WO2007127129A2 - Method of using a shared control channel in wireless communications - Google Patents

Method of using a shared control channel in wireless communications Download PDF

Info

Publication number
WO2007127129A2
WO2007127129A2 PCT/US2007/009585 US2007009585W WO2007127129A2 WO 2007127129 A2 WO2007127129 A2 WO 2007127129A2 US 2007009585 W US2007009585 W US 2007009585W WO 2007127129 A2 WO2007127129 A2 WO 2007127129A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
scch
codeword
transmission
scheduled
Prior art date
Application number
PCT/US2007/009585
Other languages
French (fr)
Other versions
WO2007127129A3 (en
Inventor
Sridhar Gollamudi
Original Assignee
Lucent Technologies Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lucent Technologies Inc. filed Critical Lucent Technologies Inc.
Priority to JP2009507735A priority Critical patent/JP2009535903A/en
Priority to EP07755740A priority patent/EP2011361A2/en
Publication of WO2007127129A2 publication Critical patent/WO2007127129A2/en
Publication of WO2007127129A3 publication Critical patent/WO2007127129A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/707Spread spectrum techniques using direct sequence modulation
    • H04B1/7073Synchronisation aspects
    • H04B1/7075Synchronisation aspects with code phase acquisition
    • H04B1/70751Synchronisation aspects with code phase acquisition using partial detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03891Spatial equalizers
    • H04L25/03898Spatial equalizers codebook-based design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/707Spread spectrum techniques using direct sequence modulation
    • H04B1/7073Synchronisation aspects
    • H04B1/7075Synchronisation aspects with code phase acquisition
    • H04B1/70751Synchronisation aspects with code phase acquisition using partial detection
    • H04B1/70752Partial correlation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B2201/00Indexing scheme relating to details of transmission systems not covered by a single group of H04B3/00 - H04B13/00
    • H04B2201/69Orthogonal indexing scheme relating to spread spectrum techniques in general
    • H04B2201/707Orthogonal indexing scheme relating to spread spectrum techniques in general relating to direct sequence modulation
    • H04B2201/70701Orthogonal indexing scheme relating to spread spectrum techniques in general relating to direct sequence modulation featuring pilot assisted reception
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/0007Code type
    • H04J13/004Orthogonal
    • H04J13/0044OVSF [orthogonal variable spreading factor]

Definitions

  • Art Background HSDPA is a high-speed packet data transmission system for the downlink, i.e.,
  • HSDPA transmission time interval
  • a scheduler in the base station selects a small number of users, typically up to eight, to which data is to be transmitted in that 2-ms interval. In the next 2-ms interval, the scheduler may select another group of users to whom to transmit.
  • Data is transmitted to each of the scheduled users via a physical channel called the HS-PDSCH (High- Speed Physical Downlink Shared Channel).
  • HS-PDSCH High- Speed Physical Downlink Shared Channel
  • HS-SCCH High- Speed Shared Control Channel
  • each scheduled user will be served by a distinct HS-SCCH channel.
  • the various HS-SSCH channels are distinguished by having different spreading codes. In current implementations, these spreading codes are OVSF (Orthogonal Variation Spreading Factor) codes.
  • the HS-SCCH channel contains the unique identity of the user who is scheduled, along with several parameters that the user will need in order to decode the received transmission. Such parameters may include, e.g., the data rate at which traffic is transmitted to the user on the HS-PDSCH, and the modulation used for HS- PDSCH.
  • the user Before receiving any scheduled transmission, the user must first decode the HS-SCCH channel in order to ascertain whether he is scheduled, and also to decode the parameters from the HS-SCCH that he will need to decode the corresponding data traffic from HS-PDSCH.
  • the HS-SCCH carries a total number k of bits that contain control information required to decode HS-PDSCH, and a total number m of bits that represent a unique user identity. These k + m bits are encoded to form a total of 120 coded bits that are transmitted over the air. In current implementations, this coding is done using a convolutional code.
  • the 120 coded HS-SCCH bits are transmitted in a transmission time interval (TTI) of 2 ms duration.
  • TTI transmission time interval
  • Each TTI is made up of three UMTS time slots, each of which is 0.667 ms long.
  • FIG. 1 The timing relationship between an HS-SCCH transmission and the corresponding data transmission on the HS-PDSCH is shown in FIG. 1.
  • HS-SCCH transmission time interval 10 is made up of time slots 11, 12, and 13
  • HS-PDSCH transmission time interval 20 is made up of time slots 21, 22, and 23.
  • HS-SCCH 10 is transmitted two time slots ahead of the beginning of the data transmission on HS-PDSCH 20.
  • the HS-SCCH message consisting of k + m bits, is broken into two parts. Each part is independently encoded, so that two separate codewords are created.
  • the first codeword is transmitted in slot 1 of the HS- SCCH transmission time interval, such as in slot 11 of FIG. 1, and the second codeword is transmitted in slots 2 and 3 of the same TTI, such as in slots 12 and 13 of FIG. 1.
  • the user will receive the first part of the HS-SCCH transmission during slot
  • the user Before the beginning of the corresponding HS-PDSCH transmission time interval, the user will decode the first part of the HS-SCCH transmission to determine whether he is the intended recipient of the corresponding transmission on the downlink shared channel. If he is, in fact, the intended recipient, the user will start buffering the HS-PDSCH signal from the beginning of the HS-
  • all k + m bits carried on the HS-SCCH are encoded together to form a single codeword, which is transmitted over the entire duration, i.e., three slots, or 2 ms, of the TTI.
  • the user will receive, within the first slot, only a partial codeword. The user will make an inference whether it is the intended recipient of the corresponding transmission on the downlink shared channel. If the user determines that it is, indeed, the intended recipient, it buffers the HS-PDSCH signal and receives the remaining part of the HS-SCCH transmission.
  • the user terminal has access to, e.g. by storing them, a collection of candidate codewords.
  • Each candidate codeword is a partial codeword known to relate specifically to that particular user terminal.
  • the inference is made by correlating the received partial codeword with the candidate vectors. If a measure of correlation exceeds a threshold, that user terminal is deemed to be the intended recipient.
  • FIG. 1 is an HSDPA timing diagram corresponding to methods of the prior art.
  • FIG. 2 is a flowchart illustrating the new method described here, in an exemplary embodiment.
  • the message carried by HS-SCCH is derived from m bits of user identity and k bits of other control information.
  • his user identity is a fixed and known quantity. Therefore, the total number of all possible codewords that may be intended for this user is 2* .
  • the set of 2* possible codewords intended for this user will be extremely unlikely to overlap the set intended for any other user, because the output of the convolutional, or other, function that creates the codeword is also dependent on the m input bits that specify user identity. Accordingly, the user lists all these 2* different codewords and stores only the portions of these codewords that correspond to slot 1 of the HS-SCCH transmission. Although these partial codewords will typically be stored at the user terminal, they may alternatively be stored in a separate but accessible location.
  • the user After reception of slot 1 of the HS-SCCH transmission, the user has a noisy version of the partial codeword, which we denote by a vector y. As indicated at block 40 of FIG. 2, the user computes a correlation of the received partial codeword with the stored partial codewords. In one possible approach, the user computes the correlation of the received partial codeword ⁇ with each of the stored partial codewords, C 1 to obtain correlations r., as follows:
  • This maximum correlation (V 1113x ) is a measure of the confidence that this transmission was intended for this user.
  • the confidence measure r ⁇ is compared to a pre-defined threshold T to decide whether the transmission was intended for the user. In other words, the user will decide that the transmission was intended for him if r ⁇ > T, and otherwise decide that it was not intended for him.
  • the user performs this test after, e.g., receiving slot 1 of the HS-SCCH transmission and before the beginning of, e.g., slot 1 of the corresponding HS- PDSCH. If the user decides that this transmission is not intended for him then he does not need to buffer the HS-PDSCH signals or receive the remainder of the HS-SCCH transmission. However, as indicated at block 60 of FIG. 2, the user will begin buffering the HS-PDSCH signals and will continue to receive the HS-SCCH transmission if the confidence measure exceeds the threshold. It will be understood that various other methods of computing a confidence measure may be.used without departing from the spirit and scope of the present invention.
  • the confidence measure may be evaluated using trellis-based algorithms such as those used in the Viterbi algorithm, although such approaches will generally be most applicable when the number of possible codewords is very large. It will also be understood that although the invention has been described with particular reference to HSDPA systems, such reference is purely for purposes of illustration and is not meant to limit the scope of the invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

In an improved method for using an HSDPA control channel HS-SCCH, all k + m bits carried on the HS-SCCH are encoded together to form a single codeword, which is transmitted over the entire duration, i.e., three slots, or 2 ms, of the tranmission time interval TTI. At the receiving end, the user will receive, within the first slot, only a partial codeword. The user will make an inference whether it is the intended recipient of the corresponding transmission on the downlink shared channel. If the user determines that it is, indeed, the intended recipient, it buffers the HS- PDSCH signal and receives the remaining part of the HS-SCCH transmission.

Description

METHOD OF USING A SHARED CONTROL CHANNEL IN WIRELESS
COMMUNICATIONS
Art Background HSDPA is a high-speed packet data transmission system for the downlink, i.e.,
• the link from the base station to the mobile station, in a wireless communication system. The current implementation of HSDPA is defined in Release 5 of the UMTS specification published by the 3rd Generation Partnership Project (3GPP). in HSDPA, a group of users is scheduled in each transmission time interval (TTI), which is 2 ms long. That is, within the 2 ms duration of a given TTI, a scheduler in the base station selects a small number of users, typically up to eight, to which data is to be transmitted in that 2-ms interval. In the next 2-ms interval, the scheduler may select another group of users to whom to transmit. Data is transmitted to each of the scheduled users via a physical channel called the HS-PDSCH (High- Speed Physical Downlink Shared Channel).
Users do not receive advance notice of particular TTIs in which they will be scheduled. Because a given, scheduled user lacks such advance knowledge, the base station must let the scheduled user know that a particular transmission is meant for him. In HSDPA, this is achieved using a control channel called HS-SCCH (High- Speed Shared Control Channel). At any given time, each scheduled user will be served by a distinct HS-SCCH channel. The various HS-SSCH channels are distinguished by having different spreading codes. In current implementations, these spreading codes are OVSF (Orthogonal Variation Spreading Factor) codes.
The HS-SCCH channel contains the unique identity of the user who is scheduled, along with several parameters that the user will need in order to decode the received transmission. Such parameters may include, e.g., the data rate at which traffic is transmitted to the user on the HS-PDSCH, and the modulation used for HS- PDSCH. Before receiving any scheduled transmission, the user must first decode the HS-SCCH channel in order to ascertain whether he is scheduled, and also to decode the parameters from the HS-SCCH that he will need to decode the corresponding data traffic from HS-PDSCH. The HS-SCCH carries a total number k of bits that contain control information required to decode HS-PDSCH, and a total number m of bits that represent a unique user identity. These k + m bits are encoded to form a total of 120 coded bits that are transmitted over the air. In current implementations, this coding is done using a convolutional code.
The 120 coded HS-SCCH bits are transmitted in a transmission time interval (TTI) of 2 ms duration. Each TTI is made up of three UMTS time slots, each of which is 0.667 ms long. The timing relationship between an HS-SCCH transmission and the corresponding data transmission on the HS-PDSCH is shown in FIG. 1. As seen in the figure, HS-SCCH transmission time interval 10 is made up of time slots 11, 12, and 13, and HS-PDSCH transmission time interval 20 is made up of time slots 21, 22, and 23. As further seen in the figure, HS-SCCH 10 is transmitted two time slots ahead of the beginning of the data transmission on HS-PDSCH 20.
In the current specification of HSDPA, the HS-SCCH message, consisting of k + m bits, is broken into two parts. Each part is independently encoded, so that two separate codewords are created. The first codeword is transmitted in slot 1 of the HS- SCCH transmission time interval, such as in slot 11 of FIG. 1, and the second codeword is transmitted in slots 2 and 3 of the same TTI, such as in slots 12 and 13 of FIG. 1. The user will receive the first part of the HS-SCCH transmission during slot
11 (after transmission delay). Before the beginning of the corresponding HS-PDSCH transmission time interval, the user will decode the first part of the HS-SCCH transmission to determine whether he is the intended recipient of the corresponding transmission on the downlink shared channel. If he is, in fact, the intended recipient, the user will start buffering the HS-PDSCH signal from the beginning of the HS-
PDSCH transmission time interval, and he will also decode the second part of the HS- SCCH message to obtain further control information. If decoding of the first part of the HS-SCCH message reveals that the user is not the intended recipient, then he does not need to decode the second part, nor does he need to buffer the HS-PDSCH signals.
Although the method described above for using the control channel is useful, there is a need for further improvements, particularly those which reduce power requirements. Summary of the Invention
We have found an improved method for using the control channel. In at least some cases, our method will lead to reduced power requirements.
In accordance with our new method, all k + m bits carried on the HS-SCCH are encoded together to form a single codeword, which is transmitted over the entire duration, i.e., three slots, or 2 ms, of the TTI. At the receiving end, the user will receive, within the first slot, only a partial codeword. The user will make an inference whether it is the intended recipient of the corresponding transmission on the downlink shared channel. If the user determines that it is, indeed, the intended recipient, it buffers the HS-PDSCH signal and receives the remaining part of the HS-SCCH transmission.
In specific embodiments, the user terminal has access to, e.g. by storing them, a collection of candidate codewords. Each candidate codeword is a partial codeword known to relate specifically to that particular user terminal. The inference is made by correlating the received partial codeword with the candidate vectors. If a measure of correlation exceeds a threshold, that user terminal is deemed to be the intended recipient.
Brief Description of the Drawing FIG. 1 is an HSDPA timing diagram corresponding to methods of the prior art.
FIG. 2 is a flowchart illustrating the new method described here, in an exemplary embodiment.
Detailed Description
According to our new method, all k + m bits carried on the HS-SCCH are encoded together to form a single codeword, which is transmitted over the entire 2- ms, or three-slot, duration of the TTI. This would imply that the user will have to wait until the end of the HS-SCCH TTI in order to decode HS-SCCH information.
However, the HS-PDSCH transmission would have already begun by then.
Consequently, the user cannot wait to decode the HS-SCCH before buffering HS- PDSCH signals. We have resolved this problem by providing a way for the user to detect whether this transmission is intended for him, without waiting to receive the whole codeword from HS-SCCH. At the end of slot 1 of the HS-SCCH, the user will have received only a part of the entire HS-SCCH codeword, as indicated at block 30 of FIG. 2. He will, for example, have received only 40 of a total of 120 coded bits. Below, we will describe an algorithm for determining whether the transmission was intended for a particular user, based only on noisy observations of this partial codeword.
As mentioned above, the message carried by HS-SCCH is derived from m bits of user identity and k bits of other control information. As far as a particular user is concerned, his user identity is a fixed and known quantity. Therefore, the total number of all possible codewords that may be intended for this user is 2* . The set of 2* possible codewords intended for this user will be extremely unlikely to overlap the set intended for any other user, because the output of the convolutional, or other, function that creates the codeword is also dependent on the m input bits that specify user identity. Accordingly, the user lists all these 2* different codewords and stores only the portions of these codewords that correspond to slot 1 of the HS-SCCH transmission. Although these partial codewords will typically be stored at the user terminal, they may alternatively be stored in a separate but accessible location.
We denote the fth partial codeword by a vector C1 , where / can range from 1 to
2* . After reception of slot 1 of the HS-SCCH transmission, the user has a noisy version of the partial codeword, which we denote by a vector y. As indicated at block 40 of FIG. 2, the user computes a correlation of the received partial codeword with the stored partial codewords. In one possible approach, the user computes the correlation of the received partial codeword^ with each of the stored partial codewords, C1 to obtain correlations r., as follows:
where y(n) is the wth element of the vector y.
The user then selects the maximum value of these correlation values, which we denote by rmx = max,. r{ . This maximum correlation (V1113x ) is a measure of the confidence that this transmission was intended for this user. As indicated at block 50 of FIG. 2, the confidence measure r^ is compared to a pre-defined threshold T to decide whether the transmission was intended for the user. In other words, the user will decide that the transmission was intended for him if r^ > T, and otherwise decide that it was not intended for him.
The user performs this test after, e.g., receiving slot 1 of the HS-SCCH transmission and before the beginning of, e.g., slot 1 of the corresponding HS- PDSCH. If the user decides that this transmission is not intended for him then he does not need to buffer the HS-PDSCH signals or receive the remainder of the HS-SCCH transmission. However, as indicated at block 60 of FIG. 2, the user will begin buffering the HS-PDSCH signals and will continue to receive the HS-SCCH transmission if the confidence measure exceeds the threshold. It will be understood that various other methods of computing a confidence measure may be.used without departing from the spirit and scope of the present invention. For example, the confidence measure may be evaluated using trellis-based algorithms such as those used in the Viterbi algorithm, although such approaches will generally be most applicable when the number of possible codewords is very large. It will also be understood that although the invention has been described with particular reference to HSDPA systems, such reference is purely for purposes of illustration and is not meant to limit the scope of the invention.

Claims

CLAIMSWhat is claimed is:
1. A method, comprising: at a communication terminal, receiving (30) a portion of a codeword transmitted over a control channel, wherein said codeword contains information indicating the identity of a terminal scheduled to receive a transmission on a shared channel; inferring (40, 50) from said codeword portion whether the communication terminal is the scheduled terminal; and if the communication terminal is the scheduled terminal, commencing (60) to receive the transmission.
2. The method of claim 1, wherein said inferring step comprises computing (40) a confidence measure by correlating the codeword portion with a collection of candidate codewords, and inferring (50) that the communication terminal is the scheduled terminal if the confidence measure exceeds a threshold.
3. The method of claim 2, wherein a respective correlation is computed between the codeword portion and each of the candidate codewords, and the confidence measure is the greatest of the computed correlations.
4. The method of claim 1, wherein the codeword (10) occupies three timeslots (11, 12, 13), and the codeword portion is received in the first of the three timeslots.
PCT/US2007/009585 2006-04-27 2007-04-19 Method of using a shared control channel in wireless communications WO2007127129A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2009507735A JP2009535903A (en) 2006-04-27 2007-04-19 Method of using shared control channel in wireless communication
EP07755740A EP2011361A2 (en) 2006-04-27 2007-04-19 Method of using a shared control channel in wireless communications

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/413,762 US20070253373A1 (en) 2006-04-27 2006-04-27 Method of using a shared control channel in wireless communications
US11/413,762 2006-04-27

Publications (2)

Publication Number Publication Date
WO2007127129A2 true WO2007127129A2 (en) 2007-11-08
WO2007127129A3 WO2007127129A3 (en) 2008-01-24

Family

ID=38648212

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/009585 WO2007127129A2 (en) 2006-04-27 2007-04-19 Method of using a shared control channel in wireless communications

Country Status (6)

Country Link
US (1) US20070253373A1 (en)
EP (1) EP2011361A2 (en)
JP (1) JP2009535903A (en)
KR (1) KR20090006126A (en)
CN (1) CN101433122A (en)
WO (1) WO2007127129A2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090196261A1 (en) * 2008-01-04 2009-08-06 Qualcomm, Incorporated Resource allocation for enhanced uplink using a shared control channel
CN101931998B (en) * 2009-06-26 2014-07-02 中兴通讯股份有限公司 Physical channel mapping and de-mapping method of high-speed physical downlink shared channel
KR20140051755A (en) 2010-04-30 2014-05-02 인터디지탈 패튼 홀딩스, 인크 Method for multiplexing data for multiple wireless transmit/receive units for high speed downlink channels

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1351538A1 (en) * 2002-04-05 2003-10-08 Lucent Technologies Inc. Shared signaling for multiple user equipment
US20040042533A1 (en) * 2002-08-28 2004-03-04 Lucent Technologies Inc. Codeword synthesizing system and a correlation system, methods of operation thereof and a spread spectrum communications transceiver employing the same
US20050078648A1 (en) * 2003-10-09 2005-04-14 Telefonaktiebolaget Lm Ericsson Adaptive threshold for HS-SCCH part 1 decoding
EP1564894A1 (en) * 2004-02-17 2005-08-17 STMicroelectronics N.V. Method and device for sequence estimation

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7424071B2 (en) * 2005-06-27 2008-09-09 Icera Inc. Decoder and a method for determining a decoding reliability indicator

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1351538A1 (en) * 2002-04-05 2003-10-08 Lucent Technologies Inc. Shared signaling for multiple user equipment
US20040042533A1 (en) * 2002-08-28 2004-03-04 Lucent Technologies Inc. Codeword synthesizing system and a correlation system, methods of operation thereof and a spread spectrum communications transceiver employing the same
US20050078648A1 (en) * 2003-10-09 2005-04-14 Telefonaktiebolaget Lm Ericsson Adaptive threshold for HS-SCCH part 1 decoding
EP1564894A1 (en) * 2004-02-17 2005-08-17 STMicroelectronics N.V. Method and device for sequence estimation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project;Technical Specification Group Radio Access Network; High Speed Downlink Packet Access; Physical Layer Aspects (Release 5)" 3GPP TR 25.858 V5.0.0, XX, XX, March 2002 (2002-03), pages 1-31, XP002249946 *
ANTTI TOSKALA ET ALL: "chapter 11 High-speed downlink packet access" WCDMA FOR UMTS, 2002, pages 279-304, XP002458223 *

Also Published As

Publication number Publication date
JP2009535903A (en) 2009-10-01
EP2011361A2 (en) 2009-01-07
CN101433122A (en) 2009-05-13
KR20090006126A (en) 2009-01-14
US20070253373A1 (en) 2007-11-01
WO2007127129A3 (en) 2008-01-24

Similar Documents

Publication Publication Date Title
US7051268B1 (en) Method and apparatus for reducing power consumption of a decoder in a communication system
JP4316620B2 (en) Method and apparatus for providing rapid detection of HS-SCCH (High SpeedSharedControlChannel)
CA2383215C (en) Method and apparatus for link adaptation in a mobile communication system
JP4453491B2 (en) Mobile station
EP1487120B1 (en) Error detection methods in wireless communication systems
AU2003214677B2 (en) Apparatus and Method for Receiving Packet Data Control Channel in a Mobile Communication System
US8194618B2 (en) Radio base station device, communication terminal device, and control information transmission method
KR100961106B1 (en) Power Control of Plural Packet Data Control Channel
JP4878654B2 (en) COMMUNICATION SYSTEM, MOBILE STATION DEVICE, BASE STATION DEVICE, AND PROCESSING METHOD
KR100929314B1 (en) Transmission control method, mobile station and network node
US8111668B2 (en) Signaling methods for wireless communication systems
EP1605597A1 (en) Method and system for blindly detecting a shared channel out of a plurality of shared channels received in parallel
KR100978865B1 (en) Method and apparatus for transmitting/receiving of system information in mobile communication system
US8315339B2 (en) Channel estimation
WO2006082761A1 (en) Base station apparatus and resource assigning method
JP4432645B2 (en) Communication device, wireless communication system
JP2003209891A (en) Method for processing control information in wireless communication system
WO2007127129A2 (en) Method of using a shared control channel in wireless communications
CN1972170B (en) Wireless communication channel detection method
KR20060061199A (en) Method and apparatus for the transmission and reception with high reliability in mobile telecommunication system for packet data transmission
KR20060087244A (en) Method and apparatus for transmission/reception with high reliability in mobile telecommunication system for packet data transmission
WO2006056957A1 (en) Tfci decoding apparatus and method
Ghosh et al. Air-interface for 1XTREME/1xEV-DV
KR100792993B1 (en) Method for discriminating information signals in a mobile communication system
UA79237C2 (en) Communication techniques, communication system (variants), data transmission device (variants), data receiving device (variants)

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2007755740

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009507735

Country of ref document: JP

Ref document number: 200780014987.0

Country of ref document: CN

Ref document number: 1020087026251

Country of ref document: KR

NENP Non-entry into the national phase

Ref country code: DE