US20130039266A1 - System and method to increase link adaptation performance with multi-level feedback - Google Patents

System and method to increase link adaptation performance with multi-level feedback Download PDF

Info

Publication number
US20130039266A1
US20130039266A1 US13/204,753 US201113204753A US2013039266A1 US 20130039266 A1 US20130039266 A1 US 20130039266A1 US 201113204753 A US201113204753 A US 201113204753A US 2013039266 A1 US2013039266 A1 US 2013039266A1
Authority
US
United States
Prior art keywords
mobile device
transport block
threshold
quality
acknowledgment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/204,753
Inventor
Ozgur Ekici
Muhammad Khaledul Islam
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Malikie Innovations Ltd
Original Assignee
Research in Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research in Motion Ltd filed Critical Research in Motion Ltd
Priority to US13/204,753 priority Critical patent/US20130039266A1/en
Assigned to RESEARCH IN MOTION LIMITED reassignment RESEARCH IN MOTION LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EKICI, OZGUR, ISLAM, MUHAMMAD KHALEDUL
Publication of US20130039266A1 publication Critical patent/US20130039266A1/en
Priority to US14/979,804 priority patent/US9967055B2/en
Assigned to BLACKBERRY LIMITED reassignment BLACKBERRY LIMITED CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: RESEARCH IN MOTION LIMITED
Assigned to MALIKIE INNOVATIONS LIMITED reassignment MALIKIE INNOVATIONS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLACKBERRY LIMITED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0002Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
    • H04L1/0003Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0006Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format
    • H04L1/0007Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format by modifying the frame length
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1829Arrangements specially adapted for the receiver end
    • H04L1/1854Scheduling and prioritising arrangements

Definitions

  • the present disclosure relates to hybrid automatic repeat request retransmission and in particular relates to adaptive modulation and coding schemes for hybrid automatic repeat request retransmission.
  • ARQ Automatic Repeat reQuest
  • HARQ Hybrid ARQ
  • FEC forward error correction
  • HARQ is used in a number of wireless technologies such as 3GPP High Speed Packet Access (HSPA) and Long Term Evolution (LTE), 3GPP2 High Rate Packet Data (HRPD).
  • HSPA High Speed Packet Access
  • LTE Long Term Evolution
  • HRPD High Rate Packet Data
  • Successful reception may depend on the modulation and coding scheme (MCS) used to send the data packet.
  • MCS modulation and coding scheme
  • a lower order modulation scheme meaning less number of bits transmitted per modulated symbol, typically provides better performance than higher order modulation in a given radio channel condition, but yields lower data throughput.
  • QPSK quadrature phase shift keying
  • 16QAM quadrature amplitude modulation
  • 16QAM provides a higher data rate than QPSK.
  • Link adaptation is a term used in wireless communications to indicate dynamic matching of the modulation and coding scheme to the radio channel conditions.
  • rate control is implemented by the medium access control high speed (MAC-hs) entity that configures the transport format of a high speed downlink shared channel (HSDSCH) in every 2 milliseconds of transmit time interval (TTI).
  • MAC-hs medium access control high speed entity that configures the transport format of a high speed downlink shared channel (HSDSCH) in every 2 milliseconds of transmit time interval (TTI).
  • Rate control is not applicable during retransmission attempts. This means that that the transport block size and the modulation scheme as well as the number of channelization codes cannot change during retransmission.
  • the retransmission of a data packet that was unsuccessfully received uses the same modulation scheme and instantaneous code rate as the first transmission. In such scenario, the data packet is never successfully received, and retransmission will continue until a maximum retry count has been reached on the physical layer and eventually the data retransmission has to be performed on the higher layers such as the radio link control (RLC) level.
  • RLC radio link control
  • FIG. 1 is a block diagram illustrating transport block processing at a mobile device in a sample HSDPA operation
  • FIG. 2 is a process diagram illustrating a method in accordance with the present disclosure
  • FIG. 3 is a block diagram illustrating transport block processing in a sample HSDPA operation using the process of FIG. 2 ;
  • FIG. 4 is a block diagram of an exemplary mobile device capable of being used with the embodiments of the present disclosure.
  • the present disclosure provides a method of explicit adaptive modulation and coding scheme selection comprising: receiving, at a mobile device, a transport block targeted to the mobile device; if a quality of the received transport block exceeds a threshold, providing an acknowledgment or negative acknowledgment to a network element; and if the quality of the received transport block is below the threshold, suppressing the acknowledgment or negative acknowledgement.
  • the present disclosure further provides a mobile device comprising: a processor; a communications subsystem; and memory, wherein the processor, communications subsystem and memory cooperate to: receive a transport block targeted to the mobile device; if a quality of the received transport block exceeds a threshold, providing an acknowledgment or negative acknowledgment to a network element; and if the quality of the received transport block is below the threshold, suppressing the acknowledgment or negative acknowledgement.
  • the transport block size, modulation scheme as well as a number of channelization codes are typically kept the same during HARQ retransmission of data packets. If channel conditions remain bad during such retransmission attempts, the mobile device will not be able to decode the transmitted packet successfully. As will be appreciated, this may happen frequently in practice, especially when the serving cell providing high speed downlink shared channel (HSDSCH) cell to the mobile device changes.
  • HSDSCH high speed downlink shared channel
  • HARQ processes are configured for the HSDSCH with a packet retransmission time of 10 ms and a maximum retransmission count configured in Node-B as 5 to 6.
  • These configuration parameters translate to an additional latency of 50 to 60 ms due to retransmission using the same modulation which is expected to fail in deteriorating channel conditions.
  • the high latency increases the round trip time almost twice the expected value provided that the next round of transmission is successful.
  • a typical round trip time in HSDPA systems is about 70 ms and with the above scenario the round trip time increases to around 130 ms, which negatively affects data throughput due to the acknowledged transmission nature of data calls.
  • Increased latency that occurs as an artifact of retransmission using the same modulation scheme may have a serious adverse impact on certain applications that use packet data services.
  • increased latency may make the circuit switched (CS) voice over HSPA channels (as described in the Third Generation Partnership Project (3GPP) Technical Specification 25.331 , “Radio Resource Control; Protocol specification” Change Request 3214, the contents of which are incorporated herein by reference) not viable as voice service requires certain acceptable delay requirements.
  • CS circuit switched
  • SRB signaling radio bearer
  • 3GPP Technical Specification 25.331 , “Radio Resource Control; Protocol specification” Change Request 2600, the contents of which are incorporated herein by reference.
  • SRB is used for exchanging control messages and timely reception of the control messages is very important—e.g. increase latency may delay allocation of the radio resources.
  • LTE Long Term Evolution
  • FIG. 1 shows a plurality of HARQ process blocks 110 in a HSDPA operation at a mobile device.
  • six HARQ processes exist, and are labeled within blocks 110 as “1”, “2”, . . . “6”.
  • HARQ process 1 is then utilized.
  • the labels in blocks 110 further show the transport block that is being sent from Node-B (NB) during the HARQ process block.
  • a first HARQ process block 112 is used to send a first transport block on the downlink from the network to a mobile device. This is shown by arrow 130.
  • a device receives the first transport block and processes the block, as shown by reference 132 .
  • the device was unable to successfully receive and demodulate the first transport block and therefore sends a NAK on the uplink back to the network, as shown by arrow 134.
  • the network then requires rescheduling, as shown by arrow 136.
  • Transport blocks 112 and 114 carry the same information content and use the same modulation scheme as well as block size.
  • the second transport block is transmitted to a mobile device, as shown by arrow 140.
  • the device then processes the second transport block as shown by block 142 and is able to successfully receive and demodulate the second transport block.
  • an acknowledgement shown at arrow 144 is sent back to the network.
  • a new transport block is sent to the mobile device.
  • transport blocks are sent and acknowledged, resulting in new transport blocks being provided in the next HARQ process time slot.
  • the transmit time interval is approximately 2 ms.
  • the retransmission time is approximately 12 ms.
  • One exemplary situation could be the attempt to send a large packet to a mobile device utilizing 16QAM modulation and a high code rate. This may be TrBlk1 from block 112 in FIG. 1 .
  • the sending, in the present example, is being done as wireless channel conditions degrade.
  • the sending of the large packet results in a NAK being provided to the network, shown by arrow 134.
  • the network then needs to reschedule the next HARQ transmission block to re-send the large packet again. Since the HARQ process is continuing, the next retransmission will utilize 16QAM modulation and the high code rate, even though a lower data rate with QPSK modulation would have been better for retransmission due to the degraded channel conditions.
  • the use of a higher order modulation and coding scheme may be common when the serving HSDSCH cell changes and the new serving HSDSCH cell may not know the channel quality of the mobile device or the mobile device is in an active set with non-serving pilots, among other situations.
  • Table 1 below shows an example mobile device log on an exemplary commercial HSPA network.
  • the block sent in row 1 is not properly decoded by a mobile device, even after 60 ms, as shown in row 31. This results in upper layers such as the radio link control (RLC) requiring retransmission.
  • RLC radio link control
  • Table 1 shows 5 HARQ processes, with each sub-frame being shown in column 3 of the table.
  • the modulation scheme is shown in the second last column and the number of codes allocated to the mobile device is shown in the last column.
  • the hybrid ARQ process (HAP) for each transmission is shown in the 8th column.
  • a transport block of 4115 bits is sent on sub-frame 2 using HARQ process 1.
  • the modulation scheme is 16QAM with 5 codes allocated to the mobile device.
  • the resending of the HARQ process 1 over 60 ms makes CS voice over HSPA or SRBs mapped on HSPA not viable.
  • the packet delay should be strictly maintained under reasonable time limits.
  • the maximum mount-to-ear delay is in the order of 250 ms.
  • the total delay for HARQ processes on the physical and MAC layers should be strictly below 150 ms.
  • the tolerable one way delay for HARQ should be under 75 ms.
  • the addition of 50 to 60 ms delay on top of regular performance would exceed the delay budget designed for voice over Internet protocol (VoIP) or CS voice over HSPA and cause a sub-optimal user experience.
  • VoIP voice over Internet protocol
  • CS voice over HSPA Voice over IP
  • FIG. 2 shows an exemplary method in accordance with the present disclosure.
  • the process of FIG. 2 starts at block 210 and proceeds to block 212 in which a mobile device receives a transport block.
  • the transport block is received and associated with a specific HARQ process.
  • the process then proceeds from block 212 to block 214 in which the quality of the transmission is checked against a threshold.
  • the check in block 214 can use any thresholds to evaluate the level of reliability of decodability of the received transport block. In one embodiment, this may be achieved by setting a Yamamoto bit to remember if, at any stage in a Viterbi trellis, the distance between the survivor path and the discarded path is smaller than a Yamamoto threshold. In one embodiment, this method is similar to the decision making process of reception of the high speed shared control channel (HS-SCCH) at the mobile device to determine whether the transmission is intended for the mobile device.
  • HS-SCCH high speed shared control channel
  • the threshold may be determined based on signal quality or other determining factors, and the present disclosure is not meant to be limited to any specific determination in block 214 .
  • the process proceeds to block 220 in which an ACK or a NAK is sent based on the received transport block.
  • the ACK would be sent if the transport block was received correctly and properly decoded.
  • the NAK would be sent if the transport block could not be properly decoded but the quality was greater than a threshold.
  • the process proceeds to block 230 .
  • the mobile device suppresses the sending of a response to the received transport block.
  • the mobile device suppresses the sending of an ACK or a NAK at block 230 to the Node B which acts as a Base Station Transceiver in a HSPA network.
  • the network does not receive either an ACK or a NAK in response to block 230 and the initial transmission attempt, and will assume that the mobile device may have missed the initial transmission on the downlink. In other words, the network will assume that either the mobile device could not decode the HS-SCCH on the downlink or the ACK or NAK response on the uplink on the high speed physical dedicated control channel (HS-PDCCH) was lost due to bad channel conditions.
  • HS-PDCCH high speed physical dedicated control channel
  • the node B will stop the current HARQ process, flush the HARQ process buffer and start a fresh HARQ process from scratch with a modulation and transport block size more suitable for current channel conditions.
  • the network element exits a redundant implicit link adaption stage (where the modulation scheme and the transport block size are kept the same) and instead uses an explicit link adaption where a new transport block is transmitted with a more suitable modulation and coding scheme.
  • a benefit of exiting the HARQ process and thus entering explicit link adaption is reduced delay. While relying on implicit link adaption alone may be sufficient from a system throughput point of view, the end user service quality may not be acceptable from a delay perspective.
  • the implementation on the device side to evaluate the level of reliability or decodability of the received transport block as described above with regard to block 214 ensures that the mobile device can determine whether or not the received transport block is good enough.
  • the mobile device Since the mobile device is at the receiving end of the downlink transmission, only the mobile device has information on whether the received initial transport block has a very poor quality or the device has almost decoded it. At one end of the spectrum, if the transport block is received with very poor quality or not at all, then the mobile device and network are better off with a fresh HARQ process with a more suitable modulation and coding scheme that match current channel conditions. On the other hand, if the mobile device has almost decoded the packet and just needs a few more parity bits to pass the cyclic redundancy check (CRC), then another HARQ retransmission would suffice. This can be done regardless of whether the HARQ utilizes incremental redundancy or chase combining.
  • CRC cyclic redundancy check
  • the mobile device responds with a NAK in both the scenarios described earlier. Therefore, the network has no information whether to change the modulation and coding scheme or not.
  • the method shown in FIG. 2 provides a mechanism to the mobile device to inform the network so that the network can make a proper decision to mitigate the above-mentioned problems.
  • FIG. 3 shows the example of FIG. 1 in which block 132 determines, through device processing, that the quality of the received transport block is below a threshold. In this case, the NAK 134 from FIG. 1 is suppressed.
  • transport block 7 may contain some or all of the data of transport block 1 , and is encoded with a modulation and coding scheme more appropriate to meet channel conditions.
  • the method of FIG. 3 can increase the overall network throughput as it minimizes avoidable unnecessary retransmissions.
  • the maximum effective data throughput is not necessarily equal to the system's peak rate.
  • the latency can reduce the overall throughput to the time required to acknowledge the data packet. In other words, large peak bit rates do not result in better user experience when the latency is too large.
  • the physical layer peak data rate of HSPA category 10 is 14 mega bits per second (Mbps), which is computed as 27952/2 or 13.9 Mbps assuming transmission of maximum transport block size of 27952 bits transmitted in 2 ms TTI. This peak data rate is calculated with the assumption of all HARQs being fully utilized and no retransmission is triggered. If 6 HARQ processes are configured on the device, then the retransmission behavior can be illustrated in the example of FIG. 1 above.
  • the mobile device can assist yielding improved throughput by proactively adapting to channel conditions in a timely manner compared to conventional scheme.
  • Table 2 below.
  • the overall packet transmission duration is 12 ms and throughput decreases to 2.3 Mbps.
  • the overall packet transmission duration is 24 ms and the throughput is 1.165 Mbps.
  • the transmission duration is 36 ms and the throughput is 0.77 Mbps.
  • the transmission duration is 48 ms and the throughput is 0.582 Mbps.
  • the transmission duration is 60 ms with a data rate of 0.465 Mbps.
  • the transmission duration is 12 ms and the throughput is 1.176 Mbps.
  • IR incremental redundancy
  • CC chase combining
  • a network uses full IR as the HARQ method and if the mobile device receives a first transmission that it is unable to decode, then triggering a NAK and repeatedly receiving retransmitted parity bits would not help decode the transport block.
  • chase combining is implemented on the network side, then retransmissions will include the same coded bits as the initial transmission (systematic bits are prioritized). This may increase the chance of decoding the transmitted transport block.
  • Mobile device 400 is a two-way wireless communication device.
  • the wireless device may be referred to as a data messaging device, a two-way pager, a wireless e-mail device, a cellular telephone with data messaging capabilities, a wireless Internet appliance, or a data communication device, as examples.
  • mobile device 400 can incorporate a communication subsystem 411 , including both a receiver 412 and a transmitter 414 , as well as associated components such as one or more, antenna elements 416 and 418 , local oscillators (LOs) 413 , and a processing module such as a digital signal processor (DSP) 420
  • LOs local oscillators
  • DSP digital signal processor
  • mobile device 400 may send and receive communication signals over the network 419 .
  • network 419 can comprise of multiple base stations communicating with the mobile device.
  • Signals received by antenna 416 through communication network 419 are input to receiver 412 , which may perform such common receiver functions as signal amplification, frequency down conversion, filtering, channel selection and the like, and in the example system shown in FIG. 4 , analog to digital (A/D) conversion.
  • A/D conversion of a received signal allows more complex communication functions such as demodulation and decoding to be performed in the DSP 420 .
  • signals to be transmitted are processed, including modulation and encoding for example, by DSP 420 and input to transmitter 414 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission over the communication network 419 via antenna 418 .
  • DSP 420 not only processes communication signals, but also provides for receiver and transmitter control. For example, the gains applied to communication signals in receiver 412 and transmitter 414 may be adaptively controlled through automatic gain control algorithms implemented in DSP 420 .
  • Network access requirements will also vary depending upon the type of network 419 .
  • network access is associated with a subscriber or user of mobile device 400 .
  • a mobile device may require a removable user identity module (RUIM) or a subscriber identity module (SIM) card in order to operate on a network.
  • the SIM/RUIM interface 444 is normally similar to a card-slot into which a SIM/RUIM card can be inserted and ejected.
  • the SIM/RUIM card hold many key configurations 451 , and other information 453 such as identification, and subscriber related information.
  • Mobile device 400 includes a processor 438 which controls the overall operation of the device. Communication functions, including at least data and voice communications, are performed through communication subsystem 411 . Processor 438 also interacts with further device subsystems such as the display 422 , flash memory 424 , random access memory (RAM) 426 , auxiliary input/output (I/O) subsystems 428 , serial port 430 , one or more keyboards or keypads 432 , speaker 434 , microphone 436 , other communication subsystem 440 such as a short-range communications subsystem and any other device subsystems generally designated as 442 . Serial port 430 could include a USB port or other port known to those in the art.
  • Some of the subsystems shown in FIG. 4 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions.
  • some subsystems such as keyboard 432 and display 422 , for example, may be used for both communication-related functions, such as entering a text message for transmission over a communication network, and device-resident functions such as a calculator or task list.
  • Operating system software used by the processor 438 can be stored in a persistent store such as flash memory 424 , which may instead be a read-only memory (ROM) or similar storage element (not shown). Specific device applications, or parts thereof, may be temporarily loaded into a volatile memory such as RAM 426 . Received communication signals may also be stored in RAM 426 .
  • a persistent store such as flash memory 424
  • ROM read-only memory
  • Specific device applications, or parts thereof may be temporarily loaded into a volatile memory such as RAM 426 .
  • Received communication signals may also be stored in RAM 426 .
  • flash memory 424 can be segregated into different areas for both computer programs 458 and program data storage 450 , 452 , 454 and 456 . These different storage types indicate each program can allocate a portion of flash memory 424 for their own data storage requirements.
  • Processor 438 in addition to its operating system functions, can enable execution of software applications on the mobile device. A predetermined set of applications which control basic operations, including at least data and voice communication applications for example, will normally be installed on mobile device 400 during manufacturing. Other applications could be installed subsequently or dynamically.
  • a software application may be a personal information manager (PIM) application having the ability to organize and manage data items relating to the user of the mobile device such as, but not limited to, e-mail, calendar events, voice mails, appointments, and task items. Naturally, one or more memory stores would be available on the mobile device to facilitate storage of PIM data items.
  • PIM application can have the ability to send and receive data items, via the wireless network 419 .
  • the PIM data items are seamlessly integrated, synchronized and updated, via the wireless network 419 , with the mobile device user's corresponding data items stored or associated with a host computer system.
  • auxiliary I/O subsystem 428 may also be loaded onto the mobile device 400 through the network 419 , an auxiliary I/O subsystem 428 , serial port 430 , short-range communications subsystem 440 or any other suitable subsystem 442 , and installed by a user in the RAM 426 or a non-volatile store (not shown) for execution by the microprocessor 438 .
  • Such flexibility in application installation increases the functionality of the device and may provide enhanced on-device functions, communication-related functions, or both.
  • a received signal such as a text message or web page download will be processed by the communication subsystem 411 and input to the microprocessor 438 , which further processes the received signal for element attributes for output to the display 422 , or alternatively to an auxiliary I/O device 428 .
  • a user of mobile device 400 may also compose data items such as email messages for example, using the keyboard 432 , which can be a complete alphanumeric keyboard or telephone-type keypad, in conjunction with the display 422 and possibly an auxiliary I/O device 428 . Such composed items may then be transmitted over a communication network through the communication subsystem 411 .
  • mobile device 400 For voice communications, overall operation of mobile device 400 is similar, except that received signals would be output to a speaker 434 and signals for transmission would be generated by a microphone 436 .
  • Alternative voice or audio I/O subsystems such as a voice message recording subsystem, may also be implemented on mobile device 400 .
  • voice or audio signal output is accomplished primarily through the speaker 434 , display 422 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information for example.
  • Serial port 430 in FIG. 4 would normally be implemented in a personal digital assistant (PDA)-type mobile device for which synchronization with a user's desktop computer (not shown) may be desirable, but is an optional device component.
  • PDA personal digital assistant
  • Such a port 430 would enable a user to set preferences through an external device or software application and would extend the capabilities of mobile device 400 by providing for information or software downloads to mobile device 400 other than through a wireless communication network.
  • the alternate download path may for example be used to load an encryption key onto the device through a direct and thus reliable and trusted connection to thereby enable secure device communication.
  • Serial port 430 can further be used to connect the mobile device to a computer to act as a modem.
  • WiFi Communications Subsystem 440 is used for WiFi Communications and can provide for communication with access point 440 .
  • Other communications subsystem(s) 441 are further components that may provide for communication between mobile device 400 and different systems or devices, which need not necessarily be similar devices.
  • the subsystem(s) 441 may include an infrared device and associated circuits and components or a BluetoothTM communication module to provide for communication with similarly enabled systems and devices.
  • the embodiments described herein are examples of structures, systems or methods having elements corresponding to elements of the techniques of the present application.
  • the above written description may enable those skilled in the art to make and use embodiments having alternative elements that likewise correspond to the elements of the techniques of the present application.
  • the intended scope of the techniques of the above application thus includes other structures, systems or methods that do not differ from the techniques of the present application as described herein, and further includes other structures, systems or methods with insubstantial differences from the techniques of the present application as described herein.

Abstract

A method and apparatus for explicit adaptive modulation and coding scheme selection, the method receiving, at a mobile device, a transport block targeted to the mobile device, and if a quality of the received transport block exceeds a threshold, providing an acknowledgment or negative acknowledgment to a network element; and if the quality of the received transport block is below the threshold, suppressing the acknowledgment or negative acknowledgement.

Description

    FIELD OF THE DISCLOSURE
  • The present disclosure relates to hybrid automatic repeat request retransmission and in particular relates to adaptive modulation and coding schemes for hybrid automatic repeat request retransmission.
  • BACKGROUND
  • Automatic Repeat reQuest (ARQ) is a method for packet data transmission that uses positive or negative acknowledgement by the receiving party to indicate to the sending party whether the data packet has been successfully received or not. If the sender does not receive an acknowledgment or receives negative acknowledgment, it usually retransmits until an acknowledgment is received from the receiving party or the number of re-transmissions exceeds a predefined threshold. The term “Hybrid ARQ” (HARQ) is used to describe any scheme that combines forward error correction (FEC) with ARQ in which data received in unsuccessful attempts are used by receiving party in FEC decoding instead of being discarded. The simplest form of HARQ is called Chase Combining (CC) wherein each retransmission repeats the first transmission, or part of it, and the receiver combines multiple received copies of the coded packet prior to decoding. Incremental redundancy (IR) is another HARQ technique wherein instead of sending simple repeats of the entire coded packet, additional redundant information is incrementally transmitted if the decoding fails on the first attempt. HARQ is used in a number of wireless technologies such as 3GPP High Speed Packet Access (HSPA) and Long Term Evolution (LTE), 3GPP2 High Rate Packet Data (HRPD).
  • Successful reception may depend on the modulation and coding scheme (MCS) used to send the data packet. A lower order modulation scheme, meaning less number of bits transmitted per modulated symbol, typically provides better performance than higher order modulation in a given radio channel condition, but yields lower data throughput. For example, QPSK (quadrature phase shift keying) is more robust and can tolerate higher levels of communication errors than 16QAM (quadrature amplitude modulation). However, 16QAM provides a higher data rate than QPSK.
  • Link adaptation is a term used in wireless communications to indicate dynamic matching of the modulation and coding scheme to the radio channel conditions. For example, in case of 3GPP high speed downlink packet access (HSDPA), rate control is implemented by the medium access control high speed (MAC-hs) entity that configures the transport format of a high speed downlink shared channel (HSDSCH) in every 2 milliseconds of transmit time interval (TTI). This results in fast adaptation of both the modulation scheme and instantaneous code rate to provide a data rate suitable for current radio conditions.
  • Rate control is not applicable during retransmission attempts. This means that that the transport block size and the modulation scheme as well as the number of channelization codes cannot change during retransmission. Thus, in degrading channel conditions, the retransmission of a data packet that was unsuccessfully received uses the same modulation scheme and instantaneous code rate as the first transmission. In such scenario, the data packet is never successfully received, and retransmission will continue until a maximum retry count has been reached on the physical layer and eventually the data retransmission has to be performed on the higher layers such as the radio link control (RLC) level.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present disclosure will be better understood with reference to the drawings, in which:
  • FIG. 1 is a block diagram illustrating transport block processing at a mobile device in a sample HSDPA operation;
  • FIG. 2 is a process diagram illustrating a method in accordance with the present disclosure;
  • FIG. 3 is a block diagram illustrating transport block processing in a sample HSDPA operation using the process of FIG. 2; and
  • FIG. 4 is a block diagram of an exemplary mobile device capable of being used with the embodiments of the present disclosure.
  • DETAILED DESCRIPTION OF THE DRAWINGS
  • The present disclosure provides a method of explicit adaptive modulation and coding scheme selection comprising: receiving, at a mobile device, a transport block targeted to the mobile device; if a quality of the received transport block exceeds a threshold, providing an acknowledgment or negative acknowledgment to a network element; and if the quality of the received transport block is below the threshold, suppressing the acknowledgment or negative acknowledgement.
  • The present disclosure further provides a mobile device comprising: a processor; a communications subsystem; and memory, wherein the processor, communications subsystem and memory cooperate to: receive a transport block targeted to the mobile device; if a quality of the received transport block exceeds a threshold, providing an acknowledgment or negative acknowledgment to a network element; and if the quality of the received transport block is below the threshold, suppressing the acknowledgment or negative acknowledgement.
  • The transport block size, modulation scheme as well as a number of channelization codes are typically kept the same during HARQ retransmission of data packets. If channel conditions remain bad during such retransmission attempts, the mobile device will not be able to decode the transmitted packet successfully. As will be appreciated, this may happen frequently in practice, especially when the serving cell providing high speed downlink shared channel (HSDSCH) cell to the mobile device changes.
  • In a typical HSPA network configuration, 5 HARQ processes are configured for the HSDSCH with a packet retransmission time of 10 ms and a maximum retransmission count configured in Node-B as 5 to 6. These configuration parameters translate to an additional latency of 50 to 60 ms due to retransmission using the same modulation which is expected to fail in deteriorating channel conditions. The high latency increases the round trip time almost twice the expected value provided that the next round of transmission is successful. A typical round trip time in HSDPA systems is about 70 ms and with the above scenario the round trip time increases to around 130 ms, which negatively affects data throughput due to the acknowledged transmission nature of data calls.
  • Increased latency that occurs as an artifact of retransmission using the same modulation scheme may have a serious adverse impact on certain applications that use packet data services. For example, increased latency may make the circuit switched (CS) voice over HSPA channels (as described in the Third Generation Partnership Project (3GPP) Technical Specification 25.331, “Radio Resource Control; Protocol specification” Change Request 3214, the contents of which are incorporated herein by reference) not viable as voice service requires certain acceptable delay requirements.
  • Example of another feature that may suffer degradation as result of increased latency is operation of signaling radio bearer (SRB) when mapped to HSPA channels, as described in 3GPP, Technical Specification 25.331, “Radio Resource Control; Protocol specification” Change Request 2600, the contents of which are incorporated herein by reference. SRB is used for exchanging control messages and timely reception of the control messages is very important—e.g. increase latency may delay allocation of the radio resources.
  • Similar problems exist in the Long Term Evolution (LTE) non-adaptive retransmission. The present disclosure is not meant to be limited to HSDPA or LTE but these are merely used as examples below to provide examples of methods that are provided to force a non-adaptive modulation scheme to become an adaptive modulation scheme during HARQ retransmission.
  • Reference is now made to FIG. 1, which shows a plurality of HARQ process blocks 110 in a HSDPA operation at a mobile device. In the example of FIG. 1, six HARQ processes exist, and are labeled within blocks 110 as “1”, “2”, . . . “6”. As will be appreciated by those in the art having regard to the above, after HARQ process 6 is used, HARQ process 1 is then utilized.
  • The labels in blocks 110 further show the transport block that is being sent from Node-B (NB) during the HARQ process block.
  • As seen in FIG. 1, a first HARQ process block 112 is used to send a first transport block on the downlink from the network to a mobile device. This is shown by arrow 130.
  • A device receives the first transport block and processes the block, as shown by reference 132.
  • In the example of FIG. 1, the device was unable to successfully receive and demodulate the first transport block and therefore sends a NAK on the uplink back to the network, as shown by arrow 134. The network then requires rescheduling, as shown by arrow 136.
  • Subsequently, during the next HARQ process 1 block 114, the first transport block is re-sent. Transport blocks 112 and 114 carry the same information content and use the same modulation scheme as well as block size.
  • Conversely, in the second HARQ process, as shown as block 116, the second transport block is transmitted to a mobile device, as shown by arrow 140. The device then processes the second transport block as shown by block 142 and is able to successfully receive and demodulate the second transport block. Thus, an acknowledgement, shown at arrow 144 is sent back to the network. At the next HARQ process 2 block, shown by reference 118, a new transport block is sent to the mobile device.
  • Similarly, for the remaining HARQ processes, transport blocks are sent and acknowledged, resulting in new transport blocks being provided in the next HARQ process time slot.
  • From FIG. 1, the transmit time interval is approximately 2 ms. Thus, with 6 HARQ processes, the retransmission time is approximately 12 ms.
  • One exemplary situation could be the attempt to send a large packet to a mobile device utilizing 16QAM modulation and a high code rate. This may be TrBlk1 from block 112 in FIG. 1. The sending, in the present example, is being done as wireless channel conditions degrade.
  • The sending of the large packet results in a NAK being provided to the network, shown by arrow 134. The network then needs to reschedule the next HARQ transmission block to re-send the large packet again. Since the HARQ process is continuing, the next retransmission will utilize 16QAM modulation and the high code rate, even though a lower data rate with QPSK modulation would have been better for retransmission due to the degraded channel conditions.
  • Such circumstances often require multiple retransmission attempts. For example, typically six attempts are observed in commercial HSPA networks. This results in lower throughput as well as unacceptable delay performance for certain applications such as CS over HSPA or SRBs mapped on HSPA.
  • In existing HSPA networks, the use of a higher order modulation and coding scheme may be common when the serving HSDSCH cell changes and the new serving HSDSCH cell may not know the channel quality of the mobile device or the mobile device is in an active set with non-serving pilots, among other situations.
  • Table 1 below shows an example mobile device log on an exemplary commercial HSPA network.
  • TABLE 1
    Sample log
    Number
    Row Time sub- Transport Modulation of
    # (s) frame CRC block size HAP type Codes
    1 25.880 2 FAIL 4115 1 16QAM 5
    2 25.880 3 N/A
    3 25.880 4 N/A
    4 25.890 0 N/A
    5 25.890 1 N/A
    6 25.890 2 PASS 3090 0 QPSK 5
    7 25.890 3 FAIL 4115 1 16QAM 5
    8 25.890 4 FAIL 3762 2 16QAM 5
    9 25.900 0 FAIL 1380 3 QPSK 4
    10 25.900 1 N/A
    11 25.900 2 N/A
    12 25.900 3 N/A
    13 25.900 4 FAIL 4115 1 16QAM 5
    14 25.910 0 FAIL 3762 2 16QAM 5
    15 25.910 1 N/A
    16 25.910 2 N/A
    17 25.910 3 N/A
    18 25.910 4 N/A
    19 25.920 0 FAIL 4115 1 16QAM 5
    20 25.920 1 FAIL 3762 2 16QAM 5
    21 25.920 2 PASS 1380 3 QPSK 4
    22 25.920 3 N/A
    23 25.920 4 N/A
    24 25.930 0 N/A
    25 25.930 1 FAIL 4115 1 16QAM 5
    26 25.930 2 FAIL 3762 2 16QAM 5
    27 25.930 3 N/A
    28 25.930 4 N/A
    29 25.940 0 N/A
    30 25.940 1 N/A
    31 25.940 2 FAIL 4115 1 16QAM 5
    32 25.940 3 FAIL 3762 2 16QAM 5
  • As is seen in Table 1 above, the block sent in row 1 is not properly decoded by a mobile device, even after 60 ms, as shown in row 31. This results in upper layers such as the radio link control (RLC) requiring retransmission.
  • From Table 1, it can be seen that packets that are transmitted with QPSK modulation have a higher chance of proper decoding due to its robustness to channel imperfections, as seen in rows 6 and 21 of the table.
  • In particular, Table 1 shows 5 HARQ processes, with each sub-frame being shown in column 3 of the table. The modulation scheme is shown in the second last column and the number of codes allocated to the mobile device is shown in the last column.
  • The hybrid ARQ process (HAP) for each transmission is shown in the 8th column.
  • Thus, for row 1, at time 25.880, a transport block of 4115 bits is sent on sub-frame 2 using HARQ process 1. The modulation scheme is 16QAM with 5 codes allocated to the mobile device.
  • Moving down the table to row 7, the same HARQ process is shown again. The 4115 bits are transported utilizing 16QAM with 5 codes allocated to the mobile device and this again fails. The same HARQ process is then shown in rows 13, 19, and 31 and continues to fail.
  • Conversely, in row 6, 3090 bits are transported utilizing QPSK modulation with 5 codes allocated to the mobile device. In this case, the bits are successfully received and decoded and therefore this process passes.
  • As will be appreciated, the resending of the HARQ process 1 over 60 ms makes CS voice over HSPA or SRBs mapped on HSPA not viable. For a typically conversational class application such as voice, the packet delay should be strictly maintained under reasonable time limits. The maximum mount-to-ear delay is in the order of 250 ms. Assuming that the delay for the radio network controller plus core network is approximately 100 ms, the total delay for HARQ processes on the physical and MAC layers should be strictly below 150 ms. Hence, assuming that both end users are HSDPA users, the tolerable one way delay for HARQ should be under 75 ms. The addition of 50 to 60 ms delay on top of regular performance would exceed the delay budget designed for voice over Internet protocol (VoIP) or CS voice over HSPA and cause a sub-optimal user experience.
  • Reference is now made to FIG. 2, which shows an exemplary method in accordance with the present disclosure.
  • The process of FIG. 2 starts at block 210 and proceeds to block 212 in which a mobile device receives a transport block. The transport block is received and associated with a specific HARQ process.
  • The process then proceeds from block 212 to block 214 in which the quality of the transmission is checked against a threshold.
  • The check in block 214 can use any thresholds to evaluate the level of reliability of decodability of the received transport block. In one embodiment, this may be achieved by setting a Yamamoto bit to remember if, at any stage in a Viterbi trellis, the distance between the survivor path and the discarded path is smaller than a Yamamoto threshold. In one embodiment, this method is similar to the decision making process of reception of the high speed shared control channel (HS-SCCH) at the mobile device to determine whether the transmission is intended for the mobile device.
  • In other embodiments the threshold may be determined based on signal quality or other determining factors, and the present disclosure is not meant to be limited to any specific determination in block 214.
  • From block 214, if the channel quality is greater than a threshold, the process proceeds to block 220 in which an ACK or a NAK is sent based on the received transport block. The ACK would be sent if the transport block was received correctly and properly decoded. The NAK would be sent if the transport block could not be properly decoded but the quality was greater than a threshold.
  • From block 220 the process proceeds to block 240 and ends.
  • Conversely, from block 214, if the quality is less than a threshold the process proceeds to block 230. At block 230 the mobile device suppresses the sending of a response to the received transport block. In other words, since the channel quality is less than a threshold, the mobile device suppresses the sending of an ACK or a NAK at block 230 to the Node B which acts as a Base Station Transceiver in a HSPA network.
  • From block 230 the process proceeds to block 240 and ends.
  • The network (Node B) does not receive either an ACK or a NAK in response to block 230 and the initial transmission attempt, and will assume that the mobile device may have missed the initial transmission on the downlink. In other words, the network will assume that either the mobile device could not decode the HS-SCCH on the downlink or the ACK or NAK response on the uplink on the high speed physical dedicated control channel (HS-PDCCH) was lost due to bad channel conditions.
  • With such assumptions, the node B will stop the current HARQ process, flush the HARQ process buffer and start a fresh HARQ process from scratch with a modulation and transport block size more suitable for current channel conditions.
  • Thus, based on the suppression of the ACK or NAK at block 230, the network element exits a redundant implicit link adaption stage (where the modulation scheme and the transport block size are kept the same) and instead uses an explicit link adaption where a new transport block is transmitted with a more suitable modulation and coding scheme.
  • As will be appreciated by those in the art having regard to the above, a benefit of exiting the HARQ process and thus entering explicit link adaption is reduced delay. While relying on implicit link adaption alone may be sufficient from a system throughput point of view, the end user service quality may not be acceptable from a delay perspective. The implementation on the device side to evaluate the level of reliability or decodability of the received transport block as described above with regard to block 214 ensures that the mobile device can determine whether or not the received transport block is good enough.
  • Since the mobile device is at the receiving end of the downlink transmission, only the mobile device has information on whether the received initial transport block has a very poor quality or the device has almost decoded it. At one end of the spectrum, if the transport block is received with very poor quality or not at all, then the mobile device and network are better off with a fresh HARQ process with a more suitable modulation and coding scheme that match current channel conditions. On the other hand, if the mobile device has almost decoded the packet and just needs a few more parity bits to pass the cyclic redundancy check (CRC), then another HARQ retransmission would suffice. This can be done regardless of whether the HARQ utilizes incremental redundancy or chase combining.
  • At present, the mobile device responds with a NAK in both the scenarios described earlier. Therefore, the network has no information whether to change the modulation and coding scheme or not. The method shown in FIG. 2, provides a mechanism to the mobile device to inform the network so that the network can make a proper decision to mitigate the above-mentioned problems.
  • Reference is now made to FIG. 3. FIG. 3 shows the example of FIG. 1 in which block 132 determines, through device processing, that the quality of the received transport block is below a threshold. In this case, the NAK 134 from FIG. 1 is suppressed.
  • In response, the network receives neither an ACK or a NAK and at the next HARQ process 1, shown by block 310, the example of FIG. 3 shows the transmission of transmit block 7. As will be appreciated, transport block 7 may contain some or all of the data of transport block 1, and is encoded with a modulation and coding scheme more appropriate to meet channel conditions.
  • The method of FIG. 3 can increase the overall network throughput as it minimizes avoidable unnecessary retransmissions. In networks with packet acknowledgement schemes such as TCP/IP, the maximum effective data throughput is not necessarily equal to the system's peak rate. The latency can reduce the overall throughput to the time required to acknowledge the data packet. In other words, large peak bit rates do not result in better user experience when the latency is too large.
  • As an example, throughput performance of a typical mobile device is illustrated below. The physical layer peak data rate of HSPA category 10 is 14 mega bits per second (Mbps), which is computed as 27952/2 or 13.9 Mbps assuming transmission of maximum transport block size of 27952 bits transmitted in 2 ms TTI. This peak data rate is calculated with the assumption of all HARQs being fully utilized and no retransmission is triggered. If 6 HARQ processes are configured on the device, then the retransmission behavior can be illustrated in the example of FIG. 1 above.
  • As can be seen, the mobile device can assist yielding improved throughput by proactively adapting to channel conditions in a timely manner compared to conventional scheme. Reference is now made to Table 2 below.
  • TABLE 2
    Data Throughput of category 10 HSDPA
    with packet re-transmissions
    Transport block Transmission Data rate
    size (bits) duration (ms) (Mbps)
    No re-tx with 16QAM 27952 2 13.976
    1 re-tx with 16QAM 27952 12 2.329
    2 re-tx with 16QAM 27952 24 1.165
    3 re-tx with 16QAM 27952 36 0.776
    4 re-tx with 16QAM 27952 48 0.582
    5 re-tx with 16QAM 27952 60 0.465
    1 re-tx with QPSK 14115 12 1.176
  • As seen from Table 2, utilizing 16QAM modulation coding with a 27952 bit transport block requiring no retransmissions provides a data rate of almost 14 Mbps.
  • If one retransmission is required with 16QAM and the same transport block size is utilized, then the overall packet transmission duration is 12 ms and throughput decreases to 2.3 Mbps.
  • If two retransmissions with 16QAM are required with the transport block size of 27952, the overall packet transmission duration is 24 ms and the throughput is 1.165 Mbps.
  • Similarly, with three retransmissions at the same transport block size the transmission duration is 36 ms and the throughput is 0.77 Mbps. With four retransmissions the transmission duration is 48 ms and the throughput is 0.582 Mbps. With five retransmissions the transmission duration is 60 ms with a data rate of 0.465 Mbps.
  • Conversely, with one retransmission and the changing of the modulation and coding scheme to QPSK and the transport block size to 14115, the transmission duration is 12 ms and the throughput is 1.176 Mbps.
  • Thus, as can be seen from Table 2 above, if more than one retransmission is required then it is better to move directly to the modulation and coding scheme that will more likely be successfully received at the mobile device.
  • Further, as will be appreciated by those skilled in the art having regard to the above, if the initial transmission is received with very poor quality, the probability of the occurrence of increased retransmission attempts is higher if full incremental redundancy (IR) is used as implicit rate adaptation compared to chase combining (CC) for soft decoding. This is due to the fact that during retransmission, not all redundancy versions provide the same amount of information about the transport block. For instance, for turbo codes, the systematic bits are of higher importance that the parity bits. Therefore, the initial transmissions typically have all systematic bits and some parity bits. If full IR is implemented in a network, all the retransmissions will have highly punctured systematic bits and therefore include mostly parity bits. During HSDPA transmission, if mobile device cannot decode the initial transmission it will respond to the network with negative acknowledgement (NAK) on the uplink, triggering the retransmission of the transport block with new redundancy versions.
  • In a current implementation, if a network uses full IR as the HARQ method and if the mobile device receives a first transmission that it is unable to decode, then triggering a NAK and repeatedly receiving retransmitted parity bits would not help decode the transport block.
  • If chase combining is implemented on the network side, then retransmissions will include the same coded bits as the initial transmission (systematic bits are prioritized). This may increase the chance of decoding the transmitted transport block.
  • The above can be implemented on any mobile device and the present disclosure is not meant to be limited to any particular mobile device. One example of a mobile device on which the above could be implemented is shown below with regard to FIG. 4.
  • Mobile device 400 is a two-way wireless communication device. Depending on the exact functionality provided, the wireless device may be referred to as a data messaging device, a two-way pager, a wireless e-mail device, a cellular telephone with data messaging capabilities, a wireless Internet appliance, or a data communication device, as examples.
  • Where mobile device 400 is enabled for two-way communication, it can incorporate a communication subsystem 411, including both a receiver 412 and a transmitter 414, as well as associated components such as one or more, antenna elements 416 and 418, local oscillators (LOs) 413, and a processing module such as a digital signal processor (DSP) 420 The particular design of the communication subsystem 411 depends upon the communication network in which the device is intended to operate.
  • When required network registration or activation procedures have been completed, mobile device 400 may send and receive communication signals over the network 419. As illustrated in FIG. 4, network 419 can comprise of multiple base stations communicating with the mobile device.
  • Signals received by antenna 416 through communication network 419 are input to receiver 412, which may perform such common receiver functions as signal amplification, frequency down conversion, filtering, channel selection and the like, and in the example system shown in FIG. 4, analog to digital (A/D) conversion. A/D conversion of a received signal allows more complex communication functions such as demodulation and decoding to be performed in the DSP 420. In a similar manner, signals to be transmitted are processed, including modulation and encoding for example, by DSP 420 and input to transmitter 414 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission over the communication network 419 via antenna 418. DSP 420 not only processes communication signals, but also provides for receiver and transmitter control. For example, the gains applied to communication signals in receiver 412 and transmitter 414 may be adaptively controlled through automatic gain control algorithms implemented in DSP 420.
  • Network access requirements will also vary depending upon the type of network 419. In some networks network access is associated with a subscriber or user of mobile device 400. A mobile device may require a removable user identity module (RUIM) or a subscriber identity module (SIM) card in order to operate on a network. The SIM/RUIM interface 444 is normally similar to a card-slot into which a SIM/RUIM card can be inserted and ejected. The SIM/RUIM card hold many key configurations 451, and other information 453 such as identification, and subscriber related information.
  • Mobile device 400 includes a processor 438 which controls the overall operation of the device. Communication functions, including at least data and voice communications, are performed through communication subsystem 411. Processor 438 also interacts with further device subsystems such as the display 422, flash memory 424, random access memory (RAM) 426, auxiliary input/output (I/O) subsystems 428, serial port 430, one or more keyboards or keypads 432, speaker 434, microphone 436, other communication subsystem 440 such as a short-range communications subsystem and any other device subsystems generally designated as 442. Serial port 430 could include a USB port or other port known to those in the art.
  • Some of the subsystems shown in FIG. 4 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions. Notably, some subsystems, such as keyboard 432 and display 422, for example, may be used for both communication-related functions, such as entering a text message for transmission over a communication network, and device-resident functions such as a calculator or task list.
  • Operating system software used by the processor 438 can be stored in a persistent store such as flash memory 424, which may instead be a read-only memory (ROM) or similar storage element (not shown). Specific device applications, or parts thereof, may be temporarily loaded into a volatile memory such as RAM 426. Received communication signals may also be stored in RAM 426.
  • As shown, flash memory 424 can be segregated into different areas for both computer programs 458 and program data storage 450, 452, 454 and 456. These different storage types indicate each program can allocate a portion of flash memory 424 for their own data storage requirements. Processor 438, in addition to its operating system functions, can enable execution of software applications on the mobile device. A predetermined set of applications which control basic operations, including at least data and voice communication applications for example, will normally be installed on mobile device 400 during manufacturing. Other applications could be installed subsequently or dynamically.
  • A software application may be a personal information manager (PIM) application having the ability to organize and manage data items relating to the user of the mobile device such as, but not limited to, e-mail, calendar events, voice mails, appointments, and task items. Naturally, one or more memory stores would be available on the mobile device to facilitate storage of PIM data items. Such PIM application can have the ability to send and receive data items, via the wireless network 419. In an embodiment, the PIM data items are seamlessly integrated, synchronized and updated, via the wireless network 419, with the mobile device user's corresponding data items stored or associated with a host computer system. Further applications may also be loaded onto the mobile device 400 through the network 419, an auxiliary I/O subsystem 428, serial port 430, short-range communications subsystem 440 or any other suitable subsystem 442, and installed by a user in the RAM 426 or a non-volatile store (not shown) for execution by the microprocessor 438. Such flexibility in application installation increases the functionality of the device and may provide enhanced on-device functions, communication-related functions, or both.
  • In a data communication mode, a received signal such as a text message or web page download will be processed by the communication subsystem 411 and input to the microprocessor 438, which further processes the received signal for element attributes for output to the display 422, or alternatively to an auxiliary I/O device 428.
  • A user of mobile device 400 may also compose data items such as email messages for example, using the keyboard 432, which can be a complete alphanumeric keyboard or telephone-type keypad, in conjunction with the display 422 and possibly an auxiliary I/O device 428. Such composed items may then be transmitted over a communication network through the communication subsystem 411.
  • For voice communications, overall operation of mobile device 400 is similar, except that received signals would be output to a speaker 434 and signals for transmission would be generated by a microphone 436. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, may also be implemented on mobile device 400. Although voice or audio signal output is accomplished primarily through the speaker 434, display 422 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information for example.
  • Serial port 430 in FIG. 4 would normally be implemented in a personal digital assistant (PDA)-type mobile device for which synchronization with a user's desktop computer (not shown) may be desirable, but is an optional device component. Such a port 430 would enable a user to set preferences through an external device or software application and would extend the capabilities of mobile device 400 by providing for information or software downloads to mobile device 400 other than through a wireless communication network. The alternate download path may for example be used to load an encryption key onto the device through a direct and thus reliable and trusted connection to thereby enable secure device communication. Serial port 430 can further be used to connect the mobile device to a computer to act as a modem.
  • WiFi Communications Subsystem 440 is used for WiFi Communications and can provide for communication with access point 440.
  • Other communications subsystem(s) 441, such as a short-range communications subsystem, are further components that may provide for communication between mobile device 400 and different systems or devices, which need not necessarily be similar devices. For example, the subsystem(s) 441 may include an infrared device and associated circuits and components or a Bluetooth™ communication module to provide for communication with similarly enabled systems and devices.
  • The embodiments described herein are examples of structures, systems or methods having elements corresponding to elements of the techniques of the present application. The above written description may enable those skilled in the art to make and use embodiments having alternative elements that likewise correspond to the elements of the techniques of the present application. The intended scope of the techniques of the above application thus includes other structures, systems or methods that do not differ from the techniques of the present application as described herein, and further includes other structures, systems or methods with insubstantial differences from the techniques of the present application as described herein.

Claims (16)

1. A method of explicit adaptive modulation and coding scheme selection comprising:
receiving, at a mobile device, a transport block targeted for the mobile device;
if a quality of the received transport block exceeds a threshold, providing an acknowledgment or negative acknowledgment to a network element; and
if the quality of the received transport block is below the threshold, suppressing the acknowledgment or negative acknowledgement.
2. The method of claim 1, wherein the transport block is received over a high speed downlink packet access channel.
3. The method of claim 2, wherein the acknowledgement or negative acknowledgement are hybrid automatic repeat request responses.
4. The method of claim 1, wherein the network element is an element within a long term evolution network.
5. The method of claim 1, wherein the quality is determined to be below the threshold based on a Yamamato bit that provides a binary indication of quality of the transport block.
6. The method of claim 1, wherein, due to the suppressing, the network element chooses a new modulation and coding scheme to send data from the transport block to the mobile device.
7. The method of claim 1, wherein the threshold is chosen based on a probability of successfully decoding a subsequent transport block utilizing an existing modulation and coding scheme.
8. The method of claim 1, wherein the threshold is set higher if the network element uses chase combining rather than incremental redundancy.
9. A mobile device comprising:
a processor;
a communications subsystem; and
memory,
wherein the processor, communications subsystem and memory cooperate to:
receive a transport block targeted for the mobile device;
if a quality of the received transport block exceeds a threshold, providing an acknowledgment or negative acknowledgment to a network element; and
if the quality of the received transport block is below the threshold, suppressing the acknowledgment or negative acknowledgement.
10. The mobile device of claim 9, wherein the transport block is received over a high speed downlink packet access channel.
11. The mobile device of claim 10, wherein the acknowledgement or negative acknowledgement are hybrid automatic repeat request responses.
12. The mobile device of claim 9, wherein the mobile device operates in a long term evolution network.
13. The mobile device of claim 9, wherein the quality is determined to be below the based on a Yamamato bit that provides a binary indication of quality of the transport block.
14. The mobile device of claim 9, wherein, due to the suppressing, the network element chooses a new modulation and coding scheme to send data from the message to the mobile device.
15. The mobile device of claim 9, wherein the threshold is chosen based on a probability of successfully decoding a subsequent message utilizing an existing modulation and coding scheme.
16. The mobile device of claim 9, wherein the threshold is set higher if the network element uses chase combining rather than incremental redundancy.
US13/204,753 2011-08-08 2011-08-08 System and method to increase link adaptation performance with multi-level feedback Abandoned US20130039266A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/204,753 US20130039266A1 (en) 2011-08-08 2011-08-08 System and method to increase link adaptation performance with multi-level feedback
US14/979,804 US9967055B2 (en) 2011-08-08 2015-12-28 System and method to increase link adaptation performance with multi-level feedback

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/204,753 US20130039266A1 (en) 2011-08-08 2011-08-08 System and method to increase link adaptation performance with multi-level feedback

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/979,804 Continuation US9967055B2 (en) 2011-08-08 2015-12-28 System and method to increase link adaptation performance with multi-level feedback

Publications (1)

Publication Number Publication Date
US20130039266A1 true US20130039266A1 (en) 2013-02-14

Family

ID=47677508

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/204,753 Abandoned US20130039266A1 (en) 2011-08-08 2011-08-08 System and method to increase link adaptation performance with multi-level feedback
US14/979,804 Active 2031-09-12 US9967055B2 (en) 2011-08-08 2015-12-28 System and method to increase link adaptation performance with multi-level feedback

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/979,804 Active 2031-09-12 US9967055B2 (en) 2011-08-08 2015-12-28 System and method to increase link adaptation performance with multi-level feedback

Country Status (1)

Country Link
US (2) US20130039266A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130223412A1 (en) * 2012-02-24 2013-08-29 Qualcomm Incorporated Method and system to improve frame early termination success rate
US20140280712A1 (en) * 2013-03-15 2014-09-18 Schweitzer Engineering Laboratories, Inc. Exchange of Messages Between Devices in an Electrical Power System
US9065763B2 (en) 2013-03-15 2015-06-23 Schweitzer Engineering Laboratories, Inc. Transmission of data over a low-bandwidth communication channel
US9620955B2 (en) 2013-03-15 2017-04-11 Schweitzer Engineering Laboratories, Inc. Systems and methods for communicating data state change information between devices in an electrical power system
US20170324508A1 (en) * 2016-03-02 2017-11-09 Kyynel Oy Link adaptation in wireless communications
US10819727B2 (en) 2018-10-15 2020-10-27 Schweitzer Engineering Laboratories, Inc. Detecting and deterring network attacks

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11202298B2 (en) * 2018-10-09 2021-12-14 Qualcomm Incorporated Resolving decodability for subsequent transmissions whose throughput exceeds a threshold

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030053435A1 (en) * 2001-05-22 2003-03-20 Nagabhushana Sindhushayana Enhanced channel interleaving for optimized data throughput
US20030188252A1 (en) * 2002-03-27 2003-10-02 Se-Hyoung Kim Apparatus and method for receiving packet data control channel in a mobile communication system
US20070110095A1 (en) * 2005-11-15 2007-05-17 Attar Rashid A Method and system for decoding
US20080049692A1 (en) * 2006-08-23 2008-02-28 Motorola, Inc. Apparatus and Method For Resource Allocation and Data Transmission Using Heterogeneous Modulation Formats in a Wireless Packet Communication System
US20080084844A1 (en) * 2006-10-10 2008-04-10 Interdigital Technology Corporation Method and apparatus for sending feedback for a downlink shared service transmitted to a plurality of wireless transmit/receive units
US20090129276A1 (en) * 2007-11-21 2009-05-21 Motorola, Inc. Method and device for managing data rate in a communication system
US20100031110A1 (en) * 2007-02-02 2010-02-04 Ji Ae Seok Methods of transmitting and receiving data in communication system
US20110085500A1 (en) * 2009-10-08 2011-04-14 Ntt Docomo, Inc. Radio communication system, radio transmitting apparatus and radio receiving apparatus
US20110090859A1 (en) * 2004-08-05 2011-04-21 Mitsubishi Electric Corporation Base station, mobile communication terminal equipment, and primary cell determination method

Family Cites Families (136)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6211354A (en) 1985-07-09 1987-01-20 Alpine Electron Inc Locking method for function of automobile telephone system
SE507449C2 (en) 1996-03-01 1998-06-08 Ericsson Telefon Ab L M Method and apparatus for activating and automatically deactivating keypad for a mobile radio terminal
US6263442B1 (en) 1996-05-30 2001-07-17 Sun Microsystems, Inc. System and method for securing a program's execution in a network environment
EP0912954B8 (en) 1996-07-22 2006-06-14 Cyva Research Corporation Personal information security and exchange tool
US5987611A (en) 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6105132A (en) 1997-02-20 2000-08-15 Novell, Inc. Computer network graded authentication system and method
NO971605L (en) 1997-04-08 1998-10-09 Ericsson Telefon Ab L M Device for improving accessibility of services in a communication system
US6052735A (en) 1997-10-24 2000-04-18 Microsoft Corporation Electronic mail object synchronization between a desktop computer and mobile device
US6405202B1 (en) 1998-04-27 2002-06-11 Trident Systems, Inc. System and method for adding property level security to an object oriented database
US6772350B1 (en) 1998-05-15 2004-08-03 E.Piphany, Inc. System and method for controlling access to resources in a distributed environment
US6292833B1 (en) 1998-07-17 2001-09-18 Openwave Systems Inc. Method and apparatus for providing access control to local services of mobile devices
US6292798B1 (en) 1998-09-09 2001-09-18 International Business Machines Corporation Method and system for controlling access to data resources and protecting computing system resources from unauthorized access
US6412070B1 (en) 1998-09-21 2002-06-25 Microsoft Corporation Extensible security system and method for controlling access to objects in a computing environment
US6360322B1 (en) 1998-09-28 2002-03-19 Symantec Corporation Automatic recovery of forgotten passwords
US7970792B2 (en) 1998-10-01 2011-06-28 Onepin, Inc. Phone to phone data exchange
US6795967B1 (en) 1999-01-26 2004-09-21 Microsoft Corporation Changing user identities without closing applications
US6957330B1 (en) 1999-03-01 2005-10-18 Storage Technology Corporation Method and system for secure information handling
US6668323B1 (en) 1999-03-03 2003-12-23 International Business Machines Corporation Method and system for password protection of a data processing system that permit a user-selected password to be recovered
US6463534B1 (en) 1999-03-26 2002-10-08 Motorola, Inc. Secure wireless electronic-commerce system with wireless network domain
JP2000311080A (en) 1999-04-28 2000-11-07 Toshiba Corp Computer system and its operation environment switching method
WO2000067123A1 (en) 1999-05-04 2000-11-09 British Telecommunications Public Limited Company Computer operation
US6609198B1 (en) 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
GB9925289D0 (en) 1999-10-27 1999-12-29 Ibm Method and means for adjusting the timing of user-activity-dependent changes of operational state of an apparatus
US7331058B1 (en) 1999-12-16 2008-02-12 International Business Machines Corporation Distributed data structures for authorization and access control for computing resources
JP3546787B2 (en) 1999-12-16 2004-07-28 インターナショナル・ビジネス・マシーンズ・コーポレーション Access control system, access control method, and storage medium
US6978385B1 (en) 2000-03-01 2005-12-20 International Business Machines Corporation Data processing system and method for remote recovery of a primary password
US7013485B2 (en) 2000-03-06 2006-03-14 I2 Technologies U.S., Inc. Computer security system
US7246374B1 (en) 2000-03-13 2007-07-17 Microsoft Corporation Enhancing computer system security via multiple user desktops
US7194764B2 (en) 2000-07-10 2007-03-20 Oracle International Corporation User authentication
EP1305722A1 (en) 2000-07-28 2003-05-02 American Calcar Inc. Technique for effective organization and communication of information
AU2001283128A1 (en) 2000-08-04 2002-02-18 First Data Corporation Trusted authentication digital signature (TADS) system
CA2315933C (en) 2000-08-14 2004-11-30 Ibm Canada Limited-Ibm Canada Limitee Method and system for granting access to information for electronic commerce
US20020031230A1 (en) 2000-08-15 2002-03-14 Sweet William B. Method and apparatus for a web-based application service model for security management
US6772157B2 (en) 2000-10-19 2004-08-03 General Electric Company Delegated administration of information in a database directory
CN100490353C (en) 2000-10-24 2009-05-20 北方电讯网络有限公司 Shared channel structure, ARQ systems and methods
US6886038B1 (en) 2000-10-24 2005-04-26 Microsoft Corporation System and method for restricting data transfers and managing software components of distributed computers
US7085833B2 (en) 2001-01-17 2006-08-01 Microsoft Corporation Caching user network access information within a network
CN100467491C (en) 2001-01-17 2009-03-11 生物质转化有限责任公司 Disruption of plant material to readily hydrolyzable cellulosic particles
US7613930B2 (en) 2001-01-19 2009-11-03 Trustware International Limited Method for protecting computer programs and data from hostile code
US7120134B2 (en) 2001-02-15 2006-10-10 Qualcomm, Incorporated Reverse link channel architecture for a wireless communication system
US7047473B2 (en) 2001-05-14 2006-05-16 Lg Electronics Inc. Method for controlling data transmission in a radio communications system
US20030005317A1 (en) 2001-06-28 2003-01-02 Audebert Yves Louis Gabriel Method and system for generating and verifying a key protection certificate
US7546629B2 (en) 2002-03-06 2009-06-09 Check Point Software Technologies, Inc. System and methodology for security policy arbitration
US20030061482A1 (en) 2001-08-23 2003-03-27 Efunds Corporation Software security control system and method
US20030039226A1 (en) 2001-08-24 2003-02-27 Kwak Joseph A. Physical layer automatic repeat request (ARQ)
US7257815B2 (en) 2001-09-05 2007-08-14 Microsoft Corporation Methods and system of managing concurrent access to multiple resources
US7389536B2 (en) 2001-11-14 2008-06-17 Lenovo Singapore Pte Ltd. System and apparatus for limiting access to secure data through a portable computer to a time set with the portable computer connected to a base computer
US7185359B2 (en) 2001-12-21 2007-02-27 Microsoft Corporation Authentication and authorization across autonomous network systems
US20030163685A1 (en) 2002-02-28 2003-08-28 Nokia Corporation Method and system to allow performance of permitted activity with respect to a device
US20040001101A1 (en) 2002-06-27 2004-01-01 Koninklijke Philips Electronics N.V. Active window switcher
EP1389848B1 (en) 2002-08-13 2006-12-27 Matsushita Electric Industrial Co., Ltd. Hybrid automatic repeat request protocol
US8544084B2 (en) 2002-08-19 2013-09-24 Blackberry Limited System and method for secure control of resources of wireless mobile communication devices
WO2004021114A2 (en) 2002-08-27 2004-03-11 Td Security, Inc., Dba Trust Digital, Llc Enterprise-wide security system for computer devices
AU2003301719A1 (en) 2002-10-25 2004-05-25 Grand Virtual Inc Password encryption key
US7813322B2 (en) 2003-02-19 2010-10-12 Qualcomm Incorporated Efficient automatic repeat request methods and apparatus
US7373657B2 (en) 2003-03-10 2008-05-13 Avaya Technology Corp. Method and apparatus for controlling data and software access
US20040111360A1 (en) 2003-07-14 2004-06-10 David Albanese System and method for personal and business information exchange
US7126928B2 (en) 2003-08-05 2006-10-24 Qualcomm Incorporated Grant, acknowledgement, and rate control active sets
US20050091309A1 (en) 2003-09-29 2005-04-28 Peter Bookman Mobility device management server
GB0322716D0 (en) 2003-09-29 2003-10-29 Symbian Ltd Multi-user mobile telephones for community access to services
WO2005043360A1 (en) 2003-10-21 2005-05-12 Green Border Technologies Systems and methods for secure client applications
GB0325252D0 (en) 2003-10-29 2003-12-03 Becrypt Ltd Password recovery system and method
KR100617841B1 (en) 2004-01-12 2006-08-28 삼성전자주식회사 Mobile communication terminal and method for automatic locking thereof
ATE424066T1 (en) 2004-01-22 2009-03-15 Panasonic Corp METHOD AND DEVICES FOR SWITCHING BETWEEN ASYNCHRONOUS AND SYNCHRONOUS HARQ RETRANSMISSION MODES
US7400878B2 (en) 2004-02-26 2008-07-15 Research In Motion Limited Computing device with environment aware features
FI20040389A0 (en) 2004-03-11 2004-03-11 Nokia Corp Method and apparatus for controlling transmission of data volumes
US20050210270A1 (en) 2004-03-19 2005-09-22 Ceelox, Inc. Method for authenticating a user profile for providing user access to restricted information based upon biometric confirmation
EP3637656B1 (en) 2004-04-01 2022-06-08 Optis Wireless Technology, LLC Interference limitation for retransmissions
US20060253894A1 (en) 2004-04-30 2006-11-09 Peter Bookman Mobility device platform
JP4717381B2 (en) 2004-06-11 2011-07-06 株式会社エヌ・ティ・ティ・ドコモ Mobile device and access control method
US20060059556A1 (en) 2004-09-10 2006-03-16 Royer Barry L System for managing inactivity in concurrently operating executable applications
US7096401B2 (en) 2004-11-15 2006-08-22 Motorola, Inc. Multi-mode hybrid ARQ scheme
US20060129948A1 (en) 2004-12-14 2006-06-15 Hamzy Mark J Method, system and program product for a window level security screen-saver
US20110167470A1 (en) 2005-02-28 2011-07-07 Trust Digital, Llc Mobile data security system and methods
WO2006094275A2 (en) 2005-03-02 2006-09-08 Markmonitor, Inc. Trust evaluation systems and methods
US7849311B2 (en) 2005-03-15 2010-12-07 Silicon Graphics International Computer system with dual operating modes
US7941544B2 (en) 2005-03-18 2011-05-10 Sap Ag Session manager for web-based applications
US8024809B2 (en) 2005-04-04 2011-09-20 Research In Motion Limited System and method for deleting confidential information
US7624111B2 (en) 2005-06-27 2009-11-24 Microsoft Corporation Active content trust model
US20070073694A1 (en) 2005-09-26 2007-03-29 Jerome Picault Method and apparatus of determining access rights to content items
US20070226778A1 (en) 2006-03-22 2007-09-27 Jorg Pietruszka Bluetooth theft protection
EP1840521A3 (en) 2006-03-31 2009-02-11 Research In Motion Limited Methods and apparatus for associating mapping functionality and information in contact lists of mobile communication devices
US8074078B2 (en) 2006-05-15 2011-12-06 Research In Motion Limited System and method for remote reset of password and encryption key
US20070277127A1 (en) 2006-05-24 2007-11-29 Carlson Michael P Screensaver for individual application programs
US7917963B2 (en) 2006-08-09 2011-03-29 Antenna Vaultus, Inc. System for providing mobile data security
WO2008038515A1 (en) 2006-09-28 2008-04-03 Nec Corporation Mobile terminal device, key operation lock method in the mobile terminal device, and program
US8370929B1 (en) 2006-09-28 2013-02-05 Whitehat Security, Inc. Automatic response culling for web application security scan spidering process
US20080081609A1 (en) 2006-09-29 2008-04-03 Motorola, Inc. Method and system for associating a user profile to a sim card
US8095124B2 (en) 2006-10-20 2012-01-10 Verizon Patent And Licensing Inc. Systems and methods for managing and monitoring mobile data, content, access, and usage
US8254315B2 (en) 2006-10-31 2012-08-28 Research In Motion Limited Method and apparatus for resegmentation of packet data for retransmission on HARQ transmission failure
US8707337B2 (en) 2006-10-31 2014-04-22 Motorola Mobility Llc Dispatch API that permits midlets to initiate dispatch calls
US8996864B2 (en) 2006-12-22 2015-03-31 Virtuallogix Sa System for enabling multiple execution environments to share a device
US8522019B2 (en) 2007-02-23 2013-08-27 Qualcomm Incorporated Method and apparatus to create trust domains based on proximity
US20080254767A1 (en) 2007-04-10 2008-10-16 Sharp Laboratories Of America, Inc. System and method for limiting access to features in a mobile telecommunications device
US20080267168A1 (en) 2007-04-27 2008-10-30 Zhijun Cai Slow Adaptation of Modulation and Coding for Packet Transmission
US8001390B2 (en) 2007-05-09 2011-08-16 Sony Computer Entertainment Inc. Methods and apparatus for secure programming and storage of data using a multiprocessor in a trusted mode
US8250540B2 (en) 2007-07-16 2012-08-21 Kaspersky Lab Zao System and method for administration of mobile application
US8769268B2 (en) 2007-07-20 2014-07-01 Check Point Software Technologies, Inc. System and methods providing secure workspace sessions
US8060074B2 (en) 2007-07-30 2011-11-15 Mobile Iron, Inc. Virtual instance architecture for mobile device management systems
US20090049518A1 (en) 2007-08-08 2009-02-19 Innopath Software, Inc. Managing and Enforcing Policies on Mobile Devices
US8782801B2 (en) 2007-08-15 2014-07-15 Samsung Electronics Co., Ltd. Securing stored content for trusted hosts and safe computing environments
KR101457688B1 (en) 2007-10-04 2014-11-12 엘지전자 주식회사 Method of Data Transmission Detecting Errors in Receiving Control Channel
ES2963388T3 (en) 2008-01-16 2024-03-26 Blackberry Ltd Secured Presentation Layer Virtualization for Handheld Wireless Communication Devices
US20100175104A1 (en) 2008-03-03 2010-07-08 Khalid Atm Shafiqul Safe and secure program execution framework with guest application space
CN102016865A (en) 2008-03-04 2011-04-13 苹果公司 System and method of authorizing execution of software code based on accessible entitlements
US8255673B2 (en) 2008-04-25 2012-08-28 Arm Limited Monitoring transactions in a data processing apparatus
EP2114030B1 (en) * 2008-04-30 2020-09-16 Google Technology Holdings LLC Methods and devices for preemptively transmitting a signal in accordance with an MCS other than a network commanded MCS
JP4719247B2 (en) 2008-05-28 2011-07-06 京セラ株式会社 Transmitting apparatus and wireless communication method
US8556991B2 (en) 2008-08-08 2013-10-15 Absolute Software Corporation Approaches for ensuring data security
US20100057911A1 (en) 2008-08-27 2010-03-04 C&C Group, Inc. Enhanced User Control Over Processing Parameters
WO2010037201A1 (en) 2008-09-30 2010-04-08 Wicksoft Corporation System and method for secure management of mobile user access to enterprise network resources
US8649808B2 (en) 2008-10-13 2014-02-11 Microsoft Corporation Universal mobile device messaging
ATE542321T1 (en) 2009-02-27 2012-02-15 Research In Motion Ltd FORWARD ERROR CORRECTION DECRYPTION AVOIDANCE BASED ON PREDICTED ENCRYPTION BLOCKING RELIABILITY
US20100241610A1 (en) 2009-03-19 2010-09-23 Gibson James Allen Methods and systems for preserving and accessing information related to decision-making
US8695058B2 (en) 2009-05-20 2014-04-08 Mobile Iron, Inc. Selective management of mobile device data in an enterprise environment
US9183534B2 (en) 2009-06-12 2015-11-10 Apple Inc. Devices with profile-based operating mode controls
US8205257B1 (en) 2009-07-28 2012-06-19 Symantec Corporation Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process
US20110055917A1 (en) 2009-08-28 2011-03-03 Sony Ericsson Mobile Communications Ab Valid access to mobile device application
US8869295B2 (en) 2009-10-26 2014-10-21 Bank Of America Corporation Automated privacy enforcement
US8499304B2 (en) 2009-12-15 2013-07-30 At&T Mobility Ii Llc Multiple mode mobile device
US9613031B2 (en) 2010-03-31 2017-04-04 Smsc Holding S.A.R.L. Profile for media/audio user preferences database
US8689349B2 (en) 2010-05-05 2014-04-01 Intel Corporation Information flow tracking and protection
US9311509B2 (en) 2010-05-09 2016-04-12 Citrix Systems, Inc. Creation and delivery of encrypted virtual disks
US8285762B2 (en) 2010-05-11 2012-10-09 International Business Machines Corporation Migration of metadata and storage management of data in a first storage environment to a second storage environment
US8468550B2 (en) 2010-06-18 2013-06-18 At&T Intellectual Property I, L.P. Mobile devices having plurality of virtual interfaces
US20120014321A1 (en) 2010-07-14 2012-01-19 Deutsche Telekom Ag Messaging activity feed
US8528072B2 (en) 2010-07-23 2013-09-03 Apple Inc. Method, apparatus and system for access mode control of a device
US8539561B2 (en) 2010-08-24 2013-09-17 International Business Machines Corporation Systems and methods to control device endpoint behavior using personae and policies
US9147085B2 (en) 2010-09-24 2015-09-29 Blackberry Limited Method for establishing a plurality of modes of operation on a mobile device
US8204480B1 (en) 2010-10-01 2012-06-19 Viasat, Inc. Method and apparatus for secured access
US9225727B2 (en) 2010-11-15 2015-12-29 Blackberry Limited Data source based application sandboxing
US8869307B2 (en) 2010-11-19 2014-10-21 Mobile Iron, Inc. Mobile posture-based policy, remediation and access control for enterprise resources
US9405723B2 (en) 2012-05-02 2016-08-02 Kony, Inc. Mobile application management systems and methods thereof
US9665576B2 (en) 2012-05-14 2017-05-30 International Business Machines Corporation Controlling enterprise data on mobile device via the use of a tag index
US20140108793A1 (en) 2012-10-16 2014-04-17 Citrix Systems, Inc. Controlling mobile device access to secure data
US9003546B2 (en) 2012-10-18 2015-04-07 Ca, Inc. Secured deletion of information

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030053435A1 (en) * 2001-05-22 2003-03-20 Nagabhushana Sindhushayana Enhanced channel interleaving for optimized data throughput
US20030188252A1 (en) * 2002-03-27 2003-10-02 Se-Hyoung Kim Apparatus and method for receiving packet data control channel in a mobile communication system
US20110090859A1 (en) * 2004-08-05 2011-04-21 Mitsubishi Electric Corporation Base station, mobile communication terminal equipment, and primary cell determination method
US20070110095A1 (en) * 2005-11-15 2007-05-17 Attar Rashid A Method and system for decoding
US20080049692A1 (en) * 2006-08-23 2008-02-28 Motorola, Inc. Apparatus and Method For Resource Allocation and Data Transmission Using Heterogeneous Modulation Formats in a Wireless Packet Communication System
US20080084844A1 (en) * 2006-10-10 2008-04-10 Interdigital Technology Corporation Method and apparatus for sending feedback for a downlink shared service transmitted to a plurality of wireless transmit/receive units
US20100031110A1 (en) * 2007-02-02 2010-02-04 Ji Ae Seok Methods of transmitting and receiving data in communication system
US20090129276A1 (en) * 2007-11-21 2009-05-21 Motorola, Inc. Method and device for managing data rate in a communication system
US20110085500A1 (en) * 2009-10-08 2011-04-14 Ntt Docomo, Inc. Radio communication system, radio transmitting apparatus and radio receiving apparatus

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130223412A1 (en) * 2012-02-24 2013-08-29 Qualcomm Incorporated Method and system to improve frame early termination success rate
US20140280712A1 (en) * 2013-03-15 2014-09-18 Schweitzer Engineering Laboratories, Inc. Exchange of Messages Between Devices in an Electrical Power System
US9065763B2 (en) 2013-03-15 2015-06-23 Schweitzer Engineering Laboratories, Inc. Transmission of data over a low-bandwidth communication channel
US9270109B2 (en) * 2013-03-15 2016-02-23 Schweitzer Engineering Laboratories, Inc. Exchange of messages between devices in an electrical power system
US9363200B2 (en) 2013-03-15 2016-06-07 Schweitzer Engineering Laboratories, Inc. Transmission of data over a low-bandwidth communication channel
US9620955B2 (en) 2013-03-15 2017-04-11 Schweitzer Engineering Laboratories, Inc. Systems and methods for communicating data state change information between devices in an electrical power system
US20170324508A1 (en) * 2016-03-02 2017-11-09 Kyynel Oy Link adaptation in wireless communications
US10097308B2 (en) * 2016-03-02 2018-10-09 Kyynel Oy Link adaptation in wireless communications
US10819727B2 (en) 2018-10-15 2020-10-27 Schweitzer Engineering Laboratories, Inc. Detecting and deterring network attacks

Also Published As

Publication number Publication date
US9967055B2 (en) 2018-05-08
US20160191198A1 (en) 2016-06-30

Similar Documents

Publication Publication Date Title
US9967055B2 (en) System and method to increase link adaptation performance with multi-level feedback
US10727982B2 (en) Controlling communication of data between devices supporting multiple retransmission protocol processes
EP3577806B1 (en) Enhancements for retransmission due to conflicting transmissions for different services
US9479297B2 (en) Fractional HARQ re-transmission
EP2915271B1 (en) Telecommunications apparatus and methods
US8645786B2 (en) Decoding method
EP2127205B1 (en) Method and apparatus for multicasting with feedback information
EP3496313A1 (en) Code block level error correction and media access control (mac) level hybrid automatic repeat requests to mitigate bursty puncturing and interference in a multi-layer protocol wireless system
US8995349B2 (en) Communication control method, mobile communication system and mobile terminal apparatus
JP4734186B2 (en) Mobile terminal device, reception control method in the same device, and wireless transmission system
KR20050106350A (en) A method and apparatus for tti change considering harq process for enhanced uplink dedicated channel
AU2009251173A1 (en) Wireless Communication Method and Apparatus Coordinating Node-B's and Supporting Enhanced Uplink Transmissions During Handover
EP2131518A2 (en) Retransmission method and transmitter and receiver thereof
JP4677751B2 (en) Wireless device and automatic retransmission method
US9847853B1 (en) Method and apparatus for reduced HARQ buffer storage
US8341484B2 (en) Data block size management in a communication system utilizing hybrid automatic repeat requests with soft combining
JPWO2010073670A1 (en) Wireless communication apparatus and subpacket transmission method
KR20100043098A (en) Methods and apparatuses for transmitting non-decodable packets
JP2004253828A (en) Wireless transmission apparatus and wireless transmission method
CA2783453C (en) System and method to increase link adaptation performance with multi-level feedback

Legal Events

Date Code Title Description
AS Assignment

Owner name: RESEARCH IN MOTION LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EKICI, OZGUR;ISLAM, MUHAMMAD KHALEDUL;REEL/FRAME:027056/0492

Effective date: 20110826

AS Assignment

Owner name: BLACKBERRY LIMITED, ONTARIO

Free format text: CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:037963/0731

Effective date: 20130709

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103

Effective date: 20230511