared with other possible masks. If the result of these comparisons is a coincidence, is determined corresponding to the configuration of the antenna. It should be noted that in this embodiment, does not require recalculation of the CRC for different masks. In particular, do not want to skip all the bits of data through the CRC generator polynomial, which is a difficult part of generating the CRC. It takes only a simple comparison of the calculation result of CRC with a set of masks, which is a very simple operation.

In addition, in some embodiments, the implementation when there is no match, the decision to return to operation 450 demodulation, or simply demaskirovanie CRC bits with a different mask at step 460 may be based on the ratio signal/noise. In cases where the signal-to-noise ratio is high, a simple return to operation enabling IRQ-unmasking may be more effective, but if the signal-to-noise ratio is low, it is more effective return to operation demodulation package SRF based on the new assumptions. In accordance with various options for implementation may take into account other factors such as the complexity of the processing, when the decision to return to the demodulation based on the new assumptions, which requires dopolnitelnyefunktsii, or return to demaskirovanie based on a new assumption, which requires less processing. In the following embodiment, the bits of the CRC first unmask at step 460 using a different mask, and if the result is negative, then the decision to return to the demodulation operation at step 450. Regardless of the return to operation 450 or 460, this procedure can be repeated until, until a match is found, which determines the configuration of the antenna and the exploded diagram of the transmission.

In another embodiment, the invention features described above in relation to data, can be implemented in the device. The device may include a processor configured to determine the set of bit masks based on the Hamming distances between the masks and the difference of bits between these masks, for example, to maximize the Hamming distance between the mask and the difference of bits between these masks. In addition, in some embodiments of the invention Hamming distance and differences bits can take into account such factors as the likelihood of false positives and false negatives and the likelihood of distortion of the blocks of bits. The processor may be configured to calculate the bits, such as CRC bits, mask based on the configuration of the antenna and/or schematic exploded transfer CoE is avago object and apply the resulting mask to these bits. In addition, the processor may be configured to combine the masked bits and data bits of the strategic missile forces to bundle the strategic missile forces and to provide a package of the strategic missile forces to send.

In another embodiment, the invention features described above with respect to receiving data, can be implemented in the device. The device may include a processor, configured to receive service of the strategic missile forces and then select the intended configuration of the antenna and/or schematic exploded transfer and the appropriate mask. The processor may be configured to select a mask from a set of bit masks that are defined on the basis of the Hamming distances between the masks and the difference of bits between these masks, for example, to maximize the Hamming distance between the mask and the difference of bits between these masks. In addition, the processor may be configured to select a mask from a set of bit masks that are defined on the basis of the Hamming distances between the masks, so that the Hamming distance and differences bits take into account such factors as the likelihood of false positives and false negatives and the likelihood of distortion of the blocks of bits. In addition, the processor may be configured for enabling IRQ-unmasking the received bits using the selected mask to the analysis of received bits and determine the configuration of the antenna and/or the schematic exploded transfer. In addition, the processor may be configured to determine which configuration of the antenna and the exploded diagram of the transmission were used for the transmission of the received packet, by definition, what a mask was used before sending the packet of the strategic missile forces.

In another embodiment, the invention features described above in relation to data, can be implemented in the way. The method may include defining a set of bit masks based on the Hamming distances between the masks and the difference of bits between these masks, for example, to maximize the Hamming distance between the mask and the difference of bits between these masks. In addition, in some embodiments of the invention Hamming distance and differences bits can take into account such factors as the likelihood of false positives and false negatives and the likelihood of distortion of the blocks of bits. The method may include calculating bits, such as CRC bits, obtaining a mask based on the configuration of the antenna and/or schematic exploded transmission network object and use the resulting mask to these bits. Furthermore, the method may include combining the masked bits and data bits of the strategic missile forces to bundle the strategic missile forces and to provide a package of the strategic missile forces to send.

In another embodiment, the invention features described above in relation to pickup the and data can be implemented in the way. The method may include receiving package of the strategic missile forces and then select the intended configuration of the antenna and/or schematic exploded transfer and the appropriate mask. The method may also include selecting a mask from a set of bit masks that are defined on the basis of the Hamming distances between the masks and the difference of bits between these masks, for example, to maximize the Hamming distance between the mask and the difference of bits between these masks. Furthermore, the method may also include selecting a mask from a set of bit masks that are defined on the basis of the Hamming distances between the masks and the differences bits, so that the Hamming distance and differences bits take into account such factors as the likelihood of false positives and false negatives and the likelihood of distortion of the blocks of bits. Furthermore, the method may include demaskirovanie received bits using the selected mask to the analysis of received bits and determine the configuration of the antenna and/or schematic exploded transfer. Furthermore, the method may include determining which antenna configuration and the circuit posted transfer was used to transfer the received packet by determining what the mask was used before sending the packet of the strategic missile forces.

In accordance with one aspect of the present invention, a network entity, such as a basic article is ncia 44, and user equipment such as mobile terminal 10, which implements embodiments of the present invention operate under control of a computer software product. Computer program product for implementing the present invention includes a machine-readable storage medium and a part of the readable computer program code, such as a series of computer commands, stored on a machine-readable storage media.

4 shows a block diagram of methods, devices and program products in accordance with the variants of implementation of the present invention. You must understand that each block or step of the flowcharts, and combinations of blocks in the flowcharts can be implemented with a computer program. Commands of the computer program can be loaded into a computer or other programmable device, such as a processor, such as controller 20 associated with the mobile terminal 10, or a processor associated with the base station 44, with the aim of creating a device so that these commands are processed by the computer or other programmable device to create means for implementing the functions specified in the block (block) or step (steps) block diagram. Commands of the computer program may also be stored in computer readable memory in order to control the computer or other programmable device, to ensure its functioning in a certain way, when the command stored in computer readable memory, create the product, including command-line tools, which performs the functions specified in the block (block) or step (steps) block diagram. Commands of the computer program can also be loaded into a computer or other programmable device to run a series of functional steps performed by the computer or other programmable device, with the aim of creating executable by a computer process, in which these commands are executed by the computer or other programmable device, provide steps for implementing the functions specified in the block (block) or step (steps) block diagram.

Accordingly, blocks or steps of the flowchart support combinations of means for performing the specified functions, combinations of steps for performing the specified functions and program command means for performing the specified functions. You must understand that each block or step of the flowchart, and the combination of blocks or steps in the flowchart may be implemented based on hardware of computer systems, special purpose, which perform the specified functions or steps, or on the basis of combinations of hardware of a special purpose, and computer commands.

Many modificati the other embodiments of the present invention, set forth herein, will be apparent to a person skilled in the art to which the data refers to options for implementation, based on the ideas presented in the above description and the drawings. Therefore, this invention is not limited to the specific disclosed variants of its implementation, and modifications and other embodiments of included in the scope of the attached claims. Although this description uses specific terms, they apply only in a General and descriptive sense, but not to limit.

1. The method of providing information about the configuration of the antenna by knockout, including:
selecting a bit mask associated with the configuration of the antenna and the exploded diagram of the transmission, the bit mask is selected from a set of bit masks, including the first bit mask associated with odnoimennoi configuration, the second bit mask associated with dvuhantennoy configuration, and the third bit mask associated with chetyrehstennoy configuration, the choice of the bit mask includes selecting a bit mask from a set of bit masks, where the first bit mask has a maximum Hamming distance from the second bit mask; and
the use of a bit mask associated with the antenna configuration and the circuit posted transmitting, to the set of predefined Bito is from a set of bits.

2. The method according to claim 1, in which the use of a bit mask includes applying a bitmask to bits cyclic redundancy code control.

3. The method according to claim 1, in which the use of a bit mask includes the use of this bit mask to the set of predetermined bits included in the physical broadcast channel (SRF).

4. The method according to claim 1, wherein selecting the bit mask includes selecting a bit mask from a set of bit masks, where the first bit mask 0000000000000000, second bitmask 1111111111111111, and the third bit mask 0101010101010101.

5. The method according to claim 1, wherein selecting the bit mask includes selecting a bit mask from a set of bit masks, where the first bit mask consists of all zeros, the second bit mask consists of one unit, and the third bit mask each digit has a bit value opposite to the bit value of the neighboring digits.

6. The method according to claim 1, in which the use of a bit mask includes applying a bit mask for enabling IRQ-unmasking a predetermined set of bits, the method also includes performing control zamaskirovannogo set of predetermined bits of the cyclic redundancy code (CRC) and the definition on the basis of the CRC was correct mask.

7. The method according to claim 1, which also includes receiving the set of bits includes a predefined set of bits, which is masked n the boron bits applying the bit mask includes applying a bit mask for enabling IRQ-unmasking adopted the masked bits set, and the method also includes performing control zamaskirovannogo set of predetermined bits of the cyclic redundancy code (CRC) and the definition on the basis of the CRC was correct mask.

8. Device for providing information about the configuration of the antenna through a mask that contains the processor, configured to provide the implementation of this device:
selecting a bit mask associated with the configuration of the antenna and the exploded diagram of the transmission of a set of bit masks, including the first bit mask associated with odnoimennoi configuration, the second bit mask associated with dvuhantennoy configuration, and the third bit mask associated with chetyrehstennoy configuration, the choice of the bit mask includes selecting a bit mask from a set of bit masks, where the first bit mask has a maximum Hamming distance from the second bit mask; and
applying a bit mask associated with the antenna configuration and the circuit posted transmitting, to the set of predetermined bits from the set of bits.

9. The device according to claim 8, in which the processor is configured to provide the application of this unit bit mask for bits cyclic redundancy code for the control.

10. The device according to claim 8, in which the processor is configured to provide the application of the device mentioned the bit mask to the set of predetermined bits included in the physical broadcast channel (SRF).

11. The device according to claim 8, in which the processor is configured to enforce the device selection bit mask from a set of bit masks, where the first bit mask 0000000000000000, second bitmask 1111111111111111, and the third bit mask 0101010101010101.

12. The device according to claim 8, in which the processor is configured to enforce the device selection bit mask from a set of bit masks, in which the first bit mask consists of all zeros, the second bit mask consists of one unit, and the third bit mask each digit has a bit value opposite to the bit value of the neighboring digits.

13. The device according to claim 8, in which the processor is configured to provide the application of this device is a bit mask for enabling IRQ-unmasking a predetermined set of bits, and to ensure the execution of the device control zamaskirovannogo set of predetermined bits of the cyclic redundancy code (CRC) and the definition on the basis of the CRC was correct mask.

14. The device according to claim 8, in which the processor is also configured so that h is ordinary to enforce this device taking multiple bits, includes a predefined set of bits, which is masked by the bits set, and to ensure the application of this device is a bit mask for enabling IRQ-unmasking adopted the masked bits set, the execution control zamaskirovannogo set of predetermined bits of the cyclic redundancy code (CRC) and the definition on the basis of the CRC was correct mask.

15. Machine-readable medium with stored therein executable commands of the program code, is configured so that when their execution by the device to provide:
selecting a bit mask associated with the configuration of the antenna and the exploded diagram of the transmission, the bit mask is selected from a set of bit masks, including the first bit mask associated with odnoimennoi configuration, the second bit mask associated with dvuhantennoy configuration, and the third bit mask associated with chetyrehstennoy configuration, the choice of the bit mask includes selecting a bit mask from a set of bit masks, where the first bit mask has a maximum Hamming distance from the second bit mask; and
the use of a bit mask associated with the antenna configuration and the circuit posted transmitting, to the set of predetermined bits from the set of bits.

16. A machine-readable medium of clause 15, wherein the command program code configured that is, so the performance of the device to provide for the application of a bit mask for bits cyclic redundancy code control.

17. A machine-readable medium of clause 15, wherein the command code is configured so that when their execution by the device to ensure the application of this bit mask to the set of predetermined bits included in the physical broadcast channel (SRF).

18. A machine-readable medium of clause 15, wherein the command code is configured so that when their execution by the device to ensure the selection of a bit mask from a set of bit masks, where the first bit mask 0000000000000000, second bitmask 1111111111111111, and the third bit mask 0101010101010101.

19. A machine-readable medium of clause 15, wherein the command code is configured so that when their execution by the device to ensure the selection of a bit mask from a set of bit masks, in which the first bit mask consists of all zeros, the second bit mask consists of one unit, and the third bit mask each digit has a bit value opposite to the bit value of the neighboring digits.

20. A machine-readable medium of clause 15, wherein the command code is configured so that when their execution by the device to provide for the application of a bit mask for enabling IRQ-unmasking a predetermined set of bits is to implement the control zamaskirovannogo set of predetermined bits of the cyclic redundancy code (CRC) and a determination based on the CRC, did you select the correct mask.



 

Same patents:

FIELD: information technologies.

SUBSTANCE: invention relates to a basic station, a user device and a method used in mobile communication systems using ASTD (Antenna Switching Transmit Diversity) with a feedback. A basic station comprises a storage unit arranged as capable of storing data on quality reflecting conditions of a channel for various transmitting antennas of a user device in a preset frequency band comprising several elements of resources; a planning unit arranged as capable of planning data generation reflecting assignment of resources elements on the basis of quality data; and a transfer unit arranged as capable of transfer of a low-level control signal to a user device, including planning data and antenna selection information. Antenna selection information specifies those transmitting antennas of a user device, which shall be used for transfer. Planning information and antenna selection information jointly go through channel coding.

EFFECT: improvement of error frequency when transferring information on selection of an antenna from a basic station to a user device in case of an ASTD method is applied with a feedback.

7 cl, 6 dwg

FIELD: radio engineering.

SUBSTANCE: invention may be used to send data in communication systems with multiple inputs and multiple outputs or with multiple inputs and one output (MIMO/MISO). The method to process data for transfer along a wideband multi-input channel consists in receiving a control vector for each of multiple subranges, at the same time each control vector comprises multiple elements for multiple transmitting antennas, and in preliminary conversion of modulation symbols to be transferred in each subrange, using a control vector for a subrange, besides, the control vector for each subrange is received on the basis of its own vector corresponding to its main mode.

EFFECT: improvement of working indices under unfavourable channel conditions.

19 cl, 5 dwg

FIELD: information technology.

SUBSTANCE: MIMO-capable base station allocates a maximum transmission power resource to each of its antennae. For serving each of one or more MIMO and non-MIMO users, one or more carriers are allocated. For each carrier, information about the amount of allocated MIMO and non-MIMO user resources associated with the carrier is used to derive coefficients. For each carrier, the coefficients and the maximum transmission power resource for the carrier are used to derive a maximum transmission power resource for each of the antennae. For each antenna, a total maximum transmission power resource is derived. If it is determined that the total maximum transmission power resource of the antenna exceeds the transmission power limit for the antenna, and radio conditions for a non-MIMO user satisfy one or more predefined criteria, then one of the secondary antennae of the carrier is used to serve the non-MIMO user.

EFFECT: efficient use of transmission power of a base station.

16 cl, 5 dwg, 2 tbl

FIELD: information technology.

SUBSTANCE: techniques for efficiently sending channel state information using differential encoding are described. Differential encoding may be performed across space, across frequency, across space and frequency, across space, frequency and time, or across some other combination of dimensions. In one design, spatial state information may be determined for multiple spatial channels on multiple subbands. The spatial channels may correspond to different antennae, different precoding vectors, etc. Channel quality indicator (CQI) values may be obtained for the multiple spatial channels on the multiple subbands. The CQI values may be differentially encoded across the multiple spatial channels and the multiple subbands to obtain differential CQI information. In another design, CQI values may be obtained for multiple spatial channels on the multiple subbands in multiple time intervals and may be differentially encoded across space, frequency and time. The differential CQI information and the spatial state information may be sent as feedback.

EFFECT: efficient transmission of channel state information in a wireless communication system.

51 cl, 16 dwg

FIELD: radio engineering.

SUBSTANCE: components of noise signals for reception units different from a final reception unit, and a desired communication signal in a final reception unit are weighed with the help of parameters determined for a receiver, which describe capabilities of the receiver for the specified units in terms of their resources for suppression of noise and/or improvement of signals. The invention also relates to the method and device of planning for planning of the user equipment with the help of using the specified information by capabilities of signals processing for received signals of each reception unit.

EFFECT: improved calculation of antenna weights for transmission of data beams generation from a transmitter's unit into a final receiver's unit.

13 cl, 6 dwg

FIELD: information technology.

SUBSTANCE: data vectors to be transferred to multiple receiving antennas of receiver can be transformed into virtual antenna area. CDD can be applied to this area with subsequent precoding to provide benefits of prcoding while CDD is used. Therein, resulting signals can be transmitted without useless dispersion of spatial transmission energy, which is unreachable by receiving devices.

EFFECT: lower dissipation of energy which is useful when information is transmitted.

22 cl, 9 dwg

FIELD: information technology.

SUBSTANCE: in one version of implementation, the method comprises realisation of adaptive beam control using multiple transmitting and receiving antennas including iterative realisation of training sequences pair, where a pair of training sequences includes evaluation of transmitter array weighting vector and receiver array weighting vector.

EFFECT: increase in communication link resource.

60 cl, 11 dwg

FIELD: information technology.

SUBSTANCE: transmission signal undergoes space-time coding on a plurality of space-time antenna groups, wherein each space-time antenna group is associated with a particular space-time code. Based on each signal in each space-time antenna group, a beam is formed for a plurality of antennae in the given space-time antenna group. Each antenna in the plurality of antennae in the space-time antenna group is assigned a separate weight coefficient relative the other antenna in that space-time group. Each weight coefficient can have defined amplitude, phase or a combination of amplitude and phase. The weight coefficients can be static or dynamic. For dynamic coefficients, the amplitude, phase or combination of amplitude and phase can vary with time.

EFFECT: transmission diversity.

29 cl, 6 dwg

FIELD: information technology.

SUBSTANCE: techniques for sending a MIMO transmission using a combination of cyclic delay diversity and precoding are described. A set of delays (e.g., zero delay, small delay, and large delay) for cyclic delay diversity and a set of precoding matrices may be supported. In one design, a Node B may select a delay specifically for user equipment (UE) or for a set of UE served by the Node B. In another design, UE may evaluate different combinations of precoding matrix and delay, determine the combination with the best performance, and send that combination of precoding matrix and delay to Node B. Node B may perform precoding with the precoding matrix and then processing for cyclic delay diversity based on the selected delay. Alternatively, Node B may perform processing for cyclic delay diversity based on the selected delay and then precoding with the precoding matrix.

EFFECT: high reliability and achieving high efficiency.

34 cl, 15 dwg

FIELD: information technology.

SUBSTANCE: techniques for transmitting data using a combination of explicit cyclic delay and implicit cyclic delay are described. A transmitter may perform first processing for cyclic delay diversity (or explicit cyclic delay processing) based on a first set of cyclic delay values known to a receiver. The transmitter may perform precoding based on a precoding matrix either before or after the explicit cyclic delay processing. The transmitter may perform second processing for cyclic delay diversity (or implicit cyclic delay processing) based on a second set of cyclic delay values unknown to the receiver. The transmitter may perform both explicit and implicit cyclic delay processing for data and may perform only implicit cyclic delay processing for pilot signal. One object may select the first set of cyclic delay values and inform the other object. The transmitter may autonomously select the second set of cyclic delay values without informing the receiver.

EFFECT: high throughput and reliability.

46 cl, 9 dwg

FIELD: information technology.

SUBSTANCE: in the method of transmitting data in a wireless access system, an input bit sequence is created by tying a first error detection code to the data. If the size B of the input bit sequence is larger than the maximum size Z of code blocks, the number C of code blocks is calculated: C=B/(Z-L) where L is the size of the second error detection code which must be tied to each code block The size B' of the altered input bit sequence is then calculated using the number C of code blocks, the size L of the second error detection code and size B of the input bit sequence; the size K of the code blocks is obtained from predetermined values based on the value obtained by dividing the size B' of the altered input bit sequence by the number C of code blocks; the input bit sequence is segmented in order to have C code blocks with size K of code blocks; code blocks are formed by tying the second error detection code to each of the segmented input bit sequences; and the code blocks are channel coded.

EFFECT: high efficiency of the data transmission method.

14 cl, 11 dwg, 15 tbl

FIELD: radio engineering.

SUBSTANCE: invention is related to the field of radio engineering and may find wide application in building of radio communication systems. Device for decoding of turbo-codes comprises turbo decoder, and also memorising unit of control code sequence (CCS), memorising unit of permissible iteration number (PIN), unit of received service information (RSI) assessment and buffer, outlet of which is outlet of device, at that outlet of turbo decoder is connected to information inlet of buffer and the first inlet of RSI assessment unit, and outlets of memorising unit of CCS and memorising unit of PIN are connected accordingly to appropriate inlets of RSI assessment unit, outlet of control signal of which is connected to control inlet of buffer, and two other outlets of RSI assessment unit are accordingly outlet of signal "receipt packet received" and outlet of signal "receipt packet is not received" of device.

EFFECT: reduced time for decoding of turbo codes due to control over correct reception of data pack after each iteration of decoding, based on assessment of correctness of service information decoding included into composition of packet.

4 dwg

FIELD: information technology.

SUBSTANCE: for the received code implementation, extended syndromes are calculated for each code word of the component code of the cascade code, and, using an extended test matrix, the sets of lines which take part in the generation of any nonzero element of the extended syndrome (the number of lines of the extended test matrix, included in the set of lines, corresponds to the positions of single and two-fold errors of the distorted code word) are determined. Further successively inspecting extended syndromes of one of the code components, arrays of isolated errors are defined, which are joined in alternative groups of isolated errors, and during decoding with a "solid" solution, the most probable correction vector chosen is that alternative group, which has the least weight and all syndromes of component codes are nullified. During decoding with a "soft" solution, that alternative group with maximum modified metric is chosen, and those elements of the systematic part of the code word of the cascade code are inverted, the number of which corresponds to the positions of nonzero elements in the correction vector.

EFFECT: realisation of an optimum decoding procedure, increased authenticity of decoding and reduced device and computational complexity and provision for decoding turbo-codes with component cyclic linear block codes.

4 cl, 2 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention is related to method for decoding for at least one code word, at that at least one code word was generated by coder that contains structure, which provides the code represented by multiple transitions from one branch to the other in matrix diagram. This invention provides appropriate decoder, as well as mobile station and base station in communication network that uses decoder. Besides, communication network is provided, which contains base stations and mobile stations.

EFFECT: reduction of false information effect in process of decoding.

15 cl, 13 dwg

FIELD: communication systems which use signals with turbo-encoding on basis of convolution codes, namely, methods for iterative receipt of signals with turbo-encoding.

SUBSTANCE: in accordance to the method, received series is decoded according to algorithm of maximum a posteriori probability, soft solutions of informational and check bits are normalized, solved code words are generated at given length of decision-making, scalar result of multiplication of normalized series and generated code words is computed, most probable code word is selected on basis of maximum scalar result of multiplication, scalar result of multiplication is compared to boundary of existence of single code word, informational bits are extracted and rigid decision is made.

EFFECT: reduced probability of errors per block of turbo-code, resulting in increased trustworthiness of receipt of turbo-encoded signals.

5 cl, 2 dwg

FIELD: method and apparatus for ECC (error code correction).

SUBSTANCE: the method of ECC comprises a first directional first decoding, a first directional second decoding, a second directional first decoding, a second directional second decoding, wherein the error tolerant ability of first directional second decoding is greater than the second directional first decoding's. The ECC method comprises the following steps: read a data to be decoded; and if there exists at least one solution cannot be efficiently solved after continuous executing the first directional first decoding and the second directional second decoding, and execute the decoding action in the ECC decoding of the present invention according to a predetermined flow control rule, if there exists no correction performed during the ECC decoding and switch to the other directional decoding, the un-modified value is added by one; and if the un-modified value reached a maximum un-modified value, an ECC failure is confirmed and then stop the ECC decoding.

EFFECT: increased efficiency.

16 cl, 11 dwg

FIELD: module for generating decoding integration circuits for use in particular in turbo-devices and for generation of folding coding circuits.

SUBSTANCE: module is parametric and, due to that, makes it possible to generate decoding circuits, having various working characteristic, which may be used in turbo-devices, using various decoding modes and various architectures. Also, module ensures generation of decoding circuits, which are special because of capacity for selective control over a set of generator polynomials and, therefore, may be used in asymmetric turbo-devices.

EFFECT: ensured generation of decoding circuits with various working characteristics with usage of various decoding modes and various technologies.

2 cl, 7 dwg, 1 tbl

The invention relates to a system for encoding and decoding without loss and restores encoded with lossless audio data based on real time

FIELD: module for generating decoding integration circuits for use in particular in turbo-devices and for generation of folding coding circuits.

SUBSTANCE: module is parametric and, due to that, makes it possible to generate decoding circuits, having various working characteristic, which may be used in turbo-devices, using various decoding modes and various architectures. Also, module ensures generation of decoding circuits, which are special because of capacity for selective control over a set of generator polynomials and, therefore, may be used in asymmetric turbo-devices.

EFFECT: ensured generation of decoding circuits with various working characteristics with usage of various decoding modes and various technologies.

2 cl, 7 dwg, 1 tbl

FIELD: method and apparatus for ECC (error code correction).

SUBSTANCE: the method of ECC comprises a first directional first decoding, a first directional second decoding, a second directional first decoding, a second directional second decoding, wherein the error tolerant ability of first directional second decoding is greater than the second directional first decoding's. The ECC method comprises the following steps: read a data to be decoded; and if there exists at least one solution cannot be efficiently solved after continuous executing the first directional first decoding and the second directional second decoding, and execute the decoding action in the ECC decoding of the present invention according to a predetermined flow control rule, if there exists no correction performed during the ECC decoding and switch to the other directional decoding, the un-modified value is added by one; and if the un-modified value reached a maximum un-modified value, an ECC failure is confirmed and then stop the ECC decoding.

EFFECT: increased efficiency.

16 cl, 11 dwg

FIELD: communication systems which use signals with turbo-encoding on basis of convolution codes, namely, methods for iterative receipt of signals with turbo-encoding.

SUBSTANCE: in accordance to the method, received series is decoded according to algorithm of maximum a posteriori probability, soft solutions of informational and check bits are normalized, solved code words are generated at given length of decision-making, scalar result of multiplication of normalized series and generated code words is computed, most probable code word is selected on basis of maximum scalar result of multiplication, scalar result of multiplication is compared to boundary of existence of single code word, informational bits are extracted and rigid decision is made.

EFFECT: reduced probability of errors per block of turbo-code, resulting in increased trustworthiness of receipt of turbo-encoded signals.

5 cl, 2 dwg

Up!