Recognition and utilization of auxiliary error control...

Multiplex communications – Communication over free space – Combining or distributing information via time channels

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S498000

Reexamination Certificate

active

06438121

ABSTRACT:

BACKGROUND OF THE INVENTION
(a) Field of the Invention
The present invention relates generally to communication systems and, more particularly, to an adaptable redundancy scheme, or overlay, for use in communication systems that use forward error correction (FEC) schemes. The present invention also relates to the automatic detection of the use of the redundancy scheme by subscriber units.
(b) Description of Related Art
Many digital cellular systems break time into a number of slots and transmit information in each time slot. For example, a cellular system may break time into six slots, with a different subscriber unit assigned to communicate with a cellular base station during each one of the time slots. The cellular base station may communicate with a first user during a first dedicated time slot, a second user during a second dedicated time slot, and so on for each time slot. After communication is made on the last time slot, the cycle is repeated and communication is made on the first time slot. However, not all of the time slots allocated to subscribers are completely filled with digital communication signals and, therefore, valuable communication time is wasted. This cellular communications configuration, where time is multiplexed between numerous users, is typically referred to as a time division multiple access (TDMA) system. TDMA systems typically use some form of Forward Error Correction (FEC) to minimize the number of communication errors in the system, thereby, improving the communication quality of the system.
Standard IS-136 is the current digital cellular standard used for TDMA systems.
FIG. 1
is a diagram showing the FEC scheme for an IS-136 TDMA digital cellular system that uses trellis coding. The IS-136 system includes a speech coder
50
coupled to an IS-136 FEC coder
51
, which includes a 7-bit Cyclic Redundency Check (CRC) computation function
52
, a rate ½ convolutional coder
54
, a puncturing function
56
, a voice cipher
58
, and a 2-slot interleaver
60
. The speech coder
50
processes analog voice signals into digital data or bits. The IS-136 FEC scheme uses unequal protection of the speech coder
50
output bits to reduce communication errors. Bits from the speech coder
50
are classified into three distinct categories. The speech coder
50
outputs
48
class Ia bits, which are passed to both the CRC computation function
52
and the rate ½ convolutional coder
54
. Although a speech coder
50
is disclosed, any digital data source may be used. The class Ia bits, which are the 48 most perceptually significant bits in terms of voice quality, are protected by a 7-bit CRC, which is, generated by the CRC computation function
52
, and the rate ½ conditional code. The speech coder
50
also outputs
48
class Ib outputs, which are passed to, and protected by, the rate ½ convolutional coder
54
. Additionally, the speech coder
50
produces
52
class II bits that are not protected in any way. The class II bits are perceptually the least significant bits used in the system.
The class Ia bits, class Ib bits, the 7-bit CRC, and
5
tail bits, which are used to terminate a trellis, are processed by the rate ½ convolutional coder
54
. As will be appreciated by one skilled in the art, a trellis code is a digital communication coding scheme. The rate ½ convolutional coder
54
produces 216 encoded bits from the 108 bit input. The output of the rate ½ convolutional coder
54
is coupled to a puncturing function
56
, which punctures (deletes) 8 bits, thereby creating a 208 bit output. The output of the puncturing function
56
and the
52
class II output from the speech coder
50
are coupled to a voice cipher
58
. The voice cipher
58
performs data encryption on the 260 bits to create 260 encoded bits. The output of the voice cipher
58
is coupled to the 2-slot interleaver
60
, which reorders the encoded bits of two slots in order to randomize any burst errors that may be as seen by the channel decoder. In order to meet system usage and quality of service requirements, there will often be idle time slots where no data communications take place.
Due to advances in technology and other market factors, there is a movement in the digital cellular industry to modify standard IS-136 in order to make use of any idle time slot period. The proposed modification to IS-136 is known generally as the ADVICE system. The ADVICE system allows a cellular base station to transmit auxiliary information (bits) in idle or auxiliary time slot periods. The auxiliary coded information is redundant information that assists certain subscriber units in accurately receiving communications sent from a cellular base station, thereby, resulting in higher voice quality at the subscriber unit.
Although the ADVICE system proposes utilizing unused time slots to transmit auxiliary information, the ADVICE system does not specify any manner in which the auxiliary information is to be generated. Digital communication systems such as cellular systems typically use trellis coding, a process by which each bit that is input into an encoder results in the transmission of multiple coded bits.
Trellis coding is typically implemented using convolutional codes or multiple trellis coded modulation codes. Rate-compatible families of such codes are well known for their suitability in adaptive FEC and automatic repeat request (ARQ) protocols.
Currently, multiple rate codes are typically generated by puncturing a base code. Puncturing a code consists of removing selected coded bits from the transmission stream. For example, a rate ¼ encoder generates four coded bits for each data bit that is to be broadcast. If a certain number of coded bits are deleted, the effective rate of the code becomes higher than ¼. When a communication channel is unfavorable, all coded bits from the base code are transmitted. However, as the channel quality improves, fewer of the encoded bits are transmitted, thereby raising the effective rate of the code. That is, as the channel improves, the puncture rate increases.
One approach to providing the auxiliary information to subscriber units is through traditional concatenated coding schemes. Concatenated coding schemes typically use a high rate BCH or Reed-Solomon codes as an outer code. However, the use of this approach in the ADVICE system would increase subscriber unit complexity because each subscriber unit would require a BCH/Reed-Solomon decoder, which the subscriber units do not presently have, as it is not part of the current IS-136 standard. Additionally, performance issues with concatenated coding include a lack of optimal maximum likelihood decoders and the severe nature of Rayleigh fading channels, which is typical of mobile cellular systems. The implementation of a concatenated coding scheme would require significant changes to the IS-136 coding scheme, thereby adversely affecting backward compatibility. Because the IS-136 standard is used by so many communication systems, it is necessary that the implementation of the ADVICE system maintain backward compatibility with current cellular communication systems.
Once auxiliary information is available to the various subscriber units in a communication system, each subscriber unit must determine when auxiliary information is available for its use. Auxiliary information is always present in an auxiliary time slot, however, that auxiliary information is only useful to a single subscriber unit. Signaling from the cellular base station to the subscriber unit is one way to inform a subscriber unit that useful auxiliary information is available. However, signaling is not desirable because it uses valuable communication bandwidth to transfer the signaling information. Automatic, or autonomous, blind detection of auxiliary information is desirable because signaling overhead is eliminated.
One method of autonomous blind detection is represented in
FIG. 2
, which shows two stages of decoding that may be used by a particular subscriber unit to detect the presence o

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Recognition and utilization of auxiliary error control... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Recognition and utilization of auxiliary error control..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Recognition and utilization of auxiliary error control... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2949404

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.