Title of Invention | METHOD FOR MAPPING FORMAT INDENTIFICATION BITS ONTO A FRAME WHICH IS TO BE TRANSMITTED USING COMPRESSED MODE |
---|---|
Abstract | In the compressed mode, more TFCI points are available than TFCI bits. IN order to fill the excess TFCI points with bits as well and at the same time to achieve as high a performance capability as possible, it is proposed that originally punctured TFCI bits and / or an unpunctured format identification code word be transmitted for the uplink and / or downlink. |
Full Text | -1- Description The present invention relates to a method for mapping format identification bits, that is to say so-called TFCI bits, onto a frame to be transmitted, in particular onto a compressed frame to be transmitted using the so-called compressed mode, as claimed in the pre-characterizing clause of claim 1 or 24. Mobile radio technology is subject to rapid development. At the moment, work is being carried out on the standardization of the so-called UMTS Mobile Radio Standard ('Universal Mobile Telecommunication System') for third-generation mobile radios. Information to be transmitted via a mobile radio channel is normally transmitted in the form of a predefined frame and time slot structure. A UMTS frame comprises 15 time slots "slots", with specific system information also being transmitted as well as the actual data within each frame. This system information includes, in particular, a known pilot bit sequence or training sequence, which the respective receiver can use to estimate the channel impulse response of the respective mobile radio channel, power control information in the form of one or more TPC bits (Transmit Power Control), whose contact is used to control the transmission power of the respective receiver, and format identification information in the form of so-called TFCI bits (Transport Format Combination Indicator). On the basis of the current status of UMTS Standardization, a TFCI code word is provided for each -1a- UMTS frame, comprising ten initially uncoded bits which are then coded using a second-order (32, 10) subcode of the Reed-Muller code. -2- and are thus mapped onto a total of 32 bits. Of these 32 bits, bit nos. 0 and 16 are then punctured in the normal mode (in the normal mode or non-compressed mode), so that the TFCI code word now comprises only 30 TFCI bits, which are then mapped or distributed uniformly with two TFCI bits in each case onto the individual time slots in the corresponding UMTS frame. These are allocated in such a way that the two most significant TFCI bits in the TFCI code word are allocated to the time slot no. 0 which is transmitted first within the UMTS frame, and the two least significant bits are allocated to the time slot no. 14, which is transmitted last within the frame. The more significant TFCI bit is then transmitted before the less significant TFCI bit within the individual time slots. The mapping or allocation of the TFCI bits in the TFCI code word onto or to the individual time slots in a frame is also referred to as mapping. The term "puncturing" for the purposes of the present application also includes the removal or non-transmission of specific bits, in particular also the last bits in a code word. In addition to normal transmission of information in uncompressed form, a compressed mode is also provided for data transmission. In the compressed mode, the information in the respective frame is transmitted in compressed form, in order in this way to artificially produce a transmission gap, during whose duration the absence of transmitted information can be used, for example, for intermediate-frequency measurements in order to prepare for handover processes etc. In the compressed mode, at least eight time slots must still be left free per frame. The 30 TFCI bits must in consequence be distributed between the remaining time -2a- slots in the compressed mode. In order to allow this, the time slot format of the uplink control channel DPCCH (Dedicated Physical Control Channel) and of the downlink -3- control channel DPCCH, as well as that of the downlink data channel DPDCH (Dedicated Physical Data Channel) must be matched. In this context, various time slot formats have been proposed for the uplink DPCCH control channel for the compressed mode and these can be summarized by the table shown in Figure 4, in which the number NTFCI of TFCI bits transmitted per time slot and the total number D of TFCI bits transmitted per frame are in each case shown for a different number of time slots or slots transmitted per frame in the compressed mode. Corresponding proposals for time slot formats for the downlink in the compressed mode have also been made, which can be summarized by the tables shown in Figure 5A and Figure 5B where Figure 5A relates to a spread factor of between 128 and 512 being used for the corresponding channelization codes or spread codes, while Figure 5B relates to spread factors of between 4 and 64. Analogously to Figure 4, these tables each show the number NTFCI of TFCI bits transmitted per time slot and the total number D of TFCI bits transmitted per frame for a different number of time slots or slots transmitted per frame in the compressed mode, with a distinction also being drawn in this case between Type A and Type B transmission. Since it is desirable to use a standard time slot format for each frame, situations may occur - as is indicated by the individual values for D in Figure 4 and Figures 5A/B - in which more TFCI points are available in each frame than are actually required for the 30 TFCI bits. For the uplink, that is to say for transmission from a mobile part to a base station, it has thus been -3a- proposed that selected TFCI bits be repeated in the compressed mode, that is to say that they be reiterated, in order to fill the excess TFCI points, with, -4- in particular, those bits which are sent immediately after the transmission gap that occurs in the compressed mode being repeated at free TFCI points for this purpose, in order that the repetition is carried out as effectively as possible. The reason for this is based on the fact that the transmission power control is very uncertain immediately after the transmission gap, so that the probability of a transmission being subject to interference is highest immediately after the transmission gap, so that these bits should be repeated, if possible. The repeated bits can in this case be determined by means of the following algorithm, where ck denotes the TFCI bits, dk denotes the repeated bits, D denotes the number of TFCI points available in total in the frame, and E denotes the index or the position of that TFCI point which immediately follows the transmission gap in the compressed mode: dD-31 = CE mod 30 dD-32 = C(E-1) mod 30 dD-33 = C(E-2) mod 30 do = C(E-(D-31)) mod 30 The bits are allocated to the individual time slots in the compressed frame in a descending sequence, with the TFCI bits CK being transmitted first, followed by the repeated bits dk, that is to say the bit C29 (Most Significant Bit (MSB) in the TFCI code word) being transmitted as the first bit in the TFCI code word, while do is transmitted as the last bit in the TFCI code word. For the downlink, that is to say for transmission from a base station to a mobile part, it has in contrast -4a- been proposed to fill the free or excess TFCI points with so-called DTX bits (Discontinuous Transmission Bits) in the compressed mode. A DTX bit in this case corresponds to a bit which is not transmitted, that is to say a bit whose energy is zero. A -5- transmission pause with a time duration of one DTX bit is thus inserted at each of the appropriate points in the relevant time slots. Against the background of the prior art described above, the present invention is based on the object of proposing a method for mapping TFCI bits onto a frame which is to be sent in a compressed mode, which makes it possible to improve the transmission power and the transmission reliability without any additional complexity. According to the invention, this object is achieved by a method having the features of claim 1 or 24. The dependent claims each define advantageous arid preferred embodiments of the present invention. In this case, the developments which relate formally to patent claim 1 are also within the scope of the invention in combination with the features of patent claim 24. A first exemplary embodiment of the present invention proposes, for the uplink and/or downlink, that the excess TFCI points initially be filled with the previously or originally punctured bits, and that the free TFCI points which still remain be filled by repetition only after this has been done. This exemplary embodiment is based on the knowledge that it is better to send the previously punctured TFCI bits, as bits to be repeated, which were sent in poor conditions with regard to power control. The originally punctured bits may, for example, be sent at the end of the frame to be sent in the compressed mode. The originally punctured bits may likewise also be sent directly after the transmission gap which occurs in the compressed mode. This procedure has the advantage -6- that bits which are normally punctured in any case are sent at those TFCI points which are "poor" owing to the transmission gap. Those TFCI points which are then still unfilled can be filled by repetition of the TFCI bits which immediately follow the transmission gap. One embodiment variant provides for the excess TFCI points to be filled by repetition of the TFCI bits following the transmission gap, but with these TFCI bits being repeated in the reverse sequence. This procedure is worthwhile since it can be assumed that those TFCI bits which are sent after the transmission gap have a lower bit error rate as the distance from the transmission gap increases. For this reason, it is better to repeat those TFCI bits which have the highest bit error rate owing to their proximity to the transmission gap in a time slot which is as far away from the transmission gap as possible. Furthermore, an additional exemplary embodiment proposes, for the downlink, that the excess TFCI points in the compressed mode be filled with DTX bits, that is to say bits which are not to be transmitted and whose energy is zero, with those TFCI points which immediately follow the transmission gap being at least partially filled with DTX bits. In this context, furthermore and in particular, it is feasible for some of the DTX bits to be allocated to the time slot before the transmission gap, and for some of them to be allocated to the time slots following the transmission gap. A further exemplary embodiment which is intended for the uplink and/or downlink proposes that, in the compressed mode, the format identification bits be mapped onto a specific number of format identification -6a- points which are available in the corresponding compressed frame, and that, in the compressed mode, all the format identification bits in the original format identification code word, including the normally (in the normal mode and non-compressed mode) punctured -7- format identification bits be mapped onto corresponding format identification points in the compressed frame. In this case, in the compressed mode, the original TFCI code word may be unpunctured so that the original TFCI bits can be sent in the original sequence since, in any case, there are more TFCI points available than punctured TFCI bits. In particular, all 32 bits may, in particular, be mapped in their own original sequence such that the two format identification bits which are unpunctured only in the compressed mode are mapped onto the format identification points which immediately follow the filled 30 format identification points. Those TFCI points which still remain can be filled by repetition. The present invention and exemplary embodiments of the present invention are based on the knowledge that, in the compressed mode, the transmission gap interferes with the power control, which stabilizes only as the distance from the transmission gap increases. The filling of additional TFCI points with TFCI bits (in the uplink and/or down-link) or DTX bits (in the downlink) is optimized on the basis of this fact. Furthermore, the present invention and exemplary embodiments of the present invention are based on the knowledge that it is better to send the previously punctured TFCI bits than to repeat TFCI bits which were sent in poor power control conditions. The invention will be explained in more detail in the following text using preferred exemplary embodiments and with reference to the attached drawing. Figure 1 shows a simplified block diagram of an arrangement for coding, puncturing and mapping TFCI bits onto a UMTS frame which is to be sent using the -7a- so-called compressed mode, which arrangement can be used in a transmitting apparatus according to the invention. -8- Figure 2 shows an illustration to explain the mapping of the TFCI bits onto a UMTS frame, Figure 3 shows an illustration to explain various exemplary embodiments of the present invention relating to the compressed mode. Figure 4 shows a table listing various known time slot formats for a UMTS frame transmitted via an uplink connection in the compressed mode, and Figures 5A and 5B show tables listing various known time slot formats for a UMTS frame transmitted via a downlink connection in the compressed mode. Before describing in any more detail the various exemplary embodiments according to the invention, the fundamental design of an arrangement for mapping TFCI bits onto a UMTS frame, as shown in Figure 1, will be explained first of all. A (32, 10) coder 1 is supplied with uncoded TFCI bits, which are to be mapped onto the respective UMTS frame. In principle, the number of uncoded TFCI bits is variable and is defined by means of appropriate signaling at the start of a connection. However, if there are less than ten uncoded TFCI bits, the corresponding TFCI word is filled with zeros to make a total of ten bits, with the more significant bits being set to zero in this case. This ensures that the (32, 10) coder 1 is always supplied with a TFCI word having ten TFCI bits. The (32, 10) coder 1 codes the TFCI word supplied to it using a second-order (32, 10) subcode of the so-called Reed-Muller code. The corresponding (31-10) coder 1 -9- is in this case structured such that the TFCI code word emitted from the (32, 10) coder 1 is formed by a linear combination (controlled by the uncoded TFCI bits) of ten different basic sequences. The TFCI code word which is emitted from the (32, 10) coder 1 and which now comprises 32 bits is then supplied to a puncturing unit 2, in which the bit no. 0 and the bit no. 16 are punctured, that is to say they are removed from the TFCI code word. The punctured TFCI code word resulting from this thus now has only 30 TFCI bits. The 30 TFCI bits are supplied to a unit 3 whose task is to assign these bits in the normal mode (that is to say for uncompressed transmission) or in the compressed mode (that is to say for compressed transmission) to the individual time slots or slots in the respective UMTS frame (see Figure 2). As has already been described, the 30 TFCI bits in the normal mode are distributed uniformly between the 15 time slots in the respective UMTS frame, with the two most significant TFCI bits no. 29 and no. 28 being mapped onto the time slot no. 0 which is transmitted first in time, while the two least significant bits no. 1 and no. 0 are mapped onto the time slot no. 14 which is transmitted last within the frame. Exactly the same configuration of TFCI bits to be transmitted can, of course, also be achieved in another way. For example, the numbering of the bits is purely a conventional question, and the MSB and LSB could also be defined in a different sequence. Furthermore, the puncturing operations do not need to relate to the bit nos. 0 and 16, since other bits may also be punctured. -9a- On the basis of another method of representation, the elements of the masks used for the Reed-Mueller code may also be reorganized so that the bits to be punctured may be placed at any desired points, in particular -10- even at the end of the TFCI code word. All these alternative, equivalent forms of representation are likewise within the scope of the present invention, even if they are not mentioned explicitly in the following text. However, in the compressed mode and as shown in Figure 3, there is a transmission gap in the corresponding frame, in which no information is transmitted. In the example shown in Figure 3, this transmission gap covers the time slots no. 6-8. As has already been described, this means that the time slot format must be adapted appropriately, so that, in certain of these adapted formats, there are more available TFCI points than TFCI bits (see also Figure 4 and Figures 5A/5B). In the following text, various options for filling these excess TFCI points are proposed both for the uplink and for the downlink, and the exemplary embodiments proposed in the following text for the uplink, can also be used for the downlink. Furthermore, the individual exemplary embodiments may also be combined with one another. First of all, a number of exemplary embodiments of the present invention for the uplink will be explained in the following text. According to a first exemplary embodiment, in the situation where there are more TFCI points than TFCI bits available in the compressed mode, it is proposed that the excess TFCI bits should not be filled immediately by repetition, but that the TFCI points which are still unfilled should first of all be filled with the bits no. 0 and no. 16, which were originally punctured by the puncture unit 2, in the original TFCI code word. These two bits are preferably placed at the -10a- end of the corresponding UMTS frame. Only after these bits have been mapped onto the UMTS frame are the TFCI points which still remain free filled by repetition, and this is carried out analogously to the prior art described initially such -11- that the 30 bits in the TFCI code word are mapped onto the TFCI points which are transmitted first in time, while the repeated bits are allocated to the later TFCI points in the frame. This procedure results in a change to the previously proposed algorithm for determining the additional TFCI bits dk as follows, where E denotes the index of the TFCI point which immediately follows the transmission gap, Ck, where k = 0...29, denotes the 30 TFCI bits in the punctured TFCI code word, C30 and C31 denotes the two originally punctured bits no. 6 and no. 16 in the TFCI code word emitted from the coder 1, and D denotes the number of TFCI points in the entire frame: dD-31 = CE mod 30 dD-32 = C(E-1) mod 30 dD-33 = C(E-2) mod 30 d2 = C(E-(D-33)) mod 30 d1 = C31 d0 = C30 For the example shown in Figure 3, this results in the following procedure for mapping the TFCI bits onto the respective frame. Since the transmission gap covers three time slots, only twelve time slots are sent, so that, on the basis of the table shown in Figure 4, three TFCI bits should be transmitted in each time slot, with a total of 36 TFCI bits being transmitted in the entire frame. According to the algorithm described above, the TFCI bits C29 to C12 are initially distributed between the first time slots no. 0 to no. 5 and the TFCI bits C11 to C0 are initially distributed between the next time -11a- slots no. 9 to no. 12. Thus, once all the TFCI bits in the punctured TFCI code word have been allocated, the TFCI bits C11 , C10, C09 are repeated in time slot no. 13, -12- and the originally punctured TFCI bits C30 and C31 are mapped onto the last time slot no. 14, with the TFCI bit C08 also being repeated in the time slot no. 14. This procedure is advantageous since it is better to send the previously punctured bits in the TFCI (32, 10) code word than to repeat bits which have been sent in poor conditions, in terms of power control, owing to the transmission gap which exists in the compression mode. The exemplary embodiment described above can also be modified such that the originally punctured bits are not placed in the last time slot in the UMTS frame but are sent directly after the transmission gap. Furthermore, as in the prior art, the TFCI bits which then immediately follow the transmission gap are repeated. This procedure has the advantage that those bits which are normally punctured in any case are sent at the TFCI points whose transmission conditions are "poor". Based on the example shown in Figure 3 and according to this exemplary embodiment, the TFCI bits C29 to C12 are initially distributed between the first time slots no. 0 to no. 5. The TFCI points in the time slot no. 9 are filled with the originally punctured bits C30 and C31 as well as the TFCI bit C11. The TFCI bits C10 to C2 are assigned to the time slots no. 10 to 12. The time slot no. 13 is filled by the TFCI bits C01 and C0. Those TFCI points which are then still available in the time slots no. 13 and no. 14 are filled, as has already been described above, by the TFCI bits which immediately follow the transmission gap, so that bit C30 is repeated in time slot no. 13, and the bits C31, C11, C10 are repeated in the time slot no. 14. -13- It may be expected that those TFCI bits which are sent after the transmission gap have a lower bit error rate as their distance from the transmission gap increases, since the power control can stabilize once again as the distance from the transmission gap increases. A further good option for filling the available TFCI points in the compressed mode is to repeat those TFCI bits which are transmitted immediately after the transmission gap and which have the greatest error probability in that time slot which is furthest away from the transmission gap. It is thus advantageous to repeat those TFCI bits which immediately follow the transmission gap in the reverse sequence (and not in the same sequence, as before). The algorithm described initially for determining the repeated bits dk in consequence change as follows: dD-31 = C(E -(D-31)) mod 30 dD-32 = C(E-(D-32)} mod 30 dD-33 = C(E-(D-33)) mod 30 d1 = C(E-1) mod 30 d0 = CE mod 30 For the example shown in Figure 3, this means that the TFCI bits C29 to C12 are initially distributed between the first time slots no. 0 to no. 5, and the TFCI bits C11 to C0 are initially distributed between the next time slots no. 9 to no. 12. Thus, once all the TFCI bits in the punctured TFCI code word have been allocated, those TFCI bits which then immediately follow the transmission gap are repeated in the reverse sequence in order to fill those TFCI points which are still free, that is to say the TFCI bits C06, C07, C08 are repeated in the time slot no. 13, and the TFCI bits C09, C10, C11 are repeated in the time slot no. 14. -14- It is particularly advantageous for this exemplary embodiment to be combined with the first exemplary embodiment, that is to say for the two originally punctured TFCI bits C30 and C31 to be sent in the last time slot, while those TFCI bits which immediately follow the transmission gap are repeated in the reverse sequence in order to fill the free TFCI points. The following algorithm is therefore used to determine how the TFCI points dk are filled: dD-31 = C(E-(D-33)) mod 30 dD-32 = C(E-(D-34)) mod 30 d2 = CE mod 30 d1 = C31 d0 = C30 For the example shown in Figure 3, this means that the TFCI bits C29 to C12 are initially distributed between the first time slots no. 0 to no. 5 and the TFCI bits C11 to C0 are additionally distributed between the next time slots no. 9 to no. 12. Thus, once all the TFCI bits in the punctured TFCI code word have been allocated, those TFCI bits which then immediately follow the transmission gap are repeated in the reverse sequence, and the originally punctured bits C30 and C31 are sent in the last time slot in order to fill the TFCI points which are still free, that is to say the TFCI bits C08, C09, C10 are repeated in the time slot no. 13, while the originally punctured TFCI bits C30 and C31 as well as the repeated TFCI bit C11 are assigned to the time slot no. 14. As has already been described, the TFCI bits in the TFCI (32, 10) code word, which has been punctured -14a- twice, are usually distributed between the first TFCI points in the respective frame in the compressed mode, while those TFCI points which are then still available are filled by repetition. If at least 32 TFCI points are available, depending on the format -15- respectively chosen for the compressed mode (see Figure 4), there is a further option for filling the TFCI points in which the entire unpunctured (32, 10) code word can be sent immediately, and in which any TFCI points which are still free are only then filled by repetition. In this case, the TFCI code word supplied from the coder 1 would retain its original length and sequence since - as indicated by dashed lines in Figure 1- no puncturing is carried out. For the example shown in Figure 3, this means that the TFCI bits C30 to C15, C31 and C14 are initially distributed between the first time slots no. 0 to no. 5, and the TFCI bits C13 to C02 are initially distributed between the next time slots no. 9 to no. 12. In this case, it should be noted that C30 denotes the bit no. 0 and C31 denotes the bit no. 16 in the unpunctured TFCI code word emitted from the coder 1 (Figure 2 shows only the punctured TFCI code word). Those TFCI bits C01 and C0 which still remain are sent first of all in the time slot no. 13. Those TFCI points which are then still free in the time slot no. 13 and in the time slot no. 14 are filled by repetition, in which case the previously described exemplary embodiments can be used once again for the repetition. In the present situation, those TFCI bits which immediately follow the transmission gap are once again repeated, so that the TFCI bit C13 is repeated in the time slot no. 13, while the TFCI bits C12 to C10 are repeated in the time slot no. 14. In the following text, exemplary embodiments of the present invention for filling those TFCI points for the downlink which are available in the compressed mode will be explained first of all. As has already been explained, so-called DTX bits can be used for this purpose. -16- Within the scope of the present invention, it is now proposed that these DTX bits should not be distributed between those TFCI points which still remain at the end of the respective frame after transmission of the punctured TFCI code word, but that these DTX bits should be transmitted immediately after the transmission gap that occurs in the compressed mode. This means that as many DTX bits as there are excess TFCI points in the frame are transmitted immediately after the transmission gap. The remaining TFCI points in the frame are filled with the bits of the punctured TFCI code word. This procedure has the advantage that the DTX bits are used for those TFCI points in which the probability of transmission being subject to interference is greatest, owing to the proximity to the transmission gap. If, as is shown in Figure 3, a frame is transmitted with a transmission gap covering three time slots, this means (by way of example for a spread factor of 256) according to the table shown in Figure 5A that four TFCI points are available in each time slot (the downlink frame structure is assumed to be of Type A). On the basis of the exemplary embodiment described above, the TFCI bits C29 to C06 in the punctured TFCI code word are accordingly distributed between the time slots no. 0 to no. 5. 16 DTX bits are sent in the time slots no. 9 to no. 12, while two DTX bits are sent first of all in the time slot no. 13, followed by the TFCI bits C05 and C04. Finally, the remaining TFCI bits C03 to C0 in the punctured TFCI code word are sent in the last time slot no. 14. Should there be fewer time slots after the transmission gap than the number required for the DTX bit, those DTX bits which cannot be transmitted after the transmission -16a- gap can be allocated to the time slots before the transmission gap. In this case, they may in principle be distributed in any desired way, in which case it is advantageous to distribute the DTX bits as uniformly -17- as possible. As a further embodiment variant, only some of the DTK bits may also be inserted immediately after the transmission gap, with the remaining DTX bits being allocated to the other time slots before and after the transmission gap. This is particularly advantageous when more time slots are available after the transmission gap than are required for stabilization of the power control. One specific embodiment variant of the invention provides for 30 bits of the TFCI code word to be mapped initially onto the frame to be transmitted, in the compression mode. Furthermore, two originally punctured bits or two bits which are not intended to be transmitted in the normal mode (during normal operation and in the uncompressed mode) are mapped onto the frame to be transmitted. If, particularly in the uplink, the number of format identification points available in the corresponding compressed frame exceeds the limit of 32 format identification points, then TFCI bits are mapped repeatedly onto the frame to be transmitted; in particular, those TFCI bits which are sent shortly after the transmission gap are mapped repeatedly onto the frame to be transmitted (they are repeated). This repeated mapping is in this case carried out in particular in reverse sequence to that in which these TFCI bits were first mapped. If, particularly in the downlink, the number of format identification points available in the corresponding compressed frame exceeds the limit of 32 format identification points, then DTX bits are mapped repeatedly onto the frame to be transmitted. Finally, it should be mentioned once again that the exemplary embodiments described above with reference to the uplink can in principle also be used for the -17a- downlink. Furthermore, the present invention has been described above on the basis of the use in a mobile radio transmitter. The invention may, -18- of course, also be extended, however, to mobile radio receivers, which shall be designed appropriately for reception and evaluation of a signal which is processed according to the invention and is then transmitted. 19 We Claim 1. A method for mapping format identification bits onto a frame which is to be transmitted using compressed mode, the information to be transmitted in the compressed frame being compressed such that there is a transmission gap in the compressed frame which is not filled with information, the method comprising the steps of: - obtaining the format identification bits by puncturing of a format of a format identification code word, therefore enabling removal of at least one punctured format identification bit from the format identification code word; - mapping the format identification bits in the compressed mode onto a specific number of format identification points available in the corresponding compressed frame, the specific number being greater than the number of format identification bits, - repeatedly mapping at feast one format identification bit during the mapping of the format identification bits onto the format identification points, therefore enabling filling-up of all the format identification points with a format identification bit, 20 characterized in that - in the compressed mode, the originally punctured format identification bits are also mapped onto corresponding format identification points in the compressed frame. 2. The method as claimed in claim 1, wherein a) the format Identification bits are mapped onto corresponding format identification points in the compressed frame, wherein b) the originally punctured format identification bits are mapped onto format identification points which are still unfilled after step a) and wherein, c) atleast one format identification bit is mapped repeatedly in order to fill format identification points which are still unfilled after steps a) and b). 3. The method as claimed in claim 2, wherein in step a), the format identification bits are mapped onto those format identification points in the compressed frame which are to be transmitted first in time. 4. The method as claimed in claim 3, wherein 21 in step a), the format identification bits are mapped in accordance with their significance onto those format identification points in the compressed frame which are to be transmitted first in time, the most significant format identification bit being mapped onto that format identification point which is to be transmitted first in time. 5. The method as claimed in one of claims 2-4, wherein in step c), exactly the same number of format identification bits which were previously mapped in step a) are mapped, in each case repeated once, onto a corresponding format identification point which is still unfilled after steps a) and b) is as required to fill these format identification points. 6. The method as claimed in claim 5, wherein, in the repeated mapping process which is carried out in step c), the individual format identification bits are mapped onto the corresponding format identification points in the reverse sequence to that in step a). 7. The method as claimed in one of claims 2-6, wherein in step b), the originally punctured format identification bits are mapped onto format identification points at the end of the compressed frame. 8. The method as claimed in claim 7, wherein in step b), the originally punctured format identification bits are mapped onto format Identification points in a last time slot of the compressed frame. 22 9. The method as claimed in claim 1, wherein the originally punctured format identification bits are mapped onto format identification points which immediately follow the transmission gap in the compressed frame. 10. The method as claimed in claim 9, wherein the originally punctured format identification bits are mapped onto format identification points which are present in a time slot which immediately follows the transmission gap in the compressed frame. 11. The method as claimed in claims 9 or 10, wherein a) the format identification bits are first mapped onto format identification points before the transmission gap in the compressed frame, b) wherein the originally punctured format identification bits are mapped onto format identification points which immediately follow the transmission gap in the compressed frame, c) wherein the format identification bits which stilt remain after step a) are mapped onto format identification points which are still unfilled after the steps a) and b), and wherein, d) atleast one format identification bit which has already been mapped in steps a) - c) is mapped repeatedly in order to fill format identification points which are still unfilled after steps a) - c). 23 12. The method as claimed in claim 11, wherein the format identification bits are mapped in accordance with their significance onto the corresponding format identification points in the compressed frame, the most significant format identification bits being mapped onto format identification point which is sent at a time before the format identification point associated with the least significant format identification bit. 13.The method as claimed in claim 10 or 11, wherein in the repeated mapping process which is carried out in step d), the individual format identification bits are mapped onto the corresponding format identification points in the reverse sequence to that in steps a)-c). 14. The method as claimed in one of the preceding claims, wherein the format identification code word comprises 32 format identification bits, with two punctured format identification bits being removed from the format identification code word by means of puncturing. 15. The method as claimed in one of the preceding claims, wherein the method is carried out before sending the compressed frame via an uplink connection in a radio system, in particular a UMTS mobile radio system. 24 16. The method as claimed in one of claims 1-14, wherein the method is carried out before sending the compressed frame via a downlink connection in a radio system, in particular a UMTS mobile radio system. 17. The method as claimed in one of the preceding claims, wherein after a first mapping of the format identification bits onto corresponding format identification points, the format identification bits following the transmission gap are mapped repeatedly in order to fill all the format identification points with a format identification bit, and wherein, after the first mapping of the format identification bits, the format identification bits, following the transmission gap being mapped repeatedly in the reverse sequence, in order to fill those format Identification points which are stilt unfilled in the compressed frame after the first mapping process with a format identification bit. 18. The method as claimed in claim 17, wherein during the first mapping process, the format identification bits are mapped onto those format identification points in the compressed frame which are to be transmitted first in time. 25 19. The method as claimed in claim 18, wherein during the first mapping process, the format identification bits are mapped in accordance with their significance onto the corresponding format identification points in the compressed frame, the most significant format identification bit being mapped onto that format Identification point which is to be transmitted first in time in the compressed frame. 20. The method as claimed in one of the preceding claims, wherein, during the mapping of the format identification bits onto the available format identification points, at least one format identification point is assigned a bit (DTX bit) which is not to be transmitted, in order to fill all the format identification points with a bit, at least some of the bits which are not to be transmitted being assigned to those format identification points which immediately follow the transmission gap. 21. The method as claimed in claim 20, wherein the same number of bits which are not to be transmitted are assigned to the format identification points which immediately follow the transmission gap as the number of available format identification points minus the number of format identification bits. 26 22. The method as claimed in claim 20, wherein a first portion of the bits which are not to be transmitted is assigned to the format identification points which immediately follow the transmission gap, and wherein a second portion of the bits which are not to be transmitted is assigned to the format identification points which precede and / or follow the transmission gap. 23. The method as claimed In one of claims 20 to 22, wherein the format identification bits are mapped in accordance with their signification onto the corresponding format identification points in the compressed frame, the most signification format identification bit being mapped onto that format identification point which is to be transmitted first in time in the compressed frame. 24. A method for mapping format identification bits onto a frame which is to be transmitted using compressed mode, the information to be transmitted in the compressed frame being compressed such that there is a transmission gap in the compressed frame which is not filled with information, the method comprising the steps of: - obtaining the format identification bits during normal operation by puncturing of an original format identification code word, therefore enabling removal of atleast one punctured format identification bit from the original format identification code word, 27 - mapping the format identification bits in the compressed mode onto a specific number of format identification points available in the corresponding compressed frame, the specific number being greater than the number of format identification bits, - repeatedly mapping atleast one format identification bit during the mapping of the format identification bits onto the format identification points, therefore enabling filling - up of all the format identification points with a format identification bit, characterized in that - in the compressed mode, all the format identification bits in the original format identification code word, comprising the normally punctured format identification bits, are mapped onto corresponding format identification points in the compressed frame. 25. The method as claimed in claim 24, wherein a) all the format identification bits in the original format identification code word, comprising the normally punctured format identification bits, are each mapped once onto corresponding format identification points in the compressed frame, and b) after step a) repeatedly mapping atleast one format identification bit which has already been mapped in step a), in order to fill those format identification points which are still unfilled after step a) with a format identification bit. 28 26. The method as claimed in claim 25, wherein in step b) repeatedly mapping the format identification bits which follow the transmission gap after carrying out step a) in the reverse sequence in order to fill those format identification points which are still unfilled after the first mapping process in the compressed frame with a format identification bit. 27. The method as claimed in claim 25 or 26, wherein in step a), the format identification bits are mapped in accordance with their significance onto the corresponding format identification points in the compressed frame, the most significant format identification bit being mapped onto that format identification point which is to be transmitted first in time in the compressed frame. In the compressed mode, more TFCI points are available than TFCI bits. IN order to fill the excess TFCI points with bits as well and at the same time to achieve as high a performance capability as possible, it is proposed that originally punctured TFCI bits and / or an unpunctured format identification code word be transmitted for the uplink and / or downlink. |
---|
Patent Number | 206716 | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
Indian Patent Application Number | IN/PCT/2002/00691/KOL | |||||||||
PG Journal Number | 19/2007 | |||||||||
Publication Date | 11-May-2007 | |||||||||
Grant Date | 10-May-2007 | |||||||||
Date of Filing | 21-May-2002 | |||||||||
Name of Patentee | SIEMENS AKTIENGESELLS CHAFT | |||||||||
Applicant Address | WITTELSBACHER PLATZ2, 80333 MUNICH | |||||||||
Inventors:
|
||||||||||
PCT International Classification Number | H04B7/26 | |||||||||
PCT International Application Number | PCT/DE00/04177 | |||||||||
PCT International Filing date | 2000-11-24 | |||||||||
PCT Conventions:
|