AU2005239706B2 - Method and system for implicit user equipment identification - Google Patents

Method and system for implicit user equipment identification Download PDF

Info

Publication number
AU2005239706B2
AU2005239706B2 AU2005239706A AU2005239706A AU2005239706B2 AU 2005239706 B2 AU2005239706 B2 AU 2005239706B2 AU 2005239706 A AU2005239706 A AU 2005239706A AU 2005239706 A AU2005239706 A AU 2005239706A AU 2005239706 B2 AU2005239706 B2 AU 2005239706B2
Authority
AU
Australia
Prior art keywords
crc
data
field
node
modulo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
AU2005239706A
Other versions
AU2005239706A1 (en
Inventor
Nader Bolourchi
Stephen G Dick
Stephen E Terry
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2002257253A external-priority patent/AU2002257253B2/en
Application filed by Intel Corp filed Critical Intel Corp
Priority to AU2005239706A priority Critical patent/AU2005239706B2/en
Publication of AU2005239706A1 publication Critical patent/AU2005239706A1/en
Application granted granted Critical
Publication of AU2005239706B2 publication Critical patent/AU2005239706B2/en
Priority to AU2008200751A priority patent/AU2008200751B2/en
Assigned to INTEL CORPORATION reassignment INTEL CORPORATION Request for Assignment Assignors: INTERDIGITAL TECHNOLOGY CORPORATION
Anticipated expiration legal-status Critical
Expired legal-status Critical Current

Links

Description

P001 Section 29 Regulation 3.2(2)
AUSTRALIA
Patents Act 1990 COMPLETE SPECIFICATION STANDARD PATENT Application Number: Lodged: Invention Title: Method and system for implicit user equipment identification The following statement is a full description of this invention, including the best method of performing it known to us: METHOD AND SYSTEM FOR gt IMPLICIT USER EQUIPMENT IDENTIFICATION
BACKGROUND
SThe present invention relates to the field of wireless communications.
One of the applications of the present invention is directed to a downlink signaling approach employing a modified cyclic redundancy check for both data protection and IN unique/group UE identification.
Wireless communication systems have become an integral link in today's
C
c modem telecommunications infrastructure. As such, they have become increasingly relied upon not only to support voice communications, but also data communications.
Voice communications are relatively low-rate, symmetrical in the upstream and downstream bandwidths and are predictable in the amount of bandwidth required.
However, data communications can place severe burdens upon a telecommunication system, particularly a wireless telecommunication system. First, data communications can often require extremely high data rates. Second, the amount of bandwidth for a data related application can vary greatly from several kilohertz of bandwidth to several megahertz. Third, the amount of bandwidth in the upstream and downstream directions can be drastically different. For example, with a typical Internet browsing application, very little data is sent in the upstream direction while vast amounts of data are downloaded in the downstream direction. These factors can place severe constraints upon a wireless telecommunication system.
The Wideband CDMA (WCDMA) standard, as the leading global third generation (3G) (IMT-2000) standard, supports data rates up to 2 Mb/s in indoor/smallcell-outdoor environments and up to 384 kb/switch wide-area coverage, as well as support for both high-rate packet data and high-rate circuit-switched data. However to satisfy the future demands for packet-data services, there is a need for a substantial increase in this data rate, especially in the downlink. High speed downlink packet access (HSDPA) would allow WCDMA to support downlink peak data rates in the range of approximately 8-10 Mb/s for best-effort packet-data services. This
-V-
rate is far beyond the IMT-2000 requirement of 2 Mb/s. It also enhances the packet- O data capability in terms of lower delay and improved capacity.
c One solution for supporting data communications is the allocation of d dedicated channels to each user equipment However, this results in an extremely Sinefficient use of the bandwidth since such channels often remain idle for long durations.
SAn alternative to dedicated channels for each UE is the use of the high Sspeed shared data channels and the packeting of data. In this method, a plurality of Shigh speed data channels are shared between a plurality of UEs. Those UEs having Sdata for transmission or reception are dynamically assigned one of the shared data Schannels. This results in a much more efficient use of the spectrum.
One such process for assigning a high speed shared data channel when a base station has data waiting for transmission to a particular UE is shown in Figs. 1A- 1C. Referring to Fig. 1A, an associated downlink dedicated physical channel (DPCH) is transmitted to each UE. The UE monitors associated downlink DPCH as well as the shared control channels (SCCH-HS). When there is no data being transmitted to the UE from the base station, the UE enters a standby mode whereby it periodically "wakes up" to attempt to monitor its associated downlink DPCH as well as SCCH- HSs. This permits the UE to save processing and battery resources.
If data at the base station is ready for transmission to the UE, a High Speed Downlink Shared Channel (HS-DSCH) indicator (HI) is transmitted in the associated DPCH. The HI has n-bit length, which points to one of 2n SCCH-HSs shown in Fig. IB. For example, a 2 bit HI can point to 4 SCCH-HSs, 00, 01, 10 or 11.
For the example shown in Fig. IA, the HI is 0) which points to the third channel shown in Fig. IB. When the UE accesses the control channel identified by the HI, that particular SCCH-HS will direct the UE to the proper HS-DSCH, which has been allocated to the UE for reception of the data. As shown in Fig. IC, for example, the UE tunes to HS-DSCH (001) that was identified by SCCH-HS 0).
I
The UE then receives the data intended for it over the HS-DSCH (001). It should be noted that the graphical representation of Fig. 1A-1C has been presented to illustrate the process of assigning HS-DSCHs, and the configuration and use of channels may differ slightly from actual implementation in HSDPA standards.
SThe process as described with reference to Figs. 1A-1C provides an 0 efficient method for assigning common data channels for transmission of data. Since packet data is intended for one or more, specific UEs, the UE identity (ID) is a critical 0 parameter for signaling from the base station to the UE.
SThere are several prior art methods for signaling the UE ID between the t base station and the UE. Referring to Fig. 2A, the first method appends the UE ID 0 onto the data for transmission. The combination is fed to a cyclic redundancy check
C
(CRC) generator, which outputs a CRC. The resulting data packet, which is ultimately transmitted, includes an X-bit data field, an M-bit UE ID and an N-bit CRC as shown in Fig. 2B. Although this provides adequate signaling of both the CRC and the UE ID, it is wasteful of signaling bandwidth.
Another prior art technique shown in Fig. 3A appends the UE ED onto the data field for input into the CRC generator. The CRC generator outputs a CRC.
As shown in Fig. 3B, the data burst for transmission includes an X-bit data field and an N-bit CRC field. Although this also adequately signals the UE ID and the CRC between the base station and the UE, it is undesirable since it can only be used for unique UE identification. This method also causes increase complexity of UE when a group UEs need to be identified.
SUMMARY
The present invention discloses several implementations for data related downlink signaling. The embodiments disclose selectively tailoring the UE ID to create a UE ID value, which is then modulo 2 added to a data field to create a data mask. This data mask may be further processed as the CRC field. The CRC field is then transmitted with the data burst to provide CRC-related functions. An alternative 1 embodiment discloses initializing a CRC generator with UE identification prior to CRC generation. This implicitly includes the UE ID within the CRC without requiring additional overhead signaling.
In a preferred embodiment the present invention provides a wideband code division multiple access (W-CDMA) user equipment (UE) operating in frequency division duplex (FDD) mode for receiving data over at least one of a plurality of high speed (HS) shared control channels (SCCHs), the UE including: means for monitoring the plurality of HS-SCCHs; means for receiving a packet over at least one of the plurality of HS- S 10 SCCHs; and means for determining whether a UE identification is present in the packet and whether a cyclic redundancy check (CRC) of the packet is correct by processing a mask field, the mask field having an N-bit CRC modulo 2 combined with an N-bit UE identification.
In a further preferred embodiment, the present invention provides a wideband code division multiple access (W-CDMA) user equipment (UE) operating in frequency division duplex (FDD) mode for receiving data over at least one of a plurality of high speed (HS) shared control channels (SCCHs): the UE configured to monitor the plurality of HS-SCCHs; the UE configured to receive a packet over at least one of the plurality of HS-SCCHs; and the UE configured to determine whether a UE identification (ID) is present in the packet and whether a cyclic redundancy check (CRC) of the packet is correct by processing a mask field, the mask field having an N-bit CRC modulo-2 combined with an N-bit UE identification.
In a further preferred embodiment, the present invention provides a wideband code division multiple access (W-CDMA) Node-B operating in a frequency division duplex (FDD) mode: the Node-B configured to transmit a plurality of high speed shared control channels (HS-SCCHs); the Node-B configured to process data for a certain user equipment (UE) and produce an N-bit cyclic redundancy check (CRC); 4a O the Node-B configured to modulo-2 add the N-bit CRC to an N-bit UE Sidentification of the certain UE to produce a mask field, o the Node-B configured to produce a packet having the data and the mask n field; and the Node-B configured to transmit the packet over at least one of the plurality of HS-SCCHs.
SIn a further preferred embodiment the present invention provides a system C for transmitting a communication burst from a first communicating unit to a second communicating unit; the system including: at said first communicating unit: a cyclic redundancy check (CRC) generator for receiving data and generating a CRC; a first combiner for combining said CRC with an identification of the second communicating unit to generate a mask; and a transmitter for transmitting the burst including said mask and said data; and at said second communicating unit: a memory for storing the identification of the second communicating unit; a receiver for receiving said communication burst including said mask and said data; a second combiner for combining said mask with said stored identification to recover the CRC; and means for determining whether said recovered CRC is valid.
In a further aspect, the invention resides in a system for transmitting a communication burst from a first communicating unit to at least a second communicating unit; the second communicating unit being associated with an identification number; the system including: at said first communicating unit: a cyclic redundancy check (CRC) generator for receiving data and generating a CRC; a combiner for combining said CRC with the identification number to generate a mask; and a transmitter for transmitting a communication burst I identification with said mask to generate.said CRC; and determining whether said CRC is valid.
In a further aspect, the invention resides in a wireless digital communications system in which messages are transmitted from a node B to a user equipment (UE) wherein the system utilizes code-division multiple access (CDMA) technology for transmission and reception of the messages, the method 11including the steps of: at said node B, performing a cyclic redundancy check on a Cc message; I 10 overlaying the cyclic redundancy check with a UE identity and transmitting the message and the overlaid UE identity and cyclic redundancy check to the UE; said UE, receiving the message with the overlaid UE identity and cyclic redundancy check; extracting the UE identity from the message received at step and comparing the extracted identity with the identity of the UE receiving the message at step In a further aspect, the invention resides in a wireless digital communications system in which messages are transmitted from a network to a user equipment (UE) wherein the system utilizes code-division multiple access (CDMA) technology for transmission and reception of the messages, the method including the steps of: at said network, performing a cyclic redundancy check on a message; overlaying the cyclic redundancy check with a UE identity and transmitting the message and the overlaid UE identity and cyclic redundancy check to the UE; said UE, receiving the message with the overlaid UE identity and cyclic redundancy check; and comparing the cyclic redundancy check at the UE combined with the identification code of the UE with the CRC and overlaid UE ID received from said network.
In a further aspect, the invention resides in a wireless digital communications system employing code-division multiple access technology including a network and at least one user equipment (UE); said network including a cyclic redundancy check (CRC) generator performing a CRC on a message to be transmitted to a given UE; means for overlaying the CRC with an identity code of the UE intended to receive the message; means for transmitting the message and overlaid UE identity and CRC to the intended UE; said intended UE including a receiver for receiving the transmission and coupling the received transmission to a CRC extractor; and said CRC extractor for extracting said higher layer message when the received UE identity extracted from the received message compares with a locally provided UE identity of said intended UE.
In a further aspect, the invention resides in a wireless digital communications system employing code-division multiple access technology including a network and at least one user equipment the system including: said network performing a cyclic redundancy check on a message to be transmitted to a given UE; said network including means for overlaying the CRC with an identity code of the UE intended to receive the message; said network including means for transmitting the message and overlaid UE identity and CRC to the intended UE; said intended UE including means for receiving the transmission; and a data extractor for extracting said message when the received UE identity extracted from the received message compares with a locally provided UE identity of said intended UE.
In a further aspect, the invention resides in a wireless digital communications system employing code-division multiple access technology including a station and at least one user equipment said station including: a cyclic redundancy check generator for performing a cyclic redundancy check on at least a portion of a message to be transmitted to a given UE; means for In overlaying the CRC with an identity code of the UE intended to receive the message; and a transmitter for transmitting the message and overlaid UE identity O and CRC to the intended UE; and said intended UE including: a receiver for receiving the transmission from the station; means for extracting the UE identity from the received messages and comparing it with a locally stored UE identity; and means for extracting said message only when there is a match between the Sextracted UE identity and the stored UE identity.
In a further aspect, the invention resides in a method for identifying one or q more user equipments (UEs) each having a unique identification UID among a tn 10 plurality of UEs including; receiving a data packet; generating a cyclic redundancy Scheck (CRC) based upon said data packet; modulo 2 adding said CRC to the UID to create a mask; and appending said mask onto said data packet for transmission.
BRIEF DESCRIPTION OF THE DRAWING(S) Figs. 1A-1C represent a prior art method for assigning shared data channels, where Fig. 1A illustrates the associated downlink channel, Fig. 1B illustrates a plurality of control channels and Fig. 1C illustrates a plurality of data channels.
Fig. 1D is a block diagram of the universal mobile telecommunication system network architecture.
Fig. 2A is a prior art user equipment identification (UE ID) specific cyclic redundancy check (CRC) method.
Fig. 2B illustrates the transmitted data burst including a data field, a UE ID field and a CRC field.
Fig. 3A is a second prior art user equipment identification (UE ID) specific cyclic redundancy check (CRC) method.
Fig. 3B illustrates the transmitted data burst including a data field and a CRC field.
Fig. 4A is a first embodiment of the present invention utilizing modulo 2 addition of the UE ID with the CRC to create a mask.
Fig. 4B is a data burst transmitted by the system of Fig. 4A including a data field and a mask field.
4e qn Fig. 5A is a second embodiment of the present invention including a CRC 0generator which is initialized using the UE ID.
o Fig. 5B is a data burst transmitted by the embodiment of Fig. 5A including a data field and a CRC field.
Fig. 6A is a third embodiment of the present invention which modulo 2 adds the data field to a UE ID field padded with trailing zeros to create a mask.
IN Fig. 6B is a fourth embodiment of the present invention which modulo 2 adds the data field to a UE ID field padded with leading zeros to create a mask.
Fig. 6B is a fourth embodiment of the present invention which modulo 2 n adds the data field to a UE ID field padded with leading zeros to create a mask.
0 Fig. 6C is the data burst transmitted by the embodiments of Fig. 6A and 6B including a data field and a CRC field.
Fig. 7 A is a fifth embodiment of the present invention which modulo 2 Sadds the data field to a UE ID field repeated and padded a truncated UE ID in the trailing bits.
SFig. 7B is a sixth embodiment of the present invention which modulo 2 Ch adds the data field to a UE ID field repeated and padded a truncated UE ID in the C leading bits.
SFig. 7C is the data burst transmitted by the embodiments of Fig. 7A and 7B including a data field and a CRC field.
Fig. 8 is a tabulation of global, subset, subsubset and unique IDs.
Fig. 9 is a flow diagram of the processing of a message in accordance with the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S) The presently preferred embodiments are described below with reference to the drawing figures wherein like numerals represent like elements throughout.
Referring to Fig. 1D, a Universal Mobile Telecommunications System (UMTS) network architecture used by the present invention includes a core network a UMTS Terrestrial Radio Access Network (UTRAN), and a User Equipment The two general interfaces are the lu interface, between the UTRAN and the core network, as well as the radio interface Uu, between the UTRAN and the UE. The UTRAN consists of several Radio Network Subsystems (RNS). They can be interconnected by the Iur interface. This interconnection allows core network independent procedures between different RNSs. The RNS is further divided into the Radio Network Controller (RNC) and several base stations (Node-B). The Node-Bs are connected to the RNC by the lub interface. One Node-B can serve one or multiple cells, and typically serves a plurality of UEs. The UTRAN supports both FDD mode 1^ and TDD mode on the radio interface. For both modes, the same network architecture and the same protocols are used. Only the physical layer and the air interface Uu are specified separately.
SReferring to Fig. 4A, one embodiment of the present invention is shown.
O In this embodiment, the system 100 utilizes the data for transmission (hereinafter referred to as "data") from the data field 102, a CRC generator 104 (which has been 0 initialized to zero), the resulting CRC from the CRC field 106 output from the CRC 0 generator 104, the UE ID from the UE ID field 108, a modulo 2 adder 110 and a mask S112. It should be noted that in this embodiment and all of the embodiments described hereinafter, the number of bits of each field is noted above the field as an example.
However, the specific number of bits is exemplary and should-not be construed to limit the present invention.
The system 100 receives the data field 102 and inputs the data from the data field 102 into the CRC generator 104. The CRC generator 104 generates the CRC field 106 and outputs the CRC from the CRC field 106 to a first input of the modulo 2 adder 110. The UE ID from the UE ID field 108 is output to the second input to the modulo 2 adder 110. The CRC and UE ID are then modulo 2 added to create a mask 112.
Preferably, the number of bits of the UE ID field 108 (M bits) is the same as the number of bits of the CRC field 106 (N bits). If M=N, then the UE ID may be directly modulo 2 added to the CRC as shown in Fig. 4A. However, ifM and N are not equal, then an interim step is necessary to make them equal. If M<N, then the UE ID is padded with either leading zeros or trailing zeros to be equal in length to the CRC. This "padded UE ID" is N modulo 2 added to the CRC 106. IfM>N, then the least significant M-N bits are truncated from the UE ID. The truncated UE ID is then modulo 2 added to the CRC.
Referring to Fig. 4B, the mask 112 that is generated is appended to the data field 102 for transmission.
Referring to Fig. 5A, a second embodiment of the present invention is I shown. In this embodiment, the system 200 utilizes the data from the data field 202, a S CRC generator 204, the UE ID from the UE ID field 208, and the resulting CRC field o 212. The system 200 receives the data field 202 and outputs the data from data field S202 into the CRC generator 204. The CRC generator 204 is the same type of generator as the CRC generator 104 from Fig. 4A, except that the CRC generator 204 is initialized with theUE ID from the UE ID field 208. This initialization is illustrated Sby the dotted line in Fig. 5A. As is well known by those of skill in the art, a CRC generator is typically initialized to all zeros, as was the case with the CRC generator C 104 shown in Fig. 4A. Accordingly, the CRC generator 204 generates a CRC based Supon the input data from the data field 202 and the initialization of the CRC generator C, 204 with UE ID. No modulo 2 addition is required in this embodiment.
Preferably, the number of bits of the UE ID from the UE ID field 208 (M bits) is the same as the size of the CRC generator 204, although this is not necessary. If the size of the UE ID (M-bits) is less than the size of the CRC generator 204, then the UE ID may be padded with either leading zeros or trailing zeros to be equal in length to the size of the CRC generator 204. This "padded UE ID" may then be used to initialize the CRC generator 204. Alternatively, the value in the UE ID field 208 may be !oaded to initialize the CRC generator 204, and any bit positions not..filled by the UE ID would be zero. If the size of the UE ID (M bits) is greater than the size of the CRC generator 204, then the least significant bits are truncated from the UE ID in order to fit the UE ID to CRC generator 204. The truncated UE ID is then used to initialize the CRC generator 204.
Referring to Fig. 5B, the CRC field 212 that is generated is appended to the data field 202 for transmission.
This second embodiment of the present invention utilizing implicit UE ID presents a simplistic, yet robust, alternative since it does not require assembly and disassembly of the UE ID with the SCCH-HS, at the transmitter or the receiver, as required by UE-specific CRC methods of the prior art and the first embodiment.
Referring to Fig. 6A, a third embodiment of the present invention is O shown. In this embodiment, the system 300 utilizes the data from the data field 302, N the UE ID from the UE ID field 308A, a modulo 2 adder 310 and a mask 311, a CRC generator 304 and the resulting CRC field 312. The system 300 receives the data field 302 and inputs the data from the data field 302 into a first input of the modulo 2 adder 310. The UE ID from UE ID field 308A is output to the second input to the modulo 2 s0 adder 310. Accordingly, the data from the data field 302 and the UE ID from the UE r ID field 308A are modulo 2 added to create a mask 311. The mask 311 is input into the CRC generator 304 which generates a CRC field 312.
In this embodiment, the number of bits of the UE ID field 308A (M bits) Smust be the same as the number of bits (X bits) of the data field 302 in order to perform the modulo 2 addition. IfM and X are equal, then the value from the UE ID field 308A may be directly modulo 2 added to the data from the data field 302 However, if M and X are not equal, then an interim step is necessary to make them equal. IfM is less than X, then the UE ID is padded with X-M trailing zeros such that the value from the UE ID field 308A is equal in length to the data field 302. This "padded UE ID value" as shown in Fig. 6A is then modulo 2 added to the data from the data field 302.
Due to the length X of the data field 302, it is not expected that M will be greater than X. However, if this were to occur, then the least significant M-X bits are truncated from the value in UE ID field 308A. The truncated UE ID is then modulo 2 added to the data from the data field 302.
Referring to Fig. 6B, a fourth embodiment of the present invention is shown. In this embodiment, the system 301 operates in the exact same manner as the third embodiment shown in Fig. 6A. The only difference in this embodiment is the method in which the value from the UE ID field 308B is generated. In this embodiment, the UE ID is padded with X-M leading zeros such that the UE ID from the UE ID field 308B is equal in length to the data field 302. This "padded UE ID value", as shown in Fig. 6B, is then modulo 2 added to the data from the data field S302. It should be noted that the padding may alternatively comprise a combination of 0 leading and trailing zeros (not shown) in order to make the UE ID the same length as the data field.
SReferring to Fig. 6C, the CRC field 312 that is generated from the system 300 of the third embodiment shown in Fig. 6A, or the CRC 314 that is generated from the system 301 of the fourth embodiment shown in Fig. 6B, is \0 appended to the data field 302 for transmission. Accordingly, either type of CRC field 312, 314 may be used and appended onto the data field 302.
Referring to Fig. 7A, a fifth embodiment of the present invention is Sshown. In this embodiment, the system 400 utilizes the data from the data field 402, C the UE ID from the UE ID field 408A, a modulo 2 adder 410, a mask 411, a CRC generator 404 and the resulting CRC field 412. The system 400 receives the data field 402 and inputs the data from the data field 402 into a first input of the modulo 2 adder 410. The UE ID from UE ID field 408A is output to the second input to the modulo 2 adder 410. The data from the data field 402 and the UE ID from the UE ID field 408A are modulo 2 added to create a mask 411. The mask 411 is input into the CRC generator 404, which generates the CRC field 412.
In this embodiment, the number of bits of the UE ID field 408A (M bits) must be the same as the number of bits of the data field 402 in order to perform the modulo 2 addition. If the M is equal to X, then the UE ID from the UE ID field 408A may be directly modulo 2 added to the data from the data field 402. Due to the length of the data field 402, it is not expected that M will be greater than X. However, if this were to occur, then the least significant bits are truncated from the UE ID field 408A until the length of the UE ID field is equal to X. The truncated UE ID is then modulo 2 added to the value from the data field 402.
If the length of the UE ID is shorter than the data field 402, then a "composite UE ID" is created such that the value from the UE ID field 408A is equal to X. The composite UE ID is created by repeating the UE ID as many times as it will fit within an X-bit field, then filling in the remaining trailing bits with a truncated UE
I
SID. This is represented in the UE ID field 408A in Fig. 7A. The composite UE ID is Sthen modulo 2 added to the data from the data field 402.
Referring to Fig. 7B, a sixth embodiment of the present invention is shown. The system 401 of this embodiment operates in the same manner as the fifth embodiment shown in Fig. 7A. The only difference in this embodiment is the value IN from the UE ID field 408B. Although the composite UE ID created in the same manner as in Fig. 7A, the truncated UE ID portion is added as leading bits, as eC opposed to the trailing bits in the UE ID field 408A shown in Fig. 7A. It should be In noted that the truncated UE ID "padding" may include a combination of leading and 0 trailing truncated bits in order to make the UE ID the same length as the data field 402.
Referring to Fig. 7C, the CRC field 412 that is generated from either the system 400 of the fifth embodiment shown in Fig. 7A, or the CRC field 414 that is generated from the system 401 of the sixth embodiment shown in Fig. 7B, is appended to the data field 402 for transmission. Accordingly, either type of CRC field 412, 414 maybe used and appended onto the data field 402.
It should be noted that all of the above-described embodiments can be used to support multiple identities (IDs). A UE may be required to process messages addressed at several levels: 1) the UE's unique ID, 2) an ID corresponding to a subset or group of UEs, where the UE belongs to the subset; or 3) a broadcast (global ID) corresponding to all UEs in the system. For example, as shown in Fig. 8, UE ID 12 has been highlighted to indicate that it will able to receive and process IDs at four different levels: 1) the UE-specific ID 2) subsubset C ID; 3) subset 2 ID; and 4) global ID. It should also be noted that alternate group identifications A-E, may also be created such that a different group of UEs maybe included. For example, group B will include all of the UEs identified next to group B which include UE numbers 2, 7, 12, 17,22 and 27. Additionally, any group or subgroup maybe created by specifically identifying individual UEs as desired by a user.
To support this requirement, the transmitter generates the CRC as O described above with each of the embodiments. At the receiver, the UE processes the message and generates the expected CRC, without the ID-based modification. The UE Sprocessor then modulo 2 adds the received CRC to the calculated CRC. The resultant output is the transmitted ID, which can be any one of the IDs described above. If the ID is none of these, then the UE discards the transmission.
In accordance with the present invention, using the CRC code of the r^ length N, the undetected error probability on the identified SCCH-HS approaches 2
N
c Using a 24-bit CRC to protect data transmitted on HS-DSCH, a 16-bit CRC to protect Scontrol information transmitted on SCCH-HS, and assuming 10-3 false acceptance Sprobability for HI bits by an unintended UE, the embodiments in accordance with the present invention hereinbefore described will provide the probability of the false acceptances as follows: Pfa PfaH I x PfaH x PSD Equation (1) where Pfa is the probability of a false acceptance; PfaHI is the probability of a false acceptance of HI; PfaH is the probability of a false acceptance of SCCH-HS; and PSD is the probability of a successful detection of HS-DSCH (PSD).
Using the above identified values for the present example with Equation Pr 10 3 x 2' 6 x2- 4 9.1 x 10- 6 The reliability computation indicates that for the same length CRC, the probability of a user passing erroneous data up to a higher layer, will be extremely low.
Referring to Fig. 9, the flow diagram illustrates a method for processing downlink messages between a node B and a UE in accordance with the present invention. This method provides a general overview and should not be interpreted as a comprehensive description of all of the detailed medium access control (MAC) layer and physical layer signaling required for processing a message, a data packet).
The node B first generates a downlink control message in the MAC layer (step 1) and then forwards the message and the LIE IOD to the physical layer (step The physical layer generates the CRC and applies the LIE ID for forwarding with the message (step 0 3) as a data burst. The message is then transmitted from the node B to the UB (step 4).
U At the physical layer, the LIE ID and the CRC are checked to determine if they are correct (step If so, the message is forwarded to the MAC layer (step 6) which then further processes the message (step 7).
It should be noted that Step 6 in Fig. 9 includes an additional signal between the physical layer and the MAC layer, which comprises a control message that indicates the CRC/LIE ED is valid. However, this is an optional step. In the preferred embodiment, only valid messages will be forwarded from the physical layer to the MIAC layer. Accordingly, in the preferred embodiment, the MAC layer will assume that any message that is forwarded to the MAC is valid, In the alternative embodiment, the additional CRCIIJE lED valid signaling will be forwarded along with the message as an additional confirmation.
The present invention has the advantage of eliminating separate processing steps for the LIE ED and the CRC. When the two fields are combined as hereinbefore described, the LIE will not further process any message until both the CRC and the LIE ID (or other type of ED shown in Fig. 8) are correct.
While the present invention has been described in terms of the preferred embodiment, other variations, which are within the scope of the invention, as outlined in the claim-s below will be apparent to those skilled in the art.
-12-

Claims (7)

  1. 2. The user equipment of claim 1 wherein masking the mask field is performed by modulo 2 adder.
  2. 3. A wideband code division multiple access (W-CDMA) user equipment (UE) operating in frequency division duplex (FDD) mode for receiving data over at least one of a plurality of high speed (HS) shared control channels (SCCHs): the UE configured to monitor the plurality of HS-SCCHs; the UE configured to receive a packet over at least one of the plurality of HS-SCCHs; and the UE configured to determine whether a UE identification (ID) is present in the packet and whether a cyclic redundancy check (CRC) of the packet is correct by processing a mask field, the mask field having an N-bit CRC modulo-2 combined with an N-bit UE identification.
  3. 4. The user equipment of claim 3 wherein masking the mask field is performed by a modulo-2 adder. A wideband code division multiple access (W-CDMA) Node-B operating in a frequency division duplex (FDD) mode: r- O the Node-B configured to transmit a plurality of high speed shared control channels (HS-SCCHs); o the Node-B configured to process data for a certain user equipment (UE) i and produce an N-bit cyclic redundancy check (CRC); the Node-B configured to modulo-2 add the N-bit CRC to an N-bit UE Q identification of the certain UE to produce a mask field, Sthe Node-B configured to produce a packet having the data and the mask field; and the Node-B configured to transmit the packet over at least one of the S 10 plurality of HS-SCCHs.
  4. 6. The Node-B of claim 5 including a CRC generator configured to produce the CRC.
  5. 7. The Node-B of claim 5 including a modulo-2 adder configured to add the N-bit CRC to the N-bit UE identification.
  6. 8. A wideband code division multiple access (W-CDMA) user equipment (UE) according to claim 1 and substantially as herein before described with reference to the drawings.
  7. 9. A wideband code division multiple access (W-CDMA) user equipment (UE) according to claim 3 and substantially as hereinbefore described with reference to the drawings. A wideband code division multiple access (W-CDMA) Node-B operating in a frequency division duplex (FDD) mode according to claim 5 and substantially as hereinbefore described with reference to the drawings. INTERDIGITAL TECHNOLOGY CORPORATION WATERMARK PATENT TRADE MARK ATTORNEYS P23437AU01
AU2005239706A 2001-05-14 2005-12-01 Method and system for implicit user equipment identification Expired AU2005239706B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2005239706A AU2005239706B2 (en) 2001-05-14 2005-12-01 Method and system for implicit user equipment identification
AU2008200751A AU2008200751B2 (en) 2001-05-14 2008-02-15 Method and system for implicit user equipment identification

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US60/290,740 2001-05-14
US60/314,993 2001-08-24
US60/345,358 2001-10-25
US10/035,771 2001-12-26
AU2002257253A AU2002257253B2 (en) 2001-05-14 2002-05-08 Method and system for implicit user equipment identification
PCT/US2002/014465 WO2002093296A2 (en) 2001-05-14 2002-05-08 Method and system for implicit user equipment identification
AU2005239706A AU2005239706B2 (en) 2001-05-14 2005-12-01 Method and system for implicit user equipment identification

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU2002257253A Division AU2002257253B2 (en) 2001-05-14 2002-05-08 Method and system for implicit user equipment identification

Related Child Applications (1)

Application Number Title Priority Date Filing Date
AU2008200751A Division AU2008200751B2 (en) 2001-05-14 2008-02-15 Method and system for implicit user equipment identification

Publications (2)

Publication Number Publication Date
AU2005239706A1 AU2005239706A1 (en) 2005-12-22
AU2005239706B2 true AU2005239706B2 (en) 2007-11-15

Family

ID=35841607

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2005239706A Expired AU2005239706B2 (en) 2001-05-14 2005-12-01 Method and system for implicit user equipment identification

Country Status (1)

Country Link
AU (1) AU2005239706B2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05236073A (en) * 1992-02-17 1993-09-10 Funai Denki Kenkyusho:Kk Method for preventing adjacent channel interference for cordless telephone set or the like
JPH08316967A (en) * 1995-05-23 1996-11-29 Mitsubishi Electric Corp Data transmitter
JPH11136138A (en) * 1997-10-30 1999-05-21 Oki Electric Ind Co Ltd Redundant code generator, error detection encoder, error detector, redundant code generation method, error detection method and information recording medium
JPH11196070A (en) * 1997-12-27 1999-07-21 Sony Corp Transmitter, receiver, communication system and communication method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05236073A (en) * 1992-02-17 1993-09-10 Funai Denki Kenkyusho:Kk Method for preventing adjacent channel interference for cordless telephone set or the like
JPH08316967A (en) * 1995-05-23 1996-11-29 Mitsubishi Electric Corp Data transmitter
JPH11136138A (en) * 1997-10-30 1999-05-21 Oki Electric Ind Co Ltd Redundant code generator, error detection encoder, error detector, redundant code generation method, error detection method and information recording medium
JPH11196070A (en) * 1997-12-27 1999-07-21 Sony Corp Transmitter, receiver, communication system and communication method

Also Published As

Publication number Publication date
AU2005239706A1 (en) 2005-12-22

Similar Documents

Publication Publication Date Title
CA2628685C (en) Method and system for implicit user equipment identification
AU2002257253A1 (en) Method and system for implicit user equipment identification
AU2005239706B2 (en) Method and system for implicit user equipment identification
AU2008200751B2 (en) Method and system for implicit user equipment identification
AU2015203588B2 (en) Method and system for implicit user equipment identification
AU2012203588B2 (en) Method and system for implicit user equipment identification
AU2009202242A1 (en) Method and system for implicit user equipment identification
TWI477084B (en) Method and system for implicit user equipment identification

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
PC Assignment registered

Owner name: INTEL CORPORATION

Free format text: FORMER OWNER WAS: INTERDIGITAL TECHNOLOGY CORPORATION

MK14 Patent ceased section 143(a) (annual fees not paid) or expired