CN101094027A - Signature sequence of sending structure of implying user's control information, transmitting and receiving method - Google Patents

Signature sequence of sending structure of implying user's control information, transmitting and receiving method Download PDF

Info

Publication number
CN101094027A
CN101094027A CNA2006100278934A CN200610027893A CN101094027A CN 101094027 A CN101094027 A CN 101094027A CN A2006100278934 A CNA2006100278934 A CN A2006100278934A CN 200610027893 A CN200610027893 A CN 200610027893A CN 101094027 A CN101094027 A CN 101094027A
Authority
CN
China
Prior art keywords
user
signature sequence
control information
implying
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006100278934A
Other languages
Chinese (zh)
Other versions
CN101094027B (en
Inventor
周平
李力
李明齐
胡宏林
张小东
王海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yan Jing Information Technology Co., Ltd.
Original Assignee
Shanghai Research Center for Wireless Communications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=38992087&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN101094027(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Shanghai Research Center for Wireless Communications filed Critical Shanghai Research Center for Wireless Communications
Priority to CN2006100278934A priority Critical patent/CN101094027B/en
Publication of CN101094027A publication Critical patent/CN101094027A/en
Application granted granted Critical
Publication of CN101094027B publication Critical patent/CN101094027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The mentioned sending structure includes a user signature sequence (USS) and user-control info (UCI). The time domain circular shift, between the mentioned signature sequence with implicit user-control info and USS, is an integer multiplied by Ns, the step length of circular shift. At the integer locates the control info. This invention provides a reliable way to transmit user-control info in the multi-user competing channel. It takes full advantage of the excellent related characteristics of the Zadoff-chu sequence to overcome interference from multi-user. In addition, this invention can be simply realized. Due to the sameness of the detection of the user signature sequence (USS) with a special structure as the detection of the traditional USS, the former USS can carry user-control information without adding extra complication to the user detection.

Description

The signature sequence of sending structure of implying user's control information and emission, method of reseptance
Technical field
The invention belongs to wireless communication technology field, particularly aerial signal transmission technology in the multi-carrier communication.
Background technology
In wireless communication system, because OFDM (OFDM) has the rectangle frequency spectrum, and adopt fast Fourier transform (FFT) and the low integrated level of system brought, it can effectively improve the power system capacity of down link under high spectral efficiency, coverage and data transmission bauds.OFDM has been widely used in all kinds of less radio-frequency environment as a kind of broadband data communication technology, High Data Rate Digital Subscriber Line (HDSLs) for example, ADSL (Asymmetric Digital Subscriber Line) (ADSLs), and digital broadcasting.OFDM is divided into many parallel subcarriers with complete frequency band, is used for launching parallel data flow.Because insert the protection time slot, the symbol transmitting time prolongs relatively, but can effectively reduce intersymbol interference (ISI).In recent years, in 3GPP standardization forum, OFDMA has been decided to be the downlink air interface scheme that the UMTS mobile radio system develops, and becomes one of main competition test of super 3G or 4G system.
It is a kind of access way that user and base station communicate in the communication system that uplink random inserts: the user is in the specific time, on the specific channel, sends some control informations in the mode of competition to the base station and communicates with the base station requiring.Usually, the state on time synchronized according to user and base station can be divided into the uplink random access channel non-synchronized random access channel and synchronous Random Access Channel.Asynchronous access generally is used for after the unexpected interruption of user's initial access or link channel.When asynchronous access, signature sequence of user's selection at first at random is as the temporary transient identify label of user, the arrival time delay (RTD) of estimating user signal when the base station detects user's signature sequence, give the user as the adjustment amount that sends signal time next time the time delay feedback information then, guarantee that all subscriber signals kept synchronously in the time of advent of base station; After user and base station synchronization, send some control signalings to the base station again and set up communication link, this signaling generally is the above signaling of physical layer, as link establishment reason, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI number (C-RNTI), User Priority, bandwidth application etc.Insert the bandwidth application that is mainly used in free subscriber synchronously.When inserting synchronously, basic identical under the communication process of user and base station and the asynchronous access way, just the base station needn't be to the time delay information of user feedback estimation, and it mainly is the bandwidth application information that the user sends what control signaling to the base station.
When traditional access at random, general user's signature sequence and control information are independent transmissions, i.e. control information is just to begin transmission after signature sequence sends successfully by the time.Though the pattern of this independent transmission can guarantee the reliable transmission of control information, it is not easy to the control and the scheduling of base station, and user's access delay just is difficult to guarantee.In order to shorten user's up turn-on time, some companies just propose user's signature sequence and the scheme that transmission is united in control information together.Because Random Access Channel is based on user competition, so when user's signature sequence and control information sent together, the following two large problems of main existence: 1) directly the performance in asynchronous Channel Transmission was unreliable in control information.Because when asynchronous access, the channel delay difference of each user's experience is so the orthogonality between the user is difficult to guarantee.Moreover the channel estimation errors under the multi-user is also very big, so the accuracy of the direct demodulation control information in base station can be very low.Particularly when the user initially inserted, user's signal experienced shadow fading possibly, so the power of received signal will significantly reduce.This just more cannot say for sure to have demonstrate,proved the correct demodulation of control information.2) for guaranteeing control information reliable transmission in asynchronous access channel, very big resource need be reserved for user's control information transmission in the base station.In case and bump between the user, these reserved resources have also just been wasted, promptly the user needs to initiate again to insert.So in real system, want by losing more than gain often the turn-on time of adopting associating send mode shortening user.
Summary of the invention
Detect performance for improving control of user's time delay and the user that uplink random inserts, the present invention proposes the transmission structure of signature sequence (shift Preamble) of a kind of new user's signature sequence (Preamble) and implying user's control information and emission thereof, method of reseptance.Transmit by certain customers' control information being lain in one group of user's signature sequence with special construction, and remaining control information is placed on based on directly transmission in the up channel of base station scheduling.Certain customers' control information lies in the special user's signature sequence and not only can transmit reliably on the one hand, and this special user's signature sequence also can improve user's detection performance.The transmission of certain customers' control information simultaneously can provide the most basic user access request information such as link establishment reason to the base station, User Priority, channel quality identification (CQI) etc., the base station just can be dispatched user's access control according to user's demand and current offered load situation like this, allow user's other important informations such as Cell Radio Network Temporary Identifier/Identity, Cell-RNTI number (C-RNTI), reliable transmission on the channel that is distributed such as radio resource control signaling (RRC) is to guarantee user's normal access.
For reaching above-mentioned purpose, the present invention adopts following technical scheme:
The transmission structure of the signature sequence of a kind of user's signature sequence and implying user's control information, comprise user's signature sequence and subscriber control information, the time-domain cyclic shift between the signature sequence of described implying user's control information and the described user's signature sequence is step length of cyclic shift N sIntegral multiple, this control information is positioned at this integral multiple place.
Wherein, described user's signature sequence can be the cyclic shift version of himself.
As a kind of optimal way of the present invention, described step length of cyclic shift N sFor user's signature sequence length L after divided by 2n integer part and satisfy the prerequisite that detects performance, wherein n is the figure place of portable maximum control information.
As another optimal way of the present invention, when described user's signature sequence length L is 512, described step length of cyclic shift N sBe chosen as 16, then the figure place n of described portable maximum control information is 5.
As an optimal way more of the present invention, also comprise the signature sequence of one or more described implying user's control informations of the one or more described user's signature sequence of repetition and repetition.
The launching technique of the signature sequence of a kind of user's signature sequence and implying user's control information adopts the transmission structure of the signature sequence of above-mentioned user's signature sequence and implying user's control information, may further comprise the steps:
1) signature sequence of sending structure of described user's signature sequence of generation and implying user's control information;
2) send the signature sequence of sending structure of described user's signature sequence and implying user's control information, or only send described transmission
The signature sequence of implying user's control information in the structure.
As a kind of optimal way of launching technique of the present invention, in the described step 1), the Zadoff-chu sequence that adopts the permanent width of cloth zero autocorrelation sequence to concentrate produces described user's signature sequence.
The method of reseptance of the signature sequence of a kind of user's signature sequence and implying user's control information receives the signature sequence of above-mentioned launching technique transmitting users signature sequence and implying user's control information, may further comprise the steps:
1) user's signature Sequence Detection;
2) the relative carry digit that detects between user's signature sequence and the user's cyclic shift signature sequence obtains control information.
As a kind of optimal way of method of reseptance of the present invention, in the described step 1), the detection method of user's signature sequence is coherent detection and threshold judgement method.
As a kind of optimal way of method of reseptance of the present invention, described step 2) in, the method for channel estimating is a time domain multipath extracting method, channel equalization adopts frequency domain MMSE equilibrium.
The present invention has the following advantages:
1, in multi-user's competitive channel, provides a kind of transmission means of reliable subscriber control information.Overcome multi-user's interference by the good correlation properties that make full use of the Zadoff-chu sequence.
2, implementation complexity of the present invention is low.Because almost the user's signature Sequence Detection with traditional is identical for the user's signature Sequence Detection of this special construction,, this user's signature sequence brings many extra complexities so can't detecting to the user carrying of subscriber control information.
Further specify the present invention below in conjunction with drawings and Examples.
Description of drawings
Fig. 1 is the transmission structure embodiment of the signature sequence of user's signature sequence of the present invention and implying user's control information;
Fig. 2 is the generation structural representation of user's signature sequence symbol;
Fig. 3 is under Gaussian channel, signal to noise ratio snr=10dB, and the peak value of the signature sequence of user's signature sequence and implying user's control information detects figure;
Fig. 4 is that user's detection probability performance of the inventive method and conventional method compares;
Fig. 5 is under desirable channel estimating, and the subscriber control information BLER performance when RACH=1.25MHz relatively;
Fig. 6 is under desirable channel estimating, and the subscriber control information BLER performance when RACH=5MHz relatively;
Fig. 7 is under actual channel is estimated, the subscriber control information BLER performance when RACH=1.25MHz relatively;
Fig. 8 is under actual channel is estimated, the subscriber control information BLER performance when RACH=5MHz relatively.
Embodiment
As shown in Figure 1, the transmission structure of the signature sequence of a kind of user's signature sequence and implying user's control information, the signature sequence that comprises two user's signature sequences, two implying user's control informations, time-domain cyclic shift between the described user's signature sequence is the integral multiple of step length of cyclic shift N, and this control information is positioned at this integral multiple place.Like this, user's control information lies in through in the user's signature sequence of time-domain cyclic shift.
Wherein, described user's signature sequence can be the cyclic shift version of himself.That is, when inserting at random synchronously, user's signature sequence also can adopt the cyclic shift version of original user's signature sequence to come dilatation to reach the purpose that reduces user's collision probability.Like this, carrying out a cyclic shift again on user's cyclic shift user's signature sequence basis sends together as control information symbol and user's signature sequence.
The transmission structure of the signature sequence of user's signature sequence of the present invention and implying user's control information, relative circular shift information between the signature sequence of user's signature sequence and implying user's control information has just been represented the entrained control information of user, these control informations can be the link establishment reasons, User Priority, resource bid and channel quality identification (CQI) etc.Suppose that the user's signature sequence length is L, minimum step length of cyclic shift is N s, promptly a user's signature sequence can derive K=L/N altogether sIndividual user's signature sequence through cyclic shift.Like this, a user's signature sequence is at most with regard to portability M = lo g 2 K The binary message of bit.General the user's signature sequence length is also fixed for the random access system under the fixed-bandwidth, so the control information amount of carrying of user's signature sequence will mainly depend on and minimum step length of cyclic shift.So, should shorten the minimal circulation shift step as far as possible in order to improve bit information implicit in the signature sequence.But under the channel of multipath fading, because the interference of multidiameter delay expansion, the minimal circulation shift step can not be too little, otherwise the detection performance of displacement can be very poor.Consider the bit quantity and the actual detected performance of subscriber control information so when choosing the minimal circulation shift step, need compromise.Suppose when the 5M system bandwidth user's signature sequence length L=512, preferred minimal circulation shift step N s=16, then the user's signature sequence of this cyclic shift can be transmitted M = log 2 32 = 5 The subscriber control information of bit.The mapping method example such as the table 1 of subscriber control information.For example, suppose control information for " 00010 ' ' and " 00011 ", be mapped as the shift step 32 and 48 of sequence number 2 and 3 correspondences respectively.Be that relative circular shift information between the signature sequence of user's signature sequence and implying user's control information has just been represented the entrained control information of user " 00010 " and " 00011 ".
Table 1: the bit Mapping Examples of control information
Sequence number Shift step (sampled point) Control information (5bits)
Set up reason (3bits) Priority (2bits)
0 0 000 00
1 16 000 01
2 32 000 10
31 496 111 11
Certainly, for transmission more control information when a user inserts, the user can send the cyclic shift user's signature sequence of a plurality of cascades simultaneously, but the expense that inserts has at random also just increased accordingly.
The launching technique of the signature sequence of a kind of user's signature sequence and implying user's control information, adopt the transmission structure of the signature sequence of above-mentioned user's signature sequence and implying user's control information, comprise signature sequence of sending structure two steps that produce and send described user's signature sequence and implying user's control information.
When the user inserts synchronously, in order to save resource overhead, the signature sequence that the user can only send out control information implicit.Because in this signature sequence, reality has comprised user's signature sequence information and subscriber control information simultaneously.And when inserting synchronously, the user reaches time delay and almost can ignore the influence of signature sequence displacement detection.
In this launching technique, consider that user's signature sequence must possess good auto-correlation and their cross correlation, keep lower peak-to-average force ratio simultaneously again, so signature sequence can be produced by the Zadoff-chu sequence in the permanent width of cloth zero auto-correlation (CAZAC) sequence sets.The Zadoff-chu sequence is shown below:
C u i ( k ) = exp ( - j 2 π k 2 u i / ( 2 N u ) ) , N u even exp ( - j 2 πk ( k + 1 ) u i / ( 2 N u ) ) N u odd
k=0,1,2,…,N u-1;u i=0,1,2,...,N u-1
Wherein k is the label of Zadoff-chu sequence, u iBe the identification number that is used to produce one group of specific Z adoff-chu sequence, N uBe the length of sequence.In order to guarantee that the Zadoff-chu sequence has good their cross correlation, N uShould get prime number.The user when inserting at random, can be in the user's signature sequence sets at random signature sequence of selection launch as temporary transient User Identity and with the form of user's signature sequence symbol.The user's signature sequence symbol is the OFDM symbol that is produced by the user's signature sequence, produces structure as shown in Figure 2.The user select for use at first randomly on the one group of continuous sub-carriers that it is mapped to after one group of Zadoff-chu sequence the Random Access Channel frequency range (if this Random Access Channel comprises the sub carrier group collection of the available selection of many groups, the user also at random the chooser carrier wave set shine upon further to reduce the collision probability that the user inserts).Through just having produced the OFDM symbol of time domain after the FFT conversion, at last the OFDM symbol after repeating repeatedly, time domain is launched then.
When the base station receives the user's signature sequence, estimate channel estimating and transmitting power control etc. with regard to the arrival time delay of utilizing the user's signature sequence that receives to carry out user's detection and user.Because the base station receiving terminal can receive from difference simultaneously with a plurality of user's signature sequences of corpse, so this just requires to have good cross correlation between user's the signature sequence.
The method of reseptance of the signature sequence of a kind of user's signature sequence and implying user's control information, receive the signature sequence of above-mentioned launching technique transmitting users signature sequence and implying user's control information, comprise 1) user's signature Sequence Detection and 2) subscriber control information detection two big steps.Promptly, at the base station receiving terminal, the base station must be detected user's signature sequence earlier by the user's signature sequence that receives, and then detect the signature sequence peak value of this user's implying user's control information, thereby the distance between the peak value that the signature sequence of peak value that obtains by the user's signature sequence at last and implying user's control information obtains determines that the figure place of cyclic shift determines control information.Its concrete detection step is described below:
1) user's signature Sequence Detection
The detection of signature sequence can be adopted the most frequently used coherent detection and threshold judgement method.In the detection window of user's signature sequence (as Fig. 1), by the FFT conversion signature sequence that receives is extracted in the special frequency channel of user's signature sequence, this special frequency channel is exactly the working frequency range by the uplink random access channel (RACH) of default.Also can adopt identical processing this moment in the detection window of the signature sequence of user's signature sequence and implying user's control information (as Fig. 1).So just can obtain sequence P (k) and P simultaneously m(k):
P ( k ) = H u ( k ) S u ( k ) + Σ i ≠ u H i ( k ) S i ( k ) + σ , P m ( k ) = H m , u ( k ) S u ( k ) + Σ i ≠ u H j , i ( k ) S i ( k ) + σ ′ , k=0,1……K-1。
H wherein i(k) be channel response on k the subcarrier of signature sequence in RACH takies frequency range of user i, H J, i(k) be channel response on k the subcarrier of signature sequence j in RACH takies frequency range of implicit control information of user i, j is the figure place of cyclic shift of the signature sequence of implicit control information.M is the figure place of the cyclic shift of user u signature sequence.σ, σ ' represent the Gaussian noise distracter of base station in the signature sequence that receives signature sequence and implicit control information respectively.K is the length of Zadoff-chu sequence.Consider P (k) and P m(k) may be respectively the stack of the signature sequence of the signature sequence of different user and implying user's control information, so receiving terminal must adopt one group of correlator to detect all possible user's signature sequence respectively.Interference and the noise of supposing other users are all very little at receiving terminal, when then the signature sequence of user u being carried out coherent detection, can adopt the frequency domain detection method:
H ~ u ( k ) ≈ P ( k ) · S u * ( k ) , H ~ m , u ( k ) ≈ P m ( k ) · S u * ( k ) S wherein u(k) be exactly local u the signature sequence that produces.
Follow the H to obtaining again u(k) and H M, u(k) carry out the IFFT that P orders and obtain sequence:
h ~ u ( l ) = 1 P Σ k = 0 J - 1 H ~ u ( k ) · e j 2 π / k / P , With h ~ m , u ( l ) = 1 P Σ k = 0 K - 1 H ~ m , u ( k ) · e j 2 π / k / P ,l=0,1,2....P-1.
Wherein, J is the number of sub carrier wave that signature sequence takies in RACH, J=73 when being 1.25MHz as the bandwidth as RACH.The P that counts of IFFT is the integer greater than J, and must to satisfy be 2 power power, as when the J=73, and P=128.
Sequence after the IFFT variation is carried out peak value to be detected:
Z u = max [ | h ~ u ( l ) | 2 , | h ~ m , u ( l ) | 2 ] σ u 2 , σ u 2 = 1 2 P Σ l = 0 P - 1 ( | h ~ u ( l ) | 2 + | h ~ m , u ( l ) | 2 )
σ wherein u 2Can be approximated to the multi-user interference noise item of actual estimated.At last with the Z that obtains uCompare with threshold value (as shown in Figure 3, the peak value of the signature sequence of user's signature sequence and implying user's control information detects under Gaussian channel, signal to noise ratio snr=10dB).As long as Z uValue has surpassed predetermined threshold value, just can think user's signature sequence S u(k) just detected success.
3) subscriber control information detects
The relative number of shift bits that receiving terminal can detect between the signature sequence of user's signature sequence and implying user's control information comprised user's control information through the number of shift bits of the signature sequence of implying user's control information, so as long as just can obtain control information.So the number of shift bits of user's signature sequence need by
Figure A20061002789300105
Figure A20061002789300106
Peak value come simultaneously to determine (as shown in Figure 3).Emphasizing to detect relative number of shift bits herein is because when inserting at random synchronously, and user's signature sequence also can adopt the cyclic shift version of original user's signature sequence to come dilatation to reach the purpose that reduces user's collision probability.The user be if will send user's signature and control information simultaneously like this, just must carry out a cyclic shift again on the signature sequence basis of user's implying user's control information and send together as control information symbol and user's signature sequence.
For the subscriber control information that improves under the multipath fading detects performance, before detection, obtain in the time of can be according to the user's signature Sequence Detection
Figure A20061002789300107
Perhaps
Figure A20061002789300108
Estimate the channel that this user experiences.Channel estimating can adopt traditional time domain multipath extracting method.Channel equalization can adopt traditional frequency domain MMSE equilibrium.
In order to assess the performance of the inventive method, present embodiment is comparing present embodiment and traditional scheme with reference to present 3GPP LTE standard aspect the mismark piece rate (BLER) of user's detection probability and subscriber control information detection.The transmission bandwidth of supposing the system is 5MHz, and the user sends 4 OFDM symbols when inserting at random: repetition preceding 2 as the user's signature sequence symbol; Back 2 the signature sequences that repeat as this implying user's control information.Send structure as shown in Figure 1.All competition accesses on same RACH of all access users, the signature sequence that each user's employing is different is not so consider the influence that the user collides in emulation.The concrete parameter of other of emulation sees Table 2.
Table 2: simulation parameter table
The Random Access Channel bandwidth 1.25M,5M
FFT counts 128,512
Signature sequence Zadoff-chu
Signature sequence length 73/1.25M 293/5M
Optional signature sequence number 16
The number of users of Jie Ruing simultaneously 1,2,4
The expansion of channel multi-path time delay FFT/2 sampled point time
The transmit/receive antenna number 1/1
Channel model 30 kilometers/hour of TU6 translational speeds
The control information bit number New method (proposed): 5bits conventional method (conventional): 4,5bits
Minimal circulation shift step (new method (proposed)) 16
The spread processing of control messages (conventional method (convent ional)) 1.25M:CAZAC spreading factor is 10,13 or Hadamard (Hadamard) spreading factor be 8,16 5M:CAZAC spreading factors are 58,41 or Hadamard spreading factors are 32,64
The modulating-coding of control messages (conventional method (conventional)) BPSK, BPSK (Hamming code (7,4)) QPSK (repeated encoding of 1/3 speed)
Fig. 4 has shown the detection probability of user's signature sequence, and wherein the void of user's signature sequence inspection probability is to be controlled at 10 -3About the order of magnitude.From simulation result as can be seen, the solution of the present invention has the snr gain of 2dB at least than traditional scheme.This mainly is to have comprised the redundant information of user's signature sequence in the control information symbol of new method, so can strengthen the detection probability of user's signature sequence.Fig. 5 and Fig. 6 have shown that the control information BLER performance under desirable channel estimating compares.When two kinds of methods were transmitted identical control information bit (5 bit), new method can obtain the snr gain of 5dB at least than conventional method.Fig. 7 and Fig. 8 have shown that the control information BLER performance under the actual channel estimation compares.In order to improve the BLER performance of conventional method, in traditional scheme, hamming code and repeated encoding technology have been adopted in control information, and adopted the multi-user interference cancellation technology again at receiving terminal.But when at least 2 users inserted simultaneously, under the channel estimating of reality, the error code flat bed of BLER still can appear in system however.And method of the present invention not only still will significantly be better than traditional method on performance, and the complexity of receiving terminal also significantly is lower than traditional method, because it can adopt any interference cancellation techniques substantially.

Claims (10)

1, the transmission structure of the signature sequence of a kind of user's signature sequence and implying user's control information, comprise user's signature sequence and subscriber control information, it is characterized in that: the time-domain cyclic shift between the signature sequence of described implying user's control information and the described user's signature sequence is step length of cyclic shift N sIntegral multiple, this control information is positioned at this integral multiple place.
2, the transmission structure of the signature sequence of user's signature sequence according to claim 1 and implying user's control information is characterized in that: described user's signature sequence is the cyclic shift version of himself.
3, the transmission structure of the signature sequence of user's signature sequence according to claim 1 and 2 and implying user's control information is characterized in that: described step length of cyclic shift N sFor user's signature sequence length L divided by 2 nAfter integer part and satisfy to detect the prerequisite of performance, wherein n is the figure place of portable maximum control information.
4, the transmission structure of the signature sequence of user's signature sequence according to claim 3 and implying user's control information is characterized in that: when described user's signature sequence length L is 512, and described step length of cyclic shift N sBe 16, then the figure place n of described portable maximum control information is 5.
5, the transmission structure of the signature sequence of user's signature sequence according to claim 1 and 2 and implying user's control information is characterized in that: the signature sequence that also comprises one or more described implying user's control informations of the one or more described user's signature sequence of repetition and repetition.
6, the launching technique of the signature sequence of a kind of user's signature sequence and implying user's control information, the transmission structure of the signature sequence of arbitrary described user's signature sequence and implying user's control information in the employing claim 1 to 5 is characterized in that may further comprise the steps:
1) signature sequence of sending structure of described user's signature sequence of generation and implying user's control information;
2) send the signature sequence of sending structure of described user's signature sequence and implying user's control information, or only send the signature sequence of implying user's control information in the described transmission structure.
7, the launching technique of the signature sequence of user's signature sequence according to claim 6 and implying user's control information, it is characterized in that: in the described step 1), the Zadoff-chu sequence that adopts the permanent width of cloth zero autocorrelation sequence to concentrate produces described user's signature sequence.
8, the method for reseptance of the signature sequence of a kind of user's signature sequence and implying user's control information, the signature sequence of arbitrary described launching technique transmitting users signature sequence and implying user's control information in the reception claim 6 to 7 is characterized in that may further comprise the steps:
1) user's signature Sequence Detection;
2) the relative carry digit that detects between user's signature sequence and the user's cyclic shift signature sequence obtains control information.
9, the launching technique of the signature sequence of user's signature sequence according to claim 8 and implying user's control information is characterized in that: in the described step 1), the detection method of user's signature sequence is coherent detection and threshold judgement method.
10, according to Claim 8 or the launching technique of the signature sequence of 9 described user's signature sequences and implying user's control information, it is characterized in that: described step 2), the method of channel estimating is a time domain multipath extracting method, and channel equalization adopts frequency domain MMSE equilibrium.
CN2006100278934A 2006-06-20 2006-06-20 Transmitting and receiving method concealing signature sequence of sending structure of user's control information Active CN101094027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006100278934A CN101094027B (en) 2006-06-20 2006-06-20 Transmitting and receiving method concealing signature sequence of sending structure of user's control information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006100278934A CN101094027B (en) 2006-06-20 2006-06-20 Transmitting and receiving method concealing signature sequence of sending structure of user's control information

Publications (2)

Publication Number Publication Date
CN101094027A true CN101094027A (en) 2007-12-26
CN101094027B CN101094027B (en) 2010-11-03

Family

ID=38992087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006100278934A Active CN101094027B (en) 2006-06-20 2006-06-20 Transmitting and receiving method concealing signature sequence of sending structure of user's control information

Country Status (1)

Country Link
CN (1) CN101094027B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009094849A1 (en) * 2008-01-17 2009-08-06 Zte Corporation Cyclic shift duration set generation method and random access preamble generation method
CN102045824A (en) * 2009-10-22 2011-05-04 中兴通讯股份有限公司 Method for controlling power of downlink channel of trunking communication system, base station and mobile station
CN101656702B (en) * 2009-09-21 2013-01-02 普天信息技术研究院有限公司 Method for processing signals to be transmitted
CN105379400A (en) * 2013-09-09 2016-03-02 华为技术有限公司 System and method for increasing low density signature space
CN106559859A (en) * 2015-09-30 2017-04-05 华为技术有限公司 A kind of terminal access method and device
CN108271271A (en) * 2016-12-30 2018-07-10 维沃移动通信有限公司 A kind of accidental access method, transmitting terminal and receiving terminal
WO2018157864A1 (en) * 2017-03-03 2018-09-07 Mediatek Inc. Sequence design for synchronization and device identification in wireless communication systems
CN108768600A (en) * 2013-12-18 2018-11-06 华为技术有限公司 Method and apparatus for WLAN ofdma communications
US10440715B2 (en) 2013-12-18 2019-10-08 Huawei Technologies Co., Ltd. System and method for OFDMA resource management in WLAN

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6643275B1 (en) * 1998-05-15 2003-11-04 Telefonaktiebolaget Lm Ericsson (Publ) Random access in a mobile telecommunications system
GB9823467D0 (en) * 1998-10-28 1998-12-23 Koninkl Philips Electronics Nv Radio communication system

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009094849A1 (en) * 2008-01-17 2009-08-06 Zte Corporation Cyclic shift duration set generation method and random access preamble generation method
US8693354B2 (en) 2008-01-17 2014-04-08 Zte Corporation Method for generation of cyclic shift amount set and method for generation of random access preamble
CN101809895B (en) * 2008-01-17 2014-05-28 中兴通讯股份有限公司 Cyclic shift duration set generation method and random access preamble generation method
CN101656702B (en) * 2009-09-21 2013-01-02 普天信息技术研究院有限公司 Method for processing signals to be transmitted
CN102045824A (en) * 2009-10-22 2011-05-04 中兴通讯股份有限公司 Method for controlling power of downlink channel of trunking communication system, base station and mobile station
CN105379400A (en) * 2013-09-09 2016-03-02 华为技术有限公司 System and method for increasing low density signature space
US10700838B2 (en) 2013-09-09 2020-06-30 Huawei Technologies Co., Ltd. System and method for increasing low density signature space
CN108768600A (en) * 2013-12-18 2018-11-06 华为技术有限公司 Method and apparatus for WLAN ofdma communications
US10567126B2 (en) 2013-12-18 2020-02-18 Huawei Technologies Co., Ltd. System and method for WLAN OFDMA design of subcarrier groups and frame format
US11012202B2 (en) 2013-12-18 2021-05-18 Huawei Technologies Co., Ltd. System and method for WLAN OFDMA design of subcarrier groups and frame format
US10893524B2 (en) 2013-12-18 2021-01-12 Huawei Technologies Co., Ltd. System and method for OFDMA resource management in WLAN
US10440715B2 (en) 2013-12-18 2019-10-08 Huawei Technologies Co., Ltd. System and method for OFDMA resource management in WLAN
WO2017054641A1 (en) * 2015-09-30 2017-04-06 华为技术有限公司 Terminal access method and apparatus
CN106559859B (en) * 2015-09-30 2021-01-29 华为技术有限公司 Terminal access method and device
US10716140B2 (en) 2015-09-30 2020-07-14 Huawei Technologies Co., Ltd. Terminal access method, and apparatus
CN106559859A (en) * 2015-09-30 2017-04-05 华为技术有限公司 A kind of terminal access method and device
CN108271271B (en) * 2016-12-30 2019-12-31 维沃移动通信有限公司 Random access method, sending end and receiving end
CN108271271A (en) * 2016-12-30 2018-07-10 维沃移动通信有限公司 A kind of accidental access method, transmitting terminal and receiving terminal
US10530565B2 (en) 2017-03-03 2020-01-07 Mediatek Inc. Sequence design for synchronization and device identification in wireless communication systems
TWI672033B (en) * 2017-03-03 2019-09-11 聯發科技股份有限公司 Sequence design method for synchronization and device identification in wireless communication systems
CN108811522A (en) * 2017-03-03 2018-11-13 联发科技股份有限公司 Sequence design for synchronization and equipment identification in wireless communication system
WO2018157864A1 (en) * 2017-03-03 2018-09-07 Mediatek Inc. Sequence design for synchronization and device identification in wireless communication systems
CN108811522B (en) * 2017-03-03 2022-04-29 联发科技股份有限公司 Sequence design method, device and memory for synchronization and device identification

Also Published As

Publication number Publication date
CN101094027B (en) 2010-11-03

Similar Documents

Publication Publication Date Title
CN101094027B (en) Transmitting and receiving method concealing signature sequence of sending structure of user's control information
KR101559794B1 (en) Method for sequence generaton and apparatus therefor
CN1951033B (en) Method and apparatus for overlaying multi-carrier and direct sequence spread spectrum signals in a broadband wireless communication system
CN102064848B (en) Method and apparatus for movable station and base station in a multi-subzones broadband wireless system
US7580400B2 (en) Apparatus and method for generating preamble signal for cell identification in an orthogonal frequency division multiplexing system
CN101563899B (en) Uplink inter-carrier interference cancellation for OFDMA systems
KR101791987B1 (en) Method and apparatus for transmitting preamble in wireless communication system
CN101729465B (en) Method and device for measuring signal to noise ratio and application thereof
US20050286409A1 (en) Apparatus and method for transmitting/receiving uplink random access channel in mobile communication system
US20070258358A1 (en) Method and apparatus for enhancing the detection of common control channel in orthogonal frequency division multiple access-based cellular communication system
US20060172713A1 (en) Radio communication system performing multi-carrier transmission, reception device, reception method, transmission device, transmission method, delay time calculation device, and delay time calculation method
US20060018250A1 (en) Apparatus and method for transmitting and receiving a signal in an orthogonal frequency division multiplexing system
US20030179776A1 (en) Multicarrier transmitter, multicarrier receiver, and multicarrier wireless communication method
CN102387108B (en) Transmission method and device for physical random access channel signal
CN101208922A (en) Timing control in orthogonal frequency division multiplex systems based on effective signal-to-noise ratio
CN101409584A (en) Random access preamble and receive scheme for radio communication system
CN101771644B (en) Joint detection and soft decision decoding-based signal receiving method
KR100838456B1 (en) OFDM system using preamble symbol and method for designing the preamble symbol and method for acquiring timing/frequency synchronization
CN101702704A (en) Receiving and transmitting method of multi-carrier spread spectrum with synchronous time domain, device and system thereof
CN101888360A (en) Method, device and related system for transmitting random access signals
CN101222459A (en) Pilot frequency insertion and channel estimation method of frequency domain equalization system
EP1994701A1 (en) Identification of maximum cyclic deley in an ofdm system based on coherence bandwith of the channel
CN101800728A (en) OFDM (Orthogonal Frequency Division Multiplexing) related coefficient signal-to-noise ratio estimation algorithm
CN101820407B (en) Serial interference cancellation based frequency domain initial ranging method and system
CN101170812A (en) A signal receiving method for base station receiver

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180817

Address after: 201411 No. 2118 Fengxin Road, Fengcheng Town, Fengxian District, Shanghai.

Patentee after: Shanghai Jinuoshi Automobile Parts Co., Ltd.

Address before: 200050, 32 tower, Zhaofeng building, 1027 Changning Road, Changning District, Shanghai.

Patentee before: Sanghai Radio Communication Research Center

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190530

Address after: 200120 118, 20, 1-42 Lane 83, Hongxiang North Road, Wanxiang Town, Pudong New Area, Shanghai.

Patentee after: Shanghai Yan Jing Information Technology Co., Ltd.

Address before: 201411 No. 2118 Fengxin Road, Fengcheng Town, Fengxian District, Shanghai.

Patentee before: Shanghai Jinuoshi Automobile Parts Co., Ltd.

TR01 Transfer of patent right