WO2020040674A1 - Modulating and demodulating data - Google Patents
Modulating and demodulating data Download PDFInfo
- Publication number
- WO2020040674A1 WO2020040674A1 PCT/SE2018/050851 SE2018050851W WO2020040674A1 WO 2020040674 A1 WO2020040674 A1 WO 2020040674A1 SE 2018050851 W SE2018050851 W SE 2018050851W WO 2020040674 A1 WO2020040674 A1 WO 2020040674A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network entity
- modulation scheme
- constellation
- bit sequence
- constellation points
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/32—Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
- H04L27/34—Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
- H04L27/3405—Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power
- H04L27/3411—Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power reducing the peak to average power ratio or the mean power of the constellation; Arrangements for increasing the shape gain of a signal set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/32—Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
- H04L27/34—Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
- H04L27/3405—Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power
- H04L27/3416—Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power in which the information is carried by both the individual signal points and the subset to which the individual points belong, e.g. using coset coding, lattice coding, or related schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/32—Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
- H04L27/34—Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
- H04L27/345—Modifications of the signal space to allow the transmission of additional information
- H04L27/3461—Modifications of the signal space to allow the transmission of additional information in order to transmit a subchannel
- H04L27/3483—Modifications of the signal space to allow the transmission of additional information in order to transmit a subchannel using a modulation of the constellation points
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/32—Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
- H04L27/34—Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
- H04L27/36—Modulator circuits; Transmitter circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/32—Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
- H04L27/34—Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
- H04L27/38—Demodulator circuits; Receiver circuits
Definitions
- the invention relates to methods, network entities, computer programs and computer program products for modulating and demodulating data transmitted over a communication channel.
- Modulating data for transmission over a communication channel can be done using many different modulation schemes.
- One commonly used modulation scheme is QAM (Quadrature Amplification Modulation).
- QAM Quadrature Amplification Modulation
- a number of constellation points are specified in a plane defined by a magnitude in an in-phase carrier (on the x axis) and a magnitude in a quadrature carrier (on the y axis).
- Each constellation point corresponds to a symbol transmitted over the communication channel and represents a bit sequence.
- the constellation points are often provided in a rectangular, e.g. square, pattern. Examples of known such schemes are 16-QAM containing 4x4 constellation points, 64-QAM containing 8x8 constellation points and 256-QAM
- PAPR Peak-to-Average Power Ratio
- the method proposes a label that still uses 6 digits in the label to get independence in I and Q component (equal to X and Y axes in the constellation diagram).
- the method thus conveys 5 bits per channel use (2.5 bits per dimension per channel use), and uses a 6-digit label, whereby a mapping is needed to map the 5 bits to the 6-digit label. Firstly, this requires extra processing at both the transmitter and receiver. Secondly, this introduces a dependence between the bit levels.
- the label bits are not equally distributed in terms of probability and that may affect the performance (or at least make the Log Likelihood Ratio (LLR) computation less symmetric). Moreover, the presented method is
- a method for modulating data for transmission over a communication channel to a receiver network entity is performed in a transmitter network entity and comprises the step of: modulating data in accordance with a modulation scheme, the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
- the constellation points may resemble a rectangle with removed corners.
- Each constellation point in the first set may represent the same bit sequence as for a corresponding constellation point of a square Quadrature Amplitude Modulation, QAM, scheme.
- a first bit sequence maybe the same bit sequence as for the corresponding square QAM scheme and a second bit sequence may represent a constellation point of the square QAM scheme which is not present in the modulation scheme.
- the first bit sequence and the second bit sequence only differs by one bit.
- the first bit sequence is the inverse of the second bit sequence.
- the method may further comprise the step of: signalling to the receiver network entity the modulation scheme being used.
- the method may further comprise the step of: determining the modulation scheme to be used, which comprises receiving a signal indicating the modulation scheme to use.
- the transmission may be an uplink transmission.
- a method for modulating data for transmission over a communication channel to a receiver network entity is provided.
- the method is performed in a transmitter network entity and comprises the step of: modulating data in accordance with a modulation scheme, the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences, wherein the two different bit sequences are a first bit sequence and a second bit sequence, the first bit sequence and the second bit sequence only differs by one bit, or the first bit sequence is the inverse of the second bit sequence.
- the transmitter network entity for modulating data for transmission over a communication channel to a receiver network entity.
- the transmitter network entity comprises: a processor; and a memory storing instructions that, when executed by the processor, cause the transmitter network entity to: modulate data in accordance with a
- the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
- the constellation points may resemble a rectangle with removed corners.
- Each constellation point in the first set may represent the same bit sequence as for a corresponding constellation point of a square Quadrature Amplitude Modulation, QAM, scheme.
- a first bit sequence maybe the same bit sequence as for the corresponding square QAM scheme and a second bit sequence may represent a constellation point of the square QAM scheme which is not present in the modulation scheme.
- the first bit sequence and the second bit sequence only differ by one bit.
- the first bit sequence is the inverse of the second bit sequence.
- the transmitter network entity may further comprise instructions that, when executed by the processor, cause the transmitter network entity to signal to the receiver network entity the modulation scheme being used.
- the transmitter network entity may further comprise instructions that, when executed by the processor, cause the transmitter network entity to determine the modulation scheme to be used, which comprises to receive a signal indicating the modulation scheme to use.
- the transmission may be an uplink transmission.
- a transmitter network entity comprising: means for modulating data in accordance with a modulation scheme for transmission over a communication channel to a receiver network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
- a computer program for modulating data for transmission over a communication channel to a receiver network entity.
- the computer program comprises computer program code which, when run on a transmitter network entity causes the transmitter network entity to: modulate data in accordance with a modulation scheme, the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
- a computer program product comprising a computer program according to the fourth aspect and a computer readable means on which the computer program is stored.
- a method for demodulating signals received over a communication channel from a transmitter network entity is performed in a receiver network entity and comprises the steps of: determining a modulation scheme used by the transmitter network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and demodulating received signals in accordance with the modulation scheme.
- the step of demodulating received signals may comprise the steps of:
- determining the constellation points in the second set determining when a received symbol is considered to match a constellation point in the second set, yielding an ambiguous symbol; and distinguishing between the multiple bit sequences of an ambiguous symbol using forward error correction, FEC.
- the step of determining a modulation scheme may comprise receiving a signal indicating the modulation scheme being used.
- the signals may be received in an uplink reception.
- a receiver network entity for demodulating signals received over a communication channel from a transmitter network entity.
- the receiver network entity comprises: a processor; and a memory storing instructions that, when executed by the processor, cause the receiver network entity to: determine a modulation scheme used by the transmitter network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and demodulate received signals in accordance with the modulation scheme.
- the instructions to demodulate received signals may comprise instructions that, when executed by the processor, cause the receiver network entity to: determine the constellation points in the second set; determine when a received symbol is considered to match a constellation point in the second set, yielding an ambiguous symbol; and distinguish between the multiple bit sequences of an ambiguous symbol using forward error correction, FEC.
- the instructions to determine a modulation scheme may comprise
- the signals may be received in an uplink reception.
- a receiver network entity comprising: means for determining a modulation scheme used by the transmitter network entity for demodulating signals received over a communication channel from a transmitter network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and means for demodulating received signals in accordance with the modulation scheme.
- a computer program for demodulating signals received over a communication channel from a transmitter network entity.
- the computer program comprises computer program code which, when run on a receiver network entity causes the receiver network entity to: determine a modulation scheme used by the transmitter network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and demodulate received signals in accordance with the modulation scheme.
- a computer program product comprising a computer program according to the ninth aspect and a computer readable means on which the computer program is stored.
- Fig l is a schematic diagram illustrating a cellular communication network where embodiments presented herein may be applied;
- Figs 2A-B are schematic diagrams illustrating network entities forming part of the wireless device and the base station of Fig l;
- Fig 3 is a schematic diagram illustrating a communication channel
- Figs 4A-B are constellation diagrams illustrating modulation schemes which can be used by the network entities of Fig 1;
- Figs 5A-B are constellation diagrams illustrating modulation schemes according to embodiments presented herein;
- Figs 6A-C are flow charts illustrating methods for modulating data for transmission over a communication channel to a receiver network entity
- Figs 7A-B are flow charts illustrating methods for demodulating signals received over a communication channel from a transmitter network entity;
- Fig 8 is a schematic diagram illustrating components of the base stations and the wireless device of Fig 2;
- Fig 9 is a schematic diagram showing functional modules of the transmitter network entity of Figs 3A and 3B according to one embodiment
- Fig 10 is a schematic diagram showing functional modules of the receiver network entity of Figs 3A and 3B according to one embodiment
- Fig 11 shows one example of a computer program product comprising computer readable means
- Fig 12 is a schematic diagram illustrating a receiver network entity used in a set zero mode
- Fig 13 is a schematic diagram illustrating the receiver network entity used in the flip one and flip all modes
- Figs 14A-C are schematic diagrams illustrating an example of multiple paths during FEC decoding
- Fig 15 is a flow chart illustrating a method for shows the common operations performed by the receiver network entities shown in Figs 12 and 13;
- Fig 16 is a flow chart illustrating a method of operations specific to the set zero mode.
- Fig 17 is a flow chart illustrating a method illustrating operations specific to the flip one mode.
- Fig 18 is a flow chart illustrating a method illustrating operations specific to the flip all mode.
- Fig l is a schematic diagram illustrating a cellular communication network 8 where embodiments presented herein may be applied.
- the cellular communication network 8 comprises a core network 3 and one or more base stations 1, here in the form of base stations being evolved Node Bs, also known as eNode Bs or eNBs.
- the base station 1 could also be in the form of g Node Bs, Node Bs, BTSs (Base Transceiver Stations) and/or BSSs (Base Station Subsystems), etc.
- the base station 1 can be implemented at one location or can be split over several locations. For instance, part of the processing of the base station 1 can be performed in a central location, also known as the cloud. In such a case, the processing in the central location can be performed in a physical device which performs processing for several base stations 1.
- the base station 1 provides radio connectivity over a wireless interface 4a-b to a plurality of wireless devices 2.
- wireless device is also known as mobile communication terminal, user equipment (UE), mobile terminal, user terminal, user agent, wireless terminal, machine-to-machine device etc., and can be, for example, what today are commonly known as a mobile phone, smart phone, Internet of Things (IoT) device, or a tablet/laptop with wireless connectivity.
- the term wireless is here to be construed as having the ability to perform wireless communication. More specifically, the wireless device 2 can comprise a number of wires for internal and/or external purposes.
- the cellular communication network 8 may e.g. comply with any one or a combination of 5G NR (New Radio), LTE (Long Term Evolution), LTE- Advanced, W-CDMA (Wideband Code Division Multiplex), EDGE (Enhanced Data Rates for GSM (Global System for Mobile communication) Evolution), GPRS (General Packet Radio Service), CDMA2000 (Code Division Multiple Access 2000), or any other current or future wireless network, as long as the principles described hereinafter are applicable.
- 5G NR New Radio
- LTE Long Term Evolution
- LTE- Advanced Long Term Evolution
- W-CDMA Wideband Code Division Multiplex
- EDGE Enhanced Data Rates for GSM (Global System for Mobile communication) Evolution
- GPRS General Packet Radio Service
- CDMA2000 Code Division Multiple Access 2000
- downlink (DL) communication 4b occurs from the base station 1 to the wireless device 2 and uplink (UL) communication 4a occurs from the wireless device 2 to the base station 1.
- DL downlink
- UL uplink
- the quality of the wireless radio interface for each wireless device 2 can vary over time and depends on the position of the wireless device 2, due to effects such as fading, multipath propagation, interference, etc.
- the base station 1 is also connected to the core network 3 for connectivity to central functions and a wide area network 7, such as the Internet.
- Figs 2A-B are schematic diagrams illustrating network entities forming part of the wireless device 2 and the base station 1 of Fig 1.
- the wireless device 2 comprises a transmitter network entity 5 as well as a receiver network entity 6.
- the transmitter network entity 5 is configured to perform modulation, power amplification and other processing for uplink transmissions to the base station 1.
- the receiver network entity 6 is configured to perform demodulation and other processing for receiving downlink transmissions from the base station 1.
- the transmitter network entity 5 and the receiver network entity 6 do not need to, but can be, physically separate. In other words, physical components of the transmitter network entity 5 may also be used in the receiver network entity 6, when applicable.
- the base station 1 comprises a transmitter network entity 5 and a receiver network entity 6.
- the transmitter network entity 5 is here configured to perform modulation, power amplification and other processing for downlink transmissions to the wireless device 2.
- the receiver network entity 6 is configured to perform
- the transmitter network entity 5 and the receiver network entity 6 do not need to, but can be, physically separate. In other words, physical components of the transmitter network entity 5 may also be used in the receiver network entity 6, when applicable.
- Fig 3 is a schematic diagram illustrating a communication channel 10.
- the communication channel 10 can comply with any suitable cellular network specification exemplified above.
- the communication channel 10 can be for another type of data transfer, e.g. a wired communication channel or a local wireless communication channel.
- Figs 4A-B are constellation diagrams illustrating modulation schemes which can be used by the network entities of Fig 1.
- the horizontal axis I represents in-phase carrier and the vertical axis Q represents quadrature carrier. This is often thought of as a complex number plane, with I being the real component and Q being the imaginary component.
- Fig 4A this shows a constellation diagram with 64
- constellation points 22 equi distantly spaced in the IQ plane.
- the modulation illustrated by Fig 4A is a 64-QAM (Quadrature Amplitude Modulation) modulation, so called due to there being 64 constellation points, each representing one of 64 (2 L 6) bit sequences. Each bit sequence is thus here 6 bits long.
- Each constellation point 22 is transmitted as a symbol from the transmitter to the receiver network entity. When the receiver network entity receives the symbol, it determines the corresponding constellation point 22 and determines the bit sequence represented by the determined constellation point.
- 64-QAM is a rectangular modulation scheme that is known in the art per se.
- corner points 24 are the constellation points furthest away from the origin.
- these three corner points 24, 27 are the three constellation points being furthest from the origin in each quadrant.
- embodiments presented herein allow corner points (e.g. one for each corner or three for each corner) to be removed from the modulation scheme.
- FIG 4B this shows a constellation diagram with 16
- constellation points 22 equidistantly spaced in the IQ plane, illustrating a 16- QAM modulation, which is known in the art per se.
- Figs 5A-B are constellation diagrams illustrating modulation schemes 2ia-b according to embodiments presented herein.
- the modulation scheme 21a of Fig 5A is similar to 64- QAM. However, one corner point of each quadrant have been removed.
- constellation points 29 there are here 60 constellation points. Still, we would like to represent 64 different bit sequences, representing six bits. This is solved by each one of the corner points to be represented by another one of the constellation points 29. Consequently, according to this modulation scheme 21a, there are overloaded constellation points 29, representing two different bit sequences. All the other constellation points, representing only one bit sequence are defined to form part of a first set of constellation points. The constellation points 29 representing two different bit sequences are defined to form a second set of constellation points. The overloaded constellation points 29 do not need to be located where exemplified in Fig 5A; these overloaded constellation points can be located anywhere among the remaining
- the overloaded constellation points 22 can be provided closer to the origin to lower average energy to thereby conserve power use.
- the overloaded constellation points are placed furthest from the origin to reduce PAPR.
- the overloaded constellation points are placed close to the origin to reduce power consumption.
- the overloaded constellation points are placed somewhere in between to balance the two benefits.
- the receiver network entity distinguishes between the two possible bit sequences using forward error correction, FEC, which is already provided in many communication channel protocols.
- FEC forward error correction
- An advantage of embodiments presented herein is that no additional mapping between encoded bits and constellation labels are needed. At the transmitter, nothing needs to be done except in the constellation mapper (changing the label of the corner points/corner and edge points to interior points). At the receiver, the regular LLR computation circuitry can be used.
- the whole modulation scheme can be scaled up to the same maximum amplitude as for the equivalent QAM modulation scheme. This results in increased distance between constellation points, making the modulation scheme more robust compared to an equivalent QAM
- FIG 5B this illustrates a modulation scheme 21b where three corner points have been removed for each corner. This augments the effect of reduced maximum amplitude or increased distance between constellation points.
- modulation schemes shown in Fig 5A and Fig 5B are used for a constellation size supporting bit sequences of six bits (corresponding to 64QAM), the modulation scheme can be applied for any suitable
- the modulation scheme can be applied in constellation size for bit sequences of four bits, eight bits, etc.
- the larger the constellation the more rounded corners can be sculpted, improving circularity, and thereby performance, of the constellation.
- Figs 6A-C are flow charts illustrating methods for modulating data for transmission over a communication channel to a receiver network entity.
- the method is performed in a transmitter network entity.
- the method can be applied for uplink transmissions, where reduced amplitude of transmissions is particularly beneficial, since a wireless device is often limited in capacity and linearity in its power amplifiers. This is an issue which only increases with the increased popularity of Internet of Things (IoT) devices. Nevertheless, the method can equally well be applied for downlink
- IoT Internet of Things
- the transmitter network entity determines a modulation scheme to be used.
- the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points (overloaded constellation points) respectively representing two different bit sequences.
- the transmitter network entity modulates data in accordance with the modulation scheme.
- the constellation points of the modulation scheme When all of the constellation points of the modulation scheme are plotted on a constellation diagram, the constellation points resemble a rectangle with removed corners, e.g. as seen in Figs 5A and 5B.
- each corner there are three corner points missing for each corner, in the constellation diagram, to make complete rectangle, e.g. as shown in Fig 5B.
- the three missing corner points, in each quadrant are the three constellation points with the greatest amplitude, i.e. distance from the origin.
- the modulation scheme can be such that each constellation point in the first set represents the same bit sequence as for a corresponding constellation point of a square QAM scheme. This makes the modulation scheme similar to square QAM schemes (16-QAM, 64-QAM, 256-QAM, etc.), simplifying implementation.
- a first bit sequence can be the same bit sequence as for the corresponding square QAM scheme.
- a second bit sequence represents a constellation point of the square QAM scheme which is not present in the modulation scheme, i.e. for corner points.
- the first bit sequence and the second bit sequence only differ by one bit. This is also called a flip one mode.
- the first bit sequence is the inverse of the second bit sequence. This is also called a flip all mode.
- transmitter network entity signals to the receiver network entity the modulation scheme being used. In this case, it is the transmitter network entity that is given the task of determining the modulation scheme to use.
- the transmitter network entity determines the modulation scheme to be used (in step 40). This comprises receiving a signal indicating the modulation scheme to use. For instance, the receiver network entity might be given the task of determining the modulation scheme to use, in which case, it is the receiver network entity that sends this signal to the transmitter network entity.
- Figs 7A-B are flow charts illustrating methods for demodulating signals received over a communication channel from a transmitter network entity. The method is performed in a receiver network entity. As explained above, the method can be applied for uplink transmissions and/or downlink transmissions.
- the receiver network entity determines a modulation scheme used by the transmitter network entity.
- the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a i8 second set of constellation points respectively representing two different bit sequences.
- this comprises receiving a signal indicating the modulation scheme being used, e.g. from the transmitter network entity.
- the receiver network entity demodulates received signals in accordance with the modulation scheme.
- the demodulation occurs using FEC.
- Fig 7B this is a flow chart illustrating optional substeps of the demodulate step 52 of Fig 7A.
- the receiver network entity determines the constellation points in the second set.
- the receiver network entity determines when a received symbol is considered to match a constellation point in the second set, yielding an ambiguous symbol.
- the receiver network entity distinguishes between the multiple bit sequences of an ambiguous symbol using FEC.
- Fig 8 is a schematic diagram illustrating components of the base station 1 and the wireless device 2 of Fig 2.
- a processor 60 is provided using any
- the processor 60 could alternatively be implemented using an application specific integrated circuit (ASIC), field programmable gate array (FPGA), etc.
- the processor 60 can be configured to execute any one of the methods described with reference to Figs 6A-C and Figs 7A-B above.
- the memory 64 can be any combination of random access memory (RAM) and/ or read only memory (ROM).
- the memory 64 also comprises persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid-state memory or even remotely mounted memory.
- a data memory 66 is also provided for reading and/ or storing data during execution of software instructions in the processor 60.
- the data memory 66 can be any combination of RAM and/or ROM.
- An I/O interface 62 is provided for communicating with external and/or internal entities.
- a transceiver 61 comprises suitable analogue and digital components to allow signal transmission and signal reception with a wireless device using one or more antennas 63.
- Fig 9 is a schematic diagram showing functional modules of the transmitter network entity 5 of Figs 3A and 3B according to one embodiment.
- the modules are implemented using software instructions such as a computer program.
- the modules are implemented using hardware, such as any one or more of an ASIC (Application Specific
- Integrated Circuit an FPGA (Field Programmable Gate Array), or discrete logical circuits.
- the modules correspond to the steps in the methods illustrated in Figs 6A and 6B.
- a modulator 70 corresponds to step 40.
- a scheme signaller corresponds to step 42.
- Fig 10 is a schematic diagram showing functional modules of the receiver network entity 6 of Figs 3A and 3B according to one embodiment.
- the modules are implemented using software instructions such as a computer program.
- the modules are implemented using hardware, such as any one or more of an ASIC (Application Specific
- Integrated Circuit an FPGA (Field Programmable Gate Array), or discrete logical circuits.
- the modules correspond to the steps in the methods illustrated in Figs 7A and 7B.
- a modulation scheme determiner 80 corresponds to step 50.
- a demodulator 82 corresponds to step 52.
- a constellation point determiner 82a corresponds to step 52a.
- a constellation point matcher 82b corresponds to step 52b.
- a distinguisher 82c corresponds to step 52c.
- Fig 11 shows one example of a computer program product 90 comprising computer readable means.
- a computer program 91 can be stored, which computer program can cause a processor to execute a method according to embodiments described herein.
- the computer program product is an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc) or a Blu-Ray disc.
- the computer program product could also be embodied in a memory of a device, such as the computer program product 67 of Fig 8.
- the computer program 91 is here schematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product, such as a removable solid state memory, e.g. a Universal Serial Bus (USB) drive.
- USB Universal Serial Bus
- Fig 12 is a schematic diagram illustrating a receiver network entity used in a set zero mode. The operations are shown in Figs 15 and 16 and are described below. This can be applied for the methods illustrated by Figs 7A-B, described above.
- a received signal is received by a demodulator 101.
- the demodulator 101 finds a constellation point corresponding to the received signal. When the constellation point is part of the second set (i.e. represents more than one bit sequence), the demodulator provides this information to a list builder 105, which keeps information about when second set constellation points are received.
- a Log Likelihood Ratio (LLR) module 102 calculates LLRs.
- a set to zero module 103 sets the received LLR of each ambiguous bit (of a second set constellation point) to zero, effectively introducing an erasure at that bit position.
- An FEC decoder 104 then performs decoding using FEC of the resulting signal. In this way, FEC is used to fill in the thus erased
- Fig 13 is a schematic diagram illustrating the receiver network entity used in the flip one and flip all modes.
- the demodulator 101, list builder 105 and LLR computation 102 are the same as for the set zero mode.
- the FEC decoder 104’ is here modified compared to FEC decoder of Fig 12. Operations of the decoding are illustrated in Figs 17 and 18 and are described below.
- Figs 14A-C are schematic diagrams illustrating an example of multiple paths during FEC decoding.
- the example shows the forward pass of a BCJR (Bahl Cocke Jelinek Raviv algorithm) decoder used in decoding of turbo codes.
- BCJR Bit Cocke Jelinek Raviv algorithm
- embodiments presented herein also cover similar path/message splitting for other classes of codes and other decoding algorithms, e.g., message passing for LDPC (Low-Density Parity-Check) codes.
- LDPC Low-Density Parity-Check
- the BCJR algorithm computes the bit-wise a posteriori probabilities based on the underlying code trellis:
- Compute bit-wise probabilities based on a, b and other information e.g., noise variance for AWGN (Additive White Gaussian Noise), bit crossover probability for binary symmetric channel
- Fig 14A shows the forward BCJR pass of a normal trellis transition where no bits in the bit sequence are overloaded.
- the Forward state metrics a are computed unambiguously.
- Fig 14B shows a trellis transition where one of the bits in the bit sequence is overloaded (marked with an“x”).
- two sets of forward metrics a are computed, one for the metrics if the overloaded bit is a o, and one for a bit value 1.
- the decoder can select which set to retain in the continued computations.
- the flip all mode it is not possible to take a decision until all m bits in the bit sequence have been encountered m is the number of bits represented by each constellation point, i.e. the number of bits in the bit sequence. Hence, even in the immediate decision alternative, we need to keep track of multiple decoding paths.
- Fig 14C shows how each time we encounter an overloaded bit, the number of paths to follow is doubled (except for the case of immediate decisions in flip one mode).
- Fig 15 is a flow chart illustrating a method for shows the common operations performed by the receiver network entities shown in Figs 12 and 13.
- the demodulator receives the signal from the RF (radio frequency) chain after down-conversion.
- the demodulator determines 110 the constellation symbol closest to the received symbol and passes this to the list builder.
- the list builder determines 111 if the present symbol is one of the overloaded symbols, i.e. of a constellation point in the second set. If this is the case, the list builder then determined 112 which bit(s) is(are) potentially flipped and adds 113 one or more indices, respectively, for each flipped bit, to a list of possible bit flips.
- bit-wise LLRs are then computed 114.
- Fig 16 is a flow chart illustrating a method of operations specific to the set zero mode.
- all LLRs corresponding to overloaded bits are set 121 to zero. I.e., the LLRs of all bits indicated by the list of possible bit flips are set to zero.
- Normal FEC decoding is then performed 122.
- the FEC fills in the erasures created by overloading the bits, where LLRs was set to zero.
- Fig 17 is a flow chart illustrating a method illustrating operations specific to the flip one mode 130.
- the LLRs and the list of possible bit flips are sent to the modified FEC decoder, where a modified FEC decoding is started 131. It is then determined 132 whether the current bit(s) to be decoded are in the list of possibly flipped bits. If this is not the case, metrics are computed normally 140. On the other hand, when a possibly flipped bit is encountered, the decoding metrics for both the original sign of the LLR are and the opposite sign of the LLR are computed 133, see Figs 14A-C and corresponding description above.
- the decoder selects 135 the sign of the LLR that minimizes the decoding metric, i.e. the best alternative.
- the sign corresponds to the value of the bit.
- the FEC decoder stores 136 the decoding metrics associated with both sign alternatives, thus continuing with two decoding paths.
- the number of possible alternatives increased with a power of two, since for every bit in the list of possible bit flips, the number of decoding paths double.
- the set of paths can optionally be continuously pruned. Methods to prune the paths include, but are not limited to
- path should be interpreted as decoding alternatives in a wide sense, not limited to the path in e.g., the Viterbi Algorithm/Maximum
- bit After the bit is processed, it is determined 137 whether all bits have been processed. If all bits have not been processed, the next bit is selected 141.
- the path with the best decoding metric is selected 138 as FEC output. This selection maybe done in either a direct manner taking decision on all alternatives at once. Alternatively, this can be done in a successive or iterative manner, where a decision is first taken on one or some bits, the decoding metrics are then recalculated with these decisions taken, and then decisions are taken on the next bit(s). This is successively progressed until all overloaded bits have been resolved.
- the magnitude of the LLRs of potentially flipped bits can be reduced to indicate the lower reliability of the potentially flipped bits.
- Fig 18 is a flow chart illustrating a method illustrating operations specific to the flip all mode. Many of the steps are the same as for the flip one mode, illustrated in Fig 17, and are not described again.
- the flip all mode 150 the LLRs and the list of possible bit flips are sent to a modified FEC decoder. When a possibly flipped bit is encountered, this will be one of m bits that are all jointly flipped or not, since the entire bit sequence is flipped. Hence, it is here introduced a decision step for determining 139 when all m bits in the bit sequence are done. Instead of computing the decoding metrics for the two options, for the original LLR sign or for the opposite LLR sign (corresponding to un-flipped and flipped bits, respectively), for a single bit, this is done for m bits jointly.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
Abstract
It is presented a method for modulating data for transmission over a communication channel to a receiver network entity. The method is performed in a transmitter network entity and comprises the step of: modulating data in accordance with a modulation scheme, the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
Description
MODULATING AND DEMODULATING DATA TECHNICAL FIELD
The invention relates to methods, network entities, computer programs and computer program products for modulating and demodulating data transmitted over a communication channel.
BACKGROUND
Modulating data for transmission over a communication channel can be done using many different modulation schemes. One commonly used modulation scheme is QAM (Quadrature Amplification Modulation). In QAM, a number of constellation points are specified in a plane defined by a magnitude in an in-phase carrier (on the x axis) and a magnitude in a quadrature carrier (on the y axis). Each constellation point corresponds to a symbol transmitted over the communication channel and represents a bit sequence. The constellation points are often provided in a rectangular, e.g. square, pattern. Examples of known such schemes are 16-QAM containing 4x4 constellation points, 64-QAM containing 8x8 constellation points and 256-QAM
containing 16x16 constellation points. There are many other QAM
modulation schemes.
While rectangular QAM has proved valuable and gained popularity, rectangular QAM suffers from relatively poor Peak-to-Average Power Ratio (PAPR) due i.a. to the corner points of the rectangular QAM.
The article by Georg Bocherer“Labeling Non-Square QAM Constellations for One-Dimensional Bit-Metric Decoding”, IEEE Communications Letters, Volume: 18, Issue: 9, Sept. 2014, presents a modulation scheme that combines the features of APSK and QAM constellations, namely, low peak power of APSK and the independent processing of the real and imaginary components of QAM. In this article, it is disclosed a method which starts from a 2A(2m) constellation and removes the 2A(2m-i) constellation points with highest energy. E.g., it is started with a 64 QAM and high energy points
are removed to get a more round constellation with 32 points. The final constellation should be symmetric around the origin.
By this process, the final constellation can convey log2(32) = 5 bits per channel use with a 2-dimensional constellation, equalling 2,5 bits per dimension per channel use. The method proposes a label that still uses 6 digits in the label to get independence in I and Q component (equal to X and Y axes in the constellation diagram).
The method thus conveys 5 bits per channel use (2.5 bits per dimension per channel use), and uses a 6-digit label, whereby a mapping is needed to map the 5 bits to the 6-digit label. Firstly, this requires extra processing at both the transmitter and receiver. Secondly, this introduces a dependence between the bit levels.
The label bits are not equally distributed in terms of probability and that may affect the performance (or at least make the Log Likelihood Ratio (LLR) computation less symmetric). Moreover, the presented method is
complicated.
SUMMARY
It is an object to provide a modulation scheme which provides better, i.e. lower, PAPR than rectangular QAM and that is easier to implement than methods known in the prior art.
According to a first aspect, it is presented a method for modulating data for transmission over a communication channel to a receiver network entity. The method is performed in a transmitter network entity and comprises the step of: modulating data in accordance with a modulation scheme, the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
When all of the constellation points of the modulation scheme are plotted on a constellation diagram, the constellation points may resemble a rectangle with removed corners.
In one embodiment, there is one corner point missing for each corner, in the constellation diagram, to make complete rectangle.
In one embodiment, there are three corner points missing for each corner, in the constellation diagram, to make complete rectangle.
Each constellation point in the first set may represent the same bit sequence as for a corresponding constellation point of a square Quadrature Amplitude Modulation, QAM, scheme.
For each constellation point in the second set, a first bit sequence maybe the same bit sequence as for the corresponding square QAM scheme and a second bit sequence may represent a constellation point of the square QAM scheme which is not present in the modulation scheme.
In one embodiment, for each constellation point in the second set, the first bit sequence and the second bit sequence only differs by one bit.
In one embodiment, for each constellation point in the second set, the first bit sequence is the inverse of the second bit sequence.
The method may further comprise the step of: signalling to the receiver network entity the modulation scheme being used.
The method may further comprise the step of: determining the modulation scheme to be used, which comprises receiving a signal indicating the modulation scheme to use.
The transmission may be an uplink transmission.
In one embodiment, a method for modulating data for transmission over a communication channel to a receiver network entity is provided. The method is performed in a transmitter network entity and comprises the step of:
modulating data in accordance with a modulation scheme, the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences, wherein the two different bit sequences are a first bit sequence and a second bit sequence, the first bit sequence and the second bit sequence only differs by one bit, or the first bit sequence is the inverse of the second bit sequence.
According to a second aspect, it is presented a transmitter network entity for modulating data for transmission over a communication channel to a receiver network entity. The transmitter network entity comprises: a processor; and a memory storing instructions that, when executed by the processor, cause the transmitter network entity to: modulate data in accordance with a
modulation scheme, the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
When all of the constellation points of the modulation scheme are plotted on a constellation diagram, the constellation points may resemble a rectangle with removed corners.
In one embodiments, there is one corner point missing for each corner, in the constellation diagram, to make complete rectangle.
In one embodiment, there are three corner points missing for each corner, in the constellation diagram, to make complete rectangle.
Each constellation point in the first set may represent the same bit sequence as for a corresponding constellation point of a square Quadrature Amplitude Modulation, QAM, scheme.
For each constellation point in the second set, a first bit sequence maybe the same bit sequence as for the corresponding square QAM scheme and a
second bit sequence may represent a constellation point of the square QAM scheme which is not present in the modulation scheme.
In one embodiment, for each constellation point in the second set, the first bit sequence and the second bit sequence only differ by one bit.
In one embodiment, for each constellation point in the second set, the first bit sequence is the inverse of the second bit sequence.
The transmitter network entity may further comprise instructions that, when executed by the processor, cause the transmitter network entity to signal to the receiver network entity the modulation scheme being used.
The transmitter network entity may further comprise instructions that, when executed by the processor, cause the transmitter network entity to determine the modulation scheme to be used, which comprises to receive a signal indicating the modulation scheme to use.
The transmission may be an uplink transmission.
According to a third aspect, it is presented a transmitter network entity comprising: means for modulating data in accordance with a modulation scheme for transmission over a communication channel to a receiver network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
According to a fourth aspect, it is presented a computer program for modulating data for transmission over a communication channel to a receiver network entity. The computer program comprises computer program code which, when run on a transmitter network entity causes the transmitter network entity to: modulate data in accordance with a modulation scheme, the modulation scheme comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
According to a fifth aspect, it is presented a computer program product comprising a computer program according to the fourth aspect and a computer readable means on which the computer program is stored.
According to a sixth aspect, it is presented a method for demodulating signals received over a communication channel from a transmitter network entity. The method is performed in a receiver network entity and comprises the steps of: determining a modulation scheme used by the transmitter network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and demodulating received signals in accordance with the modulation scheme.
The step of demodulating received signals may comprise the steps of:
determining the constellation points in the second set; determining when a received symbol is considered to match a constellation point in the second set, yielding an ambiguous symbol; and distinguishing between the multiple bit sequences of an ambiguous symbol using forward error correction, FEC.
The step of determining a modulation scheme may comprise receiving a signal indicating the modulation scheme being used.
The signals may be received in an uplink reception.
According to a seventh aspect, it is presented a receiver network entity for demodulating signals received over a communication channel from a transmitter network entity. The receiver network entity comprises: a processor; and a memory storing instructions that, when executed by the processor, cause the receiver network entity to: determine a modulation scheme used by the transmitter network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and demodulate received signals in accordance with the modulation scheme.
The instructions to demodulate received signals may comprise instructions that, when executed by the processor, cause the receiver network entity to: determine the constellation points in the second set; determine when a received symbol is considered to match a constellation point in the second set, yielding an ambiguous symbol; and distinguish between the multiple bit sequences of an ambiguous symbol using forward error correction, FEC.
The instructions to determine a modulation scheme may comprise
instructions that, when executed by the processor, cause the receiver network entity to receive a signal indicating the modulation scheme being used.
The signals may be received in an uplink reception.
According to an eighth aspect, it is presented a receiver network entity comprising: means for determining a modulation scheme used by the transmitter network entity for demodulating signals received over a communication channel from a transmitter network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and means for demodulating received signals in accordance with the modulation scheme.
According to a ninth aspect, it is presented a computer program for demodulating signals received over a communication channel from a transmitter network entity. The computer program comprises computer program code which, when run on a receiver network entity causes the receiver network entity to: determine a modulation scheme used by the transmitter network entity, wherein the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and demodulate received signals in accordance with the modulation scheme.
According to a tenth aspect, it is presented a computer program product comprising a computer program according to the ninth aspect and a computer readable means on which the computer program is stored.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the element, apparatus, component, means, step, etc." are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is now described, by way of example, with reference to the accompanying drawings, in which:
Fig l is a schematic diagram illustrating a cellular communication network where embodiments presented herein may be applied;
Figs 2A-B are schematic diagrams illustrating network entities forming part of the wireless device and the base station of Fig l;
Fig 3 is a schematic diagram illustrating a communication channel;
Figs 4A-B are constellation diagrams illustrating modulation schemes which can be used by the network entities of Fig 1;
Figs 5A-B are constellation diagrams illustrating modulation schemes according to embodiments presented herein;
Figs 6A-C are flow charts illustrating methods for modulating data for transmission over a communication channel to a receiver network entity;
Figs 7A-B are flow charts illustrating methods for demodulating signals received over a communication channel from a transmitter network entity;
Fig 8 is a schematic diagram illustrating components of the base stations and the wireless device of Fig 2;
Fig 9 is a schematic diagram showing functional modules of the transmitter network entity of Figs 3A and 3B according to one embodiment;
Fig 10 is a schematic diagram showing functional modules of the receiver network entity of Figs 3A and 3B according to one embodiment;
Fig 11 shows one example of a computer program product comprising computer readable means;
Fig 12 is a schematic diagram illustrating a receiver network entity used in a set zero mode;
Fig 13 is a schematic diagram illustrating the receiver network entity used in the flip one and flip all modes;
Figs 14A-C are schematic diagrams illustrating an example of multiple paths during FEC decoding;
Fig 15 is a flow chart illustrating a method for shows the common operations performed by the receiver network entities shown in Figs 12 and 13;
Fig 16 is a flow chart illustrating a method of operations specific to the set zero mode; and
Fig 17 is a flow chart illustrating a method illustrating operations specific to the flip one mode; and
Fig 18 is a flow chart illustrating a method illustrating operations specific to the flip all mode.
DETAILED DESCRIPTION
The invention will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. This invention may, however, be embodied in many different
forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout the description.
Fig l is a schematic diagram illustrating a cellular communication network 8 where embodiments presented herein may be applied. The cellular communication network 8 comprises a core network 3 and one or more base stations 1, here in the form of base stations being evolved Node Bs, also known as eNode Bs or eNBs. The base station 1 could also be in the form of g Node Bs, Node Bs, BTSs (Base Transceiver Stations) and/or BSSs (Base Station Subsystems), etc. The base station 1 can be implemented at one location or can be split over several locations. For instance, part of the processing of the base station 1 can be performed in a central location, also known as the cloud. In such a case, the processing in the central location can be performed in a physical device which performs processing for several base stations 1.
The base station 1 provides radio connectivity over a wireless interface 4a-b to a plurality of wireless devices 2. The term wireless device is also known as mobile communication terminal, user equipment (UE), mobile terminal, user terminal, user agent, wireless terminal, machine-to-machine device etc., and can be, for example, what today are commonly known as a mobile phone, smart phone, Internet of Things (IoT) device, or a tablet/laptop with wireless connectivity. The term wireless is here to be construed as having the ability to perform wireless communication. More specifically, the wireless device 2 can comprise a number of wires for internal and/or external purposes.
The cellular communication network 8 may e.g. comply with any one or a combination of 5G NR (New Radio), LTE (Long Term Evolution), LTE- Advanced, W-CDMA (Wideband Code Division Multiplex), EDGE (Enhanced Data Rates for GSM (Global System for Mobile communication) Evolution), GPRS (General Packet Radio Service), CDMA2000 (Code Division Multiple
Access 2000), or any other current or future wireless network, as long as the principles described hereinafter are applicable.
Over the wireless interface, downlink (DL) communication 4b occurs from the base station 1 to the wireless device 2 and uplink (UL) communication 4a occurs from the wireless device 2 to the base station 1. The quality of the wireless radio interface for each wireless device 2 can vary over time and depends on the position of the wireless device 2, due to effects such as fading, multipath propagation, interference, etc.
The base station 1 is also connected to the core network 3 for connectivity to central functions and a wide area network 7, such as the Internet.
Figs 2A-B are schematic diagrams illustrating network entities forming part of the wireless device 2 and the base station 1 of Fig 1.
As shown in Fig 2A, the wireless device 2 comprises a transmitter network entity 5 as well as a receiver network entity 6. The transmitter network entity 5 is configured to perform modulation, power amplification and other processing for uplink transmissions to the base station 1. Analogously, the receiver network entity 6 is configured to perform demodulation and other processing for receiving downlink transmissions from the base station 1. The transmitter network entity 5 and the receiver network entity 6 do not need to, but can be, physically separate. In other words, physical components of the transmitter network entity 5 may also be used in the receiver network entity 6, when applicable.
Looking now to Fig 2B, also the base station 1 comprises a transmitter network entity 5 and a receiver network entity 6. The transmitter network entity 5 is here configured to perform modulation, power amplification and other processing for downlink transmissions to the wireless device 2.
Analogously, the receiver network entity 6 is configured to perform
demodulation and other processing for receiving uplink transmissions from the wireless device 2. As for the wireless device, the transmitter network entity 5 and the receiver network entity 6 do not need to, but can be,
physically separate. In other words, physical components of the transmitter network entity 5 may also be used in the receiver network entity 6, when applicable.
Fig 3 is a schematic diagram illustrating a communication channel 10.
Transmissions 11 from a transmitter network entity 5 pass are transported through a communication channel 10 to a receiver network entity 6. The communication channel 10 can comply with any suitable cellular network specification exemplified above. Alternatively, the communication channel 10 can be for another type of data transfer, e.g. a wired communication channel or a local wireless communication channel.
Figs 4A-B are constellation diagrams illustrating modulation schemes which can be used by the network entities of Fig 1. The horizontal axis I represents in-phase carrier and the vertical axis Q represents quadrature carrier. This is often thought of as a complex number plane, with I being the real component and Q being the imaginary component.
Looking first to Fig 4A, this shows a constellation diagram with 64
constellation points 22 equi distantly spaced in the IQ plane. The modulation illustrated by Fig 4A is a 64-QAM (Quadrature Amplitude Modulation) modulation, so called due to there being 64 constellation points, each representing one of 64 (2L6) bit sequences. Each bit sequence is thus here 6 bits long. Each constellation point 22 is transmitted as a symbol from the transmitter to the receiver network entity. When the receiver network entity receives the symbol, it determines the corresponding constellation point 22 and determines the bit sequence represented by the determined constellation point. 64-QAM is a rectangular modulation scheme that is known in the art per se.
There are four corner points 24, being the constellation points furthest away from the origin. Moreover, there are two further constellation points 27 in each quadrant, being the two constellation points being closest to the respective corner point 27. Together, these three corner points 24, 27 are the
three constellation points being furthest from the origin in each quadrant. As explained in further detail below, embodiments presented herein allow corner points (e.g. one for each corner or three for each corner) to be removed from the modulation scheme.
Looking now to Fig 4B, this shows a constellation diagram with 16
constellation points 22 equidistantly spaced in the IQ plane, illustrating a 16- QAM modulation, which is known in the art per se.
Figs 5A-B are constellation diagrams illustrating modulation schemes 2ia-b according to embodiments presented herein.
Looking to Fig 5A, the modulation scheme 21a of Fig 5A is similar to 64- QAM. However, one corner point of each quadrant have been removed.
Hence, there are here 60 constellation points. Still, we would like to represent 64 different bit sequences, representing six bits. This is solved by each one of the corner points to be represented by another one of the constellation points 29. Consequently, according to this modulation scheme 21a, there are overloaded constellation points 29, representing two different bit sequences. All the other constellation points, representing only one bit sequence are defined to form part of a first set of constellation points. The constellation points 29 representing two different bit sequences are defined to form a second set of constellation points. The overloaded constellation points 29 do not need to be located where exemplified in Fig 5A; these overloaded constellation points can be located anywhere among the remaining
constellation points 22 once the corner points are removed. However, the closer the overloaded constellation points are to the origin, the lower the average energy. Since the peak energy is given by the maximum energy of the remaining constellation points, the PAPR becomes larger (i.e. worse) if the average energy is reduced. Hence, the overloaded constellation points can be provided further out to minimise PAPR. On the other hand, the overloaded constellation points can be provided closer to the origin to lower average energy to thereby conserve power use. In other words, in one embodiment, the overloaded constellation points are placed furthest from the origin to
reduce PAPR. In another embodiment, the overloaded constellation points are placed close to the origin to reduce power consumption. In another embodiment, the overloaded constellation points are placed somewhere in between to balance the two benefits.
On the receiver side, when a symbol of a constellation point 29 of the second set is received, this can represent one of two possible bit sequences. As explained in further detail below, the receiver network entity distinguishes between the two possible bit sequences using forward error correction, FEC, which is already provided in many communication channel protocols.
By not having the corner points in the modulation scheme, PAPR is reduced, which reduces the requirements on the transmitter. By using FEC on the receiver side, a simple modulation scheme is provided.
An advantage of embodiments presented herein is that no additional mapping between encoded bits and constellation labels are needed. At the transmitter, nothing needs to be done except in the constellation mapper (changing the label of the corner points/corner and edge points to interior points). At the receiver, the regular LLR computation circuitry can be used.
In the prior art by Bocherer presented background, there are a non-integer number of information bits per constellation dimension. This requires an additional mapper.
In embodiments presented herein, there is no need to keep track of which LLRs come from constellation points which may have been“overloaded” (used by two labels). In the set zero mode described more below, this amounts to setting the LLR for one bit in the label to o. If the LLR is set to o, this is effectively an erasure. An erasure is simpler to handle by the FEC than an error (if it is erased, it cannot mislead). For the methods where tentative decisions are made and updates are done later, this becomes more complex. However, e.g. for an IoT uplink, the additional complexity can be collected in the receiver in the base station, which is an advantage since the base station is not as constrained as an IoT device.
The modulation scheme can be used to reduce the amplitude of signals output by the power amplifier, thereby reducing requirements on linearity for high amplitude signals since the highest-power outputs are removed.
Alternatively, the whole modulation scheme can be scaled up to the same maximum amplitude as for the equivalent QAM modulation scheme. This results in increased distance between constellation points, making the modulation scheme more robust compared to an equivalent QAM
modulation scheme.
Looking now to Fig 5B, this illustrates a modulation scheme 21b where three corner points have been removed for each corner. This augments the effect of reduced maximum amplitude or increased distance between constellation points.
While the modulation schemes shown in Fig 5A and Fig 5B are used for a constellation size supporting bit sequences of six bits (corresponding to 64QAM), the modulation scheme can be applied for any suitable
constellation size. For instance, the modulation scheme can be applied in constellation size for bit sequences of four bits, eight bits, etc. The larger the constellation, the more rounded corners can be sculpted, improving circularity, and thereby performance, of the constellation.
While two-dimensional constellations are disclosed here, the same principle can be applied to higher-dimensional constellations, where corner points are removed to create a constellation closer to a sphere or hyper-sphere.
Figs 6A-C are flow charts illustrating methods for modulating data for transmission over a communication channel to a receiver network entity. The method is performed in a transmitter network entity. The method can be applied for uplink transmissions, where reduced amplitude of transmissions is particularly beneficial, since a wireless device is often limited in capacity and linearity in its power amplifiers. This is an issue which only increases with the increased popularity of Internet of Things (IoT) devices.
Nevertheless, the method can equally well be applied for downlink
transmissions.
In a modulate step 40, the transmitter network entity determines a modulation scheme to be used. The modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a second set of constellation points (overloaded constellation points) respectively representing two different bit sequences. The transmitter network entity modulates data in accordance with the modulation scheme.
When all of the constellation points of the modulation scheme are plotted on a constellation diagram, the constellation points resemble a rectangle with removed corners, e.g. as seen in Figs 5A and 5B.
In one embodiment, there is one corner point missing for each corner, in the constellation diagram, to make complete rectangle, e.g. as shown in Fig 5A.
In one embodiment, there are three corner points missing for each corner, in the constellation diagram, to make complete rectangle, e.g. as shown in Fig 5B. The three missing corner points, in each quadrant, are the three constellation points with the greatest amplitude, i.e. distance from the origin.
The modulation scheme can be such that each constellation point in the first set represents the same bit sequence as for a corresponding constellation point of a square QAM scheme. This makes the modulation scheme similar to square QAM schemes (16-QAM, 64-QAM, 256-QAM, etc.), simplifying implementation.
In order to minimise differences with traditional QAM modulation, for each constellation point in the second set, a first bit sequence can be the same bit sequence as for the corresponding square QAM scheme. Furthermore, a second bit sequence represents a constellation point of the square QAM scheme which is not present in the modulation scheme, i.e. for corner points.
In one embodiment, for each constellation point in the second set, the first bit sequence and the second bit sequence only differ by one bit. This is also called a flip one mode.
In one embodiment, for each constellation point in the second set, the first bit sequence is the inverse of the second bit sequence. This is also called a flip all mode.
Looking now to Fig 6B, only new or modified steps compared to the steps of Fig 6A are described.
In an optional signal scheme step 42, transmitter network entity signals to the receiver network entity the modulation scheme being used. In this case, it is the transmitter network entity that is given the task of determining the modulation scheme to use.
Looking now to Fig 6C, only new or modified steps compared to the steps of Fig 6A are described.
In an optional determine modulation scheme step 38, the transmitter network entity determines the modulation scheme to be used (in step 40). This comprises receiving a signal indicating the modulation scheme to use. For instance, the receiver network entity might be given the task of determining the modulation scheme to use, in which case, it is the receiver network entity that sends this signal to the transmitter network entity.
Figs 7A-B are flow charts illustrating methods for demodulating signals received over a communication channel from a transmitter network entity. The method is performed in a receiver network entity. As explained above, the method can be applied for uplink transmissions and/or downlink transmissions.
In a determine modulation scheme step 50, the receiver network entity determines a modulation scheme used by the transmitter network entity. As for the transmitter side, the modulation scheme comprises a first set of constellation points respectively representing only one bit sequence and a
i8 second set of constellation points respectively representing two different bit sequences.
Optionally, this comprises receiving a signal indicating the modulation scheme being used, e.g. from the transmitter network entity.
In a demodulate step 52, the receiver network entity demodulates received signals in accordance with the modulation scheme. The demodulation occurs using FEC.
Looking now to Fig 7B, this is a flow chart illustrating optional substeps of the demodulate step 52 of Fig 7A.
In an optional determine constellation points in the second set step 52a, the receiver network entity determines the constellation points in the second set.
In an optional determine when symbol matches a constellation point in the second set step 52b, the receiver network entity determines when a received symbol is considered to match a constellation point in the second set, yielding an ambiguous symbol.
In an optional distinguish based on FEC step 52 c, the receiver network entity distinguishes between the multiple bit sequences of an ambiguous symbol using FEC.
Fig 8 is a schematic diagram illustrating components of the base station 1 and the wireless device 2 of Fig 2. A processor 60 is provided using any
combination of one or more of a suitable central processing unit (CPU), multiprocessor, microcontroller, digital signal processor (DSP), etc., capable of executing software instructions 67 stored in a memory 64, which can thus be a computer program product. The processor 60 could alternatively be implemented using an application specific integrated circuit (ASIC), field programmable gate array (FPGA), etc. The processor 60 can be configured to execute any one of the methods described with reference to Figs 6A-C and Figs 7A-B above.
The memory 64 can be any combination of random access memory (RAM) and/ or read only memory (ROM). The memory 64 also comprises persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid-state memory or even remotely mounted memory.
A data memory 66 is also provided for reading and/ or storing data during execution of software instructions in the processor 60. The data memory 66 can be any combination of RAM and/or ROM.
An I/O interface 62 is provided for communicating with external and/or internal entities.
A transceiver 61 comprises suitable analogue and digital components to allow signal transmission and signal reception with a wireless device using one or more antennas 63.
Other components are omitted in order not to obscure the concepts presented herein.
Fig 9 is a schematic diagram showing functional modules of the transmitter network entity 5 of Figs 3A and 3B according to one embodiment. The modules are implemented using software instructions such as a computer program. Alternatively or additionally, the modules are implemented using hardware, such as any one or more of an ASIC (Application Specific
Integrated Circuit), an FPGA (Field Programmable Gate Array), or discrete logical circuits. The modules correspond to the steps in the methods illustrated in Figs 6A and 6B.
A modulator 70 corresponds to step 40. A scheme signaller corresponds to step 42.
Fig 10 is a schematic diagram showing functional modules of the receiver network entity 6 of Figs 3A and 3B according to one embodiment. The modules are implemented using software instructions such as a computer program. Alternatively or additionally, the modules are implemented using
hardware, such as any one or more of an ASIC (Application Specific
Integrated Circuit), an FPGA (Field Programmable Gate Array), or discrete logical circuits. The modules correspond to the steps in the methods illustrated in Figs 7A and 7B.
A modulation scheme determiner 80 corresponds to step 50. A demodulator 82 corresponds to step 52. A constellation point determiner 82a corresponds to step 52a. A constellation point matcher 82b corresponds to step 52b. A distinguisher 82c corresponds to step 52c.
Fig 11 shows one example of a computer program product 90 comprising computer readable means. On this computer readable means, a computer program 91 can be stored, which computer program can cause a processor to execute a method according to embodiments described herein. In this example, the computer program product is an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc) or a Blu-Ray disc. As explained above, the computer program product could also be embodied in a memory of a device, such as the computer program product 67 of Fig 8. While the computer program 91 is here schematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product, such as a removable solid state memory, e.g. a Universal Serial Bus (USB) drive.
Fig 12 is a schematic diagram illustrating a receiver network entity used in a set zero mode. The operations are shown in Figs 15 and 16 and are described below. This can be applied for the methods illustrated by Figs 7A-B, described above.
A received signal is received by a demodulator 101. The demodulator 101 finds a constellation point corresponding to the received signal. When the constellation point is part of the second set (i.e. represents more than one bit sequence), the demodulator provides this information to a list builder 105, which keeps information about when second set constellation points are received. A Log Likelihood Ratio (LLR) module 102 calculates LLRs. A set to
zero module 103 sets the received LLR of each ambiguous bit (of a second set constellation point) to zero, effectively introducing an erasure at that bit position. An FEC decoder 104 then performs decoding using FEC of the resulting signal. In this way, FEC is used to fill in the thus erased
information.
Fig 13 is a schematic diagram illustrating the receiver network entity used in the flip one and flip all modes. The demodulator 101, list builder 105 and LLR computation 102 are the same as for the set zero mode. The FEC decoder 104’ is here modified compared to FEC decoder of Fig 12. Operations of the decoding are illustrated in Figs 17 and 18 and are described below.
Figs 14A-C are schematic diagrams illustrating an example of multiple paths during FEC decoding. The example shows the forward pass of a BCJR (Bahl Cocke Jelinek Raviv algorithm) decoder used in decoding of turbo codes. However, embodiments presented herein also cover similar path/message splitting for other classes of codes and other decoding algorithms, e.g., message passing for LDPC (Low-Density Parity-Check) codes.
The BCJR algorithm computes the bit-wise a posteriori probabilities based on the underlying code trellis:
Compute forward probabilities a
Compute backward probabilities b
Compute bit-wise probabilities based on a, b and other information (e.g., noise variance for AWGN (Additive White Gaussian Noise), bit crossover probability for binary symmetric channel)
For each trellis step, at is a vector of probabilities of the trellis state before the transition. During the forward pass of the BCJR algorithm, these vectors are computed and stored. They are then used during the backward pass to compute both b and the bit-wise probability (usually in the same backward pass to minimize storage requirements).
Fig 14A shows the forward BCJR pass of a normal trellis transition where no bits in the bit sequence are overloaded. The Forward state metrics a are computed unambiguously.
Fig 14B shows a trellis transition where one of the bits in the bit sequence is overloaded (marked with an“x”). As a result, two sets of forward metrics a are computed, one for the metrics if the overloaded bit is a o, and one for a bit value 1. In case immediate decisions are taken in the flip one mode, the decoder can select which set to retain in the continued computations. In the flip all mode, it is not possible to take a decision until all m bits in the bit sequence have been encountered m is the number of bits represented by each constellation point, i.e. the number of bits in the bit sequence. Hence, even in the immediate decision alternative, we need to keep track of multiple decoding paths.
Fig 14C shows how each time we encounter an overloaded bit, the number of paths to follow is doubled (except for the case of immediate decisions in flip one mode).
Fig 15 is a flow chart illustrating a method for shows the common operations performed by the receiver network entities shown in Figs 12 and 13.
The demodulator receives the signal from the RF (radio frequency) chain after down-conversion. The demodulator determines 110 the constellation symbol closest to the received symbol and passes this to the list builder.
The list builder determines 111 if the present symbol is one of the overloaded symbols, i.e. of a constellation point in the second set. If this is the case, the list builder then determined 112 which bit(s) is(are) potentially flipped and adds 113 one or more indices, respectively, for each flipped bit, to a list of possible bit flips.
The bit-wise LLRs are then computed 114.
Fig 16 is a flow chart illustrating a method of operations specific to the set zero mode.
In the set zero mode 120, all LLRs corresponding to overloaded bits are set 121 to zero. I.e., the LLRs of all bits indicated by the list of possible bit flips are set to zero.
Normal FEC decoding is then performed 122. The FEC fills in the erasures created by overloading the bits, where LLRs was set to zero.
Fig 17 is a flow chart illustrating a method illustrating operations specific to the flip one mode 130.
In the flip one mode, the LLRs and the list of possible bit flips are sent to the modified FEC decoder, where a modified FEC decoding is started 131. It is then determined 132 whether the current bit(s) to be decoded are in the list of possibly flipped bits. If this is not the case, metrics are computed normally 140. On the other hand, when a possibly flipped bit is encountered, the decoding metrics for both the original sign of the LLR are and the opposite sign of the LLR are computed 133, see Figs 14A-C and corresponding description above.
At this point, it is decided 134 whether to take an immediate decision or not.
It is possible to either take immediate decisions on the sign of the LLRs or wait until all potentially flipped bits have been encountered in the decoding process.
In the case of immediate decisions, the decoder selects 135 the sign of the LLR that minimizes the decoding metric, i.e. the best alternative. The sign corresponds to the value of the bit.
If delayed decisions are used, then the FEC decoder stores 136 the decoding metrics associated with both sign alternatives, thus continuing with two decoding paths. In general, the number of possible alternatives increased with a power of two, since for every bit in the list of possible bit flips, the number of decoding paths double.
To reduce the storage requirement and complexity, the set of paths can optionally be continuously pruned. Methods to prune the paths include, but are not limited to
• Discarding the paths with the worst decoding metrics based on some threshold of the metric
• Retaining a fixed number of best paths
• When the set of paths become full, take a decision on the best bit(s) in the list of possible bit flips, and retaining the paths corresponding to that decision.
Here the term path should be interpreted as decoding alternatives in a wide sense, not limited to the path in e.g., the Viterbi Algorithm/Maximum
Likelihood Sequence Estimator. In case of message passing decoders, multiple paths would be multiple messages corresponding to alternative signs of bit(s) in the list of possible bit flips.
After the bit is processed, it is determined 137 whether all bits have been processed. If all bits have not been processed, the next bit is selected 141.
If all bits have been processed, the path with the best decoding metric is selected 138 as FEC output. This selection maybe done in either a direct manner taking decision on all alternatives at once. Alternatively, this can be done in a successive or iterative manner, where a decision is first taken on one or some bits, the decoding metrics are then recalculated with these decisions taken, and then decisions are taken on the next bit(s). This is successively progressed until all overloaded bits have been resolved.
Optionally, the magnitude of the LLRs of potentially flipped bits can be reduced to indicate the lower reliability of the potentially flipped bits.
It is then determined 142 whether decoding is done. If decoding is not done, the next bit is processed by returning to step 132. Otherwise, the decoded information is output 143 for further processing.
Fig 18 is a flow chart illustrating a method illustrating operations specific to the flip all mode. Many of the steps are the same as for the flip one mode, illustrated in Fig 17, and are not described again. In the flip all mode 150, the LLRs and the list of possible bit flips are sent to a modified FEC decoder. When a possibly flipped bit is encountered, this will be one of m bits that are all jointly flipped or not, since the entire bit sequence is flipped. Hence, it is here introduced a decision step for determining 139 when all m bits in the bit sequence are done. Instead of computing the decoding metrics for the two options, for the original LLR sign or for the opposite LLR sign (corresponding to un-flipped and flipped bits, respectively), for a single bit, this is done for m bits jointly.
The remaining steps of the processes are similar to the flip one procedure. However, when decisions on LLR signs are taken, they are always taken 138’ for a group of m bits at a time, since all the bits in the m-bit long bit sequence are flipped jointly, when flipped.
The flip all operation requires more house-keeping to track the bits and flipping alternatives, but since now m bits instead of one bit is flipped, the difference in decoding metric between the alternatives is larger, whereby the recovery of the information is more reliable. The invention has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.
Claims
1. A method for modulating data for transmission over a communication channel (10) to a receiver network entity (6), the method being performed in a transmitter network entity (5) and comprising the step of:
modulating data in accordance with a modulation scheme (21a, 21b), the modulation scheme (21a, 21b) comprising a first set of constellation points respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
2. The method according to claim 1, wherein when all of the constellation points of the modulation scheme are plotted on a constellation diagram, the constellation points resemble a rectangle with removed corners.
3. The method according to claim 2, wherein there is one corner point missing for each corner, in the constellation diagram, to make complete rectangle.
4. The method according to claim 2, wherein there are three corner points missing for each corner, in the constellation diagram, to make complete rectangle.
5. The method according to any one of the preceding claims, wherein each constellation point in the first set represents the same bit sequence as for a corresponding constellation point of a square Quadrature Amplitude
Modulation, QAM, scheme.
6. The method according to claim 5, wherein for each constellation point in the second set, a first bit sequence is the same bit sequence as for the corresponding square QAM scheme and a second bit sequence represents a constellation point of the square QAM scheme which is not present in the modulation scheme.
7. The method according to claim 6, wherein, for each constellation point in the second set, the first bit sequence and the second bit sequence only differ by one bit.
8. The method according to claim 6, wherein, for each constellation point in the second set, the first bit sequence is the inverse of the second bit sequence.
9. The method according to any one of the preceding claims, further comprising the step of:
signalling (42) to the receiver network entity (6) the modulation scheme (21a, 21b) being used.
10. The method according to any one of claims 1 to 8, further comprising the step of:
determining (38) the modulation scheme (21a, 21b) to be used, which comprises receiving a signal indicating the modulation scheme (21a, 21b) to use.
11. The method according to any one of the preceding claims, wherein the transmission is an uplink transmission.
12. A transmitter network entity (5) for modulating data for transmission over a communication channel (10) to a receiver network entity (6), the transmitter network entity (5) comprising:
a processor (60); and
a memory (64) storing instructions (67) that, when executed by the processor, cause the transmitter network entity (5) to:
modulate data in accordance with a modulation scheme (21a, 21b), the modulation scheme (21a, 21b) comprising a first set of constellation points (22) respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
13. The transmitter network entity (5) according to claim 12, wherein when all of the constellation points of the modulation scheme are plotted on a constellation diagram, the constellation points resemble a rectangle with removed corners.
14. The transmitter network entity (5) according to claim 13, wherein there is one corner point missing for each corner, in the constellation diagram, to make complete rectangle.
15. The transmitter network entity (5) according to claim 13, wherein there are three corner points missing for each corner, in the constellation diagram, to make complete rectangle.
16. The transmitter network entity (5) according to any one of claims 12 to 15, wherein each constellation point in the first set represents the same bit sequence as for a corresponding constellation point of a square Quadrature Amplitude Modulation, QAM, scheme.
17. The transmitter network entity (5) according to claim 16, wherein for each constellation point in the second set, a first bit sequence is the same bit sequence as for the corresponding square QAM scheme and a second bit sequence represents a constellation point of the square QAM scheme which is not present in the modulation scheme.
18. The transmitter network entity (5) according to claim 17, wherein, for each constellation point in the second set, the first bit sequence and the second bit sequence only differ by one bit.
19. The transmitter network entity (5) according to claim 17, wherein, for each constellation point in the second set, the first bit sequence is the inverse of the second bit sequence.
20. The transmitter network entity (5) according to any one of claims 12 to 19, further comprising instructions (67) that, when executed by the processor, cause the transmitter network entity (5) to signal to the receiver network entity (6) the modulation scheme (21a, 21b) being used.
21. The transmitter network entity (5) according to any one of claims 12 to 19, further comprising instructions (67) that, when executed by the processor, cause the transmitter network entity (5) to determine the modulation scheme
(21a, 21b) to be used, which comprises to receive a signal indicating the modulation scheme (21a, 21b) to use.
22. The transmitter network entity (5) according to any one of claims 12 to 21, wherein the transmission is an uplink transmission.
23. A transmitter network entity (5) comprising:
means for modulating data in accordance with a modulation scheme (21a, 21b) for transmission over a communication channel (10) to a receiver network entity (6), wherein the modulation scheme (21a, 21b) comprises a first set of constellation points (22) respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
24. A computer program (67, 91) for modulating data for transmission over a communication channel (10) to a receiver network entity (6), the computer program comprising computer program code which, when run on a transmitter network entity (5) causes the transmitter network entity (5) to: modulate data in accordance with a modulation scheme (21a, 21b), the modulation scheme (21a, 21b) comprising a first set of constellation points (22) respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences.
25. A computer program product (64, 90) comprising a computer program according to claim 24 and a computer readable means on which the computer program is stored.
26. A method for demodulating signals received over a communication channel (10) from a transmitter network entity (5), the method being performed in a receiver network entity (6) and comprising the steps of:
determining (50) a modulation scheme (21a, 21b) used by the
transmitter network entity (5), wherein the modulation scheme (21a, 21b) comprises a first set of constellation points (22) respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and
demodulating (52) received signals in accordance with the modulation scheme (21a, 21b).
27. The method according to claim 26, wherein the step of demodulating (52) received signals comprises the steps of:
determining (52a) the constellation points in the second set;
determining (52b) when a received symbol is considered to match a constellation point in the second set, yielding an ambiguous symbol; and distinguishing (52c) between the multiple bit sequences of an
ambiguous symbol using forward error correction, FEC.
28. The method according to claim 26 or 27, wherein the step of
determining (50) a modulation scheme (21a, 21b) comprises receiving a signal indicating the modulation scheme (21a, 21b) being used.
29. The method according to any one of claims 26 to 28, wherein the signals are received in an uplink reception.
30. A receiver network entity (6) for demodulating signals received over a communication channel (10) from a transmitter network entity (5), the receiver network entity (6) comprising:
a processor (60); and
a memory (64) storing instructions (67) that, when executed by the processor, cause the receiver network entity (6) to:
determine a modulation scheme (21a, 21b) used by the transmitter network entity (5), wherein the modulation scheme (21a, 21b) comprises a first set of constellation points (22) respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and
demodulate received signals in accordance with the modulation scheme (21a, 21b).
31. The receiver network entity (6) according to claim 30, wherein the instructions to demodulate received signals comprise instructions (67) that, when executed by the processor, cause the receiver network entity (6) to:
determine the constellation points in the second set;
determine when a received symbol is considered to match a
constellation point in the second set, yielding an ambiguous symbol; and distinguish between the multiple bit sequences of an ambiguous symbol using forward error correction, FEC.
32. The receiver network entity (6) according to claim 30 or 31, wherein the instructions to determine a modulation scheme (21a, 21b) comprise instructions (67) that, when executed by the processor, cause the receiver network entity (6) to receive a signal indicating the modulation scheme (21a, 21b) being used.
33. The receiver network entity (6) according to any one of claims 30 to 32, wherein the signals are received in an uplink reception.
34. A receiver network entity (6) comprising:
means for determining a modulation scheme (21a, 21b) used by the transmitter network entity (5) for demodulating signals received over a communication channel (10) from a transmitter network entity (5), wherein the modulation scheme (21a, 21b) comprises a first set of constellation points (22) respectively representing only one bit sequence and a second set of constellation points respectively representing two different bit sequences; and
means for demodulating received signals in accordance with the modulation scheme (21a, 21b).
35. A computer program (67, 91) for demodulating signals received over a communication channel (10) from a transmitter network entity (5), the computer program comprising computer program code which, when run on a receiver network entity (6) causes the receiver network entity (6) to:
determine a modulation scheme (21a, 21b) used by the transmitter network entity (5), wherein the modulation scheme (21a, 21b) comprises a first set of constellation points (22) respectively representing only one bit sequence and a second set of constellation points respectively representing
two different bit sequences; and
demodulate received signals in accordance with the modulation scheme (21a, 21b).
36. A computer program product (64, 90) comprising a computer program according to claim 35 and a computer readable means on which the computer program is stored.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18931150.9A EP3841718A4 (en) | 2018-08-23 | 2018-08-23 | Modulating and demodulating data |
US17/270,068 US11496351B2 (en) | 2018-08-23 | 2018-08-23 | Modulating and demodulating data |
PCT/SE2018/050851 WO2020040674A1 (en) | 2018-08-23 | 2018-08-23 | Modulating and demodulating data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SE2018/050851 WO2020040674A1 (en) | 2018-08-23 | 2018-08-23 | Modulating and demodulating data |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020040674A1 true WO2020040674A1 (en) | 2020-02-27 |
Family
ID=69592733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE2018/050851 WO2020040674A1 (en) | 2018-08-23 | 2018-08-23 | Modulating and demodulating data |
Country Status (3)
Country | Link |
---|---|
US (1) | US11496351B2 (en) |
EP (1) | EP3841718A4 (en) |
WO (1) | WO2020040674A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020131524A1 (en) * | 2000-11-13 | 2002-09-19 | Victor Demjanenko | System and method using multi-dimensional constellations with low receiver soft- decision extraction requirements |
US20140079162A1 (en) * | 2012-09-18 | 2014-03-20 | Texas Instruments Incorporated | Methods for assigning codewoods to points in hexagonal constellations in digital communication systems |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6496543B1 (en) * | 1996-10-29 | 2002-12-17 | Qualcomm Incorporated | Method and apparatus for providing high speed data communications in a cellular environment |
US7525988B2 (en) * | 2005-01-17 | 2009-04-28 | Broadcom Corporation | Method and system for rate selection algorithm to maximize throughput in closed loop multiple input multiple output (MIMO) wireless local area network (WLAN) system |
US8848830B2 (en) * | 2011-11-17 | 2014-09-30 | Intel Mobile Communications GmbH | Method for providing a modulation scheme |
US8982984B2 (en) * | 2012-06-20 | 2015-03-17 | MagnaCom Ltd. | Dynamic filter adjustment for highly-spectrally-efficient communications |
TW201806363A (en) * | 2016-05-12 | 2018-02-16 | Idac控股公司 | Methods, apparatus and systems using a multidimensional gray coding scheme for real number M-ary QAM signaling |
-
2018
- 2018-08-23 WO PCT/SE2018/050851 patent/WO2020040674A1/en unknown
- 2018-08-23 US US17/270,068 patent/US11496351B2/en active Active
- 2018-08-23 EP EP18931150.9A patent/EP3841718A4/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020131524A1 (en) * | 2000-11-13 | 2002-09-19 | Victor Demjanenko | System and method using multi-dimensional constellations with low receiver soft- decision extraction requirements |
US20140079162A1 (en) * | 2012-09-18 | 2014-03-20 | Texas Instruments Incorporated | Methods for assigning codewoods to points in hexagonal constellations in digital communication systems |
Non-Patent Citations (3)
Title |
---|
NADAL F; SEZGINER S; SARI H: "Peak-to-Average Power Ratio Reduction in CDMA Systems Using Constellation Extension", PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2005. PIMRC 2005, 11 September 2005 (2005-09-11) - 14 September 2005 (2005-09-14), Germany, pages 417 - 420, XP010926400 * |
PENG SUN; DAOBEN LI,: "Transmitting with Fewer Constellation Points", MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011,, 7 November 2011 (2011-11-07), pages 600 - 604, XP032093006 * |
See also references of EP3841718A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP3841718A1 (en) | 2021-06-30 |
US11496351B2 (en) | 2022-11-08 |
US20210288862A1 (en) | 2021-09-16 |
EP3841718A4 (en) | 2022-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8190981B2 (en) | Apparatus and method for transmitting and receiving data in a communication system using low density parity check codes | |
US11133973B2 (en) | Methods and apparatuses for quadrature amplitude modulation optimized for phase noise | |
EP2985966B1 (en) | Transmission apparatus | |
WO2016119105A1 (en) | Polar code generation method and device | |
US9246510B2 (en) | Apparatus and method for multilevel coding in communication systems | |
CN110071895B (en) | Receiving apparatus and receiving method | |
EP2426842A1 (en) | Receiver and method for decoding a receive signal in a wireless communication system | |
US8397109B2 (en) | Bit mapping/demapping method and apparatus for communication system | |
EP2206262A1 (en) | Apparatus and method for transmitting and receiving data in a communication system using low density parity check code | |
US20140105337A1 (en) | Bicm decoding in the presence of co-channel interference | |
CN113965438B (en) | Method for solving soft information in 16APSK high-order modulation mode | |
ES2362759B1 (en) | PROCEDURE AND DEVICE OF DIGITAL COMMUNICATIONS FOR THE RECEIPT OF DATA USING QAM SYMBOLS. | |
US9036735B1 (en) | Apparatus and method for adaptively selecting channel code based on non-gaussianity of channel in wireless communication system | |
EP3968551A1 (en) | Coding modulation method, demodulation decoding method, apparatus, and device | |
Lewandowsky et al. | Message alignment for discrete LDPC decoders with quadrature amplitude modulation | |
An et al. | Soft decoding without soft demapping with ORBGRAND | |
US8705665B2 (en) | Process for performing log-likelihood-ratio clipping in a soft-decision near-ML detector, and detector for doing the same | |
EP3813278B1 (en) | Multilevel polar-coded modulation transmitting and receiving methods and devices | |
US20230155680A1 (en) | Modulation and Encoding Method and Apparatus, Demodulation and Decoding Method and Apparatus, Device, and Communication System | |
US11496351B2 (en) | Modulating and demodulating data | |
US10110346B1 (en) | Method and apparatus for soft bit computation in MIMO decoders | |
Fan et al. | Low-complexity rotated QAM demapper for the iterative receiver targeting DVB-T2 standard | |
Kurmukova et al. | Friendly Attacks to Improve Channel Coding Reliability | |
CN110505359B (en) | Non-uniform modulation and demodulation method, system, medium and terminal in wireless broadcast communication system | |
WO2023160053A1 (en) | Mapping method for probabilistic shaping and reception processing method for probabilistic de-shaping |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18931150 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2018931150 Country of ref document: EP Effective date: 20210323 |