WO2010069224A1 - Method, device and terminal for differentiating modulation coding schemes corresponding to radio blocks - Google Patents

Method, device and terminal for differentiating modulation coding schemes corresponding to radio blocks Download PDF

Info

Publication number
WO2010069224A1
WO2010069224A1 PCT/CN2009/075263 CN2009075263W WO2010069224A1 WO 2010069224 A1 WO2010069224 A1 WO 2010069224A1 CN 2009075263 W CN2009075263 W CN 2009075263W WO 2010069224 A1 WO2010069224 A1 WO 2010069224A1
Authority
WO
WIPO (PCT)
Prior art keywords
stealing
frame
block
modulation
bit sequence
Prior art date
Application number
PCT/CN2009/075263
Other languages
French (fr)
Chinese (zh)
Inventor
王之曦
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2010069224A1 publication Critical patent/WO2010069224A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/0012Modulated-carrier systems arrangements for identifying the type of modulation

Definitions

  • Temporary Block Flow is a mobile station. Temporary connection between (MS, Mobile Station) and the network side, only exists during data forwarding.
  • a TBF can use radio resources on one or more Packet Data Channels (PDCHs).
  • PDCHs Packet Data Channels
  • the smallest scheduling unit for data transmission at the physical layer is a radio block.
  • Each radio block consists of 4 time slots (TS, Timeslot) (burst Burst) and is located in 4 consecutive Time Division Multiple Access (TDMA) frames.
  • TDMA frame consists of 8 time slots, generally 5 ms. Therefore, the transmission timing interval (TTI, Transmission Timing Interval) of each radio block is 20 ms.
  • Such a radio block can also be called a basic transmission time interval (BTTI, Basic TTI) Block.
  • RTTI Reduced TTI
  • the size of each radio block is kept unchanged.
  • the TTI is reduced to 10 ms by using multiple slots.
  • BTTI Block is shown in Figure 1B1;
  • RTTI Block is shown as B2 in Figure 1.
  • the radio block using the RTTI technique consists of 4 slots distributed in two consecutive TDMA frames.
  • the RTTI technique does reduce the TTI to 10ms.
  • a radio block is transmitted either on one PDCH (in BTTI configuration) or on one PDCH pair (RTTI configuration), that is, one radio block is in one time slot (BTI configuration)
  • the uplink transmission is either transmitted on a time slot pair (RTTI configuration).
  • the network side uses the control information for the PDCH (or PDCH pair) used by the MS.
  • the TBF is a TBTI configured TBF (hereinafter referred to as BTTI TBF)
  • the radio block transmitted on the channel is a BTTI Block
  • the radio block transmitted on the channel is an RTTI Block.
  • the RTTI TBF has two Uplink State Flag (USF) modes: BTTI USF mode and RTTI USF mode.
  • USF Uplink State Flag
  • MCS Modulation and Coding Scheme
  • MCS-1 ⁇ 4 Modulation and Coding Scheme
  • the network side (generally refers to the base station) sends information to the MS, it needs to use the RLC/MAC of the Radio Link Control (RLC)/Media Access Control (MAC) layer.
  • the block modulation is coded as a radio block of the physical layer.
  • modulation coding is used, a modulation coding scheme is needed.
  • the radio block obtained after modulation and coding corresponds to a modulation coding scheme.
  • the MS can determine whether the USF mode is the RTTI USF mode or the BTTI USF mode.
  • the RTTI Block used for signaling transmission In the BTTI USF mode, the RTTI Block used for signaling transmission always corresponds to the MCS-0; In RTTI USF mode, the RTTI block used for signaling transmission corresponds to CS-1 or MCS-0.
  • the MS can distinguish the letter by checking the RTTI Block's Stealing Flags/Stealing Bits. Let the transmitted RTTI block correspond to CS-1 or MCS-0 o.
  • the MS cannot determine the RTTI Block corresponding.
  • MS cannot determine whether the Stealing Bits in the RTTI Block are in the 20ms format (if the RTTI TBF is BTTI USF mode) or the 10ms format (if the RTTI TBF is the RTTI USF mode). In short, when the MS receives the RTTI Block sent by the network side, it cannot determine which modulation and coding scheme corresponds to the RTTI Block. Summary of the invention
  • Embodiments of the present invention provide a method, apparatus, and terminal for distinguishing a modulation and coding scheme corresponding to a radio block, to determine a modulation and coding scheme corresponding to the radio block.
  • An aspect of the present invention provides a method for distinguishing a modulation and coding scheme corresponding to a radio block, including: obtaining a frame stealing bit sequence in an RTTI block; and respectively, the stealing frame bit sequence and all stealing frame bit sequences that may be carried by the RTTI block Performing an alignment, finding a frame stealing bit sequence closest to the frame stealing bit sequence from all the stolen frame bit sequences that may be carried; determining the according to the stealing frame bit sequence closest to the stealing frame bit sequence The modulation coding scheme corresponding to the RTTI Block.
  • Another aspect of the present invention provides an apparatus for distinguishing a modulation and coding scheme corresponding to a radio block, including: an obtaining unit, configured to obtain a frame stealing bit sequence in an RTTI Block; and a matching unit, configured to obtain the obtained unit
  • the frame stealing bit sequence is compared with all the stealing frame bit sequences that the RTTI block may carry, and the stealing frame bit sequence closest to the stealing frame bit sequence is found from all the stolen frame bit sequences that may be carried; a determining unit, configured to determine, according to the stealing frame bit sequence that is found by the comparing unit and closest to the stealing frame bit sequence, a modulation and coding scheme corresponding to the RTTI block.
  • Still another aspect of the present invention provides a terminal comprising the above-described apparatus for distinguishing a modulation coding scheme corresponding to a radio block.
  • the obtained punctured frame bit sequence is compared with all the sneak frame bit sequences that the RTTI block may carry, thereby determining the modulation coding scheme corresponding to the obtained RTTI block. .
  • FIG. 1 is a schematic diagram of a prior art BTTI Block
  • FIG. 2A is a schematic diagram of a format of Stealing Bits in a BTTI Block corresponding to MCS-1 ⁇ 4
  • 2B is a schematic diagram of a format of Stealing Bits in a BTTI Block corresponding to CS-1
  • FIG. 3 is a schematic diagram of a format of Stealing Bits corresponding to an RTTI Block of MCS-0 ⁇ 4 in a BTTI USF mode;
  • 4A is a schematic diagram of a format of Stealing Bits corresponding to the RT-1 block of the CS-1 in the RTTI USF mode;
  • 4B is a schematic diagram showing the format of Stealing Bits corresponding to the RTS Block of the MCS-0 ⁇ 4 in the RTTI USF mode;
  • FIG. 5 is a flowchart of a method for distinguishing a modulation and coding scheme corresponding to a radio block according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of an apparatus for distinguishing a modulation and coding scheme corresponding to a radio block according to an embodiment of the present invention.
  • the modulation coding scheme corresponding to the BTTI Block used for signaling transmission is CS-1
  • the modulation coding scheme corresponding to the BTTI Block for data transmission is MCS-1 ⁇ 4.
  • the MS can use the Stealing Bits in the BTTI Block to distinguish between CS-1 and MCS-1 ⁇ 4.
  • the format of Stealing Bits using BTTI Block of MCS-1 ⁇ 4 is shown as 8 bits in Figure 2A, ie 00010110; the format of Stealing Bits using BTTI Block of CS-1 is as shown in the 8 bits of Figure 2B, ie 11111111.
  • TB represents a tail bit
  • TS represents a training sequence
  • B0, Bl, B2, and B3 represent a 0th Burst, a 1st Burst, a 2nd Burst, and a 3rd Burst, respectively.
  • the modulation coding scheme corresponding to the RTTI block used for signaling transmission is MCS-0
  • the modulation coding scheme corresponding to the RTTI Block for data transmission is MCS-1 ⁇ 4.
  • the MS may use the coded puncturing scheme indication in the RLC/MAC header of the RLC/MAC block (CPS, Coding and Puncturing Scheme) to distinguish between MCS-0 and MCS-1 ⁇ 4.
  • CPS Coding and Puncturing Scheme
  • the format of the Stealing Bits in the RTTI Block corresponding to the first 10 milliseconds (ms) of MCS-1 ⁇ 4 or MCS-0 is as shown by the 8 bits in the dotted line box, ie 00000101; corresponding to MCS
  • the format of Stealing Bits in the RTTI Block of -1-4 or MCS-0 is as follows: 8 bits in the dotted line box, that is, 01011010; where, the first 10ms and the last 10ms refer to the same 20ms period. The first 10 ms and the last 10 ms, the 20 ms period starts from the base station to start transmitting information to the MS.
  • the modulation coding scheme corresponding to the RTTI block used for signaling transmission is CS-1 or MCS-0
  • the modulation coding scheme corresponding to the RTTI block used for data transmission is MCS-1 ⁇ 4.
  • the MS can distinguish the RTTI Block corresponding to CS-1 from the RTTI Block corresponding to MCS-l ⁇ 4/MCS-0; if the MS finds RTTI The Stealing Bits in the Block correspond to MCS-1 ⁇ 4/MCS-0, then the MS can check the CPS in the RLC/MAC block header, so that the RTTI Block corresponding to MCS-0 and the RTTI Block corresponding to MCS1-4 can be obtained. differentiate.
  • the format of the Stealing Bits in the RTTI Block corresponding to the first 10 ms and the last 10 ms of MCS-1 ⁇ 4 or MCS-0 is as shown in the 8 bits of FIG. 4A, that is, 00010110; corresponding to the first 10 ms and the last 10 ms RTTI of CS-1
  • the format of the Stealing Bits in the Block is shown in the 8 bits of Figure 4B, which is 11111111.
  • the embodiment of the present invention uses the form of Table 1 to describe the format of the Stealing Bits.
  • the definition of Stealing Bits is 20ms.
  • the last 10ms of the 20ms block period is 10ms.
  • the first 10ms corresponds to MCS-1 ⁇ 4. ⁇ , ⁇ , ⁇ , ⁇ , ⁇ , ⁇ , ⁇ , ⁇ 4 0,1,0,1, 1, 0,1,0
  • S501 Obtain a frame stealing bit sequence in the RTTI Block.
  • the base station when the base station sends information to the MS, it first needs to use a modulation and coding scheme to modulate the RLC/MAC block into a radio block, and then send the radio block to the MS, where the radio block carries the Stealing Bits sequence. After the MS obtains the TTI Block, the Stealing Bits sequence can be completely obtained.
  • the base station transmits one RTC block every 20 ms from the time when the base station starts transmitting information to the MS (ie, the BTTI Block period), and every 20 ms period, the base station sends two RTTI blocks to the MS, and each The RTTI Blocks correspond to a 10ms (ie, RTTI Block period), and the modulation coding schemes corresponding to the two RTTI Blocks are the same. Therefore, the obtained RTTI Block can also be said to be the first 10ms RTTI Block of a 20ms period or the last 10ms RTTI Blocko of a 20ms period.
  • S502 Compare the frame stealing bit sequence with all stealing frame bit sequences that may be carried by the RTTI block, and find a frame stealing frame closest to the stealing frame bit sequence from all the stolen frame bit sequences that may be carried. Bit sequence.
  • All Stealing Bits sequences that may be carried by the RTTI Block are the three Stealing Bits sequences that may be carried by the first 10 ms RTTI Block shown in Table 1 (123 in Table 1); if the obtained RTTI Block is after the 20 ms period For a 10 ms RTTI block, all Stealing Bits sequences that the obtained RTTI Block may carry are the three Stealing Bits sequences that may be carried by the RTIO Block of the last 10 ms shown in Table 1 (124 in Table 1).
  • the receiver may determine the possible value closest to the received value as Originally sent value. Therefore, in the embodiment of the present invention, after obtaining the Stealing Bits sequence, the Stealing Bits sequence can be compared with all Stealing Bits sequences that the RTTI Block may carry.
  • the obtained Stealing Bits sequence is respectively compared with the three Stealing Bits sequences that may be carried by the first 10 ms RTTI Block shown in Table 1; If the obtained RTTI Block is an RTTI Block of the last 10 ms of the 20 ms period, the Stealing Bits sequence obtained is compared with the three Stealing Bits sequences that may be carried by the RTIO Block of the last 10 ms shown in Table 1. After the alignment, the Stealing Bits sequence closest to the obtained Stealing Bits sequence was found from all Stealing Bits sequences that the RTTI Block may carry.
  • the proximity between the obtained Stealing Bits sequence and all Stealing Bits sequences that the RTTI Block may carry can be measured using the Hamming distance.
  • the Stealing Bits sequence closest to the Stealing Bits sequence obtained from all the Stealing Bits sequences that the RTTI Block may carry is essentially the Stealing Bits sequence found between the Stealing Bits sequence that may be carried by the RTTI Block.
  • the Steinging Bits sequence with the smallest distance The following describes the Hamming distance.
  • the minimum Hamming distance between any two codes is called the minimum Hamming distance of this code group.
  • the Hamming distance is a number of corresponding bit values between two bit sequences, for example, the bit sequence "1, 1, 1, 1, 1, 1, 1, 1, 1.
  • the Hamming distance between 1 " and 0,0,0,1,0,1,1,0" is 5, “0,0,0,1,0,1,1,0" and "0,0
  • the Hamming distance of 0,0,0,1,0,1 " is 3.
  • the larger the Hamming distance between two bit sequences the easier it is to distinguish.
  • a Hamming distance between two bit sequences is zero, indicating that the two bit sequences are identical. The smaller the Hamming distance between two bit sequences, the closer the two bit sequences are.
  • S503 Determine a modulation and coding scheme corresponding to the RTTI block according to the stealing frame bit sequence closest to the stealing frame bit sequence. Specifically, if the found Stealing Bits sequence closest to the obtained Stealing Bits sequence only corresponds to one modulation coding scheme, it may be determined that the modulation and coding scheme is a modulation coding scheme corresponding to the obtained RTTI Block.
  • the RTTI block obtained by the device is a first 10 ms RTTI block in a 20 ms period, and the Stealing Bits sequence in the obtained RTTI block and the three Stealings that may be carried in the first 10 ms RTTI block shown in Table 1 respectively.
  • the Stealing Bits sequence in the obtained RTTI Block is closest to the sequence 1, since the sequence 1 only corresponds to CS-1, it can be directly determined that the obtained RTTI Block corresponds to CS-1.
  • the obtained RTTI Block correspondence is obtained according to the CPS in the block header of the RLC/MAC block of the obtained RTTI Block obtained by the modulation coding. Modulation coding scheme. For example, if the obtained RTTI block is a RTTI block of the last 10 ms in a 20 ms period, the Stealing Bits sequence in the obtained RTTI Block and the three Stealing Bits sequences that may be carried in the last 10 ms RTTI Block shown in Table 1 respectively.
  • the Stealing Bits sequence in the obtained RTTI Block is closest to the sequence 2, since the sequence 2 corresponds to the five modulation coding schemes of MCS-0 or MCS-1 ⁇ 4, it is necessary to use the RLC.
  • the CPS in the block header of the /MAC block distinguishes which modulation coding scheme corresponds to the obtained RTTI Block.
  • the obtained Stealing Bits sequence of the 10 ms RTTI Block in the same 20 ms period may be obtained with the additional The modulation coding scheme corresponding to the closest Stealing Bits sequence among the three Stealing Bits sequences that may be carried by the 10 ms RTTI Block is used as the modulation coding scheme corresponding to the obtained RTTI Block.
  • the modulation coding scheme of the block is the same, so that the modulation coding scheme corresponding to the RTTI block cannot be unambiguously determined by the Stealing Bits sequence in an RTTI block obtained, and then the other RTTI block of the same 20 ms period can be obtained.
  • the Stealing Bits sequence determines which modulation coding scheme the RTTI Block corresponds to.
  • the specific logical relationship is that the sequence corresponding to 10ms before and after CS-1 is 1; the sequence corresponding to 10ms before and after the RTTI USF mode of MCS-0 or MCS1-4 is 2; ⁇ USF mode of MCS-0 or MCS1-4 The sequence corresponding to the first 10ms is 3, and the sequence corresponding to the last 10ms is 4.
  • the Stealing Bits sequence in the first 10 ms RTTI Block obtained is the same as Sequence 1 and Sequence 2 shown in Table 1.
  • the Stealing Bits sequence in the RTTI Block obtained in the last 10 ms is shown in Table 1.
  • the three Stealing Bits sequences that the last 10 ms RTTI Block may carry are compared. If the Stealing Bits sequence in the RTTI Block of the last 10 ms is closest to the sequence 1, it can be determined that the obtained RTTI Block corresponds to CS-1. .
  • the Stealing Bits sequence in the RTTI Block of the last 10 ms is closest to the sequence 2
  • the CPS in the block header of the block distinguishes the modulation coding scheme corresponding to the obtained RTTI Block.
  • the Stealing Bits sequence in the first 10ms RTTI Block may be closest to Sequence 3. In this case, the corresponding method can be adopted according to the actual situation.
  • the obtained first 10 ms RTTI can be initially determined.
  • the Stealing Bits sequence in the Block is closest to Sequence 3, and then the modulation coding scheme corresponding to the obtained RTTI Block is distinguished according to the CPS in the block header of the RLC/MAC block.
  • the Stealing Bits sequence in the first 10 ms RTTI Block is close to the sequence 3
  • the Stealing Bits sequence in the RTTI Block of the first 10 ms is close to the sequence 1 or the sequence 2, and after 10 ms, 10 ms later.
  • the closeness of the Stealing Bits sequence in the TTI Block to the sequence 4 is equal to the proximity of the Stealing Bits sequence in the RTTI Block of the last 10 ms to the sequence 1 or the sequence 2, indicating that the bit error rate is likely to be large.
  • the three choose one or use blind detection to determine the modulation coding scheme corresponding to the obtained RTTI block.
  • the obtained Stealing Bits sequence in the first 10 ms RTTI Block is the closest to Sequence 1 and Sequence 2 shown in Table 1, and the 10 ms after the combination, the Stealing Bits sequence and Sequence 1 in the RTM Block after 10 ms.
  • the proximity is equal to the proximity of sequence 2, then you can choose either directly or use blind detection.
  • a method is to determine a modulation coding scheme corresponding to the obtained RTTI block.
  • the blind test please refer to the following, and I will not repeat them here.
  • those skilled in the art can also use other methods to solve the problem of determining the modulation coding scheme when the obtained Stealing Bits sequence is the same as the multiple sequences, and no longer, more embodiments are listed.
  • steps S501, S502, and S503 may be a terminal, such as an MS.
  • the method shown in FIG. 5 can be implemented by multiple forms of devices.
  • One device for distinguishing the modulation and coding scheme corresponding to the radio block is as shown in FIG. 6, and includes: an obtaining unit 601 for obtaining the steal in the RTTI Block.
  • the comparing unit 602 configured to compare the frame stealing bit sequence obtained by the obtaining unit 601 with all the stealing frame bit sequences that may be carried by the RTTI block, from all the stolen frames that may be carried A sequence of stealing frame bits closest to the sequence of the stolen frame bits is found in the bit sequence; determining unit 603 is configured to use at least the frame stealing bit sequence found by the comparing unit 602 and the stolen frame bit sequence as at least Based on a determination, a modulation coding scheme corresponding to the RTTI Block is determined.
  • the base station when it sends information to the MS, it first needs to use a modulation and coding scheme to modulate the RLC/MAC block into a radio block, and then send the radio block to the MS, where the radio block carries the Stealing Bits sequence.
  • the RTTI Block is obtained by the obtaining unit 601, and after the obtaining unit 601 obtains the RTTI Block, the Stealing Bits sequence therein can be completely obtained. If the RTTI block obtained by the obtaining unit 601 is the first 10 ms RTTI block in the 20 ms period, all the Stealing Bits sequences that the RTTI Block obtained by the obtaining unit 601 may carry are the possible TTI blocks of the first 10 ms shown in Table 1. Three Stealing Bits sequences (in Table 1)
  • the comparison list Element 602 can compare the Stealing Bits sequence to all Stealing Bits sequences that the RTTI Block may carry.
  • the Stealing Bits sequence that the matching unit 602 will obtain is respectively three types that may be carried by the first 10 ms RTTI Block shown in Table 1.
  • the Stealing Bits sequence is compared; if the RTTI Block obtained by the ⁇ obtaining unit 601 is an RTTI Block of the last 10 ms of the 20 ms period, the Stealing Bits sequence obtained by the matching unit 602 and the RTTI of the last 10 ms shown in Table 1 respectively.
  • the three Stealing Bits sequences that the Block may carry are compared.
  • the Stealing Bits sequence closest to the obtained Stealing Bits sequence is found from all Stealing Bits sequences that the RTTI Block may carry.
  • the proximity between the Stealing Bits sequence obtained by the acquisition unit 601 and all Stealing Bits sequences that the RTTI Block may carry can be measured using the Hamming distance.
  • the matching unit 602 finds that the Stealing Bits sequence closest to the obtained Stealing Bits sequence from all Stealing Bits sequences that the RTTI Block may carry is substantially obtained from the Stealing Bits sequence that may be carried by the RTTI Block and obtained by the obtaining unit 601.
  • the determining unit 603 may include a distinguishing module, if the Stealing Bits sequence closest to the Stealing Bits sequence found by the comparing unit 602 corresponds to only one modulation and coding scheme, the distinguishing module may directly determine the modulation and coding scheme. That is, the modulation coding scheme corresponding to the RTTI block. For example, assuming that the RTTI block obtained by the obtaining unit 601 is an RTTI block of the first 10 ms in a 20 ms period, the comparison unit 602 obtains the Stealing Bits sequence in the RTTI Block obtained by the unit 601 and the first 10 ms shown in Table 1, respectively.
  • the distinguishing module After the three Stealing Bits sequences that the RTTI Block may carry are compared, if the Stealing Bits sequence in the RTTI Block obtained by the obtaining unit 601 is closest to the sequence 1, then since the sequence 1 only corresponds to CS-1, the distinguishing module can directly determine The obtained RTTI Block corresponds to CS-1. If the Stealing Bits sequence closest to the Stealing Bits sequence found by the comparing unit 602 corresponds to multiple modulation and coding schemes, the distinguishing module may encode the CPS in the block header of the RLC/MAC block of the RTTI Block according to the modulation. To distinguish the modulation coding scheme corresponding to the RTTI Block.
  • the matching unit 602 will obtain the Stealing Bits in the RTTI Block obtained by the unit 601.
  • the sequence is compared with the three Stealing Bits sequences that may be carried by the RTIO block of the last 10 ms shown in Table 1, if the Stealing Bits sequence in the RTTI Block obtained by the obtaining unit 601 is closest to the sequence 2, then the sequence 2 corresponds to
  • the five modulation coding schemes are MCS-0 or MCS-1 ⁇ 4, so the distinguishing module also needs to use the CPS in the block header of the RLC/MAC block to distinguish which modulation coding scheme corresponds to the obtained RTTI Block.
  • the determining unit 603 may also include a distinguishing module, if the Stealing Bits sequence that is closest to the Stealing Bits sequence obtained by the obtaining unit 601 by the comparing unit 602 is a plurality of Stealing Bits sequences, the distinguishing module may obtain the same The modulation coding scheme corresponding to the Stealing Bits sequence of the other 10 ms RTTI Block in a 20 ms period and the closest Stealing Bits sequence among the three Stealing Bits sequences that the other 10 ms RTTI Block may carry as the modulation corresponding to the obtained RTTI Block Coding scheme.
  • the modulation coding schemes of the two radio blocks in the same 20 ms period are the same, so that if the distinguishing module passes the Stealing Bits sequence in an RTTI block obtained by the obtaining unit 601, the modulation corresponding to the RTTI block cannot be unambiguously determined.
  • the distinguishing module can determine which modulation coding scheme corresponds to the RTTI Block by obtaining the Stealing Bits sequence in another RTTI block of the same 20 ms period obtained by the unit 601.
  • the Stealing Bits sequence in the first 10 ms RTTI Block obtained by the obtaining unit 601 is the same as the sequence 1 and the sequence 2 shown in Table 1, and the matching unit 602 will again obtain the last 10 ms RTTI Block.
  • the Stealing Bits sequence is compared with the three Stealing Bits sequences that may be carried by the last 10 ms RTTI Block shown in Table 1. If the Stealing Bits sequence in the RTTI Block of the last 10 ms is closest to Sequence 1, the distinguishing module can determine the obtained The RTTI Block corresponds to CS-1.
  • the distinguishing module can initially determine that the Stealing Bits sequence in the obtained first 10 ms RTTI Block is closest to the sequence 2, and then according to the RLC/MAC.
  • the CPS in the block header of the block distinguishes the modulation coding scheme corresponding to the obtained RTTI Block.
  • the Stealing Bits sequence in the first 10ms RTTI Block may be closest to the sequence 3. In this case, the distinguishing module can take corresponding measures according to the actual situation.
  • the distinguishing module can initially determine the first 10 ms obtained.
  • the Stealing Bits sequence in the RTTI Block is closest to Sequence 3, and then the modulation coding scheme corresponding to the obtained RTTI Block is distinguished according to the CPS in the block header of the RLC/MAC block.
  • the Stealing Bits sequence and the Sequence 4 in the RTT Block after 10 ms is equal to the proximity of the Stealing Bits sequence in the RTTI Block to the sequence 1 or sequence 2 in the last 10 ms, indicating that the bit error rate is likely to be large.
  • the distinguishing module can directly select one or use the blind check. The way to determine the modulation coding scheme corresponding to the obtained RTTI Block.
  • the distinguishing module can directly determine the modulation coding scheme corresponding to the obtained RTTI block by using the blind detection method.
  • the distinguishing module may also use other methods to solve the problem of determining the modulation coding scheme when the obtained Stealing Bits sequence is the closest to the multiple sequences, and no longer, more embodiments are listed.
  • each unit in the apparatus shown in FIG. 6 may be disposed in a terminal (for example, an MS), and the units work in the terminal in the same manner as in the apparatus shown in FIG. Narration.
  • a terminal for example, an MS
  • the embodiments of the present invention will be described in detail below in conjunction with the processing techniques of Hamming distance.
  • the Stealing Bits sequence in the RTTI Block received by the MS is A
  • the Hamming distance between A and the sequence 1 "1,1,1,1,1,1,1" shown in Table 1 is dl, A.
  • the Hamming distance from the sequence 2 "0,0,0,1,0,1,1,0” is denoted as d2, A and the sequence 3 "0,0,0,0,0,0,1,0,1"
  • the Hamming distance is recorded as d3
  • the Hamming distance between A and the sequence 4 "0,1,0,1,1,0,1,0” is recorded as d4, and the minimum value in dl, d2, d3, d4 can indicate A. Which sequence is closest to it.
  • the MS uses the CPS in the block header of the RLC/MAC block to distinguish the RTTI block for signaling transmission corresponding to the MCS-0 and the RTTI for data transmission corresponding to the MCS-1 ⁇ 4. Block.
  • 5136 should be the sequence corresponding to 11101 ((11, d2, d3).
  • Else A should be the sequence corresponding to min(dl, d2, d4).
  • Else A should be the sequence corresponding to min(dl, d2, d3).
  • Else A should be the sequence corresponding to min(dl, d2, d4).
  • Else A should be the sequence corresponding to min(dl, d2, d3).
  • the Stealing Bits obtained in the first 10 ms and the last 10 ms may be different, but their corresponding modulation and coding schemes must be the same. If the Stealing Bits obtained in the first 10ms are sequence 1, then according to Table 1, the Stealing Bits obtained in the last 10ms are also listed as 1. In the same way, if the Stealing Bits obtained in the first 10ms are the sequence 3, then the Stealing obtained in the last 10ms Bits is sequence 4. Similarly, if the Stealing Bits obtained in the first 10ms are sequence 2, the Stealing Bits obtained in the last 10ms are also sequence 2.
  • the corresponding modulation and coding scheme is CS-1, and the corresponding radio block is the CSTI coded RTTI block of the RTTI USF mode for signaling transmission; A is sequence 2, and the corresponding modulation and coding scheme is MCS-0 or MCS-1 4.
  • the corresponding radio block is the MCTI-0 coded RTTI block of the RTTI USF mode for signaling transmission or the MCTI of the RTTI USF mode. -1 ⁇ 4 encoded RTTI block for data transmission; if it is judged that A is sequence 3, the corresponding modulation and coding scheme is MCS-0 or MCS-1 ⁇ 4, and the corresponding radio block is MCS-0 of BTTI USF mode.
  • the encoded RTTI Block for signaling transmission is the RTTI Block for data transmission encoded by MCS-1 ⁇ 4 of BTTI USF mode; if it is determined that A is sequence 4, the corresponding modulation and coding scheme is MCS-0 or MCS-1 ⁇ 4, the corresponding radio block is an RTTI block for signaling transmission of MCS-0 code of BTTI USF mode or an RTTI block for data transmission of MCS-1-4 code of BTTI USF mode;
  • the first 10ms of the 20ms period can correspond to 1, 2, 3, 20
  • the last 10ms of the ms period can correspond to 1, 2, and 4.
  • the Stealing Bits obtained in the first 10 ms is the sequence 2, and the MCS-0 is determined by the CPS, it may be determined that the corresponding radio block is the MCTI-0 coded RTTI block for signaling transmission in the RTTI USF mode;
  • the Stealing Bits obtained in 10ms is sequence 3, and the MCS-0 is determined by CPS, then it can be determined that the corresponding radio block is the MCTI-0 encoded BTTI USF mode for the RTTI Block for signaling transmission; if it is determined that the last 10 ms is obtained
  • the Stealing Bits is sequence 4, and the MCS-0 is determined by CPS, and it can be determined that the corresponding radio block is the MCTS-0 encoded BTTI USF mode for the RTTI Block for signaling transmission.
  • the CPS determines that it is MCS-1 ⁇ 4
  • the corresponding radio block is the MCS-1 ⁇ 4 code of the RTTI USF mode.
  • RTTI Block for data transmission If it is determined that the Stealing Bits obtained in the first 10ms are sequence 3, and it is determined by CPS that it is MCS-1 ⁇ 4, it can be determined that the corresponding radio block is the MCS-1 ⁇ 4 code of BTTI USF mode.
  • RTTI Block for data transmission; if it is determined that the Stealing Bits obtained in the last 10ms is sequence 4, and the MCS-0 is determined by CPS, the corresponding radio block is encoded by MCS-1 ⁇ 4 of BTTI USF mode for data transmission. RTTI Block.
  • the derivation process for the above judgment method is as follows: For the first 10ms, A should be close to the bit sequence 1 "1,1,1,1,1,1,1", 2 "0,0,0,1, 0,1,1,0" ,
  • the MS only needs to detect the Stealing Bits sequence in the RTTI Block.
  • the CPS in the RLC/MAC header of the RLC/MAC block, and the received RTTI can be received.
  • the modulation coding scheme of the Block is distinguished.
  • the modulation assignment scheme corresponding to the RTTI block used for signaling transmission may be explicitly indicated in the downlink assignment message, but this scheme excessively occupies the air interface resource, and the embodiment of the present invention is relative to this.
  • a technical solution can save air interface resources.
  • the scenario considered by the embodiment of the present invention covers all GMSK modulated RTTI TBF scenarios, and the embodiment of the present invention effectively ensures the correctness and success rate of the modulation and coding scheme corresponding to the MIMO-modulated RTTI block.
  • the embodiment of the present invention further provides a method for distinguishing a modulation and coding scheme corresponding to a radio block, including: first checking whether an RTTI block corresponds to a certain modulation and coding scheme, and if yes, determining corresponding to the RTTI block. Is such a modulation and coding scheme, otherwise, it is checked whether it is another modulation and coding scheme, and if so, it is determined that the RTTI block corresponds to the other modulation and coding scheme. Solution, otherwise, continue to check if it is another modulation and coding scheme, and so on, until it is determined which modulation coding scheme corresponds to the RTTI Block.
  • this technical solution is simply referred to as blind detection.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
  • ROM read-only memory
  • RAM random access memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for differentiating modulation coding schemes corresponding to radio blocks, includes that: a stealing bit sequence in a RTTI Block is obtained; the stealing bit sequence is compared respectively with all stealing bit sequences which may be carried by the RTTI Block, the closest stealing bit sequence to the stealing bit sequence is found from all the stealing bit sequences which may be carried; and a modulation coding scheme corresponding to the RTTI Block is determined according to the closest stealing bit sequence to the stealing bit sequence. A device and terminal for differentiating the modulation coding schemes corresponding to the radio blocks are also provided in the present invention. In the embodiments of the present invention, the modulation coding scheme corresponding to the obtained RTTI Block is accordingly determined by comparing the obtained stealing bit sequence with all stealing bit sequences which may be carried by the RTTI Block.

Description

区分无线块对应的调制编码方案的方法、 装置及终端  Method, device and terminal for distinguishing modulation coding scheme corresponding to radio block
本申请要求于 2008 年 12 月 19 日提交中国专利局、 申请号为 200810207529.5、 发明名称为 "区分无线块对应的调制编码方案的方法、 装置及 终端" 的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域 本发明涉及无线通信技术, 尤其涉及区分无线块(Block )使用的调制编码 方案的技术。 背景技术 This application claims priority to Chinese Patent Application No. 200810207529.5, entitled "Method, Apparatus and Terminal for Distinguishing Modulation and Coding Scheme Corresponding to Radio Blocks", filed on December 19, 2008, the entire contents of which are hereby incorporated by reference. This is incorporated herein by reference. TECHNICAL FIELD The present invention relates to wireless communication technologies, and more particularly to techniques for distinguishing a modulation coding scheme used by a radio block. Background technique
在全球移动通信 ( GSM, Global System for Mobile communications )、 通用 分组无线业务( GPRS, General Packet Radio Service )系统、增强 GPRS ( EGP S ) 网络中, 临时块流( TBF, Temporary Block Flow )是移动台( MS , Mobile Station ) 和网络侧之间临时的连接, 只在数据转发的过程中才存在。 一个 TBF可以在一 个或多个分组数据信道 ( PDCH, Packet Data Channel ) 上使用无线资源。 数据 传输在物理层的最小调度单元是无线块( Block )。 每个无线块由 4个时隙 (TS, Timeslot ) (突发脉冲 Burst )组成,且分别位于 4个连续的时分多址接入( TDMA, Time Division Multiple Access )帧。一个 TDMA帧由 8个时隙组成,一般为 5ms, 所以,每个无线块的传输时间间隔( TTI, Transmission Timing Interval )都是 20ms, 这样的无线块也可以称为基本传输时间间隔 (BTTI, Basic TTI ) Block。  In Global Mobile for Mobile Communications (GSM), General Packet Radio Service (GPRS), and Enhanced GPRS (EPPS) networks, Temporary Block Flow (TBF) is a mobile station. Temporary connection between (MS, Mobile Station) and the network side, only exists during data forwarding. A TBF can use radio resources on one or more Packet Data Channels (PDCHs). The smallest scheduling unit for data transmission at the physical layer is a radio block. Each radio block consists of 4 time slots (TS, Timeslot) (burst Burst) and is located in 4 consecutive Time Division Multiple Access (TDMA) frames. A TDMA frame consists of 8 time slots, generally 5 ms. Therefore, the transmission timing interval (TTI, Transmission Timing Interval) of each radio block is 20 ms. Such a radio block can also be called a basic transmission time interval (BTTI, Basic TTI) Block.
GPRS和 EGPRS演进的目标之一就是减少传输时间间隔的时延。 为减少无 线块的传输时间间隔的时延, 本领域技术人员提出了减少传输时间间隔( RTTI, Reduced TTI )技术。 在 RTTI技术中, 保持每个无线块的大小不变, 通过在时 域增加多时隙带宽, 利用多时隙将 TTI减少到 10ms o BTTI Block如图 1中 Bl 所示; RTTI Block如图 1中 B2所示, 即, 使用了 RTTI技术的无线块, 由分布 在连续的 2个 TDMA帧中的 4个时隙组成。 由图 1可以看出, RTTI技术确实使 TTI减少到了 10ms。 引入 RTTI技术后, 一个无线块要么在一个 PDCH ( BTTI配置时)上传输, 要么在一个 PDCH对(RTTI配置时)上传输, 也就是说, 一个无线块要么在一 个时隙(BTTI配置时)上传输, 要么在一个时隙对(RTTI配置时)上传输。 网 絡侧通过控制信息为 MS指配使用的 PDCH (或 PDCH对)。 当 TBF是 BTTI配 置的 TBF (下文简称 BTTI TBF ) 时, 信道上传输的无线块是 BTTI Block ; 当 TBF是 RTTI配置的 TBF(下文简称 RTTI TBF )时,信道上传输的无线块是 RTTI Block。 另外, RTTI TBF有两种上行状态标识 (USF, Uplink State Flag )模式 ( mode ): BTTI USF mode和 RTTI USF mode。 引入 RTTI技术后, 对于高斯滤波最小频移键控(GMSK, Gaussian Filtered Minimum Shift Keying )调制, 用于信令传输的 RTTI Block对应的调制编码方案 为调制编码方案 (MCS , Modulation and Coding Scheme ) -0或编码方案 (CS , Coding Scheme )-1 ,用于数据传输的 RTTI Block对应的调制编码方案为 MCS-1、 MCS-2、 MCS-3或 MCS-4 (下文筒称 MCS-1~4 )。 这里需要说明的是, 网络侧 (一般是指基站) 向 MS发送信息时, 需要将无线链路控制 (RLC, Radio Link Control ) /媒体接入控制 (MAC, Media Access Control )层的 RLC/MAC块调制 编码为物理层的无线块, 在调制编码时, 需要使用一种调制编码方案, 这样, 调制编码后得到的无线块就对应一种调制编码方案。 在上行指派过程中 (MS向基站发送信息时), MS能够确定 USF mode是 RTTI USF mode还是 BTTI USF mode, 在 BTTI USF mode下, 用于信令传输的 RTTI Block总是对应 MCS-0;在 RTTI USF mode下,用于信令传输的 RTTI Block 对应的是 CS-1 或 MCS-0, MS可以通过检查 RTTI Block的偷帧标志 /偷帧比特 ( Stealing Flags/Stealing Bits )来区分用于信令传输的 RTTI Block对应的是 CS-1 还是 MCS-0 o 在下行指派过程中 (基站向 MS发送信息时), 虽然 MS可以确定网络侧为 其指派了 RTTI TBF, 但 MS不能确定 RTTI Block对应的是哪种调制编码方案, MS也不能确定 RTTI Block中的 Stealing Bits是 20ms格式 (如果 RTTI TBF是 BTTI USF mode )还是 10ms格式 (如果 RTTI TBF 是 RTTI USF mode )。 简而 言之, 当 MS接收到网络侧发出的 RTTI Block时 , 无法确定 RTTI Block对应的 是哪种调制编码方案。 发明内容 One of the goals of GPRS and EGPRS evolution is to reduce the delay of the transmission time interval. In order to reduce the delay of the transmission time interval of the radio block, those skilled in the art propose a technique of reducing the transmission time interval (RTTI, Reduced TTI). In the RTTI technology, the size of each radio block is kept unchanged. By increasing the multi-slot bandwidth in the time domain, the TTI is reduced to 10 ms by using multiple slots. BTTI Block is shown in Figure 1B1; RTTI Block is shown as B2 in Figure 1. As shown, the radio block using the RTTI technique consists of 4 slots distributed in two consecutive TDMA frames. As can be seen from Figure 1, the RTTI technique does reduce the TTI to 10ms. After the introduction of RTTI technology, a radio block is transmitted either on one PDCH (in BTTI configuration) or on one PDCH pair (RTTI configuration), that is, one radio block is in one time slot (BTI configuration) The uplink transmission is either transmitted on a time slot pair (RTTI configuration). The network side uses the control information for the PDCH (or PDCH pair) used by the MS. When the TBF is a TBTI configured TBF (hereinafter referred to as BTTI TBF), the radio block transmitted on the channel is a BTTI Block; when the TBF is an RTTI configured TBF (hereinafter referred to as RTTI TBF), the radio block transmitted on the channel is an RTTI Block. In addition, the RTTI TBF has two Uplink State Flag (USF) modes: BTTI USF mode and RTTI USF mode. After the introduction of the RTTI technology, for the Gaussian Filtered Minimum Shift Keying (GMSK) modulation, the modulation coding scheme corresponding to the RTTI block used for signaling transmission is the Modulation and Coding Scheme (MCS). 0 or coding scheme (CS, Coding Scheme)-1, the modulation coding scheme corresponding to the RTTI block used for data transmission is MCS-1, MCS-2, MCS-3 or MCS-4 (hereinafter referred to as MCS-1~4) ). It should be noted that when the network side (generally refers to the base station) sends information to the MS, it needs to use the RLC/MAC of the Radio Link Control (RLC)/Media Access Control (MAC) layer. The block modulation is coded as a radio block of the physical layer. When modulation coding is used, a modulation coding scheme is needed. Thus, the radio block obtained after modulation and coding corresponds to a modulation coding scheme. In the uplink assignment process (when the MS sends information to the base station), the MS can determine whether the USF mode is the RTTI USF mode or the BTTI USF mode. In the BTTI USF mode, the RTTI Block used for signaling transmission always corresponds to the MCS-0; In RTTI USF mode, the RTTI block used for signaling transmission corresponds to CS-1 or MCS-0. The MS can distinguish the letter by checking the RTTI Block's Stealing Flags/Stealing Bits. Let the transmitted RTTI block correspond to CS-1 or MCS-0 o. During the downlink assignment process (when the base station sends information to the MS), although the MS can determine that the network side has assigned the RTTI TBF, the MS cannot determine the RTTI Block corresponding. Which modulation coding scheme is used, MS cannot determine whether the Stealing Bits in the RTTI Block are in the 20ms format (if the RTTI TBF is BTTI USF mode) or the 10ms format (if the RTTI TBF is the RTTI USF mode). In short, when the MS receives the RTTI Block sent by the network side, it cannot determine which modulation and coding scheme corresponds to the RTTI Block. Summary of the invention
本发明实施例提供区分无线块对应的调制编码方案的方法、 装置及终端, 用以确定无线块对应的调制编码方案。 本发明一方面提供了一种区分无线块对应的调制编码方案的方法, 包括: 获得 RTTI Block中的偷帧比特序列; 将所述偷帧比特序列分别与 RTTI Block可 能携带的所有偷帧比特序列进行比对, 从所述可能携带的所有偷帧比特序列中 找到与所述偷帧比特序列最接近的偷帧比特序列; 根据所述与偷帧比特序列最 接近的偷帧比特序列确定所述 RTTI Block对应的调制编码方案。 本发明另一方面提供了一种区分无线块对应的调制编码方案的装置, 包括: 获得单元, 用于获得 RTTI Block中的偷帧比特序列; 比对单元, 用于将所述获 得单元获得的所述偷帧比特序列分别与 RTTI Block可能携带的所有偷帧比特序 列进行比对, 从所述可能携带的所有偷帧比特序列中找到与所述偷帧比特序列 最接近的偷帧比特序列; 确定单元, 用于根据所述比对单元找到的与所述偷帧 比特序列最接近的偷帧比特序列, 确定所述 RTTI Block对应的调制编码方案。 本发明又一方面提供了一种终端, 包括上述的区分无线块对应的调制编码 方案的装置。 在本发明的实施例中, 通过将获得的偷帧比特序列与 RTTI Block可能携带 的所有偷帧比特序列进行比对, 从而确定获得的 RTTI Block对应的调制编码方 案。。 附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施 例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述 中的附图仅仅是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付 出创造性劳动性的前提下, 还可以根据这些附图获得其他的附图。  Embodiments of the present invention provide a method, apparatus, and terminal for distinguishing a modulation and coding scheme corresponding to a radio block, to determine a modulation and coding scheme corresponding to the radio block. An aspect of the present invention provides a method for distinguishing a modulation and coding scheme corresponding to a radio block, including: obtaining a frame stealing bit sequence in an RTTI block; and respectively, the stealing frame bit sequence and all stealing frame bit sequences that may be carried by the RTTI block Performing an alignment, finding a frame stealing bit sequence closest to the frame stealing bit sequence from all the stolen frame bit sequences that may be carried; determining the according to the stealing frame bit sequence closest to the stealing frame bit sequence The modulation coding scheme corresponding to the RTTI Block. Another aspect of the present invention provides an apparatus for distinguishing a modulation and coding scheme corresponding to a radio block, including: an obtaining unit, configured to obtain a frame stealing bit sequence in an RTTI Block; and a matching unit, configured to obtain the obtained unit The frame stealing bit sequence is compared with all the stealing frame bit sequences that the RTTI block may carry, and the stealing frame bit sequence closest to the stealing frame bit sequence is found from all the stolen frame bit sequences that may be carried; a determining unit, configured to determine, according to the stealing frame bit sequence that is found by the comparing unit and closest to the stealing frame bit sequence, a modulation and coding scheme corresponding to the RTTI block. Still another aspect of the present invention provides a terminal comprising the above-described apparatus for distinguishing a modulation coding scheme corresponding to a radio block. In the embodiment of the present invention, the obtained punctured frame bit sequence is compared with all the sneak frame bit sequences that the RTTI block may carry, thereby determining the modulation coding scheme corresponding to the obtained RTTI block. . BRIEF DESCRIPTION OF THE DRAWINGS In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings to be used in the embodiments or the description of the prior art will be briefly described below, and obviously, in the following description The drawings are only some of the embodiments of the present invention, and other drawings may be obtained from those skilled in the art without departing from the drawings.
图 1为现有技术的 BTTI Block的示意图; 图 2A为对应 MCS-1~4的 BTTI Block中的 Stealing Bits的格式示意图; 图 2B为对应 CS-1的 BTTI Block中的 Stealing Bits的格式示意图; 图 3为对应 MCS-0〜4的 RTTI Block在 BTTI USF模式时的 Stealing Bits的 格式示意图; 1 is a schematic diagram of a prior art BTTI Block; FIG. 2A is a schematic diagram of a format of Stealing Bits in a BTTI Block corresponding to MCS-1~4; 2B is a schematic diagram of a format of Stealing Bits in a BTTI Block corresponding to CS-1; FIG. 3 is a schematic diagram of a format of Stealing Bits corresponding to an RTTI Block of MCS-0~4 in a BTTI USF mode;
图 4A为对应 CS-1的 RTTI Block在 RTTI USF模式时的 Stealing Bits的格 式示意图;  4A is a schematic diagram of a format of Stealing Bits corresponding to the RT-1 block of the CS-1 in the RTTI USF mode;
图 4B为对应 MCS-0~4的 RTTI Block在 RTTI USF模式时的 Stealing Bits 的格式示意图;  4B is a schematic diagram showing the format of Stealing Bits corresponding to the RTS Block of the MCS-0~4 in the RTTI USF mode;
图 5为本发明实施例的一种区分无线块对应的调制编码方案的方法流程图; 图 6 为本发明实施例的一种区分无线块对应的调制编码方案的装置结构示 意图。 具体实施方式 下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行清 楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是 全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作出创造 性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。  FIG. 5 is a flowchart of a method for distinguishing a modulation and coding scheme corresponding to a radio block according to an embodiment of the present invention; FIG. 6 is a schematic structural diagram of an apparatus for distinguishing a modulation and coding scheme corresponding to a radio block according to an embodiment of the present invention. The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. example. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative work are within the scope of the present invention.
为便于本领域技术人员更加清楚的理解本发明实施例, 这里首先对下面实 施例涉及到的一些技术点进行说明。 用于信令传输的 BTTI Block对应的调制编码方案是 CS-1 ,用于数据传输的 BTTI Block对应的调制编码方案是 MCS-1〜4。 MS可以使用 BTTI Block中的 Stealing Bits来区分 CS-1和 MCS-1〜4。使用 MCS-1~4的 BTTI Block的 Stealing Bits的格式如图 2A的 8个比特所示, 即 00010110; 使用 CS-1的 BTTI Block 的 Stealing Bits的格式如图 2B的 8个比特所示, 即 11111111。 另夕卜, TB表示尾 比特, TS表示训练序列, B0、 Bl、 B2、 B3分别表示第 0个 Burst、第 1个 Burst、 第 2个 Burst、 第 3个 Burst。  In order to facilitate a clear understanding of the embodiments of the present invention by those skilled in the art, some technical points involved in the following embodiments are first described herein. The modulation coding scheme corresponding to the BTTI Block used for signaling transmission is CS-1, and the modulation coding scheme corresponding to the BTTI Block for data transmission is MCS-1~4. The MS can use the Stealing Bits in the BTTI Block to distinguish between CS-1 and MCS-1~4. The format of Stealing Bits using BTTI Block of MCS-1~4 is shown as 8 bits in Figure 2A, ie 00010110; the format of Stealing Bits using BTTI Block of CS-1 is as shown in the 8 bits of Figure 2B, ie 11111111. In addition, TB represents a tail bit, TS represents a training sequence, and B0, Bl, B2, and B3 represent a 0th Burst, a 1st Burst, a 2nd Burst, and a 3rd Burst, respectively.
RTTI TBF使用 BTTI USF模式时, 用于信令传输的 RTTI Block对应的调制 编码方案是 MCS-0 , 用于数据传输的 RTTI Block 对应的调制编码方案是 MCS-1~4。 MS可以使用 RLC/MAC块的 RLC/MAC头中的编码打孔方案指示 ( CPS, Coding and Puncturing Scheme )来区分 MCS-0和 MCS- 1〜4。 此时, MS 不能使用 Stealing Bits来区分 MCS-0和 MCS- 1〜4 , 因为它们对应的 Stealing Bits 相同。 如图 3所示, 对应 MCS-1〜4或 MCS-0的前 10毫秒( ms ) 的 RTTI Block 中的 Stealing Bits的格式如上边虛线框内的 8个比特所示, 即 00000101 ; 对应 MCS-1-4或 MCS-0的后 10ms的 RTTI Block中的 Stealing Bits的格式如下边虚 线框内的 8个比特所示, 即 01011010; 其中, 这里的前 10ms和后 10ms是指同 一个 20ms周期内的前 10ms和后 10ms, 20ms周期从基站开始向 MS发送信息 起开始计算。 When the RTTI TBF uses the BTTI USF mode, the modulation coding scheme corresponding to the RTTI block used for signaling transmission is MCS-0, and the modulation coding scheme corresponding to the RTTI Block for data transmission is MCS-1~4. The MS may use the coded puncturing scheme indication in the RLC/MAC header of the RLC/MAC block (CPS, Coding and Puncturing Scheme) to distinguish between MCS-0 and MCS-1~4. At this point, MS cannot use Stealing Bits to distinguish between MCS-0 and MCS-1 to 4 because they correspond to the same Stealing Bits. As shown in Figure 3, the format of the Stealing Bits in the RTTI Block corresponding to the first 10 milliseconds (ms) of MCS-1~4 or MCS-0 is as shown by the 8 bits in the dotted line box, ie 00000101; corresponding to MCS The format of Stealing Bits in the RTTI Block of -1-4 or MCS-0 is as follows: 8 bits in the dotted line box, that is, 01011010; where, the first 10ms and the last 10ms refer to the same 20ms period. The first 10 ms and the last 10 ms, the 20 ms period starts from the base station to start transmitting information to the MS.
RTTI TBF使用 RTTI USF模式时, 用于信令传输的 RTTI Block对应的调制 编码方案是 CS-1或 MCS-0, 用于数据传输的 RTTI Block对应的调制编码方案 是 MCS-1~4。 如果 MS发现 RTTI Block中的 Stealing Bits对应的是 CS-1 , 则 MS就可将对应 CS-1的 RTTI Block和对应 MCS-l~4/MCS-0的 RTTI Block区分 开来; 如果 MS发现 RTTI Block中的 Stealing Bits对应的是 MCS- 1〜4/MCS-0 , 则 MS可以去检查 RLC/MAC块头中的 CPS,这样就可以将对应 MCS-0的 RTTI Block和对应 MCS1-4的 RTTI Block区分开来。 对应 MCS-1~4或 MCS-0的前 10ms以及后 10ms的 RTTI Block中的 Stealing Bits的格式如图 4A的 8个比特所 示,即 00010110;对应 CS-1的前 10ms及后 10ms的 RTTI Block中的 Stealing Bits 的格式如图 4B的 8个比特所示, 即 11111111。 When the RTTI TBF uses the RTTI USF mode, the modulation coding scheme corresponding to the RTTI block used for signaling transmission is CS-1 or MCS-0, and the modulation coding scheme corresponding to the RTTI block used for data transmission is MCS-1~4. If the MS finds that the Stealing Bits in the RTTI Block correspond to CS-1, the MS can distinguish the RTTI Block corresponding to CS-1 from the RTTI Block corresponding to MCS-l~4/MCS-0; if the MS finds RTTI The Stealing Bits in the Block correspond to MCS-1~4/MCS-0, then the MS can check the CPS in the RLC/MAC block header, so that the RTTI Block corresponding to MCS-0 and the RTTI Block corresponding to MCS1-4 can be obtained. differentiate. The format of the Stealing Bits in the RTTI Block corresponding to the first 10 ms and the last 10 ms of MCS-1~4 or MCS-0 is as shown in the 8 bits of FIG. 4A, that is, 00010110; corresponding to the first 10 ms and the last 10 ms RTTI of CS-1 The format of the Stealing Bits in the Block is shown in the 8 bits of Figure 4B, which is 11111111.
由于下文需要再次提及 Stealing Bits的格式(也可以称为 Stealing Bits序列;), 所以为便于引用 Stealing Bits的格式,本发明实施例用表 1的形式来说明 Stealing Bits的格式。  Since the format of the Stealing Bits (which may also be referred to as a Stealing Bits sequence;) is referred to below, in order to facilitate the reference to the format of the Stealing Bits, the embodiment of the present invention uses the form of Table 1 to describe the format of the Stealing Bits.
Stealing Bits的定义 20ms 块周期的 20ms块周期的后 10ms 前 10ms 对应 MCS-1~4 的 ©ο,ο,ο,ο,ο,ι,ο,ι ④ 0,1,0,1, 1,0,1,0 The definition of Stealing Bits is 20ms. The last 10ms of the 20ms block period is 10ms. The first 10ms corresponds to MCS-1~4. ©ο,ο,ο,ο,ο,ι,ο,ι 4 0,1,0,1, 1, 0,1,0
RTTI Block在 BTTI USF  RTTI Block at BTTI USF
模式时 对应 MCS-0 的 0,0,0,0,0,1,0,1 0,1,0,1,1,0,1,0  In mode, it corresponds to 0,0,0,0,0,1,0,1 0,1,0,1,1,0,1,0 of MCS-0.
RTTI Block在 BTTI USF  RTTI Block at BTTI USF
模式时 对应 MCS-1~4 的 ©ο,ο,ο,ι,ο,ι,ι,ο 0,0,0,1,0,1,1,0 Mode Corresponding to MCS-1~4 ©ο,ο,ο,ι,ο,ι,ι,ο 0,0,0,1,0,1,1,0
RTTI Block在 RTTI USF  RTTI Block at RTTI USF
模式时  Mode
对应 MCS-0 的 0,0,0,1,0,1,1,0 0,0,0,1,0,1,1,0  0,0,0,1,0,1,1,0 0,0,0,1,0,1,1,0 corresponding to MCS-0
RTTI Block在 RTTI USF  RTTI Block at RTTI USF
模式时  Mode
对应 CS-1 的 RTTI ® 1,1,1,1,1,1,1,1 1,1,1,1,1,1,1,1  Corresponding to CS-1 RTTI ® 1,1,1,1,1,1,1,1 1,1,1,1,1,1,1,1
Block在 RTTI USF模式  Block in RTTI USF mode
 Time
下面对本发明实施例的一种区分无线块对应的调制编码方案的方法进行说 明。 如图 5所示, 包括: A method for distinguishing a modulation and coding scheme corresponding to a radio block according to an embodiment of the present invention is described below. As shown in Figure 5, it includes:
S501 : 获得 RTTI Block中的偷帧比特序列。 在实际应用中, 基站向 MS 发送信息时, 先需要使用一种调制编码方案将 RLC/MAC块调制编码为无线块, 之后再将无线块发给 MS, 其中, 无线块携带 有 Stealing Bits序列。 MS获得 TTI Block后,完全可以获得其中的 Stealing Bits 序列。  S501: Obtain a frame stealing bit sequence in the RTTI Block. In practical applications, when the base station sends information to the MS, it first needs to use a modulation and coding scheme to modulate the RLC/MAC block into a radio block, and then send the radio block to the MS, where the radio block carries the Stealing Bits sequence. After the MS obtains the TTI Block, the Stealing Bits sequence can be completely obtained.
另外, 根据现有的协议记载, 从基站开始向 MS发送信息时起每 20ms为一 个周期(即, BTTI Block周期 ),在每 20ms周期内,基站会向 MS发送两个 RTTI Block, 而每个 RTTI Block分别对应一个 10ms (即, RTTI Block周期), 并且两 个 RTTI Block对应的调制编码方案相同。 所以, 获得的 RTTI Block也可以说是 某个 20ms周期的前 10ms的 RTTI Block或者是某个 20ms周期的后 10ms的 RTTI Blocko  In addition, according to the existing protocol, the base station transmits one RTC block every 20 ms from the time when the base station starts transmitting information to the MS (ie, the BTTI Block period), and every 20 ms period, the base station sends two RTTI blocks to the MS, and each The RTTI Blocks correspond to a 10ms (ie, RTTI Block period), and the modulation coding schemes corresponding to the two RTTI Blocks are the same. Therefore, the obtained RTTI Block can also be said to be the first 10ms RTTI Block of a 20ms period or the last 10ms RTTI Blocko of a 20ms period.
S502: 将所述偷帧比特序列分别与 RTTI Block可能携带的所有偷帧比特序 列进行比对, 从所述可能携带的所有偷帧比特序列中找到与所述偷帧比特序列 最接近的偷帧比特序列。 S502: Compare the frame stealing bit sequence with all stealing frame bit sequences that may be carried by the RTTI block, and find a frame stealing frame closest to the stealing frame bit sequence from all the stolen frame bit sequences that may be carried. Bit sequence.
如果获得的 RTTI Block是 20 ms周期中的前 10ms的 RTTI Block, 则获得 的 RTTI Block可能携带的所有 Stealing Bits序列是表 1所示的前 10 ms的 RTTI Block可能携带的三种 Stealing Bits序列 (表 1中的①②③); 如果获得的 RTTI Block是 20 ms周期中的后 10ms的 RTTI Block, 则获得的 RTTI Block可能携带 的所有 Stealing Bits序列是表 1所示的后 10 ms的 RTTI Block可能携带的三种 Stealing Bits序列 (表 1中的①②④)。 在实际应用中, 信息经过无线信道传输会受到干扰, 这样就可能造成接收 到的比特序列与原发送的比特序列不完全一致, 对此, 接收方可以将与接收值 最相近的可能值判定为原发送值。 所以, 在本发明实施例中, 获得 Stealing Bits序列后, 可以将 Stealing Bits 序列分别与 RTTI Block可能携带的所有 Stealing Bits序列进行比对。 例如, 如 果获得的 RTTI Block是一个 20ms周期的前 10ms的 RTTI Block,那么就将获得 的 Stealing Bits序列分别与表 1所示的前 10ms的 RTTI Block可能携带的三种 Stealing Bits序列进行比对;如果获得的 RTTI Block是一个 20ms周期的后 10ms 的 RTTI Block, 那么就将获得的 Stealing Bits序列分别与表 1所示的后 10ms的 RTTI Block可能携带的三种 Stealing Bits序列进行比对。 比对后, 从 RTTI Block 可能携带的所有 Stealing Bits序列中找到与获得的 Stealing Bits序列最接近的 Stealing Bits序列。 获得的 Stealing Bits序列与 RTTI Block可能携带的所有 Stealing Bits序列之 间的接近程度可以使用汉明距离来衡量。 这样, 从 RTTI Block可能携带的所有 Stealing Bits序列中找到与获得的 Stealing Bits序列最接近的 Stealing Bits序列实 质上就是从 RTTI Block 可能携带的所有 Stealing Bits 序列中找到与获得的 Stealing Bits序列之间汉明距离最小的 Stealing Bits序列。 下面介绍一下汉明距离。 If the obtained RTTI Block is the first 10 ms RTTI Block in the 20 ms period, then All Stealing Bits sequences that may be carried by the RTTI Block are the three Stealing Bits sequences that may be carried by the first 10 ms RTTI Block shown in Table 1 (123 in Table 1); if the obtained RTTI Block is after the 20 ms period For a 10 ms RTTI block, all Stealing Bits sequences that the obtained RTTI Block may carry are the three Stealing Bits sequences that may be carried by the RTIO Block of the last 10 ms shown in Table 1 (124 in Table 1). In practical applications, information transmitted through the wireless channel may be interfered, which may cause the received bit sequence not to be completely consistent with the originally transmitted bit sequence. In this regard, the receiver may determine the possible value closest to the received value as Originally sent value. Therefore, in the embodiment of the present invention, after obtaining the Stealing Bits sequence, the Stealing Bits sequence can be compared with all Stealing Bits sequences that the RTTI Block may carry. For example, if the obtained RTTI block is a first 10 ms RTTI block of a 20 ms period, the obtained Stealing Bits sequence is respectively compared with the three Stealing Bits sequences that may be carried by the first 10 ms RTTI Block shown in Table 1; If the obtained RTTI Block is an RTTI Block of the last 10 ms of the 20 ms period, the Stealing Bits sequence obtained is compared with the three Stealing Bits sequences that may be carried by the RTIO Block of the last 10 ms shown in Table 1. After the alignment, the Stealing Bits sequence closest to the obtained Stealing Bits sequence was found from all Stealing Bits sequences that the RTTI Block may carry. The proximity between the obtained Stealing Bits sequence and all Stealing Bits sequences that the RTTI Block may carry can be measured using the Hamming distance. Thus, the Stealing Bits sequence closest to the Stealing Bits sequence obtained from all the Stealing Bits sequences that the RTTI Block may carry is essentially the Stealing Bits sequence found between the Stealing Bits sequence that may be carried by the RTTI Block. The Steinging Bits sequence with the smallest distance. The following describes the Hamming distance.
在一个码组集合中, 任意两个码字之间对应位上码元取值不同的位的数目 定义为这两个码字之间的汉明距离。 即, d(x,y)=∑x[i] y[i] , 在这里, i=0,l,..n-l, x,y都是 n位的编码, 表示异或。 例如, 00与 01的距离是 1, 110和 101的距 离是 2。  In a code group set, the number of bits whose values on the corresponding bits between any two code words are different is defined as the Hamming distance between the two code words. That is, d(x, y) = ∑ x [i] y [i] , where i = 0, l, .. n - l, x, y are all n-bit codes, indicating exclusive OR. For example, the distance between 00 and 01 is 1, and the distance between 110 and 101 is 2.
在一个码组集合中, 任意两个编码之间汉明距离的最小值称为这个码组的 最小汉明距离。 简单的说, 在本发明实施例中, 所谓汉明距离就是两个比特序列之间对应 比特值不相同的个数, 例如, 比特序列 "1,1,1,1,1,1,1,1 " 和 "0,0,0,1,0,1,1,0" 的汉明距离为 5, "0,0,0,1,0,1,1,0" 和 "0,0,0,0,0,1,0,1 " 的汉明距离为 3。 两个 比特序列之间汉明距离越大, 越容易区分。 两个比特序列之间的汉明距离为零, 则表明两个比特序列相同。 两个比特序列之间的汉明距离越小, 则表明两个比 特序列越接近。 In a set of code groups, the minimum Hamming distance between any two codes is called the minimum Hamming distance of this code group. In short, in the embodiment of the present invention, the Hamming distance is a number of corresponding bit values between two bit sequences, for example, the bit sequence "1, 1, 1, 1, 1, 1, 1, The Hamming distance between 1 " and 0,0,0,1,0,1,1,0" is 5, "0,0,0,1,0,1,1,0" and "0,0, The Hamming distance of 0,0,0,1,0,1 " is 3. The larger the Hamming distance between two bit sequences, the easier it is to distinguish. A Hamming distance between two bit sequences is zero, indicating that the two bit sequences are identical. The smaller the Hamming distance between two bit sequences, the closer the two bit sequences are.
S503 : 根据所述与偷帧比特序列最接近的偷帧比特序列确定所述 RTTI Block对应的调制编码方案。 具体的, 如果所述找到的与获得的 Stealing Bits序列最接近的 Stealing Bits 序列只对应一种调制编码方案, 则可以确定所述调制编码方案即为获得的 RTTI Block对应的调制编码方案。例如, 4艮设获得的 RTTI Block是一个 20 ms周期内 的前 10ms的 RTTI Block,将获得的 RTTI Block中的 Stealing Bits序列分别与表 1所示的前 10ms的 RTTI Block可能携带的三种 Stealing Bits序列进行比对后, 如果获得的 RTTI Block中的 Stealing Bits序列与序列①最接近, 那么由于序列 ①只对应 CS- 1 , 所以可以直接确定获得的 RTTI Block对应的是 CS- 1。  S503: Determine a modulation and coding scheme corresponding to the RTTI block according to the stealing frame bit sequence closest to the stealing frame bit sequence. Specifically, if the found Stealing Bits sequence closest to the obtained Stealing Bits sequence only corresponds to one modulation coding scheme, it may be determined that the modulation and coding scheme is a modulation coding scheme corresponding to the obtained RTTI Block. For example, the RTTI block obtained by the device is a first 10 ms RTTI block in a 20 ms period, and the Stealing Bits sequence in the obtained RTTI block and the three Stealings that may be carried in the first 10 ms RTTI block shown in Table 1 respectively. After the alignment of the Bits sequence, if the Stealing Bits sequence in the obtained RTTI Block is closest to the sequence 1, since the sequence 1 only corresponds to CS-1, it can be directly determined that the obtained RTTI Block corresponds to CS-1.
如果所述找到的与获得的 Stealing Bits序列最接近的 Stealing Bits序列对应 多种调制编码方案, 则根据调制编码为获得的 RTTI Block的 RLC/ MAC块的块 头中的 CPS来区分获得的 RTTI Block对应的调制编码方案。 例如, 假设获得的 RTTI Block是一个 20 ms周期内的后 10ms的 RTTI Block,将获得的 RTTI Block 中的 Stealing Bits序列分别与表 1所示的后 10ms的 RTTI Block可能携带的三种 Stealing Bits序列进行比对后, 如果获得的 RTTI Block中的 Stealing Bits序列与 序列②最接近, 那么由于序列②对应的是 MCS-0或 MCS-1~4这 5种调制编码 方案, 所以还得需要使用 RLC/ MAC 块的块头中的 CPS 来区分获得的 RTTI Block对应的是哪种调制编码方案。  If the found Stealing Bits sequence closest to the obtained Stealing Bits sequence corresponds to a plurality of modulation coding schemes, the obtained RTTI Block correspondence is obtained according to the CPS in the block header of the RLC/MAC block of the obtained RTTI Block obtained by the modulation coding. Modulation coding scheme. For example, if the obtained RTTI block is a RTTI block of the last 10 ms in a 20 ms period, the Stealing Bits sequence in the obtained RTTI Block and the three Stealing Bits sequences that may be carried in the last 10 ms RTTI Block shown in Table 1 respectively. After the comparison, if the Stealing Bits sequence in the obtained RTTI Block is closest to the sequence 2, since the sequence 2 corresponds to the five modulation coding schemes of MCS-0 or MCS-1~4, it is necessary to use the RLC. The CPS in the block header of the /MAC block distinguishes which modulation coding scheme corresponds to the obtained RTTI Block.
如果所述找到的与获得的 Stealing Bits序列最接近的 Stealing Bits序列是多 种 Stealing Bits序列, 则可以将获得的同一个 20ms周期内的另夕卜 10ms的 RTTI Block 的 Stealing Bits 序列与所述另外 10ms 的 RTTI Block 可能携带的三种 Stealing Bits序列中最接近的 Stealing Bits序列对应的调制编码方案作为获得的 RTTI Block对应的调制编码方案。 上面提到过, 同一个 20ms周期内的两个无线 块的调制编码方案相同,这样,如杲通过获得的一个 RTTI Block中的 Stealing Bits 序列不能明确的确定这个 RTTI Block对应的调制编码方案, 那么可以通过获得 的同一个 20ms周期的另一个 RTTI Block 中的 Stealing Bits序列来确定 RTTI Block对应的到底是哪种调制编码方案。 具体的逻辑关系是, CS-1 前后 10ms 对应的序列都是①; MCS-0或 MCS1-4的 RTTI USF模式情况前后 10ms对应的 序列都是②; MCS-0或 MCS1-4的 ΒΤΉ USF模式情况前 10ms对应的序列是③, 后 10ms对应的序列是④。 If the Stealing Bits sequence found closest to the obtained Stealing Bits sequence is a plurality of Stealing Bits sequences, the obtained Stealing Bits sequence of the 10 ms RTTI Block in the same 20 ms period may be obtained with the additional The modulation coding scheme corresponding to the closest Stealing Bits sequence among the three Stealing Bits sequences that may be carried by the 10 ms RTTI Block is used as the modulation coding scheme corresponding to the obtained RTTI Block. As mentioned above, two wireless in the same 20ms period The modulation coding scheme of the block is the same, so that the modulation coding scheme corresponding to the RTTI block cannot be unambiguously determined by the Stealing Bits sequence in an RTTI block obtained, and then the other RTTI block of the same 20 ms period can be obtained. The Stealing Bits sequence determines which modulation coding scheme the RTTI Block corresponds to. The specific logical relationship is that the sequence corresponding to 10ms before and after CS-1 is 1; the sequence corresponding to 10ms before and after the RTTI USF mode of MCS-0 or MCS1-4 is 2; ΒΤΉ USF mode of MCS-0 or MCS1-4 The sequence corresponding to the first 10ms is 3, and the sequence corresponding to the last 10ms is 4.
例如, 假设获得的前 10ms的 RTTI Block中的 Stealing Bits序列与表 1所示 的序列①和序列②同样最接近, 此时, 再将获得的后 10ms的 RTTI Block中的 Stealing Bits序列与表 1所示的后 10ms的 RTTI Block可能携带的三个 Stealing Bits序列进行比对, 如果后 10ms的 RTTI Block中的 Stealing Bits序列与序列① 最接近, 则可以确定获得的 RTTI Block对应的是 CS-1。 同理, 如果后 10ms的 RTTI Block中的 Stealing Bits序列与序列②最接近, 则可以初步确定获得的前 10ms的 RTTI Block中的 Stealing Bits序列与序列②最接近, 之后再才艮据 RLC/ MAC块的块头中的 CPS来区分获得的 RTTI Block对应的调制编码方案。 当然, 前 10ms的 RTTI Block中的 Stealing Bits序列还可能与序列③最接近, 此时, 可 以根据实际情况而采取相应的手段。 例如, 如果后 10ms 的 RTTI Block 中的 Stealing Bits序列与序列④的接近程度大于后 10ms的 RTTI Block中的 Stealing Bits序列与序列①或序列②的接近程度, 那么可以初步确定获得的前 10ms 的 RTTI Block中的 Stealing Bits序列与序列③最接近, 之后再根据 RLC/ MAC块 的块头中的 CPS来区分获得的 RTTI Block对应的调制编码方案。 再例如, 如果 前 10ms的 RTTI Block中的 Stealing Bits序列与序列③的接近程度等于前 10ms 的 RTTI Block中的 Stealing Bits序列与序列①或序列②的接近程度, 而且结合 后 10ms的情况, 后 10ms的 TTI Block中的 Stealing Bits序列与序列④的接近 程度等于后 10ms的 RTTI Block中的 Stealing Bits序列与序列①或序列②的接近 程度, 则说明误码率很可能较大, 此时, 可以直接三者择一或者再使用盲检的 方式来确定获得的 RTTI Block对应的调制编码方案。 当然, 如果获得的前 10ms 的 RTTI Block中的 Stealing Bits序列与表 1所示的序列①和序列②同样最接近, 而且结合后 10ms的情况, 后 10ms的 RTTI Block中的 Stealing Bits序列与序列 ①的接近程度等于与序列②的接近程度, 则可以直接二者择一或者使用盲检的 方式来确定获得的 RTTI Block对应的调制编码方案。 关于盲检的描述请参见下 文, 这里不再赘述。 在实际应用中, 本领域技术人 还可以使用其他方式来解 决获得的 Stealing Bits序列与多个序列同样最接近时的调制编码方案的确定问 题, 这里不再——列举更多的实施方式。 这里需要说明的是, 步骤 S501、 S502及 S503的执行主体可以是终端, 例 如 MS。 图 5 所示的方法可以由多种形式的装置来实现, 其中的一种区分无线块对 应的调制编码方案的装置如图 6所示,包括:获得单元 601 ,用于获得 RTTI Block 中的偷帧比特序列; 比对单元 602, 用于将所述获得单元 601获得的所述偷帧比 特序列分别与 RTTI Block可能携带的所有偷帧比特序列进行比对, 从所述可能 携带的所有偷帧比特序列中找到与所述偷帧比特序列最接近的偷帧比特序列; 确定单元 603 ,用于将所述比对单元 602找到的与所述偷帧比特序列最接近的偷 帧比特序列作为至少一个依据, 确定所述 RTTI Block对应的调制编码方案。 在实际应用中, 基站向 MS 发送信息时, 先需要使用一种调制编码方案将 RLC/MAC块调制编码为无线块, 之后再将无线块发给 MS, 其中, 无线块携带 有 Stealing Bits序列。 在这个实施例中, 由获得单元 601获得 RTTI Block, 获得 单元 601获得 RTTI Block后, 完全可以获得其中的 Stealing Bits序列。 如果获得单元 601获得的 RTTI Block是 20 ms周期中的前 10ms的 RTTI Block, 则获得单元 601获得的 RTTI Block可能携带的所有 Stealing Bits序列是 表 1所示的前 10 ms的 TTI Block可能携带的三种 Stealing Bits序列 (表 1中的For example, suppose that the Stealing Bits sequence in the first 10 ms RTTI Block obtained is the same as Sequence 1 and Sequence 2 shown in Table 1. At this time, the Stealing Bits sequence in the RTTI Block obtained in the last 10 ms is shown in Table 1. The three Stealing Bits sequences that the last 10 ms RTTI Block may carry are compared. If the Stealing Bits sequence in the RTTI Block of the last 10 ms is closest to the sequence 1, it can be determined that the obtained RTTI Block corresponds to CS-1. . Similarly, if the Stealing Bits sequence in the RTTI Block of the last 10 ms is closest to the sequence 2, it can be preliminarily determined that the Stealing Bits sequence in the obtained first 10 ms RTTI Block is closest to the sequence 2, and then the RLC/MAC is used. The CPS in the block header of the block distinguishes the modulation coding scheme corresponding to the obtained RTTI Block. Of course, the Stealing Bits sequence in the first 10ms RTTI Block may be closest to Sequence 3. In this case, the corresponding method can be adopted according to the actual situation. For example, if the Stealing Bits sequence in the RTTI Block of the last 10 ms is closer to the sequence 4 than the Stealing Bits sequence in the RTTI Block of the last 10 ms is close to the sequence 1 or the sequence 2, the obtained first 10 ms RTTI can be initially determined. The Stealing Bits sequence in the Block is closest to Sequence 3, and then the modulation coding scheme corresponding to the obtained RTTI Block is distinguished according to the CPS in the block header of the RLC/MAC block. For another example, if the Stealing Bits sequence in the first 10 ms RTTI Block is close to the sequence 3, the Stealing Bits sequence in the RTTI Block of the first 10 ms is close to the sequence 1 or the sequence 2, and after 10 ms, 10 ms later. The closeness of the Stealing Bits sequence in the TTI Block to the sequence 4 is equal to the proximity of the Stealing Bits sequence in the RTTI Block of the last 10 ms to the sequence 1 or the sequence 2, indicating that the bit error rate is likely to be large. The three choose one or use blind detection to determine the modulation coding scheme corresponding to the obtained RTTI block. Of course, if the obtained Stealing Bits sequence in the first 10 ms RTTI Block is the closest to Sequence 1 and Sequence 2 shown in Table 1, and the 10 ms after the combination, the Stealing Bits sequence and Sequence 1 in the RTM Block after 10 ms. The proximity is equal to the proximity of sequence 2, then you can choose either directly or use blind detection. A method is to determine a modulation coding scheme corresponding to the obtained RTTI block. For a description of the blind test, please refer to the following, and I will not repeat them here. In practical applications, those skilled in the art can also use other methods to solve the problem of determining the modulation coding scheme when the obtained Stealing Bits sequence is the same as the multiple sequences, and no longer, more embodiments are listed. It should be noted that the execution body of steps S501, S502, and S503 may be a terminal, such as an MS. The method shown in FIG. 5 can be implemented by multiple forms of devices. One device for distinguishing the modulation and coding scheme corresponding to the radio block is as shown in FIG. 6, and includes: an obtaining unit 601 for obtaining the steal in the RTTI Block. a frame bit sequence; the comparing unit 602, configured to compare the frame stealing bit sequence obtained by the obtaining unit 601 with all the stealing frame bit sequences that may be carried by the RTTI block, from all the stolen frames that may be carried A sequence of stealing frame bits closest to the sequence of the stolen frame bits is found in the bit sequence; determining unit 603 is configured to use at least the frame stealing bit sequence found by the comparing unit 602 and the stolen frame bit sequence as at least Based on a determination, a modulation coding scheme corresponding to the RTTI Block is determined. In practical applications, when the base station sends information to the MS, it first needs to use a modulation and coding scheme to modulate the RLC/MAC block into a radio block, and then send the radio block to the MS, where the radio block carries the Stealing Bits sequence. In this embodiment, the RTTI Block is obtained by the obtaining unit 601, and after the obtaining unit 601 obtains the RTTI Block, the Stealing Bits sequence therein can be completely obtained. If the RTTI block obtained by the obtaining unit 601 is the first 10 ms RTTI block in the 20 ms period, all the Stealing Bits sequences that the RTTI Block obtained by the obtaining unit 601 may carry are the possible TTI blocks of the first 10 ms shown in Table 1. Three Stealing Bits sequences (in Table 1)
①②③);如果获得单元 601获得的 RTTI Block是 20 ms周期中的后 10ms的 RTTI Block, 则获得单元 601获得的 RTTI Block可能携带的所有 Stealing Bits序列是 表 1所示的后 10 ms的 TTI Block可能携带的三种 Stealing Bits序列 (表 1中的123); if the RTTI block obtained by the obtaining unit 601 is the RTTI block of the last 10 ms in the 20 ms period, all the Stealing Bits sequences that the RTTI Block obtained by the obtaining unit 601 may carry are the last 10 ms TTI Block shown in Table 1. Three Stealing Bits sequences that may be carried (in Table 1)
①②④)。 在实际应用中, 信息经过无线信道传输会受到干扰, 这样就可能造成接收 到的比特序列与原发送的比特序列不完全一致, 对此, 接收方可以将与接收值 最相近的可能值判定为原发送值。 所以, 在本发明实施例中, 获得单元 601获得 Stealing Bits序列后, 比对单 元 602可以将 Stealing Bits序列分别与 RTTI Block可能携带的所有 Stealing Bits 序列进行比对。 例如, 如果获得单元 601获得的 RTTI Block是一个 20ms周期 的前 10ms的 RTTI Block, 那么比对单元 602就将获得的 Stealing Bits序列分别 与表 1所示的前 10ms的 RTTI Block可能携带的三种 Stealing Bits序列进行比对; 如杲获得单元 601获得的 RTTI Block是一个 20ms周期的后 10ms的 RTTI Block, 那么比对单元 602就将获得的 Stealing Bits序列分别与表 1所示的后 10ms的 RTTI Block可能携带的三种 Stealing Bits序列进行比对。 比对单元 602进行比对 后,从 RTTI Block可能携带的所有 Stealing Bits序列中找到与获得的 Stealing Bits 序列最接近的 Stealing Bits序列。 获得单元 601 获得的 Stealing Bits 序列与 RTTI Block 可能携带的所有 Stealing Bits序列之间的接近程度可以使用汉明距离来衡量。这样,比对单元 602 从 RTTI Block可能携带的所有 Stealing Bits序列中找到与获得的 Stealing Bits序 列最接近的 Stealing Bits序列实质上就是从 RTTI Block可能携带的所有 Stealing Bits序列中找到与获得单元 601获得的 Stealing Bits序列之间汉明距离最小的 Stealing Bits序列。 确定单元 603可以包括区分模块, 用于如果所述比对单元 602找到的与所 述 Stealing Bits序列最接近的 Stealing Bits序列只对应一种调制编码方案, 则区 分模块可以直接确定所述调制编码方案即为所述 RTTI Block对应的调制编码方 案。 例如, 假设获得单元 601获得的 RTTI Block是一个 20 ms周期内的前 10ms 的 RTTI Block,比对单元 602将获得单元 601获得的 RTTI Block中的 Stealing Bits 序列分别与表 1所示的前 10ms的 RTTI Block可能携带的三种 Stealing Bits序列 进行比对后, 如果获得单元 601获得的 RTTI Block中的 Stealing Bits序列与序 列①最接近, 那么由于序列①只对应 CS- 1 , 所以区分模块可以直接确定获得的 RTTI Block对应的是 CS-1。 如果所述比对单元 602找到的与所述 Stealing Bits序列最接近的 Stealing Bits 序列对应多种调制编码方案 , 则区分模块可以根据调制编码为所述 RTTI Block 的 RLC/MAC块的块头中的 CPS来区分所述 RTTI Block对应的调制编码方案。 例如, 假设获得单元 601获得的 RTTI Block是一个 20 ms周期内的后 10ms的 RTTI Block, 比对单元 602将获得单元 601获得的 RTTI Block中的 Stealing Bits 序列分别与表 1所示的后 10ms的 RTTI Block可能携带的三种 Stealing Bits序列 进行比对后, 如果获得单元 601获得的 RTTI Block中的 Stealing Bits序列与序 列②最接近, 那么由于序列②对应的是 MCS-0或 MCS- 1〜4这 5种调制编码方 案, 所以区分模块还得需要使用 RLC/ MAC块的块头中的 CPS来区分获得的 RTTI Block对应的是哪种调制编码方案。 124). In practical applications, information transmitted through the wireless channel may be interfered, which may cause the received bit sequence not to be completely consistent with the originally transmitted bit sequence. In this regard, the receiver may determine the possible value closest to the received value as Originally sent value. Therefore, in the embodiment of the present invention, after the obtaining unit 601 obtains the Stealing Bits sequence, the comparison list Element 602 can compare the Stealing Bits sequence to all Stealing Bits sequences that the RTTI Block may carry. For example, if the RTTI block obtained by the obtaining unit 601 is an RTTI block of the first 10 ms of a 20 ms period, the Stealing Bits sequence that the matching unit 602 will obtain is respectively three types that may be carried by the first 10 ms RTTI Block shown in Table 1. The Stealing Bits sequence is compared; if the RTTI Block obtained by the 杲 obtaining unit 601 is an RTTI Block of the last 10 ms of the 20 ms period, the Stealing Bits sequence obtained by the matching unit 602 and the RTTI of the last 10 ms shown in Table 1 respectively. The three Stealing Bits sequences that the Block may carry are compared. After comparison by the matching unit 602, the Stealing Bits sequence closest to the obtained Stealing Bits sequence is found from all Stealing Bits sequences that the RTTI Block may carry. The proximity between the Stealing Bits sequence obtained by the acquisition unit 601 and all Stealing Bits sequences that the RTTI Block may carry can be measured using the Hamming distance. Thus, the matching unit 602 finds that the Stealing Bits sequence closest to the obtained Stealing Bits sequence from all Stealing Bits sequences that the RTTI Block may carry is substantially obtained from the Stealing Bits sequence that may be carried by the RTTI Block and obtained by the obtaining unit 601. The Stealing Bits sequence with the smallest Hamming distance between the Stealing Bits sequences. The determining unit 603 may include a distinguishing module, if the Stealing Bits sequence closest to the Stealing Bits sequence found by the comparing unit 602 corresponds to only one modulation and coding scheme, the distinguishing module may directly determine the modulation and coding scheme. That is, the modulation coding scheme corresponding to the RTTI block. For example, assuming that the RTTI block obtained by the obtaining unit 601 is an RTTI block of the first 10 ms in a 20 ms period, the comparison unit 602 obtains the Stealing Bits sequence in the RTTI Block obtained by the unit 601 and the first 10 ms shown in Table 1, respectively. After the three Stealing Bits sequences that the RTTI Block may carry are compared, if the Stealing Bits sequence in the RTTI Block obtained by the obtaining unit 601 is closest to the sequence 1, then since the sequence 1 only corresponds to CS-1, the distinguishing module can directly determine The obtained RTTI Block corresponds to CS-1. If the Stealing Bits sequence closest to the Stealing Bits sequence found by the comparing unit 602 corresponds to multiple modulation and coding schemes, the distinguishing module may encode the CPS in the block header of the RLC/MAC block of the RTTI Block according to the modulation. To distinguish the modulation coding scheme corresponding to the RTTI Block. For example, assuming that the RTTI Block obtained by the obtaining unit 601 is an RTTI Block of the last 10 ms in a 20 ms period, the matching unit 602 will obtain the Stealing Bits in the RTTI Block obtained by the unit 601. After the sequence is compared with the three Stealing Bits sequences that may be carried by the RTIO block of the last 10 ms shown in Table 1, if the Stealing Bits sequence in the RTTI Block obtained by the obtaining unit 601 is closest to the sequence 2, then the sequence 2 corresponds to The five modulation coding schemes are MCS-0 or MCS-1~4, so the distinguishing module also needs to use the CPS in the block header of the RLC/MAC block to distinguish which modulation coding scheme corresponds to the obtained RTTI Block.
确定单元 603也可以包括区分模块, 用于如果所述比对单元 602找到的与 获得单元 601获得的 Stealing Bits序列最接近的 Stealing Bits序列是多种 Stealing Bits序列, 则区分模块可以将获得的同一个 20ms周期内的另外 10ms的 RTTI Block 的 Stealing Bits 序列与所述另外 10ms 的 RTTI Block 可能携带的三种 Stealing Bits序列中最接近的 Stealing Bits序列对应的调制编码方案作为获得的 RTTI Block对应的调制编码方案。 上面提到过, 同一个 20ms周期内的两个无线 块的调制编码方案相同,这样,如果区分模块通过获得单元 601获得的一个 RTTI Block中的 Stealing Bits序列不能明确的确定这个 RTTI Block对应的调制编码方 案,那么区分模块可以通过获得单元 601获得的同一个 20ms周期的另一个 RTTI Block中的 Stealing Bits序列来确定 RTTI Block对应的到底是哪种调制编码方 案。 例如, 假设获得单元 601获得的前 10ms的 RTTI Block中的 Stealing Bits序 列与表 1所示的序列①和序列②同样最接近, 此时, 比对单元 602再将获得的 后 10ms的 RTTI Block中的 Stealing Bits序列与表 1所示的后 10ms的 RTTI Block 可能携带的三个 Stealing Bits序列进行比对, 如果后 10ms的 RTTI Block中的 Stealing Bits序列与序列①最接近,则区分模块可以确定获得的 RTTI Block对应 的是 CS-1。 同理,如果后 10ms的 RTTI Block中的 Stealing Bits序列与序列②最 接近, 则区分模块可以初步确定获得的前 10ms的 RTTI Block中的 Stealing Bits 序列与序列②最接近, 之后再根据 RLC/ MAC块的块头中的 CPS来区分获得的 RTTI Block对应的调制编码方案。当然,前 10ms的 RTTI Block中的 Stealing Bits 序列还可能与序列③最接近, 此时, 区分模块可以根据实际情况而采取相应的 手段。 例如, 如果后 10ms的 RTTI Block中的 Stealing Bits序列与序列④的接近 程度大于后 10ms的 RTTI Block中的 Stealing Bits序列与序列①或序列②的接近 程度,那么区分模块可以初步确定获得的前 10ms的 RTTI Block中的 Stealing Bits 序列与序列③最接近, 之后再根据 RLC/ MAC块的块头中的 CPS来区分获得的 RTTI Block对应的调制编码方案。 再例如, 如果前 10ms 的 RTTI Block 中的 Stealing Bits序列与序列③的接近程度等于前 10ms的 RTTI Block中的 Stealing Bits序列与序列①或序列②的接近程度, 而且结合后 10ms的情况, 后 10ms的 RTTI Block 中的 Stealing Bits序列与序列④的接近程度等于后 10ms 的 RTTI Block中的 Stealing Bits序列与序列①或序列②的接近程度, 则说明误码率很可 能较大, 此时, 区分模块可以直接三者择一或者再使用盲检的方式来确定获得 的 RTTI Block对应的调制编码方案。 当然, 如果获得的前 10ms的 RTTI Block 中的 Stealing Bits序列与表 1 所示的序列①和序列②同样最接近, 而且结合后 10ms的情况, 后 10ms的 RTTI Block中的 Stealing Bits序列与序列①的接近程 度等于与序列②的接近程度, 则区分模块可以直接二者择一或者使用盲检的方 式来确定获得的 RTTI Block对应的调制编码方案。 在实际应用中, 区分模块还 可以使用其他方式来解决获得的 Stealing Bits序列与多个序列同样最接近时的调 制编码方案的确定问题, 这里不再——列举更多的实施方式。 The determining unit 603 may also include a distinguishing module, if the Stealing Bits sequence that is closest to the Stealing Bits sequence obtained by the obtaining unit 601 by the comparing unit 602 is a plurality of Stealing Bits sequences, the distinguishing module may obtain the same The modulation coding scheme corresponding to the Stealing Bits sequence of the other 10 ms RTTI Block in a 20 ms period and the closest Stealing Bits sequence among the three Stealing Bits sequences that the other 10 ms RTTI Block may carry as the modulation corresponding to the obtained RTTI Block Coding scheme. As mentioned above, the modulation coding schemes of the two radio blocks in the same 20 ms period are the same, so that if the distinguishing module passes the Stealing Bits sequence in an RTTI block obtained by the obtaining unit 601, the modulation corresponding to the RTTI block cannot be unambiguously determined. For the coding scheme, the distinguishing module can determine which modulation coding scheme corresponds to the RTTI Block by obtaining the Stealing Bits sequence in another RTTI block of the same 20 ms period obtained by the unit 601. For example, it is assumed that the Stealing Bits sequence in the first 10 ms RTTI Block obtained by the obtaining unit 601 is the same as the sequence 1 and the sequence 2 shown in Table 1, and the matching unit 602 will again obtain the last 10 ms RTTI Block. The Stealing Bits sequence is compared with the three Stealing Bits sequences that may be carried by the last 10 ms RTTI Block shown in Table 1. If the Stealing Bits sequence in the RTTI Block of the last 10 ms is closest to Sequence 1, the distinguishing module can determine the obtained The RTTI Block corresponds to CS-1. Similarly, if the Stealing Bits sequence in the RTTS block of the last 10 ms is closest to the sequence 2, the distinguishing module can initially determine that the Stealing Bits sequence in the obtained first 10 ms RTTI Block is closest to the sequence 2, and then according to the RLC/MAC. The CPS in the block header of the block distinguishes the modulation coding scheme corresponding to the obtained RTTI Block. Of course, the Stealing Bits sequence in the first 10ms RTTI Block may be closest to the sequence 3. In this case, the distinguishing module can take corresponding measures according to the actual situation. For example, if the Stealing Bits sequence in the RTTI Block of the last 10 ms is closer to the sequence 4 than the Stealing Bits sequence in the RTTI Block of the last 10 ms is close to the sequence 1 or the sequence 2, the distinguishing module can initially determine the first 10 ms obtained. The Stealing Bits sequence in the RTTI Block is closest to Sequence 3, and then the modulation coding scheme corresponding to the obtained RTTI Block is distinguished according to the CPS in the block header of the RLC/MAC block. For another example, if in the first 10ms of the RTTI Block The closeness of the Stealing Bits sequence to Sequence 3 is equal to the proximity of the Stealing Bits sequence in the RTTI Block of the first 10 ms to Sequence 1 or Sequence 2, and the 10 ms after the combination, the Stealing Bits sequence and the Sequence 4 in the RTT Block after 10 ms. The proximity is equal to the proximity of the Stealing Bits sequence in the RTTI Block to the sequence 1 or sequence 2 in the last 10 ms, indicating that the bit error rate is likely to be large. In this case, the distinguishing module can directly select one or use the blind check. The way to determine the modulation coding scheme corresponding to the obtained RTTI Block. Of course, if the obtained Stealing Bits sequence in the first 10 ms RTTI Block is the same as Sequence 1 and Sequence 2 shown in Table 1, and the 10 ms after the combination, the Stealing Bits sequence and Sequence 1 in the RTIO Block after 10 ms. The proximity is equal to the proximity of the sequence 2, and the distinguishing module can directly determine the modulation coding scheme corresponding to the obtained RTTI block by using the blind detection method. In practical applications, the distinguishing module may also use other methods to solve the problem of determining the modulation coding scheme when the obtained Stealing Bits sequence is the closest to the multiple sequences, and no longer, more embodiments are listed.
需要说明的是, 图 6所示的装置中的各个单元可以设置于终端 (例如 MS ) 中, 这些单元在终端中的工作方式与在图 6所示的装置中的工作方式相同, 这 里不再赘述。 下面结合汉明距离的处理技术, 再对本发明实施例进行详细说明。  It should be noted that each unit in the apparatus shown in FIG. 6 may be disposed in a terminal (for example, an MS), and the units work in the terminal in the same manner as in the apparatus shown in FIG. Narration. The embodiments of the present invention will be described in detail below in conjunction with the processing techniques of Hamming distance.
假设 MS收到的 RTTI Block中的 Stealing Bits序列为 A, A与表 1所示的序 列① "1,1,1,1,1,1,1,1" 的汉明距离记为 dl, A与序列② "0,0,0,1,0,1,1,0" 的汉明 距离记为 d2, A 与序列③ "0,0,0,0,0,1,0,1" 的汉明距离记为 d3, A 与序列④ "0,1,0,1,1,0,1,0" 的汉明距离记为 d4, dl、 d2、 d3、 d4中的最小值可以表明 A 与哪个序列最接近。  Assume that the Stealing Bits sequence in the RTTI Block received by the MS is A, and the Hamming distance between A and the sequence 1 "1,1,1,1,1,1,1,1" shown in Table 1 is dl, A. The Hamming distance from the sequence 2 "0,0,0,1,0,1,1,0" is denoted as d2, A and the sequence 3 "0,0,0,0,0,1,0,1" The Hamming distance is recorded as d3, and the Hamming distance between A and the sequence 4 "0,1,0,1,1,0,1,0" is recorded as d4, and the minimum value in dl, d2, d3, d4 can indicate A. Which sequence is closest to it.
对于前 10ms的 RTTI Block, 判断 A与序列①、 ②、 ③中的哪个序列最接 近, 即判断 dl、 d2、 d3中哪个最小。 同理, 对于后 10ms的 RTTI Block, 判断 A与序列①、 ②、 ④中的哪个序列最接近, 即判断 dl、 d2、 d4中哪个最小。 同时, 无论是哪种 USF mode, MS使用 RLC/MAC块的块头中的 CPS来区 分对应 MCS-0的用于信令传输的 RTTI Block和对应的 MCS-1~4的用于数据传 输的 RTTI Block。  For the first 10ms RTTI Block, it is judged which of the sequences 1, 2, and 3 is closest to A, that is, which of dl, d2, and d3 is the smallest. Similarly, for the last 10ms RTTI Block, it is judged which sequence of A, 1, 2, and 4 is closest to A, that is, which of dl, d2, and d4 is the smallest. Meanwhile, regardless of the USF mode, the MS uses the CPS in the block header of the RLC/MAC block to distinguish the RTTI block for signaling transmission corresponding to the MCS-0 and the RTTI for data transmission corresponding to the MCS-1~4. Block.
使用汉明距离的一种判断方法如下: 对于前 10ms的 RTTI Block: One way to judge the Hamming distance is as follows: For the first 10ms RTTI Block:
If dl<=2, 则 dl<d2,d3 , 表明 A与序列①最接近;  If dl<=2, then dl<d2,d3 , indicating that A is closest to sequence 1.
Else if 2<dl=d3 , 且 dl<d2, 则表明 A与序列①或③最接近, 此时, 可取 A 是序列③或取 A是序列①;  Else if 2<dl=d3 , and dl<d2, indicating that A is closest to sequence 1 or 3. In this case, it is preferable that A is sequence 3 or A is sequence 1;
5136 应是11101((11 , d2, d3)对应的序列。 5136 should be the sequence corresponding to 11101 ((11, d2, d3).
对于后 10ms的 RTTI Block:  For the last 10ms RTTI Block:
If dl=l , 则 dl<d2,d4, 表明 A与序列①最接近;  If dl=l , then dl<d2,d4, indicating that A is closest to sequence 1.
Else if Kdl =d4<d2, 则表明 A与序列①或④最接近;  Else if Kdl =d4<d2, indicating that A is closest to sequence 1 or 4;
Else A应是 min(dl,d2,d4)对应的序列。  Else A should be the sequence corresponding to min(dl, d2, d4).
上述判断方法也可以筒化为如下形式: The above judgment method can also be compressed into the following form:
对于前 10ms的 RTTI Block:  For the first 10ms RTTI Block:
IF 2<dl=d3<d2, 则表明 A应是①或③, 可取 A是③或取 A是①;  IF 2 < dl = d3 < d2, which means that A should be 1 or 3, and it can be taken that A is 3 or A is 1;
Else A应是 min(dl,d2,d3)对应的序列。  Else A should be the sequence corresponding to min(dl, d2, d3).
对于后 10ms的 RTTI Block:  For the last 10ms RTTI Block:
IF Kdl=d4<d2, 则表明 A应是①或④;  IF Kdl=d4<d2, indicating that A should be 1 or 4;
Else A应是 min(dl,d2,d4)对应的序列。  Else A should be the sequence corresponding to min(dl, d2, d4).
更简单的, 上述判断方法可以进一步筒化为如下形式: More simply, the above determination method can be further compressed into the following form:
对于前 10ms的 RTTI Block:  For the first 10ms RTTI Block:
IF dl=d3<d2, 则表明 A应是①或③, 可取 A是③或取 A是①;  IF dl=d3<d2, indicating that A should be 1 or 3, but A is 3 or A is 1;
Else A应是 min(dl,d2,d3)对应的序列。  Else A should be the sequence corresponding to min(dl, d2, d3).
对于后 10ms的 RTTI Block:  For the last 10ms RTTI Block:
IF dl=d4<d2, 则表明 A应是①或④; Else A应是 min(dl,d2,d4)对应的序列。 IF dl=d4<d2, indicating that A should be 1 or 4; Else A should be the sequence corresponding to min(dl, d2, d4).
需要说明的是, 前 10ms和后 10ms分别获得的 Stealing Bits可能不相同, 但它们对应的调制编码方案一定相同。 如果前 10ms获得的 Stealing Bits是序列 ①, 那么根据表 1所示, 后 10ms获得的 Stealing Bits也^^列①; 同理, 如果 前 10ms获得的 Stealing Bits是序列③, 那么后 10ms获得的 Stealing Bits是序列 ④;同理,如果前 10ms获得的 Stealing Bits是序列②,则后 10ms 获得的 Stealing Bits也是序列②。 还需要说明的是, 如果判断出 A是序列①, 那么对应的调制编码方案就是 CS-1 , 对应的无线块是 RTTI USF mode的 CS-1 编码的用于信令传输的 RTTI Block; 如果判断出 A是序列②, 对应的调制编码方案就是 MCS-0或 MCS-1 4, 对应的无线块是 RTTI USF mode的 MCS-0编码的用于信令传输的 RTTI Block 或者是 RTTI USF mode的 MCS-1~4编码的用于数据传输的 RTTI Block;如果判 断出 A是序列③,对应的调制编码方案就是 MCS-0或 MCS- 1 ~4 ,对应的无线块 是 BTTI USF mode的 MCS-0编码的用于信令传输的 RTTI Block或者是 BTTI USF mode的 MCS-1〜4编码的用于数据传输的 RTTI Block; 如杲判断出 A是序 列④,对应的调制编码方案就是 MCS-0或 MCS-1〜4,对应的无线块是 BTTI USF mode的 MCS-0编码的用于信令传输的 RTTI Block或者是 BTTI USF mode的 MCS-1-4编码的用于数据传输的 RTTI Block;其中 20ms周期的前 10ms 可对应 ①、 ②、 ③, 20ms周期的后 10ms 可对应①、 ②、 ④。 It should be noted that the Stealing Bits obtained in the first 10 ms and the last 10 ms may be different, but their corresponding modulation and coding schemes must be the same. If the Stealing Bits obtained in the first 10ms are sequence 1, then according to Table 1, the Stealing Bits obtained in the last 10ms are also listed as 1. In the same way, if the Stealing Bits obtained in the first 10ms are the sequence 3, then the Stealing obtained in the last 10ms Bits is sequence 4. Similarly, if the Stealing Bits obtained in the first 10ms are sequence 2, the Stealing Bits obtained in the last 10ms are also sequence 2. It should also be noted that if it is determined that A is sequence 1, then the corresponding modulation and coding scheme is CS-1, and the corresponding radio block is the CSTI coded RTTI block of the RTTI USF mode for signaling transmission; A is sequence 2, and the corresponding modulation and coding scheme is MCS-0 or MCS-1 4. The corresponding radio block is the MCTI-0 coded RTTI block of the RTTI USF mode for signaling transmission or the MCTI of the RTTI USF mode. -1~4 encoded RTTI block for data transmission; if it is judged that A is sequence 3, the corresponding modulation and coding scheme is MCS-0 or MCS-1~4, and the corresponding radio block is MCS-0 of BTTI USF mode. The encoded RTTI Block for signaling transmission is the RTTI Block for data transmission encoded by MCS-1~4 of BTTI USF mode; if it is determined that A is sequence 4, the corresponding modulation and coding scheme is MCS-0 or MCS-1~4, the corresponding radio block is an RTTI block for signaling transmission of MCS-0 code of BTTI USF mode or an RTTI block for data transmission of MCS-1-4 code of BTTI USF mode; The first 10ms of the 20ms period can correspond to 1, 2, 3, 20 The last 10ms of the ms period can correspond to 1, 2, and 4.
如果判断出前 10ms 获得的 Stealing Bits 是序列②, 且通过 CPS 判定是 MCS-0 , 则可以确定对应的无线块是 RTTI USF mode的 MCS-0编码的用于信令 传输的 RTTI Block; 如果判断出前 10ms获得的 Stealing Bits是序列③, 且通过 CPS判定是 MCS-0, 则可以确定对应的无线块是 BTTI USF mode的 MCS-0编 码的用于信令传输的 RTTI Block; 如果判断出后 10ms获得的 Stealing Bits是序 列④, 且通过 CPS判定是 MCS-0, 则可以确定对应的无线块是 BTTI USF mode 的 MCS-0编码的用于信令传输的 RTTI Block。  If it is determined that the Stealing Bits obtained in the first 10 ms is the sequence 2, and the MCS-0 is determined by the CPS, it may be determined that the corresponding radio block is the MCTI-0 coded RTTI block for signaling transmission in the RTTI USF mode; The Stealing Bits obtained in 10ms is sequence 3, and the MCS-0 is determined by CPS, then it can be determined that the corresponding radio block is the MCTI-0 encoded BTTI USF mode for the RTTI Block for signaling transmission; if it is determined that the last 10 ms is obtained The Stealing Bits is sequence 4, and the MCS-0 is determined by CPS, and it can be determined that the corresponding radio block is the MCTS-0 encoded BTTI USF mode for the RTTI Block for signaling transmission.
如果判断出前 10ms 获得的 Stealing Bits 是序列②, 且通过 CPS 判定是 MCS- 1 ~4,则可以确定对应的无线块是 RTTI USF mode的 MCS- 1〜4编码的用于 数据传输的 RTTI Block; 如果已判断前 10ms获得的 Stealing Bits是序列③, 且 通过 CPS 判定是 MCS-1〜4, 则可以确定对应的无线块是 BTTI USF mode 的 MCS-1〜4编码的用于数据传输的 RTTI Block;如果判断出后 10ms获得的 Stealing Bits是序列④, 且通过 CPS判定是 MCS-0, 则对应的无线块是 BTTI USF mode 的 MCS-1〜4编码的用于数据传输的 RTTI Block。 对于上述判断方法的推导过程如下例所示: 对于前 10ms, A应接近比特序列① "1,1,1,1,1,1,1,1"、 ② "0,0,0,1,0,1,1,0" 、If it is determined that the Stealing Bits obtained in the first 10 ms is the sequence 2, and the CPS determines that it is MCS-1~4, it can be determined that the corresponding radio block is the MCS-1~4 code of the RTTI USF mode. RTTI Block for data transmission; If it is determined that the Stealing Bits obtained in the first 10ms are sequence 3, and it is determined by CPS that it is MCS-1~4, it can be determined that the corresponding radio block is the MCS-1~4 code of BTTI USF mode. RTTI Block for data transmission; if it is determined that the Stealing Bits obtained in the last 10ms is sequence 4, and the MCS-0 is determined by CPS, the corresponding radio block is encoded by MCS-1~4 of BTTI USF mode for data transmission. RTTI Block. The derivation process for the above judgment method is as follows: For the first 10ms, A should be close to the bit sequence 1 "1,1,1,1,1,1,1,1", 2 "0,0,0,1, 0,1,1,0" ,
③ "0,0,0,0,0,1,0,1 " 的一种。 若 dl=l或 2, 表明 A应有 7个 1或 6个 1, 而序 列②、 ③只有 3个 1或 2个 1, 故 d2>=3, d3>=4, 即 dl< d2,d3 , 所以, A应该 是①。 对于后 10ms, A应接近比特序列① "1,1,1,1,1,1,1,1"、 ② "0,0,0,1,0,1,1,0"、3 "0,0,0,0,0,1,0,1". If dl=l or 2, it means that A should have 7 1 or 6 1s, and sequences 2 and 3 have only 3 1s or 2s, so d2>=3, d3>=4, ie dl< d2, d3 , so, A should be 1. For the last 10ms, A should be close to the bit sequence 1 "1,1,1,1,1,1,1,1", 2 "0,0,0,1,0,1,1,0",
④ "0,1,0,1,1,0,1,0" 的一种。 若 dl=l , 表明 A应有 7个 1 , 而序列②、 ④只有 3 个 1或 4个 1 , 故 d2>=4, d4>=3, 即 dl< d2,d4, 所以 A应是①。 若 dl=2, 则 表明 A有 6个 1 , 而序列②、 ④只有 3个 1或 4个 1 , 故 d2>=3 , d4>=2, 即 dl< d2,d4, 或者 dl=d4=2<d2, 所以 A应是①或④。 若 dl=3 , 表明 A有 5个 1, 而 序列②、④只有 3个 1或 4个 1 ,故 d2>=2,d4>=l ,即 dl< d2,d4,或者 dl=d4=2<d2, 所以 A应是①或④。 综上所述, 在本发明实施例中, MS只需检测组成 RTTI Block中的 Stealing Bits序列, 当然, 有时需要检测 RLC/MAC块的 RLC/MAC头中的 CPS, 就可以 对接收到的 RTTI Block的调制编码方案进行区分。 在现有技术中, 可以在下行 指派消息中明确指明用于信令传输的 RTTI Block对应的是哪种调制编码方案, 但这种方案过多的占用了空口资源, 本发明实施例相对于这种技术方案可以节 省空口资源。 另外, 本发明实施例考虑的情况覆盖所有 GMSK调制的 RTTI TBF 场景,本发明实施例 常有效地保证了区分 GMSK调制的 RTTI Block对应的调 制编码方案的正确性和成功率。 此外, 本发明实施例还提供了一种区分无线块对应的调制编码方案的方法, 包括: 先检查 RTTI Block对应的是否是某一种调制编码方案, 如果是, 则确定 所述 RTTI Block对应的就是这种调制编码方案, 否则, 再检查是否是另一种调 制编码方案, 如果是, 则确定所述 RTTI Block对应的就是所述另一种调制编码 方案, 否则, 再继续检查是否是其他调制编码方案, 以此类推, 直至确定 RTTI Block对应的是哪种调制编码方案为止。 在这里, 将这种技术方案简称为盲检。 本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程, 是可以通过计算机程序来指令相关的硬件来完成, 所述的程序可存储于一计算 机可读取存储介质中, 该程序在执行时, 可包括如上述各方法的实施例的流程。 其中, 所述的存储介质可为磁碟、 光盘、 只读存储记忆体(Read-Only Memory, ROM ) 或随机存储记忆体(Random Access Memory, RAM ) 等。 还需要说明的是, 本发明实施例可以通过硬件来实现, 也可以通过软件来 实现, 这些单元是功能性单元, 物理上可以合并为一个模块, 也可以拆分成多 个子模块。 4 A type of "0,1,0,1,1,0,1,0". If dl=l, it means that A should have 7 1s, and the sequence 2, 4 has only 3 1 or 4 1s, so d2>=4, d4>=3, ie dl< d2, d4, so A should be 1 . If dl=2, it means that A has 6 1s, and the sequence 2, 4 has only 3 1 or 4 1s, so d2>=3, d4>=2, ie dl< d2, d4, or dl=d4= 2<d2, so A should be 1 or 4. If dl=3, it means that A has 5 1s, and the sequence 2, 4 has only 3 1 or 4 1s, so d2>=2, d4>=l, ie dl< d2, d4, or dl=d4=2 <d2, so A should be 1 or 4. In summary, in the embodiment of the present invention, the MS only needs to detect the Stealing Bits sequence in the RTTI Block. Of course, sometimes it is necessary to detect the CPS in the RLC/MAC header of the RLC/MAC block, and the received RTTI can be received. The modulation coding scheme of the Block is distinguished. In the prior art, the modulation assignment scheme corresponding to the RTTI block used for signaling transmission may be explicitly indicated in the downlink assignment message, but this scheme excessively occupies the air interface resource, and the embodiment of the present invention is relative to this. A technical solution can save air interface resources. In addition, the scenario considered by the embodiment of the present invention covers all GMSK modulated RTTI TBF scenarios, and the embodiment of the present invention effectively ensures the correctness and success rate of the modulation and coding scheme corresponding to the MIMO-modulated RTTI block. In addition, the embodiment of the present invention further provides a method for distinguishing a modulation and coding scheme corresponding to a radio block, including: first checking whether an RTTI block corresponds to a certain modulation and coding scheme, and if yes, determining corresponding to the RTTI block. Is such a modulation and coding scheme, otherwise, it is checked whether it is another modulation and coding scheme, and if so, it is determined that the RTTI block corresponds to the other modulation and coding scheme. Solution, otherwise, continue to check if it is another modulation and coding scheme, and so on, until it is determined which modulation coding scheme corresponds to the RTTI Block. Here, this technical solution is simply referred to as blind detection. A person skilled in the art can understand that all or part of the process of implementing the above embodiment method can be completed by a computer program to instruct related hardware, and the program can be stored in a computer readable storage medium. In execution, the flow of an embodiment of the methods as described above may be included. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM). It should be noted that the embodiments of the present invention may be implemented by using hardware or by software. The units are functional units, may be physically combined into one module, or may be split into multiple sub-modules.
以上所述仅是本发明的优选实施方式, 应当指出, 对于本技术领域的普通 技术人员来说, 在不脱离本发明原理的前提下, 还可以作出若千改进和润饰, 这些改进和润饰也应视为本发明的保护范围。  The above description is only a preferred embodiment of the present invention, and it should be noted that those skilled in the art can also make thousands of improvements and retouchings without departing from the principles of the present invention. It should be considered as the scope of protection of the present invention.

Claims

权利 要求 Rights request
1.一种区分无线块对应的调制编码方案的方法, 其特征在于, 包括: 获得减少传输时间间隔无线块 RTTI Block中的偷帧比特序列; 将所述偷帧比特序列分别与 RTTI Block可能携带的所有偷帧比特序列进行 比对, 从所述可能携带的所有偷帧比特序列中找到与所述偷帧比特序列最接近 的偷帧比特序列;  A method for distinguishing a modulation and coding scheme corresponding to a radio block, comprising: obtaining a frame sequence of stealing frames in a radio block RTTI block of a reduced transmission time interval; and carrying the frame sequence of the stealth frame with an RTTI block respectively Aligning all the stealing frame bit sequences, and finding the stealing frame bit sequence closest to the stealing frame bit sequence from all the stolen frame bit sequences that may be carried;
根据所述与偷帧比特序列最接近的偷帧比特序列确定所述 RTTI Block对应 的调制编码方案。  And determining, according to the stealing frame bit sequence closest to the stealing frame bit sequence, a modulation and coding scheme corresponding to the RTTI block.
2.如权利要求 1 所述的区分无线块对应的调制编码方案的方法, 其特征在 于, 如果所述 RTTI Block是 20毫秒 ms周期中的前 10ms的 RTTI Block , 则所 述 RTTI Block可能携带的所有偷帧比特序列为前 10 ms的 RTTI Block可能携带 的三种偷帧比特序列; 如果所述 RTTI Block是 20 ms周期中的后 10ms的 RTTI Block, 则所述 RTTI Block可能携带的所有偷帧比特序列为后 10 ms 的 RTTI Block可能携带的三种偷帧比特序列; 其中, 所述 20 ms周期是从基站开始发送 RTTI Block时计算的周期。  The method for distinguishing a modulation coding scheme corresponding to a radio block according to claim 1, wherein if the RTTI Block is an RTTI Block of a first 10 ms in a 20 millisecond ms period, the RTTI Block may carry All stealing frame bit sequences are three stealing frame bit sequences that may be carried by the first 10 ms RTTI block; if the RTTI block is the last 10 ms RTTI block in the 20 ms period, all the stealing frames that the RTTI block may carry The bit sequence is a sequence of three stealing frame bits that may be carried by the RTTI Block of the last 10 ms; wherein the 20 ms period is a period calculated when the base station starts transmitting the RTTI Block.
3.如权利要求 1 所述的区分无线块对应的调制编码方案的方法, 其特征在 于, 根据所述与偷帧比特序列最接近的偷帧比特序列确定所述 RTTI Block对应 的调制编码方案包括: 如果所述找到的与所述偷帧比特序列最接近的偷帧比特序列对应一种调制 编码方案,则确定所述调制编码方案即为所述 RTTI Block对应的调制编码方案; 如果所述找到的与所述偷帧比特序列最接近的偷帧比特序列对应多种调制 编码方案,则根据调制编码为所述 RTTI Block的无线链路控制 RLC/媒体接入控 制 MAC块的块头中的编码打孔方案指示 CPS来区分所述 RTTI Block对应的调 制编码方案。 The method for determining a modulation and coding scheme corresponding to a radio block according to claim 1, wherein determining, according to the frame stealing bit sequence closest to the frame stealing bit sequence, the modulation and coding scheme corresponding to the RTTI block comprises: And determining, if the found stealing frame bit sequence closest to the stealing frame bit sequence, a modulation and coding scheme, determining that the modulation and coding scheme is a modulation and coding scheme corresponding to the RTTI block; The frame stealing bit sequence closest to the stealing frame bit sequence corresponds to a plurality of modulation and coding schemes, and the coded in the block header of the radio link control RLC/media access control MAC block of the RTTI block according to the modulation code The hole scheme instructs the CPS to distinguish the modulation coding scheme corresponding to the RTTI Block.
4.如权利要求 1 所述的区分无线块对应的调制编码方案的方法, 其特征在 于, 根据所述与偷帧比特序列最接近的偷帧比特序列确定所述 RTTI Block对应 的调制编码方案包括: 如果所述找到的与所述偷帧比特序列最接近的偷帧比特 序列是多种偷帧比特序列,则将获得的同一个 20ms周期内的另外 10ms的 RTTI Block的偷帧比特序列与所述另外 10ms的 RTTI Block可能携带的三种偷帧比特 序列中最接近的偷帧比特序列对应的调制编码方案作为所述 RTTI Block对应的 调制编码方案。 The method for determining a modulation and coding scheme corresponding to a radio block according to claim 1, wherein the determining a modulation and coding scheme corresponding to the RTTI block according to the sequence of stealing frame bits closest to the frame stealing bit sequence comprises: : if the stolen frame bit sequence found closest to the stolen frame bit sequence is a plurality of stealing frame bit sequences, then another 10 ms RTTI in the same 20 ms period to be obtained is obtained. The modulation frame coding sequence corresponding to the closest frame stealing bit sequence of the three stealing frame bit sequences that the other 10 ms RTTI block may carry is the modulation coding scheme corresponding to the RTTI block.
5.如权利要求 1 所述的区分无线块对应的调制编码方案的方法, 其特征在 于,其特征在于,根据所述与偷帧比特序列最接近的偷帧比特序列确定所述 RTTI Block对应的调制编码方案包括: 如果所述找到的与所述偷帧比特序列最接近的 偷帧比特序列是多种偷帧比特序列, 并且在同一个 20ms周期内的另外 10ms的 RTTI Block的可能携带的三种偷帧比特序列中找到多个与获得的同一个 20ms周 期内的另外 10ms的 RTTI Block的偷帧比特序列最接近的偷帧比特序列, 则从 所述三种偷帧比特序列中任意选择一个偷帧比特序列作为对应的调制编码方案 作为所述 RTTI Block对应的调制编码方案。 The method for distinguishing a modulation coding scheme corresponding to a radio block according to claim 1, wherein the RTTI block is determined according to the frame stealing bit sequence closest to the frame stealing bit sequence. The modulation coding scheme includes: if the found stealing frame bit sequence closest to the stealing frame bit sequence is a plurality of stealing frame bit sequences, and possibly carrying another 10 ms RTTI block in the same 20 ms period A plurality of stealing frame bit sequences closest to the obtained stealing frame bit sequence of another 10 ms RTTI block in the same 20 ms period are found in the stealing frame bit sequence, and then one of the three stealing frame bit sequences is arbitrarily selected. The frame stealing bit sequence is used as a corresponding modulation and coding scheme as a modulation and coding scheme corresponding to the RTTI block.
6.如权利要求 1 所述的区分无线块对应的调制编码方案的方法, 其特征在 于,其特征在于,根据所述与偷帧比特序列最接近的偷帧比特序列确定所述 RTTI Block对应的调制编码方案包括: 如果所述找到的与所述偷帧比特序列最接近的 偷帧比特序列是多种偷帧比特序列, 并且在同一个 20ms周期内的另外 10ms的 RTTI Block的可能携带的三种偷帧比特序列中找到多个与获得的同一个 20ms周 期内的另外 10ms的 RTTI Block的偷帧比特序列最接近的偷帧比特序列, 则先 检查所述 RTTI Block是否对应所述三种偷帧比特序列分别对应的调制编码方案 中的其中一种调制编码方案, 如果是, 则确定所述 RTTI Block对应的是所述其 中一种调制编码方案, 否则, 再检查所述 RTTI Block是否对应所述三种偷帧比 特序列分别对应的调制编码方案中的其中另一种调制编码方案, 如果是, 则确 定所述 RTTI Block对应的是所述其中另一种调制编码方案,否则,确定所述 RTTI Block对应的是所述三种偷帧比特序列分别对应的调制编码方案中的剩余一种 调制编码方案。 The method for distinguishing a modulation and coding scheme corresponding to a radio block according to claim 1, wherein the RTTI block is determined according to the frame stealing bit sequence closest to the frame stealing bit sequence. The modulation coding scheme includes: if the found stealing frame bit sequence closest to the stealing frame bit sequence is a plurality of stealing frame bit sequences, and possibly carrying another 10 ms RTTI block in the same 20 ms period In the stealing frame bit sequence, a plurality of stealing frame bit sequences closest to the obtained stealing frame bit sequence of the other 10 ms RTTI block in the same 20 ms period are found, and then it is checked whether the RTTI block corresponds to the three types of stealing. One of the modulation and coding schemes corresponding to the frame bit sequence respectively, if yes, determining that the RTTI block corresponds to the one of the modulation and coding schemes, otherwise, checking whether the RTTI block corresponds to One of the three modulation coding schemes corresponding to the three types of stealing frame bit sequences respectively, if yes, then The RTTI block is determined to be another one of the modulation and coding schemes. Otherwise, it is determined that the RTTI block corresponds to the remaining one of the modulation coding schemes corresponding to the three types of frame stealing bit sequences respectively. .
7.如权利要求 1或 2所述的区分无线块对应的调制编码方案的方法,其特征 在于, 将所述偷帧比特序列分别与 RTTI Block可能携带的所有偷帧比特序列进 行比对, 从所述可能携带的所有偷帧比特序列中找到与所述偷帧比特序列最接 近的偷帧比特序列包括: 分别计算所述偷帧比特序列与 RTTI Block可能携带的 所有偷帧比特序列之间的汉明距离, 从所述可能携带的所有偷帧比特序列中找 到与所述偷帧比特序列之间汉明距离最小的偷帧比特序列。 The method for distinguishing a modulation and coding scheme corresponding to a radio block according to claim 1 or 2, wherein the stolen frame bit sequence is compared with all stolen frame bit sequences that the RTTI block may carry, respectively. The stolen frame bit sequence that is closest to the stolen frame bit sequence in the sequence of all stolen frame bits that may be carried includes: calculating, respectively, between the stolen frame bit sequence and all stolen frame bit sequences that the RTTI block may carry Hamming distance, looking for all the stolen frame bit sequences that may be carried A sequence of stealing frame bits with a minimum Hamming distance from the stolen frame bit sequence.
8.—种区分无线块对应的调制编码方案的装置, 其特征在于, 包括: 获得单元, 用于获得 TTI Block中的偷帧比特序列; 比对单元, 用于将所述获得单元获得的所述偷帧比特序列分别与 RTTI Block可能携带的所有偷帧比特序列进行比对,从所述可能携带的所有偷帧比特 序列中找到与所述偷帧比特序列最接近的偷帧比特序列; 确定单元, 用于根据所述比对单元找到的与所述偷帧比特序列最接近的偷 帧比特序列确定所述 RTTI Block对应的调制编码方案。  8. The apparatus for distinguishing a modulation and coding scheme corresponding to a radio block, comprising: an obtaining unit, configured to obtain a frame stealing bit sequence in a TTI block; and a comparing unit, configured to obtain the obtained unit The stolen frame bit sequence is respectively compared with all the stealing frame bit sequences that the RTTI block may carry, and the stolen frame bit sequence closest to the stolen frame bit sequence is found from all the stolen frame bit sequences that may be carried; And a unit, configured to determine, according to the stealing frame bit sequence that is found by the comparing unit and closest to the stealing frame bit sequence, a modulation and coding scheme corresponding to the RTTI block.
9.如权利要求 8 所述的区分无线块对应的调制编码方案的装置, 其特征在 于, 所述确定单元包括: 第一区分模块, 用于如果所述找到的与所述偷帧比特 序列最接近的偷帧比特序列只对应一种调制编码方案, 则确定所述调制编码方 案即为所述 RTTI Block对应的调制编码方案; 如果所述找到的与所述偷帧比特 序列最接近的偷帧比特序列对应多种调制编码方案, 则根据调制编码为所述 RTTI Block的 RLC/ MAC块的块头中的 CPS来区分所述 RTTI Block对应的调制 编码方案。 The apparatus for distinguishing a modulation and coding scheme corresponding to a radio block according to claim 8, wherein the determining unit comprises: a first distinguishing module, configured to: if the found bit and the stolen frame bit sequence are the most The close stealing frame bit sequence corresponds to only one modulation and coding scheme, and then the modulation and coding scheme is determined to be a modulation and coding scheme corresponding to the RTTI block; if the found stolen frame closest to the stolen frame bit sequence is found The bit sequence corresponds to a plurality of modulation and coding schemes, and the modulation and coding scheme corresponding to the RTTI block is distinguished according to the CPS in the block header of the RLC/MAC block of the RTTI block.
10.如权利要求 8所述的区分无线块对应的调制编码方案的装置, 其特征在 于, 所述确定单元包括: 第二区分模块, 用于如果所述比对单元找到的与所述 偷帧比特序列最接近的偷帧比特序列是两种偷帧比特序列, 则将获得的同一个 20ms周期内的另外 10ms 的 RTTI Block的偷帧比特序列与所述另外 10ms 的 RTTI Block可能携带的三种偷帧比特序列中最接近的偷帧比特序列对应的调制 编码方案作为所述 RTTI Block对应的调制编码方案。 The apparatus for distinguishing a modulation and coding scheme corresponding to a radio block according to claim 8, wherein the determining unit comprises: a second distinguishing module, configured to: if the comparison unit finds the stolen frame The closest frame stealing bit sequence of the bit sequence is two stealing frame bit sequences, and the obtained 10 ms RTTI Block stealing frame bit sequence in the same 20 ms period and the other 10 ms RTTI Block may carry The modulation coding scheme corresponding to the closest frame stealing bit sequence in the frame stealing bit sequence is used as the modulation coding scheme corresponding to the RTTI block.
11.如权利要求 8所述的区分无线块对应的调制编码方案的装置, 其特征在 于, 所述确定单元包括: 第三区分模块, 用于如果所述找到的与所述偷帧比特 序列最接近的偷帧比特序列是多种偷帧比特序列,并且在同一个 20ms周期内的 另外 10ms的 RTTI Block的可能携带的三种偷帧比特序列中找到多个与获得的 同一个 20ms周期内的另外 10ms的 RTTI Block的偷帧比特序列最接近的偷帧比 特序列, 则从所述三种偷帧比特序列中任意选择一个偷帧比特序列作为对应的 调制编码方案作为所述 TTI Block对应的调制编码方案。 The apparatus for distinguishing a modulation and coding scheme corresponding to a radio block according to claim 8, wherein the determining unit comprises: a third distinguishing module, configured to: if the found bit and the stolen frame bit sequence are the most The close stealing frame bit sequence is a plurality of stealing frame bit sequences, and multiple of the three stealing frame bit sequences that may be carried in the other 10 ms RTTI block in the same 20 ms period are found in the same 20 ms period as obtained. In addition, the closest frame stealing bit sequence of the 10 bit RTTI block stealing frame bit sequence is arbitrarily selected from the three stealing frame bit sequences as a corresponding modulation and coding scheme as the modulation corresponding to the TTI block. Coding scheme.
12.如权利要求 8所述的区分无线块对应的调制编码方案的装置, 其特征在 于, 所述确定单元包括: 第四区分模块, 用于如果所述找到的与所述偷帧比特 序列最接近的偷帧比特序列是多种偷帧比特序列,并且在同一个 20ms周期内的 另外 10ms的 RTTI Block的可能携带的三种偷帧比特序列中找到多个与获得的 同一个 20ms周期内的另外 10ms的 RTTI Block的偷帧比特序列最接近的偷帧比 特序列, 则先检查所述 RTTI Block是否对应所述三种偷帧比特序列分别对应的 调制编码方案中的其中一种调制编码方案, 如果是, 则确定所述 RTTI Block对 应的是所述其中一种调制编码方案, 否则, 再检查所述 RTTI Block是否对应所 述三种偷帧比特序列分别对应的调制编码方案中的其中另一种调制编码方案, 如杲是, 则确定所述 RTTI Block对应的是所述其中另一种调制编码方案, 否则, 确定所述 RTTI Block对应的是所述三种偷帧比特序列分别对应的调制编码方案 中的剩余一种调制编码方案。 The apparatus for distinguishing a modulation and coding scheme corresponding to a radio block according to claim 8, wherein the determining unit comprises: a fourth distinguishing module, configured to: if the found bit and the stolen frame bit sequence are the most The close stealing frame bit sequence is a plurality of stealing frame bit sequences, and multiple of the three stealing frame bit sequences that may be carried in the other 10 ms RTTI block in the same 20 ms period are found in the same 20 ms period as obtained. In addition, the closest frame stealing bit sequence of the stealing frame bit sequence of the RTTI block of the 10 ms is first checked whether the RTTI block corresponds to one of the modulation and coding schemes corresponding to the three types of stealing frame bit sequences respectively. If yes, determining that the RTTI block corresponds to one of the modulation and coding schemes. Otherwise, checking whether the RTTI block corresponds to one of the modulation coding schemes corresponding to the three types of stolen frame bit sequences respectively. a modulation coding scheme, such as 杲, determining that the RTTI block corresponds to the other modulation coding scheme, otherwise Determining the RTTI Block corresponding to the remaining one modulation coding scheme is a modulation coding scheme corresponding to each frame bit sequence of the three kinds of stealing.
13.如权利要求 8所述的区分无线块对应的调制编码方案的装置, 其特征在 于, 所述比对单元将所述偷帧比特序列分别与 RTTI Block可能携带的所有偷帧 比特序列进行比对时, 分别计算所述偷帧比特序列与 RTTI Block可能携带的所 有偷帧比特序列之间的汉明距离; 所述比对单元从所述可能携带的所有偷帧比 特序列中找到与所述偷帧比特序列最接近的偷帧比特序列时, 从所述可能携带 的所有偷帧比特序列中找到与所述偷帧比特序列之间汉明距离最小的偷帧比特 序列。 The apparatus for distinguishing a modulation and coding scheme corresponding to a radio block according to claim 8, wherein the comparison unit compares the frame stealing bit sequence with all stealing frame bit sequences that the RTTI block may carry, respectively. Opposing, respectively, calculating a Hamming distance between the stealing frame bit sequence and all the stealing frame bit sequences that the RTTI block may carry; the comparing unit is found from the all stolen frame bit sequences that may be carried When stealing the frame bit sequence closest to the frame bit sequence, the frame stealing bit sequence having the smallest Hamming distance from the stealing frame bit sequence is found from all the stealing frame bit sequences that may be carried.
14.一种终端, 其特征在于, 包括如权利要求 8-13任意一项所述的装置。A terminal, comprising the apparatus of any one of claims 8-13.
15. —种计算机可读存储介质, 其特征在于, 包括用于执行如权利要求 1-7 任意一项所述方法的程序。 15. A computer readable storage medium, comprising: a program for performing the method of any of claims 1-7.
PCT/CN2009/075263 2008-12-19 2009-12-02 Method, device and terminal for differentiating modulation coding schemes corresponding to radio blocks WO2010069224A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810207529.5 2008-12-19
CN 200810207529 CN101753257B (en) 2008-12-19 2008-12-19 Method and device for differentiating a modulation code scheme corresponding to a wireless block and terminal

Publications (1)

Publication Number Publication Date
WO2010069224A1 true WO2010069224A1 (en) 2010-06-24

Family

ID=42268307

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/075263 WO2010069224A1 (en) 2008-12-19 2009-12-02 Method, device and terminal for differentiating modulation coding schemes corresponding to radio blocks

Country Status (2)

Country Link
CN (1) CN101753257B (en)
WO (1) WO2010069224A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532659B (en) * 2012-07-03 2017-03-29 京信通信系统(广州)有限公司 A kind of method and device for determining encoding scheme code book

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1835670A1 (en) * 2006-03-14 2007-09-19 Siemens S.p.A. Coexistence of legacy GPRS/EGPRS radio blocks and reduced transmit time interval (RTTI) radio blocks
CN101237296A (en) * 2007-01-30 2008-08-06 华为技术有限公司 Coding method and device based on compression transmission interval
EP2003806A1 (en) * 2007-06-15 2008-12-17 Nokia Siemens Networks Oy Protection of RCL/MAC control messages in reduced latency EGPRS

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100596098C (en) * 2006-04-30 2010-03-24 华为技术有限公司 Quick process method for radio block and its process system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1835670A1 (en) * 2006-03-14 2007-09-19 Siemens S.p.A. Coexistence of legacy GPRS/EGPRS radio blocks and reduced transmit time interval (RTTI) radio blocks
CN101237296A (en) * 2007-01-30 2008-08-06 华为技术有限公司 Coding method and device based on compression transmission interval
EP2003806A1 (en) * 2007-06-15 2008-12-17 Nokia Siemens Networks Oy Protection of RCL/MAC control messages in reduced latency EGPRS

Also Published As

Publication number Publication date
CN101753257B (en) 2013-01-23
CN101753257A (en) 2010-06-23

Similar Documents

Publication Publication Date Title
CN110419186B (en) Downlink control channel for uplink ultra-high reliability and low latency communications
US11403193B2 (en) Transmission control method for HARQ in mobile communication system
CN111510257B (en) Method for identifying and repairing reception failure of WIFI
US8855070B2 (en) Methods, systems, and computer readable media for improved long term evolution (LTE) hybrid automatic repeat request (HARQ) processing
EP2731393B1 (en) Retransmission resource allocation method and apparatus for wireless communication system
WO2018121293A1 (en) Method for unlicensed transmission, terminal and network device
US10140173B2 (en) Method for allocating resources in wireless communication system and system thereof
EP2534784A1 (en) Component carrier activation and deactivation using resource assignments
US6975611B1 (en) Method and device for MAC layer feedback in a packet communication system
EP4135390A1 (en) Measurement method and apparatus, node, and storage medium
US11589389B2 (en) Method and apparatus for implementing collision detection in data transmission
CN110235400B (en) User equipment, base station and communication method
WO2012088877A1 (en) Method for sending acknowledgement information and user equipment
US10693597B2 (en) Method and apparatus for transmitting status report for receiver
JP5819002B2 (en) Method and apparatus for transmitting an acknowledgment frame in a wireless local area network
US20160013891A1 (en) Feedback information transmission method, user equipment, and base station
WO2019166010A1 (en) Uplink control information transmission method and receiving method, terminal, base station and device
RU2455770C2 (en) Method and device for data unit transfer
US8627173B2 (en) Method, apparatus, and user equipment for checking false alarm
KR101613238B1 (en) A method for communicating in a network, radio stations and a system therefor
WO2010069224A1 (en) Method, device and terminal for differentiating modulation coding schemes corresponding to radio blocks
US20220337347A1 (en) Method and apparatus for harq feedback
CN102045145A (en) Method and device for obtaining hybrid automatic repeat request (HARQ) information of common control channel (CCCH)
KR20190099037A (en) Data transmission method, network device, and terminal device
CN105764147B (en) The acquisition methods and terminal of the length information of subframe

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09832906

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09832906

Country of ref document: EP

Kind code of ref document: A1