Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
NETWORK DEVICE AND TERMINAL DEVICE FOR WIRELESS MULTICAST
Document Type and Number:
WIPO Patent Application WO/2018/228676
Kind Code:
A1
Abstract:
The present invention provides a network device (100), preferably a BS. The network device (100) is configured to receive a signal comprising a plurality of superimposed messages (101), wherein each message (101) is sent by one of a plurality of terminal devices (200) and has one of two possible logical values "true" and "false". The network device (100) is also configured to determine a logical conjunction or disjunction of the superimposed messages (101) based on a comparison of the received signal with a threshold value. Accordingly, the present invention also provides a terminal device (200), preferably a UE. The terminal device (200) is configured to receive a multicast message (201) from a network device (100), and to send at least one message (101) having, of two possible logical values "true" and "false", the logical value "false" to the network device (100), if the terminal device (200) was not able to decode the multicast message (201). Therein, the terminal device (200) is configured to send the message (101) in a predetermined resource block shared with one or more other terminal devices (200).

Inventors:
ZHOU CHAN (DE)
KALOXYLOS ALEXANDROS (DE)
CHANG YUNYAN (DE)
BJELAKOVIC IGOR (DE)
FREY MATTHIAS (DE)
STANCZAK SLAWOMIR (DE)
Application Number:
PCT/EP2017/064411
Publication Date:
December 20, 2018
Filing Date:
June 13, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HUAWEI TECH CO LTD (CN)
FRAUNHOFER GES FORSCHUNG (DE)
International Classes:
H04L1/16; H04L1/00
Foreign References:
US20070223614A12007-09-27
US20140198710A12014-07-17
US20040166869A12004-08-26
Other References:
ZHONGDING LEI ET AL: "WiMax signal detection", MILITARY COMMUNICATIONS CONFERENCE, 2008. MILCOM 2008. IEEE, IEEE, PISCATAWAY, NJ, USA, 16 November 2008 (2008-11-16), pages 1 - 7, XP031408410, ISBN: 978-1-4244-2676-8
Attorney, Agent or Firm:
KREUZ, Georg (DE)
Download PDF:
Claims:
CLAIMS

1. Network device (100), preferably a base station, configured to

receive a signal comprising a plurality of superimposed messages (101), wherein each message (101) is sent by one of a plurality of terminal devices (200) and has one of two possible logical values "true" and "false",

determine a logical conjunction or disjunction of the superimposed messages (101) based on a comparison of the received signal with a threshold value. 2. Network device (100) according to claim 1, configured to

for determining the logical conjunction or disjunction of the superimposed messages

(101),

apply a hypothesis test, preferably a Neyman-Pearson test, based on the threshold value. 3. Network device (100) according to claim 1 or 2, wherein

the threshold value bases on a predetermined minimum power σ2 of the received signal and a noise power .

4. Network device (100) according to one of the claims 1 to 3, wherein

if either channel coefficients between the network device (100) and the terminal devices

(200) or the predetermined minimum power σ2 are available at the network device (100), the threshold value is determined by a noise-free constellation point given that the logical conjunction or disjunction of the message is "true", a closest noise-free constellation point given that the logical conjunction or disjunction of the message is "false", and a noise distribution,

wherein the threshold value is preferably in the range between the two constellation points.

5. Network device (100) according to claim 4, wherein

if a number of the plurality of terminal devices (200) is available at the network device

(100),

the noise- free constellation point is— and/or the closest noise-free constellation point is η=.

6. Network device (100) according to claim 4, wherein

if a number of the plurality of terminal devices (200) is not available at the network device (100),

the noise- free constellation point is 0, and

the closest noise-free constellation point is

7. Network device (100) according to claim 3, wherein

if a number of the plurality of terminal devices (200) and channel coefficients between the network device (100) and the terminal devices (200) are not available at the network device (100),

the threshold value is in a range between ^ and ^ (σ^ + σ2).

8. Network device (100) according to one of the claim 1 to 7, wherein

each message (101) is a single-bit message.

9. Network device (100) according to one of the claims 1 to 7, configured to

distribute at least two sequences to each of the terminal devices (200), wherein each message (101) is one of the sequences.

10. Terminal device (200), preferably a user equipment, configured to

receive a multicast message (201) from a network device (100),

send at least one message (101) having, of two possible logical values "true" and "false", the logical value "false" to the network device (100), if the terminal device (200) was not able to decode the multicast message (201), wherein

the terminal device (200) is configured to send the message (101) in a predetermined resource block shared with one or more other terminal devices (200).

11. Terminal device (200) according to claim 10, configured to

if a channel coefficient between the terminal device (200) and the network device (100) is available at the terminal device (200),

encode the message (101) having the logical value "false" according to a first determined encoding scheme, before sending it to the network device (100), and either encode a message (101) having the logical value "true" according to a second determined encoding scheme, if the terminal device (200) was able to decode the multicast message (201), and send it to the network device (100),

or not send any message to the network device, if the terminal device was able to decode the multicast message.

12. Terminal device (200) according to claim 10, configured to

if a channel coefficient between the terminal device (200) and the network device (100) is not available at the terminal device (200),

encode the message (101) having the logical value "false" according to a random encoding scheme, before sending it to the network device (100), and

not send any message (101) to the network device (100), if the terminal device (200) was able to decode the multicast message (201). 13. Terminal device (200) according to one of the claims 10 to 12, wherein

each message (101) is a single-bit message.

14. Terminal device (200) according to one of the claims 10 to 13, wherein

each message (101) is one of at least two sequences, and

the terminal device (200) is configured to obtain the at least two sequences from the network device (100) or the at least two sequences are preconfigured at the terminal device (200).

15. System of a network device (100) according to one of the claims 1 to 9 and a plurality of terminal devices (200) according to one of the claims 10 to 14, wherein

the network device (100) is configured to send the multicast message (201) to the terminal devices (200), and

each terminal device (200) is configured to send the at least one message (101) having the logical value "false" in the same predetermined resource block as the one or more other terminal devices (200).

16. Method (300) for a network device (100), comprising the steps of receiving (301) a signal comprising a plurality of superimposed messages (101), wherein each message (101) is sent by one of a plurality of terminal devices (200) and has one of two possible logical values "true" and "false",

determining (302) a logical conjunction or disjunction of the superimposed messages (101) based on a comparison of the received signal with a threshold value.

17. Method (400) for a terminal device (200), comprising the steps of

receiving (401) a multicast message (201) from a network device (100),

sending (402) at least a message (!Ol) having, of two possible logical values "true" and "false", the logical value "false" to the network device (100), if the multicast message (201) could not be decoded, wherein

the message (101) is sent in a predetermined resource block shared with one or more other terminal devices (200).

Description:
NETWORK DEVICE AND TERMINAL DEVICE FOR WIRELESS MULTICAST

TECHNICAL FIELD

The present invention relates to a network device and to a terminal device, respectively, for implementing an efficient feedback acknowledgment transmission scheme. In particular, a feedback acknowledgement transmission scheme for wireless multicast communication. The present invention also relates to corresponding methods, and to a system including one or more terminal devices and a network device.

BACKGROUND

In order to achieve a reliable multicast communication, it is essential for a transmitter of a multicast message to learn, whether all intended recipients have received and successfully decoded the multicast message. Currently, this is done by sending individually from each intended receiver either an acknowledgement (ACK) and/or a negative acknowledgement (NACK) to the original transmitter. For example, in LTE a 1-bit information defining the ACK or NACK is transmitted in a Physical Hybrid- ARQ Indicator Channel (PHICH) or in a Physical Uplink Control Channel / Physical Uplink Shared Channel (PUCCH/PUSCH) for uplink (UL) and downlink (DL) data transmissions, respectively, in order to indicate the status of the message decoding at the receiver of the multicast message [see e.g. 3GPP TS 36.213].

The conventional scheme, which is also applied in LTE, is shown in Fig. 6 for a base station (BS) as transmitter of the multicast message, and for a plurality of user equipments (UEs) as receivers of the multicast message. The UEs send in response to the multicast message either the ACK or the NACK, depending on the status of their message decoding, i.e. depending on whether they were able to decode the multicast message or not.

However, especially when the number of receivers of the multicast message is large (and thus also the number of potentially transmitted ACKs is large), the conventional scheme wastes a lot of wireless resources, because it feeds back a lot more information to the original transmitter than needed. In particular, all information that the original transmitter in principle needs is, whether or not there was at least one error (indicated by a NACK) in the reception of the multicast message (which typically determines, whether or not the original multicast message needs to be repeated). However, in the conventional scheme the original transmitter has so much information, that it can even exactly reconstruct the number of multicast message recipients, and even which specific receivers could successfully decode the multicast message, and which receivers could not.

In addition to the conventional scheme, there is known a wide range of methods for detecting superimposed signals in a wireless channel. However, the goal of all these methods is reconstructing information encoded by a plurality of transmitters entirely. Thus, these methods are all not suited for solving the above-described problem of wasted resources. Moreover, these methods all use a standard information theoretic approach, in which a transmission rate is to be optimized for a block length tending to infinity. Thus, these methods are all not compatible with the one-bit ACK/NACK information conveyed in the conventional scheme.

SUMMARY

In view of the above-mentioned problems and disadvantages, the present invention aims to improve the conventional scheme of feedback acknowledgment transmissions. The present invention has thereby the object to provide a network device and terminal device, respectively, with which a more efficient, faster, and more reliable scheme can be implemented, particularly for multicast communication. The object of the present invention is achieved by the solution provided in the enclosed independent claims. Advantageous implementations of the present invention are further defined in the dependent claims.

In particular, the present invention proposes a scheme, in which a joint feedback message is sent in response to a multicast message simultaneously from all multicast message receivers. Thus, the present invention proposes exploiting the additive properties of a wireless channel. The scheme of the present invention is thereby applicable to all kinds of networks and application scenarios, in which a reliable multicast communication plays an important role. An exemplary application scenario is vehicular-to -vehicular communication, as shown in Fig. 7. In this application scenario, the vehicle denoted as Car A may be the transmitter of a multicast message, and may accordingly receive feedback messages from a plurality of other vehicles.

The present invention describes specifically three specific approaches (the approaches differing in the performance and the amount of information needed at the transmitter and receiver side, respectively) for the scheme of transmitting feedback acknowledgement messages simultaneously, and then reconstructing the desired information at the original multicast transmitter from a superposition of these messages. A first aspect of the present invention provides a network device, preferably a base station, configured to receive a signal comprising a plurality of superimposed messages, wherein each message is sent by one of a plurality of terminal devices and has one of two possible logical values "true" and "false", determine a logical conjunction or disjunction of the superimposed messages based on a comparison of the received signal with a threshold value.

The network device can efficiently determine from the determined conjunction or disjunction, whether the multicast message was decoded successfully by all terminal devices or not. In particular, if the logical conjunction or disjunction of the messages is "true", then all messages have a value "true", indicating that each terminal device decoded the multicast message successfully. In this case, the multicast message does not have to be sent again. If the conjunction or disjunction is "false", then at least one message has a value "false", which means preferably that the multicast message is sent again.

The network device, by comparing against the threshold value, can take a comparatively quick, but still reliable decision concerning the conjunction or disjunction. Since the logical conjunction or disjunction is determined, it would not matter if one or more terminal devices would not send any message with value "true, if they are able to decode the multicast message. Only messages with value "false" are required, when the decoding is unsuccessful. Thereby, resource waste can be reduced significantly.

In an implementation form of the first aspect, the network device is further configured to for determining the logical conjunction or disjunction of the superimposed messages, apply a hypothesis test, preferably a Neyman-Pearson test, based on the threshold value. The hypothesis test allows takin a reliable decision concerning the conjunction or disjunction, i.e. at least controlling the most important error rate, while being fast and efficient.

In a further implementation form of the first aspect, the threshold value bases on a predetermined minimum power σ 2 of the received signal and a noise power aft .

Based on such a threshold value, a reliable decision can be taken, and error probabilities can be well balanced. In a further implementation form of the first aspect, if either channel coefficients between the network device and the terminal devices or the predetermined minimum power σ 2 are available at the network device, the threshold value is determined by a noise-free constellation point given that the logical conjunction or disjunction of the message is "true", a closest noise-free constellation point given that the logical conjunction or disjunction of the message is "false", and a noise distribution, wherein the threshold value is preferably in the range between the two constellation points.

Thus, the network device can make use of side information, in order to improve the reliability of the determination.

In a further implementation form of the first aspect, if a number of the plurality of terminal devices is available at the network device, the noise-free constellation point is— and/or the closest noise-free constellation point is In a further implementation form of the first aspect, if a number of the plurality of terminal devices is not available at the network device, the noise-free constellation point is 0, and the closest noise-free constellation point is

The above two approaches provide reliable threshold values for the two cases that the side information of the number of terminal devices is available or not. In a further implementation form of the first aspect, if a number of the plurality of terminal devices and channel coefficients between the network device and the terminal devices are not available at the network device, the threshold value is in a range between ^ σ and ^ + σ 2 ). This approach works well, if no side information is available to improve the reliability of the determination.

In a further implementation form of the first aspect, each message is a single-bit message. Accordingly, the amount of transmitted data can be reduced.

In a further implementation form of the first aspect, the network device is configured to distribute at least two sequences to each of the terminal devices, wherein each message is one of the sequences.

The use of such sequences helps countering interference in the transmission of the messages form the terminal devices to the network device.

A second aspect of the present invention provides a terminal device, preferably a user equipment, configured to receive a multicast message from a network device, send at least one message having, of two possible logical values "true" and "false", the logical value "false" to the network device, if the terminal device was not able to decode the multicast message, wherein the terminal device is configured to send the message in a predetermined resource block shared with one or more other terminal devices.

Due to the use of the shared resource block, messages of different terminal devices are superimposed. For the network device determining the conjunction or disjunction of the superimposed messages, it is sufficient to send only a message with value "false", in case that the decoding was unsuccessful. Thus, resource waste can be significantly reduced.

In particular, in case of multiple terminal devices, all the terminal devices can transmit their message immediately and concurrently, for example, when the transmission of the original multicast message is finished. As shared resource block, there may, for instance, be defined a fixed duration for the transmission of the messages. This fixed duration advantageously does not grow with the number of terminal devices receiving the multicast message.

In an implementation form of the second aspect, the terminal device is configured to, if a channel coefficient between the terminal device and the network device is available at the terminal device, encode the message having the logical value "false" according to a first determined encoding scheme, before sending it to the network device, and either encode a message having the logical value "true" according to a second determined encoding scheme, if the network device was able to decode the multicast message, and send it to the network device, or not send any message to the network device, if the terminal device was able to decode the multicast message.

This encoding is selected advantageously, in case the side information is available, in order to improve the reliability. The sending of also the "true" message increases the amount of data, but improves the reliability.

In a further implementation form of the second aspect, the terminal device is configured to, if a channel coefficient between the terminal device and the network device is not available at the terminal device, encode the message having the logical value "false" according to a random encoding scheme, before sending it to the network device, and not send any message to the network device, if the terminal device was able to decode the multicast message.

This encoding is selected advantageously, in case the side information is not available, for best reliability.

In a further implementation form of the second aspect, each message is a single-bit message.

As mentioned above, this reduces the amount of transmitted data. In a further implementation form of the second aspect, each message is one of at least two sequences, and the terminal device is configured to obtain the at least two sequences from the network device or the at least two sequences are preconfigured at the terminal device. As mentioned above, this counters interference in the transmission between the terminal device and the network device.

A third aspect of the present invention provides a system of a network device according to the first aspect and its implementation forms, respectively, and a plurality of terminal devices according to the second aspect and its implementation forms, respectively, wherein the network device is configured to send the multicast message to the terminal devices, and each terminal device is configured to send the at least one message having the logical value "false" in the same predetermined resource block as the one or more other terminal devices.

The system of the third aspect achieves all advantages and effects of the network device of the first aspect, and the terminal device of the second aspect, respectively.

A fourth aspect of the present invention provides a method for a network device, comprising the steps of receiving a signal comprising a plurality of superimposed messages, wherein each message is sent by one of a plurality of terminal devices and has one of two possible logical values "true" and "false", determining a logical conjunction or disjunction of the superimposed messages based on a comparison of the received signal with a threshold value. In an implementation form of the fourth aspect, the method comprises, for determining the logical conjunction or disjunction of the superimposed messages, applying a hypothesis test, preferably a Neyman-Pearson test, based on the threshold value.

In a further implementation form of the fourth aspect, the threshold value bases on a predetermined minimum power σ 2 of the received signal and a noise power aft .

In a further implementation form of the fourth aspect, if either channel coefficients between the network device and the terminal devices or the predetermined minimum power σ 2 are available at the network device, the threshold value is determined by a noise-free constellation point given that the logical conjunction or disjunction of the message is "true", a closest noise-free constellation point given that the logical conjunction or disjunction of the message is "false", and a noise distribution, wherein the threshold value is preferably in the range between the two constellation points. In a further implementation form of the fourth aspect, if a number of the plurality of terminal devices is available at the network device, the noise-free constellation point is— and/or the closest noise-free constellation point is In a further implementation form of the fourth aspect, if a number of the plurality of terminal devices is not available at the network device, the noise-free constellation point is 0, and the closest noise-free constellation point is

In a further implementation form of the fourth aspect, if a number of the plurality of terminal devices and channel coefficients between the network device and the terminal devices are not available at the network device, the threshold value is in a range between ^ σ and ^ (σ^ + σ 2 ).

In a further implementation form of the fourth aspect, each message is a single-bit message. In a further implementation form of the fourth aspect, the method comprises distributing at least two sequences to each of the terminal devices, wherein each message is one of the sequences.

The method of the fourth aspect and its implementation forms achieves all the advantages and effects of the network device of the first aspect and its implementation forms.

A fifth aspect of the present invention provides a method for a terminal device, comprising the steps of, receiving a multicast message from a network device, sending at least a message having, of two possible logical values "true" and "false", the logical value "false" to the network device, if the multicast message could not be decoded, wherein the message is sent in a predetermined resource block shared with one or more other terminal devices.

In an implementation form of the fifth aspect, the method further comprise, if a channel coefficient between the terminal device and the network device is available at the terminal device, encoding the message having the logical value "false" according to a first determined encoding scheme, before sending it to the network device, and either encoding a message having the logical value "true" according to a second determined encoding scheme, if the network device was able to decode the multicast message, and sending it to the network device, or not send any message to the network device, if the terminal device was able to decode the multicast message.

In a further implementation form of the fifth aspect, the method comprises, if a channel coefficient between the terminal device and the network device is not available at the terminal device, encoding the message having the logical value "false" according to a random encoding scheme, before sending it to the network device, and not sending any message to the network device, if the terminal device was able to decode the multicast message. In a further implementation form of the fifth aspect, each message is a single-bit message.

In a further implementation form of the fifth aspect, each message is one of at least two sequences, and the method comprises obtaining the at least two sequences from the network device or preconfiguring the at least two sequences at the terminal device.

The method of the fifth aspect and its implementation forms achieves all the advantages and effects of the terminal device of the second aspect and its implementation forms.

It has to be noted that all devices, elements, units and means described in the present application could be implemented in the software or hardware elements or any kind of combination thereof. All steps which are performed by the various entities described in the present application as well as the functionalities described to be performed by the various entities are intended to mean that the respective entity is adapted to or configured to perform the respective steps and functionalities. Even if, in the following description of specific embodiments, a specific functionality or step to be performed by external entities is not reflected in the description of a specific detailed element of that entity which performs that specific step or functionality, it should be clear for a skilled person that these methods and functionalities can be implemented in respective software or hardware elements, or any kind of combination thereof. BRIEF DESCRIPTION OF DRAWINGS

The above described aspects and implementation forms of the present invention will be explained in the following description of specific embodiments in relation to the enclosed drawings, in which Fig. 1 shows a network device according to an embodiment of the present invention.

Fig. 2 shows a terminal device according to an embodiment of the present invention.

Fig. 3 shows a method according to an embodiment of the present invention.

Fig. 4 shows a method according to an embodiment of the present invention. Fig. 5 shows a message flow between a network device and three terminal devices according to embodiments of the present invention.

Fig. 6 shows a conventional feedback acknowledgement transmission scheme. Fig. 7 shows an application scenario of a feedback acknowledgement transmission scheme.

DETAILED DESCRIPTION OF EMBODIMENTS Fig. 1 highlights a network device 100 according to an embodiment of the present invention. The network device 100 is preferably a BS, and is associated and/or communicating with one or more terminal devices 200, which are preferably UEs.

In particular, the network device 100 is configured to receive a signal, which comprises a plurality of superimposed messages 101. Each of these messages 101 is sent by one of the terminal devices 200, and has one of two possible logical values "true" and "false". These possible logical values could alternatively be referred to as "1" and "0", or vice versa, or "ACK" and "NACK", or by any other binary coding. The network device 100 is then configured to determine a logical conjunction or disjunction of the superimposed messages 101 based on a comparison of the received signal with a threshold value. That is, the network device 100 can determine, whether the logical conjunction or disjunction of the messages 101 is "true" or "false" (as indicated in Fig. 1), or is equivalently "1" or "0" orthe like. The logical conjunction of the superimposed messages 101 is particularly "true", if each message 101 is "true". The logical conjunction of the superimposed messages 101 is furthermore "false", if at least one of the messages 101 is "false". The logical disjunction of the superimposed messages 101 is particularly "true", if at least one of the messages 101 is "true". The logical disjunction of the superimposed messages 101 is furthermore "false" if each message 101 is "false". In the following, the description is continued only with reference to the "logical conjunction". However, the principles of the invention can be applied likewise for the "logical disjunction", or for any other equivalent logical function.

Fig. 2 highlights accordingly one of the terminal devices 200, which is associated with and/or communicating with the network device 100. This terminal device 200 according to an embodiment of the present invention is preferably a UE.

The terminal device 200 is configured to receive a multicast message 201 from the network device 100. In response, the terminal device 200 sends at least one message 101 having, of two possible logical values "true" and "false", the logical value "false" to the network device 100, if the terminal device 200 was not able to decode the multicast message 201. Again, the logical values can also be referred to as "1" and "0" or vice versa, or "ACK" and "NACK", or by any other binary coding. That is, the terminal device 100 feeds back a message 101 to the terminal device 100 at least when it fails to decode the multicast message 201. In this case, the multicast message 201 should be sent again by the network device 100.

The terminal device 200 may further be configured to send also a message 101 having the logical value "true" to the network device 100, if the terminal device 200 was able to decode the multicast message 201 , in order to improve the reliability of the determination at the network device 100. Alternatively, the terminal device 200 may be configured to not send any message 101 to the network device 100, if the terminal device 200 was able to decode the multicast message, in order to reduce significantly the amount of sent data.

In either case, the terminal device 200 is configured to send the at least one message 101 in a predetermined resource block, which is shared with one or more other terminal devices 200. That is, all terminal devices 200 send their messages 101 in the same resource block, for instance, in the same time and/or frequency block. Accordingly, the messages 101 will be superimposed, as described above. If only one of these superimposed messages 101 has a logical value of "false", then also the logical conjunction of the superimposed messages 101 will be "false". In this case, the network device 100 may retransmit the multicast message 201. If all superimposed messages 101 have a logical value of "true", then also the conjunction of the superimposed messages 101 is true. In this case, the multicast message 201 was distributed successfully to all terminal devices 200. Also, if the network device 100 receives no message 101 at all - in case that the terminal devices 200 feedback a message 101 only in case of a decode failure of the multicast message 201 - the multicast message 201 can be deemed successfully distributed.

Fig. 3 shows a method 300 according to an embodiment of the present invention. The method 300 is for a network device 100, is preferably carried out by the network device 100 shown in Fig. 1 , and comprises the following steps. A step 301 of receiving a signal comprising a plurality of superimposed messages 101, wherein each message 101 is sent by one of a plurality of terminal devices 200 and has one of two possible logical values "true" and "false". And a step 302 of determining a logical conjunction of the superimposed messages 101 based on a comparison of the received signal with a threshold value.

Fig. 4 shows another method 400 according to an embodiment of the present invention. The method 400 is for a terminal device 200, is preferably carried out by the terminal device 200 shown in Fig. 2, and comprises the following steps. A step 401 of receiving 401 a multicast message 201 from a network device 100. And a step 402 of sending at least a message 101 having, of two possible logical values "true" and "false", the logical value "false" to the network device 100, if the multicast message 201 could not be decoded. In particular, the message 101 is thereby sent in a predetermined resource block shared with one or more other terminal devices 200.

According to the proposed feedback transmission scheme, after transmitting the multicast message 201 is finished, all the terminal devices 200 feedback their "true/false" messages 101 (in the following referred to as "ACK/NACK", as in e.g. LTE) simultaneously on the same shared wireless resource. Each message 101 may thereby be a single-bit message, in order to keep the amount of exchanged data at a minimum. Alternatively, some sequences (either pre- assigned by the network device 100 or pre-configured at the terminal devices 200) can be exploited instead of the single bits, in order to help counter interference and malicious attempts in the transmission of the ACK/NACK. In particular, each message 101 may be one of at least two sequences. Thereafter, the network device 100 determines from the superimposed messages 101 a joint acknowledgement, i.e. the conjunction of the messages 101, by exploiting the additive properties of the wireless channel. Advantageously, the network device 101 does not need to reconstruct all the individual sent messages 101, but only the logical conjunction, in order to decide if the multicast message needs 201 to be retransmitted or not. This makes the scheme particularly efficient. Details for the proposed scheme, i.e. how to determine by the network device 100 the logical conjunction of the ACK/NACK from the received superposition of the messages 101, will be explained further below. In particular, appropriately choosing decision thresholds for determining "false" or "true" concerning the conjunction will be highlighted.

An example of a message flow between a network device 100 according to an embodiment of the present invention, and three terminal devices 200 according to embodiments of the present invention, is shown in Fig. 5. Fig. 5 specifically shows a typical multicast transmission from a BS as the network device 100 to multiple UEs (UE1, UE2, UE3) as the terminal devices 200. The BS 100 may optionally distribute specific sequences to the UEs 200. The BS 100 sends a multicast message 201 to the UEs 200, and the UEs 200 respond with messages 101 according to ACK or NACK. Then, the BS 200 checks 302 a threshold for determining the logical conjunction of the superimposed messages 101 , as described previously. In case that the logical conjunction is NACK ("false"), the BS 100 may retransmit the multicast message 201. Notably, in case of a side-link multicast transmission, the multicast message 201 and the ACK NACK messages 101 are sent and received by one of the UEs accordingly.

In the present invention, specifically three approaches are presented for decoding the logical conjunction of the ACK/NACK from the received superposition of messages 101, the approaches depending on how much side information is available at the terminal devices 200 and the network device 100, respectively.

A first approach targets to decode the logical conjunction of the superimposed messages 101, in case that at the network device 100, either channel coefficients between the network device 100 and the terminal devices 200, or a predetermined minimum power σ 2 of the signal received by the network device 100 from the terminal devices 200, are available. And, if also at the network device 100, a number of the plurality of terminal devices 200 is available. And, if also at the terminal device 200, the channel coefficient between the terminal device 200 and the network device 100 is available.

A second approach eases some requirements of the first approach. This approach applies, if either the channel coefficients between the network device 100 and the terminal devices 200, or the predetermined minimum power σ 2 , are available at the network device 200. And accordingly, if also at the terminal device 200, the channel coefficient between the terminal device 200 and the network device 100 is available. However, contrary to the first approach, it is not necessary that the number of terminal devices 100 is available at the network device 100 side.

A third approach targets to decode the logical conjunction without any of this side information. That is, a channel coefficient between the terminal device 200 and the network device 100 is neither available at the terminal device 200 nor the network device.

In all three approaches, tools from statistics are used, in order to exercise additional control over error probabilities. The goal is to decode the logical conjunction of the messages 101. If the network device 100 decides on a result of "true", although at least one of the transmitted messages 101 was "false", this is called a type 1 error. If the network device 100 on the other hand decides on an outcome of "false", although all the transmitted messages 101 were all "true", this is called that a type 2 error. Typically, a relatively large fraction of one type of error can be tolerated, while the other type needs to be more strictly controlled. In the present case of the feedback to the multicast message 201, a type 1 error would mean that the multicast message 201 is not repeated by the network device 100, although at least one of the terminal devices 200 could not correctly decode it. A type 2 error would mean that the multicast message 201 is unnecessarily repeated, since all terminal devices 200 could correctly decode it already the first time. Thus, the type 1 error causes unreliability in the multicast communication, whereas the type 2 error causes a waste of wireless resources (which is, however, moderate, if the error probability is not excessively large).

Therefore, it may be preferable to keep the type 1 error at a fixed (but very low) value, while making use of the available wireless resources to make the type 2 error as small as possible (given the fixed value of the type 1 error). This can be accounted for by using a statistical hypothesis test at the network device 100 side. Accordingly, for determining the logical conjunction of the superimposed messages 101, the network device 100 is preferably configured to apply a hypothesis test, more preferably a Neyman-Pearson test, based on the threshold value. The threshold values for the three different approaches explained above differ, and are described further below. For each approach, however, the threshold value preferably bases on a predetermined minimum power σ 2 of the received signal and a noise power aft .

Notably, it would be easily possible for the skilled person to switch the roles of the two types of error with an only slightly modified construction. In all three approaches, a network comprising n terminal devices 200, which are denoted as T , ... , T n , and a network device 100, which is denoted as R, are considered. Each terminal device 200 7} may transmit a message 101 with, for instance, a single bit of information t j E {0,1} indicating its feedback message 101 ("false, "true") to the multicast message 201. The network device 100 aims to reconstruct t■= t A ... A t n E {0,1} such that t is the logical conjunction of all the t j (where 0 corresponds to the logical value of "false" and 1 to the logical value of "true").

The messages 101 transmitted simultaneously by the terminal devices 200 get superimposed in the wireless channel. The channel coefficient between each terminal device 200 and the network device 100 is denoted by h , ... , h n E C. Therefore, if each terminal device 200 7} sends the signal X jk at time instant k, the signal Y k obtained at the network device 100 is

where (N 1} ... , N { ) is white noise in the wireless channel, which can be modelled by a sequence of identically and independently distributed (i.i.d) complex Gaussian random variables with 0 mean and standard deviation ^ (in each of the complex components). By the Nyquist sampling theorem, there is a direct correspondence between the number of channel uses £ and the transmission duration and bandwidth of a signal in a continuous channel.

Thus, it is further denoted σ ■= min \h; σ,- je{l n} 1 1 where σ,· is the signal variance by the terminal device 7} and the signal-to-noise ratio is defined as σ 2

SNR : = -=-.

er 2 is the predetermined minimum power of the signal comprising the superimposed messages 101 , which is received by the network device 100. denotes the noise power.

An encoder at a terminal device 200 is configured to map each of the transmit messages t j to a signal vector [X j , ... , / fe ). For the first and second approach explained above, the encoding process can be described as E j : {0,l}→€ k , where also a power constraint may be imposed according to for each component β ΐ of the encoder output e , e k ) .

The encoding process for the third approach explained above, however, will be stochastic and instead the following expectation is limited A decoder at the network device 100 is a function

D : C f → {0,1} configured to map the received signal vector (Y^ ... , ¾ to an estimated signal t.

The type 1 error probability introduced above (i.e. the probability that t = 1 given that t■= t A ... A t n = 0) is denoted by , and the type 2 error probability introduced above (i.e. the probability that t = 0 given that t = t A ... A t n = 1) is denoted by /?. The preferred target of the scheme of the present invention implemented by network device 100 and terminal devices 200 is to keep both and β as small as possible, by using a properly designed decoding algorithm. Now, the first approach is described in more detail. The first approach targets to decode the logical conjunction t■= t A ... A t n of the feedback messages 101 that are transmitted simultaneously from the terminal devices 200 to the network device 100, in case that at the network device 100 side, either channel coefficients between the network device 100 and the terminal devices 200, or a predetermined minimum power σ 2 of the signal received by the network device 100 from the terminal devices 200, are available. And, if also at the network device 100, a number of the plurality of terminal devices 200 is available. The number of terminal devices 200 can be obtained by the network device 100, since - being the original multicast message 201 transmitter - it is aware of the multicast destinations. Also the other assumption is reasonable, in particular if a reciprocal wireless channel is used, and its coherence time is long compared to the duration of the acknowledgement messages 101, because the original multicast message 201 could for instance contain pilot symbols, from which the transmitters can perform channel estimation to measure the channel state and channel coefficients. Alternatively, the channel coefficients can also be obtained by the terminal devices 200 via statistical channel knowledge or long-term observation. The first approach can be suitably applied to TDD systems with deterministic receivers.

In this approach, each terminal device 7} knows its own channel coefficient h j and the network device 100 knows the number of the terminal devices 200, which can be given by the sum

Generally speaking, in this first approach the terminal device 200 is configured to encode a message 101 having the logical value "false" according to a first determined encoding scheme, before sending it to the network device 100, and encode a message 101 having the logical value "true" according to a second determined encoding scheme, and send it to the network device 100.

Specifically, the encoding function E j at the terminal device T j may preferably be defined in the first approach as

That is, if the original multicast message 201 is successfully decoded (t j = 1) at the terminal device 200, the feedback message 101 is encoded as— °'^ + ' exp i arg(/i ) and transmitted as an ACK ("true"), while the NACK ("false") is encoded and transmitted as exp (— i arg(/i )^, if the decoding of the original multicast message 201 ends in a failure (t j = 0).

All the terminal devices 200 send their individual encoded messages 101 to the network device 100 simultaneously on the same wireless resource, and the transmitted signals get superimposed in the wireless channel. Then the component Y k of the received vector Y obtained by the receiver at time instant k is

exp (-i argf )) + N t

Σ σ,· + ίσ: σ: + ia;

tj =Q tj =l which consists of a positive factor resulting from the NACKs ("false" messages 101 ), a negative factor resulting from the ACKs ("true" messages 101), and an additional noise factor. Since the channel coefficients and the number of transmitters∑ =1 |/i/ |o)- are known by the network device 100, it is then configured to compute Y' = (Y- , ... , Y ( ' ~ ) over all channel uses by cancelling out the negative factor brought by the ACKs, which is given by

If now the real and imaginary parts of Y'axc considered separately, a sequence (Y lt ... Y 2 t) of 2-β identically and independently distributed random samples is obtained. They follow a Gaussian distribution, which has mean

Therefore, the mean is 0, if t = 1 and at least λίϊσ, if t = 0. Now preferably a Neyman-Pearson test can be constructed for the null hypothesis that the mean is (at least) λ[2σ and the alternative hypothesis that the mean is (at most) 0.

Generally speaking, in this first approach the threshold value is determined by a noise-free constellation point given that the logical conjunction of the message is "true", a closest noise- free constellation point given that the logical conjunction of the message is "false", and a noise distribution. Thereby, the noise-free constellation point given that the logical conjunction of the message is "true" is— and the closest noise-free constellation point given that the logical conjunction of the message is "false" is

Specifically, the decoder of the network device 100 is preferably configured in the first approach to function as

with c := 0 _1 0) ¾ + 2^la, where c is the decision threshold and Φ -1 denotes the quantile function of the standard Gaussian distribution.

Regarding the robustness of this first approach, it is worth noting that the exact value of the noise power is not required for the construction of the encoders and decoder, but rather it suffices to construct the test with some σ Ν ' ≥ σ Ν . Then, if the actual noise has lower power than the one used in the construction, the error probabilities will be lower (at least not higher) than in the calculation. This is true unless the decision threshold is higher than the null hypothesis mean of 2λ[2ίσ (which can occur, however, only if the type 1 error is more than one half).

A slight modification can be made to further relax the requirements of the first approach, where the network device 100 only needs to know n and all terminal devices 200 need to know σ, which is defined above or alternatively even arbitrary, if all the terminal devices 200 and the network device 100 agree on a common received signal strength such that σ < \h j (not necessarily with equality) for all j.

In this case, all terminal devices 200 can use a common encoder according to

And the terminal devices 200 also attenuate their signal transmission power accordingly as

, 2 ≤

k i 2 and thus does not violate the power constraint. This way, the expression that the decoder at the network device 100 uses to compute Y k from Y k becomes

Y k := ¾ +— σ(1 + ί)

and so the decoder only needs to know n and σ and not the actual sum of maximum received signal powers, which not only depends on the transmitter power constraints, but also on the channel state. Now, the second approach is described in more detail. This approach is a modification of the first approach, in which the network device 100 does not need to know the number of terminal devices 200. It is still required, however, that the terminal devices 200 have knowledge of their channel coefficients to the network device 100, and that the channel coefficients between the network device 100 and the terminal devices 200, or the predetermined minimum power σ 2 , are available at the network device 100.

This approach is suitable for TDD systems without deterministic receivers at the network device 100, e.g., in broadcast like communications. Generally speaking, in the second approach the terminal device 200 is configured to encode the message 101 having the logical value "false" according to a first determined encoding scheme, before sending it to the network device 100, and not send any message 101 to the network device 100, if the terminal device 200 was able to decode the multicast message 201.

Specifically, the encoders at the terminal devices 200 can preferably be defined to be

This results in a received signal Again the real and imaginary parts are considered separately to obtain a sequence (Y lt ... , Ϋ 2 ι) of independently and identically distributed samples (e.g., of a Gaussian distribution). The variance is that of the noise ^ and the mean is

Therefore, the mean is 0 if t = 1 and it is (at least)

Again, preferably a Neyman-Pearson test is constructed for the null hypothesis that the mean is (at least) η= and the alternative hypothesis that the mean is 0.

Generally speaking, in the second approach the threshold value is determined by a noise-free constellation point given that the logical conjunction of the message is "true", a closest noise- free constellation point given that the logical conjunction of the message is "false", and a noise distribution, wherein the noise-free constellation point given that the logical conjunction of the message is "true" is 0 and the closest noise-free constellation point given that the logical conjunction of the message is "false" is

Specifically, the decoder at the network device 100 may preferably take the form

where the decision threshold is

c := ~1 {α) ίσ Ν + λίσ.

Regarding the robustness of the second approach, it is worth noting that similarly to the remark for the first approach, the test can be constructed at the decoder with values σ Ν ' ≥ σ Ν and σ ' ≤ σ. The theoretical error bounds will be worse than they would be if the actual values were used, but they will be achieved as long as the actual values are within the given ranges (and the type one error is not chosen to be larger than one half).

Now, the third approach is described in more detail. For this approach, channel coefficients between the terminal devices 200 and the network device 100 need not be available at the terminal devices 200 and the network device, respectively. Nor is the number of terminal devices 200 required to be available at the network device 100. This kind of assumption suits perfectly for communications in FDD systems.

In order to decode the logical conjunction t■= t A ... A t n of the feedback messages 101 from the terminal devices 200 without the side information on the channels coefficients and the number of terminal devices 200, a probability distribution for the transmitted signal is used, which is invariant to the phase shift component of the channel coefficients.

Generally speaking, in the third approach the terminal device 200 is configured to encode the message 101 having the logical value "false" according to a random encoding scheme, before sending it to the network device 100, and not send any message 101 to the network device 100, if the terminal device 200 was able to decode the multicast message 201.

Specifically, the encoder E j of the terminal device 200 may preferably output 0, if t j = 1, and

a)

a complex Gaussian distributed value with mean 0 and a variance of - - in each complex component, if t,- = 0, which can be presented as

The received signal at time instant k is where (Xj k ) have the same distribution as {Xjk) which is i.i.d Gaussian with mean 0 and a)

variance - - in each complex component.

By considering real and imaginary parts separately, a sequence (Y lt ... , ¾) is obtained of i.i.d

σ 2 σ 2 σ 2

Gaussian samples with mean 0 and a variance of— if t = 1 and (at least) l·— if t = 0.

Generally speaking, in the third approach the threshold value is in a range between - σ and

2

Specifically, the decoder at the network device 100 may preferably take the form

wherein the decision threshold c is denotes the quantile function of the Chi-Squared distribution with 21 degrees

This third approach is robust against the use of a too low value for σ, but contrary to first and second approaches, the approach is sensitive to using a wrong value for the noise power.

In all three approaches, some sequences can be exploited to help counter interference in the transmission of the ACK/NACK from the terminal devices 200 to the network device 100. The first and second approach can specifically be extended to make use of spreading sequences. The sequences used for ACK/NACK feedback may be transmitted in advance to terminal devices 200 in the network by the network device 100. Alternatively, the sequences can be preconfigured at the terminal devices 200.

A problem that has to be considered while doing this is that robustness against time shifts of the transmitted signals should be retained. It is assumed that the received signal of each terminal device j arrives shifted in time by £ j channel uses, where £ j is unknown, but guaranteed to be in the set {— L, ... , L] for a given L≥ 0. It is further assumed that communication is obstructed by an interference process O k k ei an d Gaussian noise N k as before. It is also assumed the existence of a complex- valued sequence (¾) ¾ <= { ! ^ with entries of absolute value 1 such that the autocorrelation of s with cyclic shifts of itself is £ if the shift is by a multiple of £ elements and 0 if the shift is by more than 0 but at most L elements (in either direction). Moreover, it is assumed that the correlation of cyclic shifts of s with subsequences of / is close to 0. These assumptions are met (or closely met) for many widely-used spreading sequences, for instance when s is chosen to be a Zadoff-Chu sequence of length and / comes from communication which is spread with Zadoff-Chu sequences orthogonal to s.

First, an illustration on the spreading analogue for the first approach is provided. The encoder at the terminal device 200 to encode the message 101 to a sequence may be defined as

where s is the sequence s followed by its first 2L elements. Thus, the encoder at the terminal device 200 now needs £ + 2L channel uses instead of £, however, this cost is small if L is much smaller than £.

The components of the received vector Y k are now

Y k = s(k + £ j ) - s(k + £ j ) + N k + I k .

t,=o t,=l At the decoder of the network device 100, this is correlated with the sequence s in all possible cyclic shifts, and correlations are summed to get

= ∑ s(k - ~l) Y k

k=L+l I

l+L

^ ^ s(fc - Z) s(k + £ j ) - s(k + £ j ) + N k + I k

k=L+l l=-L \t,=0 t,=l

The decoding can now continue as described above. Note, however, that compared to before the noise is now amplified by an additional factor of up to (2L + 1), so this use of spreading sequences is only practical for very small L.

Similarly, in order to adapt the second approach for spreading, the encoder of the terminal device 200 should be adjusted to map the ACK message 101 with value "true" (or "1 ") to the all-zero sequence, that is

Then the components of the received vector Y k and the corresponding sum of correlations Y are given as

Y k = s(k + £ j ) + N k + I k ,

tj=0

Y = £ (∑ tj=0 1 ) +∑it L L+1 N k ∑ _ L s ~ k - V). For the third approach, the encoder of the terminal device 200 may map the ACK message 101 with value "true" to the all-zero sequence, and the message 101 with value "false" to a specified sequence for a given Gaussian distributed value. The decoding principle and the decision threshold are the same as described above.

All three proposed approaches can with little effort be modified in such a way that the roles of the type 1 and type 2 error are switched, i.e. that the error, which has been specified as type 2 above is the one, which can be strictly controlled, while the error specified above as type 1 is made as small as possible given the available resources.

For the first and second approach any signal of type

(and specifically for the first approach: also its additive inverse depending on the message 101 that is to be conveyed) can be sent at channel use I (of course, to fulfill the power constraint,

. a?+b?

need—— - = 1) so that the use of suitable spreading sequences would be possible to separate different multicast clusters. For reception, a matched filter would be necessary at the network device 100. But the summation of the received signals described for the first and second approach is also in effect a filter matched to the (particularly simple) signal given above.

For the third approach, in principle any circularly symmetric probability distribution could be used (like for instance a uniform distribution on a sphere or ball around zero). In any case, detection of the signal will amount to a measurement of received signal strength, but in the non- Gaussian case, the establishment of analytical error bounds would be more complicated.

Regarding to the performance of the scheme of the present invention, the scheme of the present invention enables a more efficient, faster and more reliable feedback acknowledgement transmission for wireless multicast communication than a conventional scheme, e.g. the TDMA scheme. Thereby, the first approach (method 1) has the best performance (in terms of error probability versus transmitting power and transmission duration), while the third approach (method 3) performs worst (but with only slightly performance degradation compared with the first and second approach, respectively), due to the lack of side information.

The present invention has been described in conjunction with various embodiments as examples as well as implementations. However, other variations can be understood and effected by those persons skilled in the art and practicing the claimed invention, from the studies of the drawings, this disclosure and the independent claims. In the claims as well as in the description the word "comprising" does not exclude other elements or steps and the indefinite article "a" or "an" does not exclude a plurality. A single element or other unit may fulfill the functions of several entities or items recited in the claims. The mere fact that certain measures are recited in the mutual different dependent claims does not indicate that a combination of these measures cannot be used in an advantageous implementation.