CN101753257A - Method and device for differentiating a modulation code scheme corresponding to a wireless block and terminal - Google Patents

Method and device for differentiating a modulation code scheme corresponding to a wireless block and terminal Download PDF

Info

Publication number
CN101753257A
CN101753257A CN200810207529A CN200810207529A CN101753257A CN 101753257 A CN101753257 A CN 101753257A CN 200810207529 A CN200810207529 A CN 200810207529A CN 200810207529 A CN200810207529 A CN 200810207529A CN 101753257 A CN101753257 A CN 101753257A
Authority
CN
China
Prior art keywords
bit sequence
frame bit
modulation
stealing
coding scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200810207529A
Other languages
Chinese (zh)
Other versions
CN101753257B (en
Inventor
王之曦
尹丽坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Shanghai Huawei Technologies Co Ltd
Original Assignee
Shanghai Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Huawei Technologies Co Ltd filed Critical Shanghai Huawei Technologies Co Ltd
Priority to CN 200810207529 priority Critical patent/CN101753257B/en
Priority to PCT/CN2009/075263 priority patent/WO2010069224A1/en
Publication of CN101753257A publication Critical patent/CN101753257A/en
Application granted granted Critical
Publication of CN101753257B publication Critical patent/CN101753257B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/0012Modulated-carrier systems arrangements for identifying the type of modulation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a method for differentiating a modulation code scheme corresponding to a wireless block, which comprises the following steps: obtaining stealing frame bit sequences in a RTTI Block; comparing the stealing frame bit sequences with all stealing frame bit sequences possibly carried by the RTTI Block and finding a stealing frame bit sequence closest to the stealing frame bit sequences from all the stealing frame bit sequences possibly carried by the RTTI Block; and determining the modulation code scheme corresponding to the RTTI Block according to the stealing frame bit sequence closest to the stealing frame bit sequences. The invention also provides a device for differentiating the modulation code scheme corresponding to the wireless block and a terminal. In the embodiment of the invention, the obtained modulation code scheme corresponding to the RTTI Block is determined through comparing the obtained stealing frame bit sequences with all the stealing frame bit sequences possibly carried by the RTTI Block. Therefore, the embodiment of the invention achieves the purpose of determining the modulation code scheme corresponding to the RTTI Block.

Description

Distinguish method, device and the terminal of the Modulation and Coding Scheme of radio block correspondence
Technical field
The present invention relates to wireless communication technology, relate in particular to the technology of the Modulation and Coding Scheme of distinguishing radio block (Block) use.
Background technology
At global mobile communication (GSM, Global System for Mobile communications), GPRS (GPRS, General Packet Radio Service) in system, enhancing GPRS (EGPRS) network, Temporary Block Flow (TBF, Temporary Block Flow) be travelling carriage (MS, Mobile Station) interim connection and between the network side, only just existence in the process of data forwarding.A TBF can go up at one or more Packet Data Channels (PDCH, Packet Data Channel) and use Radio Resource.Transfer of data is radio block (Block) at the minimum scheduling unit of physical layer.(TS, Timeslot) (burst Burst) forms each radio block, and lays respectively at 4 continuous time division multiple accesses access (TDMA, Time Division Multiple Access) frames by 4 time slots.A tdma frame is made up of 8 time slots, is generally 5ms, so, Transmission Time Interval (the TTI of each radio block, Transmission Timing Interval) all be 20ms, such radio block also can be called basic Transmission Time Interval (BTTI, Basic TTI) Block.
One of target of GPRS, EGPRS evolution is exactly to reduce the time delay of Transmission Time Interval.Be the time delay of the Transmission Time Interval that reduces radio block, those skilled in the art have proposed minimizing Transmission Time Interval (RTTI, Reduced TTI) technology.In the RTTI technology, keep the big or small constant of each radio block, by increasing the multi-slot bandwidth, utilize multi-slot that TTI is reduced to 10ms in time domain.BTTI Block is shown in B1 among Fig. 1; RTTI Block promptly, has used the radio block of RTTI technology shown in B2 among Fig. 1, be made up of 4 time slots that are distributed in 2 continuous tdma frames.As seen from Figure 1, the RTTI technology makes TTI reduce to 10ms really.
After introducing the RTTI technology, radio block or go up transmission at a PDCH (during the BTTI configuration), at a PDCH (during the RTTI configuration) gone up transmission, that is to say, radio block or go up transmission at a time slot (during the BTTI configuration), or (during the RTTI configuration) gone up transmission at a time slot.The PDCH that network side uses for the MS assignment by control information (or PDCH to).When TBF was the TBF (hereinafter referred BTTI TBF) of BTTI configuration, the radio block of channel was BTTIBlock; When TBF was the TBF (hereinafter referred RTTI TBF) of RTTI configuration, the radio block of channel was RTTI Block.In addition, RTTI TBF has two kinds of uplink state sign (USF, UplinkState Flag) patterns (mode): BTTI USF mode and RTTI USF mode.
After introducing the RTTI technology, for Gaussian-filtered minimum shift keying (GMSK, Gaussian FilteredMinimum Shift Keying) modulation, the Modulation and Coding Scheme that is used for the RTTI Block correspondence of signaling transmission is Modulation and Coding Scheme (MCS, Modulation and Coding Scheme)-0 or encoding scheme (CS, Coding Scheme)-1, the Modulation and Coding Scheme that is used for the RTTI Block correspondence of transfer of data is MCS-1, MCS-2, MCS-3 or MCS-4 (hereinafter referred MCS-1~4).Here need to prove, when network side (generally being meant the base station) sends information to MS, Radio Link need be controlled (RLC, Radio Link Control)/medium access control (MAC, Media Access Control) Ceng RLC/MAC piece modulating-coding is the radio block of physical layer, when modulating-coding, needs to use a kind of Modulation and Coding Scheme, like this, the radio block that obtains behind the modulating-coding is with regard to corresponding a kind of Modulation and Coding Scheme.
In up appointment process (when MS sends information to the base station), MS can determine that USF mode is RTTI USF mode or BTTI USF is mode, under BTTI USF mode, is used for the always corresponding MCS-0 of RTTI Block of signaling transmission; Under RTTI USF mode, be used for signaling transmission the RTTIBlock correspondence be CS-1 or MCS-0, to distinguish what be used for RTTI Block correspondence that signaling transmits be CS-1 or MCS-0 to flag of frame/the steal frame bit (Stealing Flags/Stealing Bits) of stealing that MS can be by checking RTTI Block.
But, the present inventor finds in realizing process of the present invention: in the downstream assigned process (when the base station sends information to MS), though it is that it has assigned RTTI TBF that MS can determine network side, but owing to do not comprise USF mode information in the downstream assigned message, so which kind of Modulation and Coding Scheme what MS can not determine the RTTIBlock correspondence is, MS can not determine that the StealingBits among the RTTI Block is 20ms form (if RTTI TBF is BTTI USF mode) or 10ms form (if RTTI TBF is RTTI USF mode).In brief, when MS received the RTTIBlock that network side sends, which kind of Modulation and Coding Scheme what can't determine RTTI Block correspondence was.
Summary of the invention
The embodiment of the invention provides method, device and the terminal of the Modulation and Coding Scheme of distinguishing the radio block correspondence, in order to determine the Modulation and Coding Scheme of radio block correspondence.
A kind of method of distinguishing the Modulation and Coding Scheme of radio block correspondence comprises: obtain the frame bit sequence steathily among the RTTI Block; Described all of stealing that the frame bit sequence may carry with RTTI Block are respectively stolen the frame bit sequence compare, steal from described all that may carry and find the frame bit sequence and the described immediate frame bit sequence of stealing of frame bit sequence of stealing; According to described with steal the immediate frame bit sequence of stealing of frame bit sequence and determine the corresponding Modulation and Coding Scheme of described RTTI Block.
A kind of device of distinguishing the Modulation and Coding Scheme of radio block correspondence comprises: obtain the unit, be used for obtaining the frame bit sequence steathily of RTTI Block; Comparing unit, be used for that described all of stealing that the frame bit sequence may carry with RTTI Block respectively that described acquisition unit obtains are stolen the frame bit sequence and compare, steal from described all that may carry and find the frame bit sequence and the described immediate frame bit sequence of stealing of frame bit sequence of stealing; Determining unit, that be used for finding according to described comparing unit and the described immediate frame bit sequence of stealing of frame bit sequence of stealing are determined the Modulation and Coding Scheme of described RTTI Block correspondence.
A kind of terminal comprises the device of the Modulation and Coding Scheme of above-mentioned differentiation radio block correspondence.
In an embodiment of the present invention, frame bit sequence and RTTI Block may carry that all are stolen the frame bit sequence and compare by stealing of will obtaining, thereby determine the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition.Therefore, the embodiment of the invention has reached the purpose of the Modulation and Coding Scheme of definite radio block correspondence.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic diagram of the BTTI Block of prior art;
Fig. 2 A is the form schematic diagram of the Stealing Bits among the BTTI Block of corresponding MCS-1~4;
Fig. 2 B is the form schematic diagram of the Stealing Bits among the BTTI Block of corresponding CS-1;
Fig. 3 is the form schematic diagram of the Stealing Bits of RTTI Block when BTTI USF pattern of corresponding MCS-0~4;
Fig. 4 A is the form schematic diagram of the Stealing Bits of RTTI Block when RTTI USF pattern of corresponding CS-1;
Fig. 4 B is the form schematic diagram of the Stealing Bits of RTTI Block when RTTI USF pattern of corresponding MCS-0~4;
Fig. 5 is a kind of method flow diagram of distinguishing the Modulation and Coding Scheme of radio block correspondence of the embodiment of the invention;
Fig. 6 is a kind of apparatus structure schematic diagram of distinguishing the Modulation and Coding Scheme of radio block correspondence of the embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
More clearly understand the embodiment of the invention for ease of those skilled in the art, some technology points that at first following embodiment related to describe here.
The Modulation and Coding Scheme that is used for the BTTI Block correspondence of signaling transmission is CS-1, and the Modulation and Coding Scheme that is used for the BTTI Block correspondence of transfer of data is MCS-1~4.MS can use the Stealing Bits among the BTTI Block to distinguish CS-1 and MCS-1~4.The form of Stealing Bits of BTTI Block that uses MCS-1~4 shown in 8 bits of Fig. 2 A, promptly 00010110; The form of Stealing Bits of BTTIBlock that uses CS-1 shown in 8 bits of Fig. 2 B, promptly 11111111.In addition, TB represents the tail bit, and TS represents training sequence, and B0, B1, B2, B3 represent the 0th Burst, the 1st Burst, the 2nd Burst, the 3rd Burst respectively.
When RTTI TBF used BTTI USF pattern, the Modulation and Coding Scheme that is used for the RTTI Block correspondence of signaling transmission was MCS-0, and the Modulation and Coding Scheme that is used for the RTTI Block correspondence of transfer of data is MCS-1~4.MS can use the coding punching scheme indication (CPS, Coding and Puncturing Scheme) in the RLC/MAC head of RLC/MAC piece to distinguish MCS-0 and MCS-1~4.At this moment, MS can not use Stealing Bits to distinguish MCS-0 and MCS-1~4, because the StealingBits of their correspondences is identical.As shown in Figure 3, shown in 8 bits in the form di sopra frame of broken lines of the Stealing Bits among the RTTIBlock of corresponding MCS-1~4 or MCS-0 preceding 10 milliseconds (ms), promptly 00000101; The form of Stealing Bits among the RTTI Block of the back 10ms of corresponding MCS-1~4 or MCS-0 shown in 8 bits in the following frame of broken lines, promptly 01011010; Wherein, preceding 10ms here and back 10ms are meant preceding 10ms and the back 10ms in the same 20ms cycle, and the 20ms cycle begins from the base station to begin to calculate to MS transmission information.
When RTTI TBF used RTTI USF pattern, the Modulation and Coding Scheme that is used for the RTTI Block correspondence of signaling transmission was CS-1 or MCS-0, and the Modulation and Coding Scheme that is used for the RTTI Block correspondence of transfer of data is MCS-1~4.If that the Stealing Bits correspondence among the MS discovery RTTI Block is CS-1, then MS just can make a distinction the RTTI Block of corresponding CS-1 and the RTTI Block of corresponding MCS-1~4/MCS-0; If that the Stealing Bits correspondence among the MS discovery RTTI Block is MCS-1~4/MCS-0, then MS can remove to check the CPS in the RLC/MAC build, so just the RTTI Block of corresponding MCS-0 and the RTTI Block of corresponding MCS1-4 can be made a distinction.The form of Stealing Bits among the RTTI Block of the preceding 10ms of corresponding MCS-1~4 or MCS-0 and back 10ms shown in 8 bits of Fig. 4 A, promptly 00010110; The form of Stealing Bits among the RTTI Block of the preceding 10ms of corresponding CS-1 and back 10ms shown in 8 bits of Fig. 4 B, promptly 11111111.
Owing to hereinafter need to mention once more the form (also can be called Stealing Bits sequence) of Stealing Bits, so for ease of quoting the form of Stealing Bits, the embodiment of the invention illustrates the form of Stealing Bits with the form of table 1.
The definition of Stealing Bits The preceding 10ms of 20ms block period The back 10ms of 20ms block period
The RTTI Block of corresponding MCS-1~4 is when BTTI USF pattern ??③0,0,0,0,0,1,0,1 ??④0,1,0,1,1,0,1,0
The RTTI Block of corresponding MCS-0 is when BTTI USF pattern ??0,0,0,0,0,1,0,1 ??0,1,0,1,1,0,1,0
The RTTI Block of corresponding MCS-1~4 is when RTTI USF pattern ??②0,0,0,1,0,1,1,0 ??0,0,0,1,0,1,1,0
The RTTI Block of corresponding MCS-0 is when RTTI USF pattern ??0,0,0,1,0,1,1,0 ??0,0,0,1,0,1,1,0
The RTTI Block of corresponding CS-1 is when RTTI USF pattern ??①1,1,1,1,1,1,1,1 ??1,1,1,1,1,1,1,1
Table 1
A kind of method of distinguishing the Modulation and Coding Scheme of radio block correspondence to the embodiment of the invention describes below.As shown in Figure 5, comprising:
S501: obtain the frame bit sequence steathily among the RTTI Block.
In actual applications, when the base station sends information to MS, need earlier to use a kind of Modulation and Coding Scheme that RLC/MAC piece modulating-coding is radio block, again radio block is issued MS afterwards, wherein, radio block carries Stealing Bits sequence.MS can obtain StealingBits sequence wherein after obtaining RTTI Block fully.
In addition, put down in writing according to prior protocols, begin when MS sends information every 20ms from the base station and be one-period (, the BTTI Block cycle), in cycle, the base station can send two RTTI Block to MS at every 20ms, and the respectively corresponding 10ms of each RTTI Block (promptly, the RTTI Block cycle), and the Modulation and Coding Scheme of two RTTI Block correspondences identical.So the RTTI Block of acquisition also can be described as the RTTI Block of preceding 10ms in certain 20ms cycle or the RTTI Block of the back 10ms in certain 20ms cycle.
S502: described all of stealing that the frame bit sequence may carry with RTTI Block are respectively stolen the frame bit sequence compare, steal from described all that may carry and find the frame bit sequence and the described immediate frame bit sequence of stealing of frame bit sequence of stealing.
If the RTTI Block that obtains is the RTTI Block of the preceding 10ms of 20ms in the cycle, then all the Stealing Bits sequences that may carry of the RTTI Block of Huo Deing are three kinds of Stealing Bits sequences may carrying of the RTTI Block of the preceding 10ms shown in the table 1 (in tables 1 1. 2. 3.); If the RTTI Block that obtains is the RTTI Block of the back 10ms of 20ms in the cycle, then all the Stealing Bits sequences that may carry of the RTTI Block of Huo Deing are three kinds of Stealing Bits sequences may carrying of the RTTI Block of the back 10ms shown in the table 1 (in tables 1 1. 2. 4.).
In actual applications, the transmission of information via wireless channel can be interfered, and so just may cause the bit sequence of the bit sequence that receives and former transmission not quite identical, and to this, the recipient can be judged to be former transmission value with the probable value the most close with the reception value.
So, in embodiments of the present invention, after the acquisition Stealing Bits sequence, Stealing Bits sequence can be compared with all Stealing Bits sequences that RTTI Block may carry respectively.For example, if the RTTI Block that obtains is the RTTI Block of the preceding 10ms in a 20ms cycle, so just the Stealing Bits sequence of acquisition is compared with three kinds of Stealing Bits sequences that the RTTI Block of the preceding 10ms shown in the table 1 may carry respectively; If the RTTI Block that obtains is the RTTI Block of the back 10ms in a 20ms cycle, so just the Stealing Bits sequence of acquisition is compared with three kinds of Stealing Bits sequences that the RTTI Block of the back 10ms shown in the table 1 may carry respectively.After the comparison, the immediate Stealing Bits of the Stealing Bits sequence sequence that from all Stealing Bits sequences that RTTI Block may carry, finds and obtain.
Degree of closeness between all Stealing Bits sequences that Stealing Bits sequence that obtains and RTTI Block may carry can use Hamming distance to weigh.Like this, from all Stealing Bits sequences that RTTI Block may carry, find and the immediate Stealing Bits of the Stealing Bits sequence sequence that obtains finds from all Stealing Bits sequences that RTTI Block may carry in fact exactly and the Stealing Bits sequence that obtains between the Stealing Bits sequence of Hamming distance minimum.
Introduce Hamming distance below.
In a code character set, the number of the position that upward the code element value is different, corresponding position is defined as the Hamming distance between these two code words between any two code words.That is,
Figure G2008102075295D0000061
Here, i=0,1 ..n-1, x, y are the codings of n position,
Figure G2008102075295D0000062
The expression XOR.For example, 00 and 01 distance is that 1,110 and 101 distance is 2.
In a code character set, the minimum value of Hamming distance is called the smallest hamming distance of this code character between any two codings.
Briefly, in embodiments of the present invention, so-called Hamming distance is exactly a corresponding bit value number inequality between two bit sequences, for example, and bit sequence " 1,1; 1,1,1,1,1,1 " and " 0; 0,0,1,0,1,1; 0 " Hamming distance be 5, the Hamming distance of " 0,0,0,1,0; 1,1,0 " and " 0,0,0; 0,0,1,0,1 " is 3.Hamming distance is big more between two bit sequences, easy more differentiation.Hamming distance between two bit sequences is zero, shows that then two bit sequences are identical.Hamming distance between two bit sequences is more little, shows that then two bit sequences are approaching more.
S503: according to described with steal the immediate frame bit sequence of stealing of frame bit sequence and determine the Modulation and Coding Scheme that described RTTIBlock is corresponding.
Concrete, if described that find and the only corresponding a kind of Modulation and Coding Scheme of the immediate Stealing Bits of Stealing Bits sequence sequence that obtains can determine that then described Modulation and Coding Scheme is the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition.For example, suppose that the RTTI Block that obtains is the RTTI Block of the preceding 10ms in the 20ms cycle, after three kinds of Stealing Bits sequences that Stealing Bits sequence among the RTTI Block that obtains may be carried with the RTTI Block of the preceding 10ms shown in the table 1 are respectively compared, if Stealing Bits sequence and sequence among the RTTI Block that obtains are 1. the most approaching, so because the 1. only corresponding CS-1 of sequence, thus can directly determine acquisition RTTI Block correspondence be CS-1.
If described that find and the corresponding multiple Modulation and Coding Scheme of the immediate Stealing Bits of Stealing Bits sequence sequence that obtains are then distinguished the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition for the CPS in the build of the RLC/MAC piece of the RTTI Block of acquisition according to modulating-coding.For example, suppose that the RTTI Block that obtains is the RTTI Block of the back 10ms in the 20ms cycle, after three kinds of Stealing Bits sequences that Stealing Bits sequence among the RTTI Block that obtains may be carried with the RTTI Block of the back 10ms shown in the table 1 are respectively compared, if Stealing Bits sequence and sequence among the RTTI Block that obtains are 2. the most approaching, so since sequence 2. corresponding be MCS-0 or these 5 kinds of Modulation and Coding Scheme of MCS-1~4, so must need to use CPS in the build of RLC/MAC piece distinguish acquisition RTTI Block correspondence be which kind of Modulation and Coding Scheme.
If described that find and the immediate Stealing Bits of the Stealing Bits sequence sequence that obtains are multiple Stealing Bits sequences, then Modulation and Coding Scheme that can the Stealing Bits sequence of the RTTI Block of the other 10ms of same 20ms in the cycle that obtain is corresponding with immediate Stealing Bits sequence in three kinds of Stealing Bits sequences that the RTTI Block of described other 10ms may carry is as the corresponding Modulation and Coding Scheme of RTTI Block of acquisition.Mentioned above, the Modulation and Coding Scheme of two radio blocks in the same 20ms cycle is identical, like this, if by the Stealing Bits sequence among the RTTI Block who obtains can not be clear and definite the Modulation and Coding Scheme of determining this RTTI Block correspondence, which kind of Modulation and Coding Scheme what can determine RTTT Block correspondence by the Stealing Bits sequence among another RTTI Block in same 20ms cycle of obtaining so is on earth.Concrete logical relation is that 1. the sequence of 10ms correspondence all is before and after the CS-1; 2. the sequence of 10ms correspondence all is before and after the RTTI USF pattern situation of MCS-0 or MCS1-4; 3. the sequence of 10ms correspondence is before the BTTI USF pattern situation of MCS-0 or MCS1-4, and 4. the sequence of back 10ms correspondence is.
For example, suppose that Stealing Bits sequence and the sequence shown in the table 1 among the RTTI Block of the preceding 10ms that obtains are 1. 2. the most approaching equally with sequence, at this moment, three Stealing Bits sequences may carrying of the RTTI Block of Stealing Bits sequence among the RTTI Block of the back 10ms that will obtain and the back 10ms shown in the table 1 are compared again, if Stealing Bits sequence and sequence among the RTTI Block of back 10ms are 1. the most approaching, that then can determine the RTTI Block correspondence that obtains is CS-1.In like manner, if Stealing Bits sequence and sequence among the RTTI Block of back 10ms are 2. the most approaching, can determine tentatively that then Stealing Bits sequence and sequence among the RTTI Block of the preceding 10ms that obtains are 2. the most approaching, distinguish the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition afterwards again according to the CPS in the build of RLC/MAC piece.Certainly, the Stealing Bits sequence among the RTTI Block of preceding 10ms also may be 3. the most approaching with sequence, at this moment, can take corresponding means according to actual conditions.For example, if Stealing Bits sequence among the RTTI Block of back 10ms and sequence degree of closeness 4. are greater than the Stealing Bits sequence among the RTTIBlock of back 10ms and sequence 1. or sequence degree of closeness 2., can determine tentatively that so Stealing Bits sequence and sequence among the RTTI Block of the preceding 10ms that obtains are 3. the most approaching, distinguish the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition afterwards again according to the CPS in the build of RLC/MAC piece.Again for example, 1. or sequence degree of closeness 2. if Stealing Bits sequence before Stealing Bits sequence among the RTTI Block of preceding 10ms and sequence degree of closeness 3. equal among the RTTI Block of 10ms and sequence, and the situation of combination back 10ms, 1. or sequence degree of closeness 2. StealingBits sequence among the RTTI Block of back 10ms and sequence degree of closeness 4. equal Stealing Bits sequence among the RTTI Block of back 10ms and sequence, illustrate that then the error rate is bigger probably, at this moment, directly the three select one or the mode that re-uses blind check determine the Modulation and Coding Scheme of the RTTI Block correspondence that obtains.Certainly, if Stealing Bits sequence and the sequence shown in the table 1 among the RTTI Block of the preceding 10ms that obtains are 1. 2. the most approaching equally with sequence, and the situation of combination back 10ms, Stealing Bits sequence among the RTTIBlock of back 10ms and sequence degree of closeness 1. equal and sequence degree of closeness 2., then direct either-or or use the mode of blind check to determine the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition.Description about blind check sees also hereinafter, repeats no more here.In actual applications, those skilled in the art can also use other modes solve the Stealing Bits sequence of acquisition and a plurality of sequence equally near the time definite problem of Modulation and Coding Scheme, enumerate more execution mode here no longer one by one.
Here need to prove that the executive agent of step S501, S502 and S503 can be terminal, for example MS.
Method shown in Figure 5 can realize by the device of various ways, wherein a kind of distinguish the radio block correspondence Modulation and Coding Scheme device as shown in Figure 6, comprising: obtain unit 601, what be used for obtaining RTTIBlock steals the frame bit sequence; Comparing unit 602, be used for that described all of stealing that the frame bit sequence may carry with RTTI Block respectively that described acquisition unit 601 obtains are stolen the frame bit sequence and compare, steal from described all that may carry and find the frame bit sequence and the described immediate frame bit sequence of stealing of frame bit sequence of stealing; Determining unit 603 is used for the described comparing unit 602 immediate frame bit sequences steathily of frame bit sequence of stealing that find and described are determined the Modulation and Coding Scheme of described RTTI Block correspondence as at least one foundation.
In actual applications, when the base station sends information to MS, need earlier to use a kind of Modulation and Coding Scheme that RLC/MAC piece modulating-coding is radio block, again radio block is issued MS afterwards, wherein, radio block carries Stealing Bits sequence.In this embodiment, obtain RTTI Block, after acquisition unit 601 obtains RTTI Block, can obtain Stealing Bits sequence wherein fully by obtaining unit 601.
If obtaining the RTTI Block that unit 601 obtains is the RTTIBlock of the preceding 10ms of 20ms in the cycle, then obtain all Stealing Bits sequences that RTTI Block that unit 601 obtains may carry and be three kinds of Stealing Bits sequences that the RTTI Block of the preceding 10ms shown in the table 1 may carry (in the table 1 1. 2. 3.); If obtaining the RTTI Block that unit 601 obtains is the RTTI Block of the back 10ms of 20ms in the cycle, then obtain all StealingBits sequences that RTTI Block that unit 601 obtains may carry and be three kinds of Stealing Bits sequences that the RTTI Block of the back 10ms shown in the table 1 may carry (in the table 1 1. 2. 4.).
In actual applications, the transmission of information via wireless channel can be interfered, and so just may cause the bit sequence of the bit sequence that receives and former transmission not quite identical, and to this, the recipient can be judged to be former transmission value with the probable value the most close with the reception value.
So in embodiments of the present invention, after acquisition unit 601 obtained Stealing Bits sequences, comparing unit 602 can be compared Stealing Bits sequence respectively with all StealingBits sequences that RTTI Block may carry.For example, if obtaining the RTTI Block that unit 601 obtains is the RTTI Block of the preceding 10ms in a 20ms cycle, comparing unit 602 is just compared the Stealing Bits sequence of acquisition respectively with three kinds of Stealing Bits sequences that the RTTI Block of the preceding 10ms shown in the table 1 may carry so; If obtaining the RTTI Block that unit 601 obtains is the RTTI Block of the back 10ms in a 20ms cycle, comparing unit 602 is just compared the Stealing Bits sequence of acquisition respectively with three kinds of Stealing Bits sequences that the RTTI Block of the back 10ms shown in the table 1 may carry so.After comparing unit 602 is compared, the immediate Stealing Bits of the Stealing Bits sequence sequence that from all Stealing Bits sequences that RTTI Block may carry, finds and obtain.
Degree of closeness between all Stealing Bits sequences that Stealing Bits sequence that acquisition unit 601 obtains and RTTI Block may carry can use Hamming distance to weigh.Like this, comparing unit 602 finds from all Stealing Bits sequences that RTTI Block may carry and the immediate Stealing Bits of the StealingBits sequence sequence that obtains finds and obtain the Stealing Bits sequence of Hamming distance minimum between the Stealing Bits sequence that unit 601 obtains in fact exactly from all Stealing Bits sequences that RTTI Block may carry.
Determining unit 603 can comprise discriminating module, if be used for the only corresponding a kind of Modulation and Coding Scheme of described comparing unit 602 Stealing Bits sequence that find and described immediate Stealing Bits sequences, then discriminating module can determine directly that described Modulation and Coding Scheme is the Modulation and Coding Scheme of described RTTI Block correspondence.For example, suppose that the RTTI Block that acquisition unit 601 obtains is the RTTI Block of the preceding 10ms in the 20ms cycle, comparing unit 602 will obtain three kinds of Stealing Bits sequences that the Stealing Bits sequence among the RTTI Block that unit 601 obtains may carry with the RTTI Block of the preceding 10ms shown in the table 1 respectively compare after, if Stealing Bits sequence and sequence among the RTTI Block that acquisition unit 601 obtains are 1. the most approaching, so because the 1. only corresponding CS-1 of sequence, thus discriminating module can directly determine acquisition RTTI Block correspondence be CS-1.
If the corresponding multiple Modulation and Coding Scheme of the described comparing unit 602 immediate StealingBits sequences of Stealing Bits sequence that find and described, then discriminating module can be the Modulation and Coding Scheme that CPS in the build of RLC/MAC piece of described RTTIBlock distinguishes described RTTI Block correspondence according to modulating-coding.For example, suppose that the RTTI Block that acquisition unit 601 obtains is the RTTI Block of the back 10ms in the 20ms cycle, comparing unit 602 will obtain three kinds of Stealing Bits sequences that the Stealing Bits sequence among the RTTI Block that unit 601 obtains may carry with the RTTI Block of the back 10ms shown in the table 1 respectively compare after, if Stealing Bits sequence and sequence among the RTTI Block that acquisition unit 601 obtains are 2. the most approaching, so since sequence 2. corresponding be MCS-0 or these 5 kinds of Modulation and Coding Scheme of MCS-1~4, so discriminating module must need to use CPS in the build of RLC/MAC piece distinguish acquisition RTTI Block correspondence be which kind of Modulation and Coding Scheme.
Determining unit 603 also can comprise discriminating module; If being used for described comparing unit 602 that find is multiple Stealing Bits sequences with obtaining the immediate Stealing Bits of the Stealing Bits sequence sequences that unit 601 obtains, the Modulation and Coding Scheme that then discriminating module can be corresponding with immediate Stealing Bits sequence in three kinds of Stealing Bits sequences that the RTTI Block of described other 10ms may carry with the Stealing Bits sequence of the RTTI Block of the other 10ms of same 20ms in the cycle that obtain is as Modulation and Coding Scheme corresponding to the RTTI Block of acquisition. Mentioned above, the Modulation and Coding Scheme of two radio blocks in the same 20ms cycle is identical, like this, if discriminating module by the Stealing Bits sequence among the RTTI Block who obtains unit 601 and obtain can not be clear and definite the Modulation and Coding Scheme of determining this RTTI Block correspondence, which kind of Modulation and Coding Scheme what discriminating module can be determined RTTI Block correspondence by the Stealing Bits sequence among another RTTI Block that obtains the same 20ms cycle that unit 601 obtains so is on earth.For example, Stealing Bits sequence and the sequence shown in the table 1 supposing to obtain among the RTTIBlock of the preceding 10ms that unit 601 obtains are 1. 2. the most approaching equally with sequence, at this moment, three Stealing Bits sequences that Stealing Bits sequence among the RTTI Block of the back 10ms that comparing unit 602 will obtain again and the RTTI Block of the back 10ms shown in the table 1 may carry are compared, if Stealing Bits sequence and sequence among the RTTI Block of back 10ms are 1. the most approaching, that then discriminating module can be determined the RTTI Block correspondence that obtains is CS-1.In like manner, if Stealing Bits sequence and sequence among the RTTI Block of back 10ms are 2. the most approaching, then discriminating module can determine tentatively that Stealing Bits sequence and sequence among the RTTI Block of the preceding 10ms that obtains are 2. the most approaching, distinguishes the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition afterwards again according to the CPS in the build of RLC/MAC piece.Certainly, the Stealing Bits sequence among the RTTI Block of preceding 10ms also may be 3. the most approaching with sequence, and at this moment, discriminating module can be taked corresponding means according to actual conditions.For example, if Stealing Bits sequence among the RTTI Block of back 10ms and sequence degree of closeness 4. are greater than the Stealing Bits sequence among the RTTIBlock of back 10ms and sequence 1. or sequence degree of closeness 2., discriminating module can determine tentatively that Stealing Bits sequence and sequence among the RTTI Block of the preceding 10ms that obtains are 3. the most approaching so, distinguishes the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition afterwards again according to the CPS in the build of RLC/MAC piece.Again for example, 1. or sequence degree of closeness 2. if Stealing Bits sequence before Stealing Bits sequence among the RTTI Block of preceding 10ms and sequence degree of closeness 3. equal among the RTTI Block of 10ms and sequence, and the situation of combination back 10ms, 1. or sequence degree of closeness 2. Stealing Bits sequence among the RTTI Block of back 10ms and sequence degree of closeness 4. equal Stealing Bits sequence among the RTTI Block of back 10ms and sequence, illustrate that then the error rate is bigger probably, at this moment, discriminating module directly the three select one or the mode that re-uses blind check determine the Modulation and Coding Scheme of the RTTIBlock correspondence that obtains.Certainly, if Stealing Bits sequence and the sequence shown in the table 1 among the RTTI Block of the preceding 10ms that obtains are 1. 2. the most approaching equally with sequence, and the situation of combination back 10ms, Stealing Bits sequence among the RTTI Block of back 10ms and sequence degree of closeness 1. equal and sequence degree of closeness 2., then the direct either-or or use the mode of blind check to determine the Modulation and Coding Scheme of the RTTI Block correspondence of acquisition of discriminating module.In actual applications, discriminating module can also use other modes solve the Stealing Bits sequence of acquisition and a plurality of sequence equally near the time definite problem of Modulation and Coding Scheme, enumerate more execution mode here no longer one by one.
Need to prove that each unit in the device shown in Figure 6 can be arranged in the terminal (for example MS), the working method of these unit in terminal is identical with working method in device shown in Figure 6, repeats no more here.Treatment technology below in conjunction with Hamming distance is elaborated to the embodiment of the invention again.
Suppose that the Stealing Bits sequence among the RTTI Block that MS receives is A, the sequence shown in A and the table 1 1. Hamming distance of " 1,1,1,1,1; 1,1,1 " is designated as d1, and A and the sequence 2. Hamming distance of " 0,0,0; 1,0,1,1,0 " are designated as d2, A and sequence 3. " 0; 0,0,0,0,1,0; 1 " Hamming distance be designated as d3, A and the sequence 4. Hamming distance of " 0,1,0,1; 1,0,1,0 " are designated as d4, the minimum value among d1, d2, d3, the d4 can show that A and which sequence are the most approaching.
For the RTTI Block of preceding 10ms, judge A and sequence 1., 2., which sequence in 3. is the most approaching, promptly judges which minimum among d1, d2, the d3.In like manner, for the RTTI Block of back 10ms, judge A and sequence 1., 2., which sequence in 4. is the most approaching, promptly judges which minimum among d1, d2, the d4.
Simultaneously, no matter be which kind of USF mode, the CPS in the build of MS use RLC/MAC piece distinguishes the RTTI Block that is used for the signaling transmission of corresponding MCS-0 and the RTTI Block that is used for transfer of data of MCS-1~4 of correspondence.
Use a kind of determination methods of Hamming distance as follows:
RTTI Block for preceding 10ms:
Ifd1<=2, d1<d2 then, d3 shows that A and sequence are 1. the most approaching;
1. or 3. the most approaching Else if 2<d1=d3, and d1<d2 then show A and sequence, at this moment, desirable A be sequence 3. or get A be sequence 1.;
ElseA should be min (d1, d2, d3) a Dui Ying sequence.
RTTI Block for back 10ms:
If d1=1, d1<d2 then, d4 shows that A and sequence are 1. the most approaching;
1. or 4. the most approaching Else if 1<d1=d4<d2 shows that then A and sequence;
Else A should be min (d1, d2, d4) a Dui Ying sequence.
Above-mentioned determination methods also can be reduced to following form:
RTTI Block for preceding 10ms:
IF 2<d1=d3<d2 shows that then 1. A should be or 3., 1. 3. desirable A is or gets A is;
Else A should be min (d1, d2, d3) a Dui Ying sequence.
RTTI Block for back 10ms:
1. or 4. IF 1<d1=d4<d2 shows that then A should be;
Else A should be min (d1, d2, d4) a Dui Ying sequence.
Simpler, above-mentioned determination methods can further be reduced to following form:
RTTI Block for preceding 10ms:
IF d1=d3<d2 shows that then 1. A should be or 3., 1. 3. desirable A is or gets A is;
Else A should be min (d1, d2, d3) a Dui Ying sequence.
RTTI Block for back 10ms:
1. or 4. IF d1=d4<d2 shows that then A should be;
Else A should be min (d1, d2, d4) a Dui Ying sequence.
Need to prove that the Stealing Bits that preceding 10ms and back 10ms obtain respectively may be inequality, but the Modulation and Coding Scheme of their correspondences is necessarily identical.If the Stealing Bits that preceding 10ms obtains be sequence 1., so according to shown in the table 1, the Stealing Bits of back 10ms acquisition also be sequence 1.; In like manner, if the Stealing Bits that preceding 10ms obtains be sequence 3., so the Stealing Bits that obtains of back 10ms be sequence 4.; In like manner, if the Stealing Bits that preceding 10ms obtains be sequence 2., then the Stealing Bits that obtains of back 10ms also be sequence 2..
Also need to prove, if judge A be sequence 1., so Dui Ying Modulation and Coding Scheme is exactly CS-1, corresponding radio block is the RTTIBlock that is used for the signaling transmission of the CS-1 coding of RTTI USF mode; If judge A and be sequence 2., corresponding Modulation and Coding Scheme is exactly MCS-0 or MCS-1~4, and corresponding radio block is the RTTI Block that is used for transfer of data of MCS-1~4 codings of the RTTI Block that is used for the signaling transmission of MCS-0 coding of RTTI USF mode or RTTI USF mode; If judge A and be sequence 3., corresponding Modulation and Coding Scheme is exactly MCS-0 or MCS-1~4, and corresponding radio block is the RTTI Block that is used for transfer of data of MCS-1~4 codings of the RTTI Block that is used for the signaling transmission of MCS-0 coding of BTTI USF mode or BTTI USF mode; If judge A and be sequence 4., corresponding Modulation and Coding Scheme is exactly MCS-0 or MCS-1~4, and corresponding radio block is the RTTI Block that is used for transfer of data of MCS-1~4 codings of the RTTI Block that is used for the signaling transmission of MCS-0 coding of BTTI USF mode or BTTIUSF mode; Wherein the preceding 10ms in 20ms cycle can correspondence 1., 2., 3., the back 10ms in 20ms cycle can correspondence 1., 2., 4..
If the Stealing Bits that 10ms obtains before judging be sequence 2., and judge it is MCS-0 by CPS, can determine that then corresponding radio block is the RTTI Block that is used for the signaling transmission of the MCS-0 coding of RTTI USF mode; If the Stealing Bits that 10ms obtains before judging be sequence 3., and judge it is MCS-0 by CPS, can determine that then corresponding radio block is the RTTI Block that is used for the signaling transmission of the MCS-0 coding of BTTI USF mode; If judge StealingBits that back 10ms obtains and be sequence 4., and judge it is MCS-0, can determine that then corresponding radio block is the RTTI Block that is used for the signaling transmission of the MCS-0 coding of BTTIUSF mode by CPS.
If the Stealing Bits that 10ms obtains before judging be sequence 2., and judge it is MCS-1~4 by CPS, can determine that then corresponding radio block is the RTTI Block that is used for transfer of data of MCS-1~4 codings of RTTI USF mode; If the Stealing Bits that 10ms obtains before having judged be sequence 3., and judge it is MCS-1~4 by CPS, can determine that then corresponding radio block is the RTTI Block that is used for transfer of data of MCS-1~4 codings of BTTI USF mode; If judge Stealing Bits that back 10ms obtains and be sequence 4., and judge it is MCS-0 by CPS, then Dui Ying radio block is the RTTI Block that is used for transfer of data that encodes in MCS-1~4 of BTTIUSF mode.
For the derivation of above-mentioned determination methods in the following example shown in:
For preceding 10ms, A should near bit sequence 1. " 1,1,1,1,1,1,1,1 ", 2. " 0,0,0,1,0,1,1,0 ", 3. " 0,0,0,0,0,1,0,1 " is a kind of.If d1=1 or 2, show that A should have 71 or 61, and 2., 3. sequence has only 31 or 21, thus d2>=3, d3>=4, i.e. d1<d2, d3 is so 1. A should be.
For the back 10ms, A should near bit sequence 1. " 1,1,1,1,1,1,1,1 ", 2. " 0,0,0,1,0,1,1,0 ", 4. " 0,1,0,1,1,0,1,0 " is a kind of.If d1=1, show that A should have 71, and 2., 4. sequence has only 31 or 41, thus d2>=4, d4>=3, i.e. d1<d2, d4 is so 1. A should be.If d1=2, show that then A has 61, and 2., 4. sequence has only 31 or 41, thus d2>=3, d4>=2, i.e. d1<d2, d4,1. or 4. perhaps d1=d4=2<d2 is so A should be.If d1=3, show that A has 51, and 2., 4. sequence has only 31 or 41, thus d2>=2, d4>=1, i.e. d1<d2, d4,1. or 4. perhaps d1=d4=2<d2 is so A should be.
In sum, in embodiments of the present invention, MS only need detect the StealingBits sequence of forming among the RTTI Block, certainly, sometimes need to detect the CPS in the RLC/MAC head of RLC/MAC piece, just can distinguish the Modulation and Coding Scheme of the RTTI Block that receives.In the prior art, which kind of Modulation and Coding Scheme what can clearly indicate the RTTI Block correspondence that is used for signaling transmission in downstream assigned message is, taken interface-free resources but this scheme is too much, the embodiment of the invention can be saved interface-free resources with respect to this technical scheme.In addition, the situation that the embodiment of the invention is considered covers the RTTI TBF scene of all GMSK modulation, and the embodiment of the invention has guaranteed the correctness and the success rate of the Modulation and Coding Scheme of the RTTIBlock correspondence that differentiation GMSK modulates very effectively.
In addition, the embodiment of the invention also provides a kind of method of distinguishing the Modulation and Coding Scheme of radio block correspondence, comprise: whether what check RTTI Block correspondence earlier is a certain Modulation and Coding Scheme, if, what then determine described RTTI Block correspondence is exactly this Modulation and Coding Scheme, otherwise, whether reexamine is another kind of Modulation and Coding Scheme, if, what then determine described RTTI Block correspondence is exactly described another kind of Modulation and Coding Scheme, otherwise, continue again to check whether be other Modulation and Coding Scheme, by that analogy, until determine RTTI Block correspondence be which kind of Modulation and Coding Scheme till.Abbreviate this technical scheme as blind check here.
One of ordinary skill in the art will appreciate that all or part of flow process that realizes in the foregoing description method, be to instruct relevant hardware to finish by computer program, described program can be stored in the computer read/write memory medium, this program can comprise the flow process as the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only storage memory body (Read-OnlyMemory, ROM) or at random store memory body (Random Access Memory, RAM) etc.
Need to prove that also the embodiment of the invention can realize by hardware, also can realize by software, these unit are functional element, physically can merge into a module, also can split into a plurality of submodules.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (14)

1. a method of distinguishing the Modulation and Coding Scheme of radio block correspondence is characterized in that, comprising:
Obtain to reduce the frame bit sequence steathily among the Transmission Time Interval radio block RTTI Block;
Described all of stealing that the frame bit sequence may carry with RTTI Block are respectively stolen the frame bit sequence compare, steal from described all that may carry and find the frame bit sequence and the described immediate frame bit sequence of stealing of frame bit sequence of stealing;
According to described with steal the immediate frame bit sequence of stealing of frame bit sequence and determine the corresponding Modulation and Coding Scheme of described RTTI Block.
2. the method for the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 1, it is characterized in that, if described RTTI Block is the RTTI Block of 20 milliseconds of ms preceding 10ms in the cycle, then described RTTI Block may carry all to steal the frame bit sequence be that three kinds of may carry of the RTTI Block of preceding 10ms are stolen the frame bit sequence; If described RTTI Block is the RTTI Block of the back 10ms of 20ms in the cycle, then described RTTI Block may carry all steal the frame bit sequence and may carry three kinds steal the frame bit sequence for the RTTI Block of back 10ms; Wherein, the described 20ms cycle is the cycle of calculating when beginning to send RTTI Block from the base station.
3. the method for the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 1 is characterized in that, according to described with steal the immediate frame bit sequence of stealing of frame bit sequence and determine that the corresponding Modulation and Coding Scheme of described RTTI Block comprises:
If the described immediate corresponding a kind of Modulation and Coding Scheme of frame bit sequence of stealing of frame bit sequence of stealing that find and described determines that then described Modulation and Coding Scheme is the Modulation and Coding Scheme of described RTTI Block correspondence;
If the described immediate corresponding multiple Modulation and Coding Scheme of frame bit sequence of stealing of frame bit sequence of stealing that find and described is that coding punching scheme in the build of Radio Link control RLC/ media access control MAC piece of described RTTI Block indicates CPS to distinguish the Modulation and Coding Scheme of described RTTI Block correspondence according to modulating-coding then.
4. the method for the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 1, it is characterized in that, according to described with steal the immediate frame bit sequence of stealing of frame bit sequence and determine that the corresponding Modulation and Coding Scheme of described RTTI Block comprises: if described that find and described to steal the immediate frame bit sequence of stealing of frame bit sequence be the multiple frame bit sequence of stealing, steal that frame bit sequence and the RTTI Block of described other 10ms may carry three kinds of the RTTI Block of the other 10ms in the same 20ms cycle that then will obtain steathily in the frame bit sequence the immediate steathily Modulation and Coding Scheme that the frame bit sequence is corresponding as the corresponding Modulation and Coding Scheme of described RTTIBlock.
5. the method for the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 1, it is characterized in that, it is characterized in that, according to described with steal the immediate frame bit sequence of stealing of frame bit sequence and determine that the corresponding Modulation and Coding Scheme of described RTTI Block comprises: if described that find and described to steal the immediate frame bit sequence of stealing of frame bit sequence be the multiple frame bit sequence of stealing, and steal the immediate frame bit sequences of stealing of frame bit sequence what may carry three kinds of the RTTI Block of the other 10ms of same 20ms in the cycle were stolen the RTTI Block that finds a plurality of and the other 10ms of same 20ms in the cycle that obtains in the frame bit sequence, then steal and select one to steal the frame bit sequence the frame bit sequence arbitrarily as the Modulation and Coding Scheme of correspondence Modulation and Coding Scheme as described RTTI Block correspondence from described three kinds.
6. the method for the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 1, it is characterized in that, it is characterized in that, according to described with steal the immediate frame bit sequence of stealing of frame bit sequence and determine that the corresponding Modulation and Coding Scheme of described RTTI Block comprises: if described that find and described to steal the immediate frame bit sequence of stealing of frame bit sequence be the multiple frame bit sequence of stealing, and steal the immediate frame bit sequences of stealing of frame bit sequence what may carry three kinds of the RTTI Block of the other 10ms of same 20ms in the cycle were stolen the RTTI Block that finds a plurality of and the other 10ms of same 20ms in the cycle that obtains in the frame bit sequence, then check earlier whether corresponding described three kinds of wherein a kind of Modulation and Coding Scheme of stealing in the corresponding respectively Modulation and Coding Scheme of frame bit sequence of described RTTI Block, if, what then determine described RTTIBlock correspondence is described wherein a kind of Modulation and Coding Scheme, otherwise, reexamine the whether corresponding described three kinds of wherein another kind of Modulation and Coding Scheme stolen in the corresponding respectively Modulation and Coding Scheme of frame bit sequence of described RTTI Block, if, what then determine described RTTI Block correspondence is described wherein another kind of Modulation and Coding Scheme, otherwise what determine described RTTI Block correspondence is described three kinds of a kind of Modulation and Coding Scheme of residue of stealing in the corresponding respectively Modulation and Coding Scheme of frame bit sequence.
7. the method for the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 1 or 2, it is characterized in that, described all of stealing that the frame bit sequence may carry with RTTI Block are respectively stolen the frame bit sequence compares, steal from described all that may carry and to find the frame bit sequence and the described immediate frame bit sequence of stealing of frame bit sequence of stealing comprises: calculate described all of stealing that frame bit sequence and RTTI Block may carry respectively and steal Hamming distance between the frame bit sequence, steal from described all that may carry and find the frame bit sequence and the described frame bit sequence steathily of stealing Hamming distance minimum between the frame bit sequence.
8. a device of distinguishing the Modulation and Coding Scheme of radio block correspondence is characterized in that, comprising:
Obtain the unit, be used for obtaining the frame bit sequence steathily of RTTI Block;
Comparing unit, be used for that described all of stealing that the frame bit sequence may carry with RTTIBlock respectively that described acquisition unit obtains are stolen the frame bit sequence and compare, steal from described all that may carry and find the frame bit sequence and the described immediate frame bit sequence of stealing of frame bit sequence of stealing;
Determining unit, what be used for finding according to described comparing unit determines the corresponding Modulation and Coding Scheme of described RTTI Block with the described immediate frame bit sequence of stealing of frame bit sequence of stealing.
9. the device of the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 8, it is characterized in that, described determining unit comprises: first discriminating module, if be used for the described immediate only corresponding a kind of Modulation and Coding Scheme of frame bit sequence of stealing of frame bit sequence of stealing that find and described, determine that then described Modulation and Coding Scheme is the Modulation and Coding Scheme of described RTTI Block correspondence; If the described immediate corresponding multiple Modulation and Coding Scheme of frame bit sequence of stealing of frame bit sequence of stealing that find and described is the Modulation and Coding Scheme that CPS in the build of RLC/MAC piece of described RTTI Block distinguishes described RTTI Block correspondence according to modulating-coding then.
10. the device of the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 8, it is characterized in that, described determining unit comprises: second discriminating module, if what be used for that described comparing unit finds is two kinds and steals the frame bit sequences with the described immediate frame bit sequence of stealing of frame bit sequence of stealing, steal that frame bit sequence and the RTTI Block of described other 10ms may carry three kinds of the RTTI Block of the other 10ms in the same 20ms cycle that then will obtain steathily in the frame bit sequence the immediate steathily Modulation and Coding Scheme that the frame bit sequence is corresponding as the corresponding Modulation and Coding Scheme of described RTTI Block.
11. the device of the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 8, it is characterized in that, described determining unit comprises: the 3rd discriminating module, if being used for the described immediate frame bit sequence steathily of frame bit sequence of stealing that find and described is the multiple frame bit sequence of stealing, and steal the immediate frame bit sequences of stealing of frame bit sequence what may carry three kinds of the RTTI Block of the other 10ms of same 20ms in the cycle were stolen the RTTI Block that finds a plurality of and the other 10ms of same 20ms in the cycle that obtains in the frame bit sequence, then steal and select one to steal the frame bit sequence the frame bit sequence arbitrarily as the Modulation and Coding Scheme of correspondence Modulation and Coding Scheme as described RTTI Block correspondence from described three kinds.
12. the device of the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 8, it is characterized in that, described determining unit comprises: the 4th discriminating module, if being used for the described immediate frame bit sequence steathily of frame bit sequence of stealing that find and described is the multiple frame bit sequence of stealing, and steal the immediate frame bit sequences of stealing of frame bit sequence what may carry three kinds of the RTTI Block of the other 10ms of same 20ms in the cycle were stolen the RTTI Block that finds a plurality of and the other 10ms of same 20ms in the cycle that obtains in the frame bit sequence, then check earlier whether corresponding described three kinds of wherein a kind of Modulation and Coding Scheme of stealing in the corresponding respectively Modulation and Coding Scheme of frame bit sequence of described RTTI Block, if, what then determine described RTTI Block correspondence is described wherein a kind of Modulation and Coding Scheme, otherwise, reexamine the whether corresponding described three kinds of wherein another kind of Modulation and Coding Scheme stolen in the corresponding respectively Modulation and Coding Scheme of frame bit sequence of described RTTIBlock, if, what then determine described RTTI Block correspondence is described wherein another kind of Modulation and Coding Scheme, otherwise what determine described RTTI Block correspondence is described three kinds of a kind of Modulation and Coding Scheme of residue of stealing in the corresponding respectively Modulation and Coding Scheme of frame bit sequence.
13. the device of the Modulation and Coding Scheme of differentiation radio block correspondence as claimed in claim 8, it is characterized in that, when described comparing unit is stolen described all of stealing that the frame bit sequence may carry with RTTI Block respectively the frame bit sequence and compared, calculate described all of stealing that frame bit sequence and RTTI Block may carry respectively and steal Hamming distance between the frame bit sequence; Described comparing unit is stolen from described all that may carry and is found the frame bit sequence with described when stealing that the frame bit sequence is immediate steals the frame bit sequence, from described all that may carry steal find the frame bit sequence and described steal Hamming distance minimum between the frame bit sequence steal the frame bit sequence.
14. a terminal is characterized in that, comprises any described device as claim 8-13.
CN 200810207529 2008-12-19 2008-12-19 Method and device for differentiating a modulation code scheme corresponding to a wireless block and terminal Expired - Fee Related CN101753257B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 200810207529 CN101753257B (en) 2008-12-19 2008-12-19 Method and device for differentiating a modulation code scheme corresponding to a wireless block and terminal
PCT/CN2009/075263 WO2010069224A1 (en) 2008-12-19 2009-12-02 Method, device and terminal for differentiating modulation coding schemes corresponding to radio blocks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200810207529 CN101753257B (en) 2008-12-19 2008-12-19 Method and device for differentiating a modulation code scheme corresponding to a wireless block and terminal

Publications (2)

Publication Number Publication Date
CN101753257A true CN101753257A (en) 2010-06-23
CN101753257B CN101753257B (en) 2013-01-23

Family

ID=42268307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200810207529 Expired - Fee Related CN101753257B (en) 2008-12-19 2008-12-19 Method and device for differentiating a modulation code scheme corresponding to a wireless block and terminal

Country Status (2)

Country Link
CN (1) CN101753257B (en)
WO (1) WO2010069224A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532659A (en) * 2012-07-03 2014-01-22 京信通信系统(广州)有限公司 Method for determining coding plan codebook and device thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1835670A1 (en) * 2006-03-14 2007-09-19 Siemens S.p.A. Coexistence of legacy GPRS/EGPRS radio blocks and reduced transmit time interval (RTTI) radio blocks
CN100596098C (en) * 2006-04-30 2010-03-24 华为技术有限公司 Quick process method for radio block and its process system
CN101237296B (en) * 2007-01-30 2011-09-14 华为技术有限公司 Coding method and device based on compression transmission interval
EP2003806A1 (en) * 2007-06-15 2008-12-17 Nokia Siemens Networks Oy Protection of RCL/MAC control messages in reduced latency EGPRS

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532659A (en) * 2012-07-03 2014-01-22 京信通信系统(广州)有限公司 Method for determining coding plan codebook and device thereof
CN103532659B (en) * 2012-07-03 2017-03-29 京信通信系统(广州)有限公司 A kind of method and device for determining encoding scheme code book

Also Published As

Publication number Publication date
WO2010069224A1 (en) 2010-06-24
CN101753257B (en) 2013-01-23

Similar Documents

Publication Publication Date Title
CN103024807B (en) The method of control information transmission, subscriber equipment and base station
CN107359969B (en) HARQ feedback information transmission method, UE, base station and system
CN1119056C (en) Method and system for testing data channel funcltionality in a radio apparatus
US10736102B2 (en) Channel capacity on collision based channels
CN103096493B (en) Method, subscriber equipment and the base station received and transmit control channel
US9031046B2 (en) Methods and arrangements in a radio communication system
CN102858014A (en) Sending and receiving method and equipment of control signaling
CN103002579B (en) Control information transmission method, base station and user equipment
CN107734710B (en) Data transmission method and device
CN103200662B (en) Uplink transmission power defining method and subscriber equipment
CN106576283B (en) System overload control when in extended coverage
CN103023621A (en) Information transmission method, user equipment and base station
CN115039359B (en) System and method for resource allocation
CN103248598B (en) Communication method, base station and user equipment
CN101784120A (en) Be used for receiving the method for the data that transmit by the base station in terminal
CN104426633A (en) Uplink control information transmission method, user equipment and network side equipment
CN102448037A (en) Method and equipment for transmitting and receiving control signalling
CN101911763A (en) System and method for one-phase access in a communication system
CN103368684A (en) Method for transmitting signals, network equipment and user equipment
CN104541536A (en) Method, user equipment and base station for detecting device to device signals
WO2003069831A1 (en) Method and apparatus for conveying the information of the frame type
CN101753257B (en) Method and device for differentiating a modulation code scheme corresponding to a wireless block and terminal
CN101753265A (en) False alarm check method, device and user equipment
CN110492977B (en) Method and equipment for feeding back information and determining information receiving through feedback
CN103532659B (en) A kind of method and device for determining encoding scheme code book

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130123

Termination date: 20171219

CF01 Termination of patent right due to non-payment of annual fee