Abstract:
In a wireless communication system comprising at least one wireless transmit/receive unit (WTRU), a base station, and a radio network controller (RNC), a method for constant envelope orthogonal frequency division multiplexing (CE-OFDM) modulation comprises the WTRU performing an inverse transform on the data. The WTRU next performs constant envelope (CE) modulation on the data and transmits the CE-OFDM data to the base station. The base station receives the data and CE demodulates the data. The base station performs a transform on the demodulated data.
Abstract:
A wireless communication method and apparatus for coordinating Node-Bs during handover for enhanced uplink (EU) transmission. In one embodiment, a radio network controller (RNC) initiates an inter-Node-B soft handover. A wireless transmit/receive unit (WTRU) establishes communication connections with a plurality of Node-Bs. A particular one of the Node-Bs is designated as being a primary Node-B, and each of other Node-Bs are designated as being a non-primary Node-B. The RNC informs all of the Node-Bs that the particular Node-B is a primary Node-B. The primary Node-B schedules EU transmission and performs ACK/NACK during soft handover. In another embodiment, the RNC initiates a hard handover for a WTRU connected to a source Node-B. The RNC sends an activation timer to the source Node-B to set the time for handover. As many previously negatively acknowledged (NACKed) data packets as possible are prioritized for retransmission in the source Node-B before the activation timer expires.
Abstract:
A system and method in a wireless communication network that efficiently determine when a message is intended for a particular wireless transmit/receive unit (WTRU). In accordance with the present invention, each WTRU is configured to receive communications on multiple communication channels. The WTRU receives and processes incoming signals on the multiple communication channels at the physical layer for an indication of which, if any, of the multiple communication channels is intended for the WTRU. If the indication is consistent with an expected indication for that mobile unit, the mobile unit accesses the particular communication channel and processes the information being sent therein.
Abstract:
A method and system for an enhanced uplink (EU) operation in a wireless communication system during soft handover. The system comprises a wireless transmit/receive unit (WTRU), at least two Node-Bs, and a radio network controller (RNC). One Node-B may be designated as a primary Node-B, and the primary Node-B may control EU operation during soft handover including uplink scheduling and hybrid automatic repeat request (H-ARQ). Soft buffer corruption is avoided during soft handover by controlling H-ARQ by the primary Node-B. Alternatively, an RNC may control EU operation during soft handover including H-ARQ. In this case, an RNC generates final acknowledge/non-acknowledge (ACK/NACK) decision based on the error check results of the Node-Bs.
Abstract:
A method for outer loop power control in a wireless communication system begins by determining if a cyclic redundancy check (CRC) is available. If the CRC is available, the method uses the CRC to calculate an adjustment for a target signal to interference ratio (SIR) for a coded composite transport channel (CCTrCH). If the CRC is not available, then quality measurements of the CCTrCH are taken. The quality measurements are used to calculate an adjustment for the target SIR, which is then updated.
Abstract:
A wireless communication system and method for controlling transmission power to maintain a received signal-to-interference ratio (SIR) as close as possible to a target SIR. A received quality is maintained as close as possible to a target quality based on block error rate (BLER). When a target BLER is converted to an initial target SIR, an error may occur due to a channel condition mismatch, since the target SIR required for the target BLER varies with channel conditions. An outer loop power control process is used to set a target SIR for each coded composite transport channel (CCTrCH) based on the required target BLER. The process adjusts a SIR step size parameter to maximize the convergence speed of the process.
Abstract:
A stopping rule for Turbo Decoding (14) is applied for both good and bad code blocks in a received data stream. The iteration (26) either converges or diverges. Rule testing may be used for H-ARQ acknowledgement generation: if the iteration converges, an ACK (28) is generated and if the iteration diverges, a NACK (32) is generated. Optionally, the maximum number of decoding iterations (34) may dynamically selected based on MCS levels.
Abstract:
A code is produce for use in scrambling or descrambling data associated with a high speed shared control channel (HS-SSCH) for a particular user equipment. A user identification of the particular user equipment comprises L bits. A 1/2 rate convolutional encoder (14) processes at least the bits of the user identification by a 1/2 rate convolutional code to produce the code.
Abstract:
A method and apparatus of control signaling in an enhanced universal terrestrial radio access (E-UTRA) wireless communication system includes transmitting data-associated control signaling in a first orthogonal frequency division multiplexed (OFDM) symbol of a first slot of an E-UTRA subframe. Data is then transmitted in remaining OFDM symbols of the E-UTRA subframe.
Abstract:
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data processing unit, a cross-layer watermarking unit, and optionally a smart antenna processor. The security processing unit generates a token/key to be used in watermarking and sends a node security policy to other components. The data processing unit generates user data. The cross-layer watermarking unit includes at least one of Layer-2/3, Layer-1 and Layer-0. Each layer performs a different scheme or degree of watermarking. The cross-layer watermarking unit embeds the token/key into the user data transmission on at least one of the layers selectively in accordance with a security policy.