Background technology
In wireless communication system, because OFDM (OFDM) has the rectangle frequency spectrum, and adopt fast Fourier transform (FFT) and the low integrated level of system brought, it can effectively improve the power system capacity of down link under high spectral efficiency, coverage and data transmission bauds.OFDM has been widely used in all kinds of less radio-frequency environment as a kind of broadband data communication technology, High Data Rate Digital Subscriber Line (HDSLs) for example, ADSL (Asymmetric Digital Subscriber Line) (ADSLs), and digital broadcasting.OFDM is divided into many parallel subcarriers with complete frequency band, is used for launching parallel data flow.Because insert the protection time slot, the symbol transmitting time prolongs relatively, but can effectively reduce intersymbol interference (ISI).In recent years, in 3GPP standardization forum, OFDMA has been decided to be the downlink air interface scheme that the UMTS mobile radio system develops, and becomes one of main competition test of super 3G or 4G system.
It is a kind of access way that user and base station communicate in the communication system that uplink random inserts: the user is in the specific time, on the specific channel, sends some control informations in the mode of competition to the base station and communicates with the base station requiring.Usually, the state on time synchronized according to user and base station can be divided into the uplink random access channel non-synchronized random access channel and synchronous Random Access Channel.Asynchronous access generally is used for after the unexpected interruption of user's initial access or link channel.When asynchronous access, signature sequence of user's selection at first at random is as the temporary transient identify label of user, the arrival time delay (RTD) of estimating user signal when the base station detects user's signature sequence, give the user as the adjustment amount that sends signal time next time the time delay feedback information then, guarantee that all subscriber signals kept synchronously in the time of advent of base station; After user and base station synchronization, send some control signalings to the base station again and set up communication link, this signaling generally is the above signaling of physical layer, as link establishment reason, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI number (C-RNTI), User Priority, bandwidth application etc.Insert the bandwidth application that is mainly used in free subscriber synchronously.When inserting synchronously, basic identical under the communication process of user and base station and the asynchronous access way, just the base station needn't be to the time delay information of user feedback estimation, and it mainly is the bandwidth application information that the user sends what control signaling to the base station.
When traditional access at random, general user's signature sequence and control information are independent transmissions, i.e. control information is just to begin transmission after signature sequence sends successfully by the time.Though the pattern of this independent transmission can guarantee the reliable transmission of control information, it is not easy to the control and the scheduling of base station, and user's access delay just is difficult to guarantee.In order to shorten user's up turn-on time, some companies just propose user's signature sequence and the scheme that transmission is united in control information together.Because Random Access Channel is based on user competition, so when user's signature sequence and control information sent together, the following two large problems of main existence: 1) directly the performance in asynchronous Channel Transmission was unreliable in control information.Because when asynchronous access, the channel delay difference of each user's experience is so the orthogonality between the user is difficult to guarantee.Moreover the channel estimation errors under the multi-user is also very big, so the accuracy of the direct demodulation control information in base station can be very low.Particularly when the user initially inserted, user's signal experienced shadow fading possibly, so the power of received signal will significantly reduce.This just more cannot say for sure to have demonstrate,proved the correct demodulation of control information.2) for guaranteeing control information reliable transmission in asynchronous access channel, very big resource need be reserved for user's control information transmission in the base station.In case and bump between the user, these reserved resources have also just been wasted, promptly the user needs to initiate again to insert.So in real system, want by losing more than gain often the turn-on time of adopting associating send mode shortening user.
Summary of the invention
Detect performance for improving control of user's time delay and the user that uplink random inserts, the present invention proposes the transmission structure of signature sequence (shift Preamble) of a kind of new user's signature sequence (Preamble) and implying user's control information and emission thereof, method of reseptance.Transmit by certain customers' control information being lain in one group of user's signature sequence with special construction, and remaining control information is placed on based on directly transmission in the up channel of base station scheduling.Certain customers' control information lies in the special user's signature sequence and not only can transmit reliably on the one hand, and this special user's signature sequence also can improve user's detection performance.The transmission of certain customers' control information simultaneously can provide the most basic user access request information such as link establishment reason to the base station, User Priority, channel quality identification (CQI) etc., the base station just can be dispatched user's access control according to user's demand and current offered load situation like this, allow user's other important informations such as Cell Radio Network Temporary Identifier/Identity, Cell-RNTI number (C-RNTI), reliable transmission on the channel that is distributed such as radio resource control signaling (RRC) is to guarantee user's normal access.
For reaching above-mentioned purpose, the present invention adopts following technical scheme:
The transmission structure of the signature sequence of a kind of user's signature sequence and implying user's control information, comprise user's signature sequence and subscriber control information, the time-domain cyclic shift between the signature sequence of described implying user's control information and the described user's signature sequence is step length of cyclic shift N
sIntegral multiple, this control information is positioned at this integral multiple place.
Wherein, described user's signature sequence can be the cyclic shift version of himself.
As a kind of optimal way of the present invention, described step length of cyclic shift N
sFor user's signature sequence length L after divided by 2n integer part and satisfy the prerequisite that detects performance, wherein n is the figure place of portable maximum control information.
As another optimal way of the present invention, when described user's signature sequence length L is 512, described step length of cyclic shift N
sBe chosen as 16, then the figure place n of described portable maximum control information is 5.
As an optimal way more of the present invention, also comprise the signature sequence of one or more described implying user's control informations of the one or more described user's signature sequence of repetition and repetition.
The launching technique of the signature sequence of a kind of user's signature sequence and implying user's control information adopts the transmission structure of the signature sequence of above-mentioned user's signature sequence and implying user's control information, may further comprise the steps:
1) signature sequence of sending structure of described user's signature sequence of generation and implying user's control information;
2) send the signature sequence of sending structure of described user's signature sequence and implying user's control information, or only send described transmission
The signature sequence of implying user's control information in the structure.
As a kind of optimal way of launching technique of the present invention, in the described step 1), the Zadoff-chu sequence that adopts the permanent width of cloth zero autocorrelation sequence to concentrate produces described user's signature sequence.
The method of reseptance of the signature sequence of a kind of user's signature sequence and implying user's control information receives the signature sequence of above-mentioned launching technique transmitting users signature sequence and implying user's control information, may further comprise the steps:
1) user's signature Sequence Detection;
2) the relative carry digit that detects between user's signature sequence and the user's cyclic shift signature sequence obtains control information.
As a kind of optimal way of method of reseptance of the present invention, in the described step 1), the detection method of user's signature sequence is coherent detection and threshold judgement method.
As a kind of optimal way of method of reseptance of the present invention, described step 2) in, the method for channel estimating is a time domain multipath extracting method, channel equalization adopts frequency domain MMSE equilibrium.
The present invention has the following advantages:
1, in multi-user's competitive channel, provides a kind of transmission means of reliable subscriber control information.Overcome multi-user's interference by the good correlation properties that make full use of the Zadoff-chu sequence.
2, implementation complexity of the present invention is low.Because almost the user's signature Sequence Detection with traditional is identical for the user's signature Sequence Detection of this special construction,, this user's signature sequence brings many extra complexities so can't detecting to the user carrying of subscriber control information.
Further specify the present invention below in conjunction with drawings and Examples.
Embodiment
As shown in Figure 1, the transmission structure of the signature sequence of a kind of user's signature sequence and implying user's control information, the signature sequence that comprises two user's signature sequences, two implying user's control informations, time-domain cyclic shift between the described user's signature sequence is the integral multiple of step length of cyclic shift N, and this control information is positioned at this integral multiple place.Like this, user's control information lies in through in the user's signature sequence of time-domain cyclic shift.
Wherein, described user's signature sequence can be the cyclic shift version of himself.That is, when inserting at random synchronously, user's signature sequence also can adopt the cyclic shift version of original user's signature sequence to come dilatation to reach the purpose that reduces user's collision probability.Like this, carrying out a cyclic shift again on user's cyclic shift user's signature sequence basis sends together as control information symbol and user's signature sequence.
The transmission structure of the signature sequence of user's signature sequence of the present invention and implying user's control information, relative circular shift information between the signature sequence of user's signature sequence and implying user's control information has just been represented the entrained control information of user, these control informations can be the link establishment reasons, User Priority, resource bid and channel quality identification (CQI) etc.Suppose that the user's signature sequence length is L, minimum step length of cyclic shift is N
s, promptly a user's signature sequence can derive K=L/N altogether
sIndividual user's signature sequence through cyclic shift.Like this, a user's signature sequence is at most with regard to portability
The binary message of bit.General the user's signature sequence length is also fixed for the random access system under the fixed-bandwidth, so the control information amount of carrying of user's signature sequence will mainly depend on and minimum step length of cyclic shift.So, should shorten the minimal circulation shift step as far as possible in order to improve bit information implicit in the signature sequence.But under the channel of multipath fading, because the interference of multidiameter delay expansion, the minimal circulation shift step can not be too little, otherwise the detection performance of displacement can be very poor.Consider the bit quantity and the actual detected performance of subscriber control information so when choosing the minimal circulation shift step, need compromise.Suppose when the 5M system bandwidth user's signature sequence length L=512, preferred minimal circulation shift step N
s=16, then the user's signature sequence of this cyclic shift can be transmitted
The subscriber control information of bit.The mapping method example such as the table 1 of subscriber control information.For example, suppose control information for " 00010 ' ' and " 00011 ", be mapped as the shift step 32 and 48 of sequence number 2 and 3 correspondences respectively.Be that relative circular shift information between the signature sequence of user's signature sequence and implying user's control information has just been represented the entrained control information of user " 00010 " and " 00011 ".
Table 1: the bit Mapping Examples of control information
Sequence number |
Shift step (sampled point) |
Control information |
(5bits) |
Set up reason (3bits) |
Priority (2bits) |
0 |
0 |
000 |
00 |
1 |
16 |
000 |
01 |
2 |
32 |
000 |
10 |
… |
… |
… |
… |
31 |
496 |
111 |
11 |
Certainly, for transmission more control information when a user inserts, the user can send the cyclic shift user's signature sequence of a plurality of cascades simultaneously, but the expense that inserts has at random also just increased accordingly.
The launching technique of the signature sequence of a kind of user's signature sequence and implying user's control information, adopt the transmission structure of the signature sequence of above-mentioned user's signature sequence and implying user's control information, comprise signature sequence of sending structure two steps that produce and send described user's signature sequence and implying user's control information.
When the user inserts synchronously, in order to save resource overhead, the signature sequence that the user can only send out control information implicit.Because in this signature sequence, reality has comprised user's signature sequence information and subscriber control information simultaneously.And when inserting synchronously, the user reaches time delay and almost can ignore the influence of signature sequence displacement detection.
In this launching technique, consider that user's signature sequence must possess good auto-correlation and their cross correlation, keep lower peak-to-average force ratio simultaneously again, so signature sequence can be produced by the Zadoff-chu sequence in the permanent width of cloth zero auto-correlation (CAZAC) sequence sets.The Zadoff-chu sequence is shown below:
k=0,1,2,…,N
u-1;u
i=0,1,2,...,N
u-1
Wherein k is the label of Zadoff-chu sequence, u
iBe the identification number that is used to produce one group of specific Z adoff-chu sequence, N
uBe the length of sequence.In order to guarantee that the Zadoff-chu sequence has good their cross correlation, N
uShould get prime number.The user when inserting at random, can be in the user's signature sequence sets at random signature sequence of selection launch as temporary transient User Identity and with the form of user's signature sequence symbol.The user's signature sequence symbol is the OFDM symbol that is produced by the user's signature sequence, produces structure as shown in Figure 2.The user select for use at first randomly on the one group of continuous sub-carriers that it is mapped to after one group of Zadoff-chu sequence the Random Access Channel frequency range (if this Random Access Channel comprises the sub carrier group collection of the available selection of many groups, the user also at random the chooser carrier wave set shine upon further to reduce the collision probability that the user inserts).Through just having produced the OFDM symbol of time domain after the FFT conversion, at last the OFDM symbol after repeating repeatedly, time domain is launched then.
When the base station receives the user's signature sequence, estimate channel estimating and transmitting power control etc. with regard to the arrival time delay of utilizing the user's signature sequence that receives to carry out user's detection and user.Because the base station receiving terminal can receive from difference simultaneously with a plurality of user's signature sequences of corpse, so this just requires to have good cross correlation between user's the signature sequence.
The method of reseptance of the signature sequence of a kind of user's signature sequence and implying user's control information, receive the signature sequence of above-mentioned launching technique transmitting users signature sequence and implying user's control information, comprise 1) user's signature Sequence Detection and 2) subscriber control information detection two big steps.Promptly, at the base station receiving terminal, the base station must be detected user's signature sequence earlier by the user's signature sequence that receives, and then detect the signature sequence peak value of this user's implying user's control information, thereby the distance between the peak value that the signature sequence of peak value that obtains by the user's signature sequence at last and implying user's control information obtains determines that the figure place of cyclic shift determines control information.Its concrete detection step is described below:
1) user's signature Sequence Detection
The detection of signature sequence can be adopted the most frequently used coherent detection and threshold judgement method.In the detection window of user's signature sequence (as Fig. 1), by the FFT conversion signature sequence that receives is extracted in the special frequency channel of user's signature sequence, this special frequency channel is exactly the working frequency range by the uplink random access channel (RACH) of default.Also can adopt identical processing this moment in the detection window of the signature sequence of user's signature sequence and implying user's control information (as Fig. 1).So just can obtain sequence P (k) and P simultaneously
m(k):
k=0,1……K-1。
H wherein
i(k) be channel response on k the subcarrier of signature sequence in RACH takies frequency range of user i, H
J, i(k) be channel response on k the subcarrier of signature sequence j in RACH takies frequency range of implicit control information of user i, j is the figure place of cyclic shift of the signature sequence of implicit control information.M is the figure place of the cyclic shift of user u signature sequence.σ, σ ' represent the Gaussian noise distracter of base station in the signature sequence that receives signature sequence and implicit control information respectively.K is the length of Zadoff-chu sequence.Consider P (k) and P
m(k) may be respectively the stack of the signature sequence of the signature sequence of different user and implying user's control information, so receiving terminal must adopt one group of correlator to detect all possible user's signature sequence respectively.Interference and the noise of supposing other users are all very little at receiving terminal, when then the signature sequence of user u being carried out coherent detection, can adopt the frequency domain detection method:
S wherein
u(k) be exactly local u the signature sequence that produces.
Follow the H to obtaining again
u(k) and H
M, u(k) carry out the IFFT that P orders and obtain sequence:
With
,l=0,1,2....P-1.
Wherein, J is the number of sub carrier wave that signature sequence takies in RACH, J=73 when being 1.25MHz as the bandwidth as RACH.The P that counts of IFFT is the integer greater than J, and must to satisfy be 2 power power, as when the J=73, and P=128.
Sequence after the IFFT variation is carried out peak value to be detected:
σ wherein
u 2Can be approximated to the multi-user interference noise item of actual estimated.At last with the Z that obtains
uCompare with threshold value (as shown in Figure 3, the peak value of the signature sequence of user's signature sequence and implying user's control information detects under Gaussian channel, signal to noise ratio snr=10dB).As long as Z
uValue has surpassed predetermined threshold value, just can think user's signature sequence S
u(k) just detected success.
3) subscriber control information detects
The relative number of shift bits that receiving terminal can detect between the signature sequence of user's signature sequence and implying user's control information comprised user's control information through the number of shift bits of the signature sequence of implying user's control information, so as long as just can obtain control information.So the number of shift bits of user's signature sequence need by
Peak value come simultaneously to determine (as shown in Figure 3).Emphasizing to detect relative number of shift bits herein is because when inserting at random synchronously, and user's signature sequence also can adopt the cyclic shift version of original user's signature sequence to come dilatation to reach the purpose that reduces user's collision probability.The user be if will send user's signature and control information simultaneously like this, just must carry out a cyclic shift again on the signature sequence basis of user's implying user's control information and send together as control information symbol and user's signature sequence.
For the subscriber control information that improves under the multipath fading detects performance, before detection, obtain in the time of can be according to the user's signature Sequence Detection
Perhaps
Estimate the channel that this user experiences.Channel estimating can adopt traditional time domain multipath extracting method.Channel equalization can adopt traditional frequency domain MMSE equilibrium.
In order to assess the performance of the inventive method, present embodiment is comparing present embodiment and traditional scheme with reference to present 3GPP LTE standard aspect the mismark piece rate (BLER) of user's detection probability and subscriber control information detection.The transmission bandwidth of supposing the system is 5MHz, and the user sends 4 OFDM symbols when inserting at random: repetition preceding 2 as the user's signature sequence symbol; Back 2 the signature sequences that repeat as this implying user's control information.Send structure as shown in Figure 1.All competition accesses on same RACH of all access users, the signature sequence that each user's employing is different is not so consider the influence that the user collides in emulation.The concrete parameter of other of emulation sees Table 2.
Table 2: simulation parameter table
The Random Access Channel bandwidth |
1.25M,5M |
FFT counts |
128,512 |
Signature sequence |
Zadoff-chu |
Signature sequence length |
73/1.25M 293/5M |
Optional signature sequence number |
16 |
The number of users of Jie Ruing simultaneously |
1,2,4 |
The expansion of channel multi-path time delay |
FFT/2 sampled point time |
The transmit/receive antenna number |
1/1 |
Channel model |
30 kilometers/hour of TU6 translational speeds |
The control information bit number |
New method (proposed): 5bits conventional method (conventional): 4,5bits |
Minimal circulation shift step (new method (proposed)) |
16 |
The spread processing of control messages (conventional method (convent ional)) |
1.25M:CAZAC spreading factor is 10,13 or Hadamard (Hadamard) spreading factor be 8,16 5M:CAZAC spreading factors are 58,41 or Hadamard spreading factors are 32,64 |
The modulating-coding of control messages (conventional method (conventional)) |
BPSK, BPSK (Hamming code (7,4)) QPSK (repeated encoding of 1/3 speed) |
Fig. 4 has shown the detection probability of user's signature sequence, and wherein the void of user's signature sequence inspection probability is to be controlled at 10
-3About the order of magnitude.From simulation result as can be seen, the solution of the present invention has the snr gain of 2dB at least than traditional scheme.This mainly is to have comprised the redundant information of user's signature sequence in the control information symbol of new method, so can strengthen the detection probability of user's signature sequence.Fig. 5 and Fig. 6 have shown that the control information BLER performance under desirable channel estimating compares.When two kinds of methods were transmitted identical control information bit (5 bit), new method can obtain the snr gain of 5dB at least than conventional method.Fig. 7 and Fig. 8 have shown that the control information BLER performance under the actual channel estimation compares.In order to improve the BLER performance of conventional method, in traditional scheme, hamming code and repeated encoding technology have been adopted in control information, and adopted the multi-user interference cancellation technology again at receiving terminal.But when at least 2 users inserted simultaneously, under the channel estimating of reality, the error code flat bed of BLER still can appear in system however.And method of the present invention not only still will significantly be better than traditional method on performance, and the complexity of receiving terminal also significantly is lower than traditional method, because it can adopt any interference cancellation techniques substantially.