Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
CONTROL CHANNEL DECODING OF NEIGHBORING CELLS
Document Type and Number:
WIPO Patent Application WO/2013/000690
Kind Code:
A1
Abstract:
A method of determining a radio network temporary identifier (RNTI) includes descrambling a control channel, decoding control messages included in the control channel wherein the decoded control messages include control bits and received cyclic redundancy check (CRC) bits, generating a CRC from the decoded control bits, determining the RNTI from the generated CRC and received CRC and utilizing the RNTI for decoding subsequent subframes.

Inventors:
LINDOFF BENGT (SE)
KAMUF MATTHIAS (DE)
REIAL ANDRES (SE)
Application Number:
PCT/EP2012/060984
Publication Date:
January 03, 2013
Filing Date:
June 11, 2012
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ERICSSON TELEFON AB L M (SE)
LINDOFF BENGT (SE)
KAMUF MATTHIAS (DE)
REIAL ANDRES (SE)
International Classes:
H04J11/00; H04L1/00
Domestic Patent References:
WO2010108136A12010-09-23
Foreign References:
US20100190447A12010-07-29
US20100009634A12010-01-14
Other References:
None
Attorney, Agent or Firm:
ÅKERMAN, Mårten (Nya Vattentornet, Lund, SE)
Download PDF:
Claims:
CLAIMS

1. A method in a user equipment for determining a radio network temporary identifier (RNTI), the method comprising the steps of:

descrambling a control channel;

decoding control messages included in the control channel wherein the decoded control messages include control bits and received cyclic redundancy check (CRC) bits;

generating a CRC from the decoded control bits;

determining the RNTI from the generated CRC and received CRC; and utilizing the RNTI for decoding subsequent subframes.

2. The method of claim 1, further comprising:

detecting a neighboring cell; and

measuring signal strength on a serving cell of the user equipment and the detected neighboring cell.

3. The method of claim 1 or 2, further comprising:

associating a timestamp to the determined RNTI;

storing the determined RNTI with the associated timestamp in a candidate

RNTI list; and

updating a count associated with the determined RNTI.

4. The method of claim 3, further comprising:

removing RNTIs from the list upon a time lapse from the timestamp of RNTI exceeding a pre-specified time period.

The method of claim 3 or 4, further comprising:

comparing the count of the RNTI with a pre-specified threshold value; storing the RNTI in a reliable candidate RNTI list if the count is equal to or greater than the threshold value.

6. The method of claim 5, further comprising:

utilizing a RNTI from the candidate RNTI list to decode subsequent subframes.

7. The method of claim 6, wherein the subsequent subframes are from a cell serving the user equipment.

8. The method of claim 6, wherein the subsequent subframes are from neighboring cells detected by the user equipment.

9. The method of any of claims 5 to 8, further comprising:

assigning a timestamp for the RNTI stored in the reliable RNTI list.

10. The method of claim 9, further comprising:

removing a RNTI from the candidate list upon a time lapse from the timestamp of the RNTI exceeding a pre-specified time period.

11. The method of any of claims 1 to 10, wherein the de-scrambling is based on at least a cell identity and a sub frame number associated with the control channel.

12. The method of any of claims 1 to 11, further comprising:

determining the RNTI by applying an exclusive OR (XOR) function between the generated CRC and the received CRC.

13. The method of any of claims 2 to 9, further comprising:

descrambling sub frames of physical downlink control channels

(PDCCHs) originating from the neighboring cell.

14. A user equipment comprising :

a receiver for down converting a received radio signal to a baseband signal;

an analog to digital converter for transforming the baseband signal to a digital signal; a cell search and measuring unit for detecting neighboring cells and for measuring signals on a serving cell and on the detected cells;

a decoder for decoding the digital signal wherein the decoded signal includes control bits and received cyclic redundancy check (CRC) bits; and

a control unit for generating a CRC from the decoded control bits; and determining a radio network temporary identifier candidate (RNTI) from the generated CRC and received CRC.

15. The user equipment of claim 14, further comprising:

a memory for storing the determined RNTI in a candidate RNTI list with an associated timestamp and a count.

16. The user equipment of claim 15, wherein the control unit is further for: comparing the count with a pre-determined threshold; and storing the RNTI in a reliable RNTI list if the count exceeds the threshold with each stored RNTI having an associated timestamp.

17. The user equipment of claim 16, wherein the control unit is further for: providing reliable RNTIs to the decoder for decoding subsequent subframes.

18. The user equipment of any of claims 15 to 17, wherein the control unit is further for:

removing a RNTI from the candidate list if a time lapse from the timestamp associated with the RNTI exceeds a pre-determined threshold.

19. The user equipment of claim 16 or 17, wherein the control unit is further for:

removing a RNTI from the reliable list if a time lapse from the timestamp associated with the RNTI exceeds a pre-determined threshold.

20. A computer program comprising computer readable program modules which when run on a user terminal causes the user terminal to:

descramble a control channel;

decode control messages included in the control channel wherein the decoded control messages include control bits and received cyclic redundancy check (CRC) bits;

generate a CRC from the decoded control bits;

determine the RNTI from the generated CRC and received CRC; and utilize the RNTI for decoding subsequent sub frames.

Description:
CONTROL CHANNEL DECODING OF NEIGHBORING CELLS

TECHNICAL FIELD

The invention relates generally to a mobile terminal, and more particularly, to methods and apparatus for improving the terminal performance.

BACKGROUND

Forthcoming releases of the 3GPP LTE (3 rd Generation Partnership Project Long Term Evolution) and HSPA (High Speed Packet Access) standard facilitate dual-carrier operation. In dual carrier operation, the user equipment (UE) can transmit and receive on multiple system carriers simultaneously. A dual carrier system 100 is illustrated in FIG. 1. A dual carrier capable UE 112 can transmit to, and receive from, serving cell 110 on multiple system carriers (fl and f2) simultaneously. A dual carrier system can increase the maximal throughput. Throughput is roughly

proportional to N where N is the number of carriers. Therefore, the throughput in a dual carrier system can increase by a factor of two (from 100 Mb/s to 200 Mb/s for example). A dual-carrier (or dual-cell) mobile terminal (or UE) for use in the dual carrier system needs the ability to process two downlinks (and/or two uplinks) at the same time. Typically, this means that baseband processing capability of a dual-carrier mobile terminal (such as channel estimation/decoding, etc.) is double that of a single- carrier mobile terminal.

The co-ordination of transmission from antennas positioned in different sites have also evolved in these standards such as advanced Inter-Cell Interference Coordination (ICIC), Co-ordinated Multipoint (CoMP) transmission and the introduction of Remote Radio Units (RRU). These techniques enable fast co-ordinated

transmissions from several antenna positions including beam forming and nulling. With nulling, interference can be strongly reduced to a specific UE. In coherent CoMP transmissions, the nulling gain is included in the algorithm of selecting co-scheduled mobiles and antenna pre-coding weights.

In order to increase capacity, MU-MIMO (Multi User Multiple Input Multiple Output) is used. In MU-MIMO, the radio resources are reused by transmitting on the same time and frequency to multiple UEs.

Dual-carrier (dual-cell) LTE/HSPA will probably be applied only in hot spot regions and also is only needed for very high throughput scenarios such as when single carrier transmission is insufficient. Therefore, in many use cases, where a single carrier is used, the baseband processing is not fully utilized in the mobile terminal. According to a common scenario in cellular systems, as illustrated in FIG. 2, a terminal 212 is at the cell border between two cells. One of these cells is the serving cell (SC) 210 and the other cell is a neighboring cell (NC) (or multiple neighboring cells) 220. A signal S that is being communicated between serving cell 210 and UE 212 is being subjected to interference I from neighboring cell 220. In such a scenario, the signal- interference-ratio (SI or SIR or carrier-to-interference ratio, C/I) is approximately 0 dB (SI ~ 0). As a result, full downlink (DL) throughput cannot be achieved. However, in these scenarios, the extra processing power can be used for detecting and cancelling the interfering signals, I.

A terminal connected to a cell receives control information on the physical downlink control channel (PDCCH). This information can be utilized by the terminal to determine whether it (i.e. the terminal) is scheduled data packets on the PDSCH in the downlink of its serving cell in the current subframe.

However, a significant problem is the decoding of the control channels (i.e. PDCCH) of the neighbouring cells since the terminal (that is trying to decode PDCCHs) is unaware of which terminals are connected to the neighboring cells. This makes the cancelling process of neighbouring cells' physical channels such as for example PDSCH significantly more complex.

There exists a need therefore for a method and apparatus for improving the blind decoding of control channels from neighbouring cells in order to make practical interference cancelling receivers capable of cancelling interference from neighboring cells. SUMMARY

It should be emphasized that the terms "comprises" and "comprising", when used in this specification, are taken to specify the presence of stated features, integers, steps or components; but the use of these terms does not preclude the presence or addition of one or more other features, integers, steps, components or groups thereof.

In exemplary embodiments, the foregoing and other objects are achieved in methods, systems, and apparatuses for utilizing information received by a user equipment .

According to an embodiment, a method of determining a radio network temporary identifier (RNTI) is disclosed. The method includes determining a radio network temporary identifier (RNTI) includes descrambling a control channel, decoding control messages included in the control channel wherein the decoded control messages include control bits and received cyclic redundancy check (CRC) bits, generating a

CRC from the decoded control bits, determining the RNTI from the generated CRC and received CRC and utilizing the RNTI for decoding subsequent subframes.

According to another embodiment, a user equipment for determining an RNTI is disclosed. The user equipment includes a receiver for down converting a received radio signal to a baseband signal, an analog to digital converter for

transforming the baseband signal to a digital signal, a cell search and measuring unit for detecting neighboring cells and for measuring signals on a serving cell and on the detected cells, a decoder for decoding the digital signal wherein the decoded signal includes control bits and received cyclic redundancy check (CRC) bits and a control unit. The control unit generates a CRC from the decoded control bits and determines a radio network temporary identifier candidate (RNTI) from the generated CRC and received CRC.

According to a further embodiment, a computer program including computer readable program modules is disclosed. The computer program, when run on a user terminal causes the user terminal to: descramble a control channel, decode control messages included in the control channel wherein the decoded control messages include control bits and received cyclic redundancy check (CRC) bits, generate a CRC from the decoded control bits, determine the RNTI from the generated CRC and received CRC and utilize the RNTI for decoding subsequent subframes.

BRIEF DESCRIPTION OF THE DRAWINGS

The objects and advantages of the invention will be understood by reading the following detailed description in conjunction with the drawings in which:

FIG. 1 illustrates a dual carrier system with dual carrier terminal;

FIG. 2 illustrates a single carrier system with dual carrier terminal;

FIG. 3 illustrates a method in accordance with exemplary embodiments; and

FIG. 4 illustrates a user equipment in accordance with exemplary embodiments;

DETAILED DESCRIPTION

The various features of the invention will now be described with reference to the figures, in which like parts are identified with the same reference characters.

The various aspects of the invention will now be described in greater detail in connection with a number of exemplary embodiments. To facilitate an understanding of the invention, many aspects of the invention are described in terms of sequences of actions to be performed by elements of a computer system or other hardware capable of executing programmed instructions. It will be recognized that in each of the embodiments, the various actions could be performed by specialized circuits (e.g., analog and/or discrete logic gates interconnected to perform a specialized function), by one or more processors programmed with a suitable set of instructions, or by a combination of both. The term "circuitry configured to" perform one or more described actions is used herein to refer to any such embodiment (i.e., one or more specialized circuits and/or one or more programmed processors). Moreover, the invention can additionally be considered to be embodied entirely within any form of computer readable carrier, such as solid-state memory, magnetic disk, or optical disk containing an appropriate set of computer instructions that would cause a processor to carry out the techniques described herein. Thus, the various aspects of the invention may be embodied in many different forms, and all such forms are contemplated to be within the scope of the invention. For each of the various aspects of the invention, any such form of embodiments as described above may be referred to herein as "logic configured to" perform a described action, or alternatively as "logic that" performs a described action.

In exemplary embodiments, a method for determining radio network temporary identifiers (R TIs) used in neighboring cells is described. Once a first terminal determines a reliable R TI (i.e. a second terminal identity) in a neighboring cell, the first terminal can decode the control channel (the PDCCH in LTE for example) and data packet(s) transmitted on a physical data channel (PDSCH in LTE) for that particular second terminal and utilize that information in the processing of the packets to the first terminal. Improved receiver performance, especially at the cell border, may be achieved.

As the first terminal detects a neighboring cell in a cell search step, and thereby the cell ID and cell specific scrambling applied to the cell's control channels. The control channel may be de-scrambled, and an RNTI candidate may be determined by comparing received cyclic redundancy check (CRC) bits associated to a first decoded control channel message to the CRC generated based on the decoded first control message. All RNTI candidates results may be stored in an RNTI candidate list and a used RNTI may be determined once an RNTI has been determined (or occurs) a pre-specified number of times during a pre-specified time period.

According to 3 GPP TS 36.212, chapter 5.3.3.2, a PDCCH is scrambled with an RNTI defined by higher layers. The scrambling is performed as a modulo-2 operation on the CRC part, which is needed to reliably declare a decoding attempt as being (or not being) successful. This part constitutes the rightmost 16 bits of the bits b k for k=0,..., A+15 to be encoded, , <¾ = (¾ + Xmti,k-4) modi for k = A, A+l, A+2, . . ., A+15 where x rnt i denotes the bit representation of the RNTI. A UE looks in pre- defined search spaces for possible PDCCH assignments, see 3GPP TS 36.213, chapter 9.1.1. This search is performed, depending on the downlink control information (DCI) format, using different types of R TIs, e.g. C-R TI, RA-RNTI, P-RNTI, SI-RNTI (see 3GPP TS 36.321, chapter 7.1). In general, a DCI format is linked to information about whether the PDCCH is related to UL transmission, one- or two-codeword DL reception (including resource allocation, precoders, MCS, ...), or a power control message, etc.

While the description of exemplary embodiments is based on RNTI detection in control messages transmitted from neighboring cells, the invention is not limited to that case. For instance, the same technique can be used for determination of RNTI for other terminals connected to the serving cell.

A method in accordance with an embodiment is illustrated in FIG. 3. A measurement and cell search unit (CS) may determine the presence of (one or more) neighboring cells at 305. Signal strength measurements on the serving cell and on the detected neighboring cell(s) may be made on a regular basis at 310. This may occur typically every 10 to 60 milliseconds (ms) for example. A detector may descramble every sub frame of the PDCCHs originating from the neighboring cell at 315. The PDCCHs (control channel messages) may be decoded at 320. The decoded message includes control bits and scrambled CRC bits. These bits are scrambled by the radio network temporary identifier (RNTI). The scrambled CRC bits may be referred to as received CRC bits and designated as CRC R . It is assumed that the PDCCH payload is in a certain, known downlink control information (DCI) format.

The UE now has an estimate of the combination of a hypothetical (hypothetical in the sense that it is based on the assumption that the unmasked CRC anticipating a specific RNTI might check) PDCCH payload and its corresponding CRC (CRC R ). For each decoded CCH message (i.e. payload), the control bits may be used to generate a CRC at 325 (i.e., generation of a check bit sequence from an information bit sequence). The generated CRC may be designated as CRC G - CRC G may be compared to CRC R to determine or estimate a RNTI candidate at 330. A suitable distance measure such as, for example, a soft correlation metric may be applied based on the real values of CRC R and CRC G - An XOR function may alternatively be applied to CRC G and CRC R . The RNTI candidate may be stored in a first RNTI list (designated as LI) at 335.

Each RNTI in the list may have a timestamp associated with it to indicate the time at which the RNTI was determined for example. RNTI candidates may be removed from the list if the time lapse from when they were determined/generated exceeds a first pre-specified time period Tl (i.e. if a particular RNTI candidate has not been generated during Tl).

A counter may also be associated with each RNTI in the list. The counter may be incremented by one (1) each subsequent time a particular RNTI is determined. If a particular RNTI is removed from LI due to non-occurrence within Tl, then the counter associated with the particular RNTI may be reset (and may be associated with another RNTI for example).

Reliability of each RNTI may be evaluated at 340. The evaluation may be based on whether (the counter associated with) a RNTI is more than or equal to a pre-specified number of times F (within Tl). If a RNTI has occurred less than F number of times (i.e. RNTI is deemed unreliable), descrambling of additional control channels may continue at 315. If the RNTI has occurred more than or equal to F number of times (i.e. RNTI is deemed reliable), it may be placed in a second RNTI list that may be referred to as reliable RNTI list and designated as L2 at 345. Upon placement of a RNTI in list L2, it (i.e. the RNTI) may be removed from LI . RNTI candidates from this list (i.e. L2) may be utilized in decoding of subsequent sub frames at 350.

The subsequent sub frames may be from the neighboring cell(s) or from the serving cell. Each RNTI in L2 may also have a timestamp associated therewith. If a particular RNTI is already in L2, its timestamp may be updated (in L2). If the time lapse from the timestamp exceeds a second pre-specified time period T2, the RNTI may be removed from L2. In this manner, RNTIs that are not likely to occur or be used any more (even if they were used at an earlier point in time) can be removed.

Since the RNTI candidate is determined assuming that the message is correctly decoded, the CRC could be used for determination of RNTI (as the CRC is scrambled with a scrambling code associated with the RNTI). In case the message was erroneously decoded, the determined R TI candidate can be a "ghost RNTI".

However, by collecting statistics over a time period (designated as T2 that is different from Tl ), true (i.e. used) R TIs are likely to occur much more frequently than non- applicable, "erroneous" RNTIs which may be randomly distributed over all possible RNTIs. The reason for determining true used RNTIs by checking the number of occurrences is that the total number of RNTIs is in the order of 2 16 (65536 or ~ 64K) while the number of active terminals at a certain time interval is much smaller (i.e. between 10-100). Therefore, an erroneous RNTI will be evenly distributed among the 64K RNTIs while true RNTIs will be distributed among the 10-100 RNTIs.

Depending on the used RNTIs that are declared to be reliable, different conclusions can be drawn about interference towards the UE's reception in its serving cell. For example, decoding a neighboring cell's PDCCH scrambled with SI-RNTI tells the UE where the system information is located in subframe #5. This value is static (see 3GPP TS 36.321, chapter 7.1) and can hence always be detected in subframe #5. The information may then be used for decoding the PDSCH, for interference cancelling, etc.

Another example could involve the decoding of another UE in the serving cell that is co-scheduled in a multi-user fashion (i.e. sharing the same time and frequency resources). Based on information about MCS, precoding can then be utilized for advanced inter-layer interference suppression. The first UE, once a reliable RNTI has been determined for a second terminal (or UE) in a neighboring cell, can decode PDCCH and check whether the control messages match with the currently determined RNTIs.

Then, the first UE can determine which MCS (Modulation and Coding Scheme) and resource block allocation is used to allocate data on PDSCH for the second terminal in the neighboring cell. Other parameters (such as precoders for example) can be found in the definition of the respective DCI message. These parameters may assist or help in the cancellation process. By comparing the resource block allocation for data to the first UE, the first UE can identify whether its own data is interfered and thereby selectively start IC (interference cancellation) process for suppressing the interference. A user equipment (UE) or mobile terminal in accordance with an embodiment is illustrated in FIG. 4. In user equipment 400, analog front end receiver 420 may down convert a radio signal received via antenna 410 to a baseband signal. Analog-to-digital converter 430 may transform the analog baseband signal to a digital signal. The digital signal may then be provided (or fed) to decoder 440 for decoding the signal. The digital signal may also be fed to cell search/measuring unit 450 and to channel estimation unit 460. Cell search/measuring unit 450 may perform the cell search and signal measurements on serving and detected neighboring cells. The channel estimation unit 460 may estimate the channel information needed by decoder 440 based on the digital signal and on the cell search and measurement information from cell search/measuring unit 450. Information from channel estimation unit 460 may be utilized by decoder 440 to decode the control messages.

A decoded PDCCH may be sent from decoder 440 to control unit (CU) 470 for determining the RNTI according to embodiments of the present invention. CU can also, from the history list, provide the RNTI candidates (of neighboring channels, NC) needed for the interference cancellation (IC) functionality in the decoder. This information may be utilized for further processing. The history list and RNTI information may be stored in a memory 480. The detected cell identification and RSRP on serving and neighboring cells (SC, NC) may also be provided by cell search and measuring unit 450 to control unit 470.

In some embodiments, one or more of modules 420-470 of FIG. 4 may be implemented within one or more processors. In order for these (one or more) processors to be able to perform the steps illustrated in FIG. 3, memory 480 comprises a computer program (CP) 485 with computer program modules which when run by the (one or more) processors causes user equipment 400 to perform all or some of the steps illustrated in FIG. 3. The terms user equipment and user terminal may be used interchangeably while referring to the same device.

The invention has been described with reference to particular embodiments. However, it will be readily apparent to those skilled in the art that it is possible to embody the invention in specific forms other than those of the embodiment described above. The described embodiments are merely illustrative and should not be considered restrictive in any way. The scope of the invention is given by the appended claims, rather than the preceding description, and all variations and equivalents which fall within the range of the claims are

intended to be embraced therein.