(19)
(11)EP 2 642 683 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
20.01.2021 Bulletin 2021/03

(21)Application number: 12360019.9

(22)Date of filing:  19.03.2012
(51)International Patent Classification (IPC): 
H04L 5/00(2006.01)

(54)

Method and apparatus for resource allocation in a MIMO communication system

Verfahren und Vorrichtung zur Ressourcenzuweisung in einem MIMO-System

Méthode et appareil pour allocation de ressource dans un système de communication de MIMO


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(43)Date of publication of application:
25.09.2013 Bulletin 2013/39

(73)Proprietor: Alcatel Lucent
91620 Nozay (FR)

(72)Inventors:
  • Wong, Shin Horng
    Chippenham Wiltshire SN15 3YB (GB)
  • Baker, Matthew P.J.
    Canterbury Kent CT2 9DB (GB)

(74)Representative: Script IP Limited 
Turnpike House 18 Bridge Street
Frome Somerset BA11 1BB
Frome Somerset BA11 1BB (GB)


(56)References cited: : 
WO-A1-2011/063050
US-A1- 2004 002 364
US-A1- 2011 293 025
US-A1- 2003 161 282
US-A1- 2009 268 675
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    FIELD OF THE INVENTION



    [0001] The present invention relates to a method of controlling uplink multiple input multiple output transmission between user equipment and a base station of a wireless communications network, user equipment and a computer program product.

    BACKGROUND



    [0002] Wireless telecommunications networks are known. Base stations in such networks provide wireless connectivity to user equipment within a geographical area or cell, associated with the base station. The wireless communication links between the base station and each of the user equipment typically include one or more downlink (or forward) channels for transmitting information from the base station to the user equipment and one or more uplink (or reverse) channels for transmitting information from the user equipment to the base station.

    [0003] Multiple-input-multiple-output (MIMO) techniques may be employed when the base station and, optionally, the user equipment include multiple antennas. For example, user equipment that includes multiple antennas can transmit multiple independent and distinct signals to base stations on the same a frequency, using the same code and within the same transmission time interval (TTI) which can be resolved by the base stations. For example, individual user equipment is able to transmit two streams of Enhanced Data Channel (E-DCH) in the uplink using the same uplink resource (frequency, time and code) which means that the user equipment is capable of performing a rank two transmission (as opposed to a rank one transmission which occurs with when transmitting a single E-DCH stream).

    [0004] The E-DCH consists of one or more E-DCH Dedicated Physical Data Channels (E-DPDCH) and is accompanied by one E-DCH Dedicated Physical Control Channel (E-DPCCH). The E-DPDCH carries the data traffic and the E-DPCCH carries control information to enable the E-DPDCH to be decoded.

    [0005] In uplink MIMO, a secondary E-DCH stream is sent together with the primary E-DCH stream. Similar to the primary E-DCH stream, the secondary E-DCH stream consists of one or more secondary E-DPDCH (S-E-DPDCH) and one secondary E-DPCCH (S-E-DPCCH).

    [0006] US 2003/0161282 A1 discloses techniques for transmitting data on a number of transmission channels in a multi-channel communication system using multiple transmission schemes requiring less channel-state information. One such multi-channel communication system is a Multiple-Input-Multiple-Output (MIMO) communication system. Various full-channel state information transmission schemes are provided and data streams may be transmitted over a MIMO channel. In one embodiment, the signal to noise ratio of the system is initially determined and a transmission scheme is selected from a number of possible transmission schemes based on the signal to noise ratio and the amount of channel state information available. A water filling transmission scheme is utilised where the total transmit power is allocated such that more transmit power is allocated to transmission channels with less noise and less transmit power is allocated to more noisy channels.

    [0007] US 2009/0268675 A1 discloses techniques for addressing asymmetric conditions in a multi-antenna, such as a MIMO, system to efficiently utilise transmitter and receiver resources. If an asymmetric condition is detected by the transmitter on any given stream, the transmitter can decide to utilise only a sub-set of the available resources for that stream.

    [0008] US 2004/0002364 A1 discloses a wireless MIMO system which utilises parameters of the transmitter and/or receiver to control transmissions in dependence on those parameters. A series of parameters is transmitted from a mobile station to a base station and a practical rank number is estimated for the link between the mobile station and the base station. In particular, the relative strengths of the channels are determined and the practical rank number is estimated from the measured signal to interference noise ratio.

    [0009] WO2011/063050 A1 describes methods for signalling multi-user MIMO in an HSPA telecommunications system. One described method includes a downlink data stream selection module which determines whether to use dual downlink data streams for a single wireless communication device or to use a first data stream for a first wireless communication device and a second orthogonal data stream for a second wireless communication device.

    [0010] Wireless communication devices may generate channel quality indicators (CQI) for transmission to a base station. A base station may receive CQI from many communication devices corresponding to many downlink channels. The downlink data stream selection module described may use CQI reported from multiple communication devices to determine scheduling for each wireless communication device.

    [0011] The methods described recognise that multiple-user MIMO (MU-MIMO) may increase user throughput on the downlink compared to single user MIMO, by making more intelligent use of base station resources.

    [0012] Although providing uplink MIMO facilitates transmissions from the user equipment to the network, unexpected consequences can occur.

    [0013] Accordingly, it is desired to provide an improved technique for supporting MIMO communications.

    SUMMARY



    [0014] According to a first aspect, there is provided a method as claimed in claim 1.

    [0015] The first aspect recognizes that a problem with existing techniques is that disproportionately high interference can occur as a result of transmitting relatively little data. This is because existing techniques is assume that the transmission power of the primary stream and the secondary stream are equal, that both the primary stream and the secondary stream utilize the highest number of codes and therefore operate at the highest capacity. A problem with this approach is that in a buffer-limited case (where there is insufficient pending uplink data to be sent), the number of data packets (the amount of information bits) that would be transmitted using the secondary stream may not use up the capacity provided by such a stream transmitting with equal power and using the highest number of codes such as, for example, 2xSF2 + 2xSF4 codes. This leads to the data packets transmitted in the secondary stream effectively consuming unnecessarily high power for the amount of data transmitted which in turn leads to unnecessarily high inter-stream interference and uplink interference to other users.

    [0016] Accordingly, a method of controlling uplink multiple input multiple output transmissions between user equipment and base station of a wireless communications network may be provided. The method may comprise the step of identifying whether insufficient capacity exists on a primary uplink stream to carry pending or untransmitted uplink data packets. The method may also comprise the step of, when it is determined that insufficient capacity exists, the establishment of a secondary uplink stream is prevented in the event that the pending or untransmitted uplink data packets which could not be transmitted using the primary stream would under or insufficiently utilize or exploit a capacity of the secondary uplink stream.

    [0017] In this way, the disproportionate interference and consumption of resources that would otherwise result from the establishment of a secondary stream in order to carry relatively little data is avoided which reduces the resources utilized, increases power efficiency and minimizes interference.

    [0018] In one embodiment, it is determined that the secondary uplink stream is under-utilised when it is determined that the pending uplink data packets which would not be carried by the primary uplink stream are transmittable on the primary uplink stream within a transmission time interval. Accordingly, it is determined that the secondary uplink stream would be underutilized if all of the pending data packets which are not transmittable on the primary stream can be transmitted within a single transmission time interval. In such a case, it would be more efficient to prevent the secondary stream from being established and instead transmit those pending data packets in the next transmission time interval using the primary stream.

    [0019] In one embodiment, it is determined that the secondary uplink stream is under-utilised when a difference in pending data packets which would be carried by the primary stream and by the secondary stream exceeds a threshold amount. Accordingly, an imbalance between the data packets transmitted by the primary stream and the secondary stream may indicate a potential under-utilization or inefficient use of the secondary stream.

    [0020] It is determined that the secondary uplink stream is under-utilised when pending data packets which would be carried by the secondary stream fails to achieve a threshold amount. Accordingly, a simple assessment of whether a particular amount of data packets are to be transmitted using the secondary stream provides an indication of whether that secondary stream will be under-utilized.

    [0021] In one embodiment, it is determined that the secondary uplink stream is under-utilised when a difference between a transport block size of the primary stream and a transport block size of the secondary stream exceeds a threshold amount. Given that typically the primary stream will have an equal or larger transport block size than that of the secondary stream, the large difference in transport block size indicates that the secondary stream has very little data to transmit and it would be inefficient to transmit that amount of data using the huge capacity offered by the secondary stream.

    [0022] In one embodiment, it is determined that the secondary uplink stream is under-utilised when a transport block size of the secondary stream fails to achieve a threshold amount. Accordingly, a simple assessment of the transport block size of the secondary stream may be used to determine whether the secondary stream is being under-utilized.

    [0023] In one embodiment, when the primary uplink stream and the secondary uplink stream use identical modulation, it is determined that the secondary uplink stream is under-utilised when a difference in code rate of the primary stream and a code rate of the secondary stream exceeds a threshold amount. Since the two streams use the same modulation, a difference in the code rate may indicate that it is not sufficient to transmit the pending data packets using the secondary stream particularly given that the transmission power of the secondary stream is typically high.

    [0024] In one embodiment, when the primary uplink stream and the secondary uplink stream use identical modulation, it is determined that the secondary uplink stream is under-utilised when a code rate of the secondary stream fails to achieve a threshold amount. Accordingly, a simple assessment of the code rate may be used to indicate that the secondary stream would be under-utilized.

    [0025] In one embodiment, when the primary uplink stream and the secondary uplink stream use different modulation, it is determined that the secondary uplink stream is under-utilised when a difference in a product of a modulation order and a code rate of the primary stream and a product of a modulation order and a code rate of the secondary stream exceeds a threshold amount. The product of the modulation order and the code rate gives the number of information bits per symbol. A large difference in this product indicates that the data packets that would be transmitted on the secondary stream would be being transmitted very inefficiently compared to that of the primary stream.

    [0026] In one embodiment, when the primary uplink stream and the secondary uplink stream use different modulation, it is determined that the secondary uplink stream is under-utilised when a product of a modulation order and a code rate of the secondary stream fails to achieve a threshold amount. Accordingly, a simple assessment of the product may be used to determine whether the secondary stream would be under-utilized.

    [0027] In one embodiment, the method comprises the step of receiving the threshold amount from a network node. Accordingly, the degree of under-utilization can be controlled by the network setting the threshold amount.

    [0028] In one embodiment, the step of preventing establishment of a secondary uplink stream prevents rank two transmissions.

    [0029] In one embodiment, the step of identifying identifies that insufficient capacity exists if it is determined that all pending uplink data could not be transmitted on the primary uplink stream within a transmission time interval.

    [0030] According to a second aspect, there is provided a computer program product operable, when executed on a computer, to perform the method steps of the first aspect.

    [0031] According to a third aspect, there is provided user equipment as claimed in claim 14.

    [0032] In one embodiment, it is determined that the secondary uplink stream is under-utilised when it is determined that the pending uplink data packets which would not be carried by the primary uplink stream are transmittable on the primary uplink stream within a transmission time interval.

    [0033] It is determined that the secondary uplink stream is under-utilised when a difference in pending data packets which would be carried by the primary stream and by the secondary stream exceeds a threshold amount.

    [0034] In one embodiment, it is determined that the secondary uplink stream is under-utilised when pending data packets which would be carried by the secondary stream fails to achieve a threshold amount.

    [0035] In one embodiment, it is determined that the secondary uplink stream is under-utilised when a difference between a transport block size of the primary stream and a transport block size of the secondary stream exceeds a threshold amount.

    [0036] In one embodiment, it is determined that the secondary uplink stream is under-utilised when a transport block size of the secondary stream fails to achieve a threshold amount.

    [0037] In one embodiment, when the primary uplink stream and the secondary uplink stream use identical modulation, it is determined that the secondary uplink stream is under-utilised when a difference in code rate of the primary stream and a code rate of the secondary stream exceeds a threshold amount.

    [0038] In one embodiment, when the primary uplink stream and the secondary uplink stream use identical modulation, it is determined that the secondary uplink stream is under-utilised when a code rate of the secondary stream fails to achieve a threshold amount.

    [0039] In one embodiment, when the primary uplink stream and the secondary uplink stream use different modulation, it is determined that the secondary uplink stream is under-utilised when a difference in a product of a modulation order and a code rate of the primary stream and a product of a modulation order and a code rate of the secondary stream exceeds a threshold amount.

    [0040] In one embodiment, when the primary uplink stream and the secondary uplink stream use different modulation, it is determined that the secondary uplink stream is under-utilised when a product of a modulation order and a code rate of the secondary stream fails to achieve a threshold amount.

    [0041] In one embodiment, the user equipment comprises reception logic operable to receive the threshold amount from a network node.

    [0042] In one embodiment, the prevention logic prevents establishment of a secondary uplink stream by preventing rank two transmissions.

    [0043] In one embodiment, the identification logic identifies that insufficient capacity exists if it is determined that all pending uplink data could not be transmitted on the primary uplink stream within a transmission time interval.

    [0044] Further particular and preferred aspects are set out in the accompanying independent and dependent claims. Features of the dependent claims may be combined with features of the independent claims as appropriate, and in combinations other than those explicitly set out in the claims.

    [0045] Where an apparatus feature is described as being operable to provide a function, it will be appreciated that this includes an apparatus feature which provides that function or which is adapted or configured to provide that function.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0046] Embodiments of the present invention will now be described further, with reference to the accompanying drawings, in which:
    Figure 1 illustrates the main processing steps according to one embodiment.

    DESCRIPTION OF THE EMBODIMENTS


    Overview



    [0047] Before discussing embodiments in any more detail, first an overview will be provided. Embodiments provide a technique to select the user equipment rank for uplink MIMO. Currently, it is proposed that the user equipment is only able to use rank 2 if both streams use 2xSF2 + 2xSF4 coding. The problem with this approach is that in a buffer-limited case, the amount of information bits that would be transmitted via the second stream may not use up the capacity offered by 2xSF2+2xSF4 codes. Since the transmit power for E-DPDCHs and S-E-DPDCHs are intended to be equal, the information bits in the secondary stream would consume unnecessarily high power causing:
    1. 1) Unnecessarily high inter-stream interference; and
    2. 2) Uplink interference to other users.


    [0048] Embodiments impose a criterion such that rank 2 transmission is allowed (i.e. the secondary stream is established) only if the secondary stream would be sufficiently utilised. In other words, the secondary stream is only established if the benefits of doing so outweigh the impact of doing so. Various techniques are proposed for making such an assessment, as will now be described.

    Transport Block Size Assessment



    [0049] In this embodiment, rank 2 transmission is allowed only if the transport block size imbalance (difference) between the two streams is within a threshold. The primary stream (usually) has an equal or greater transport block size than that of the secondary stream. Hence, a large imbalance means the second stream has very little data to transmit and it is not efficient to transmit a small amount of data using the huge capacity offered by the 2xSF2 + 2xSF4 codes.

    [0050] In another embodiment, a rank 2 transmission is allowed if the absolute transport block size for the secondary stream is above a threshold.

    [0051] These thresholds can be signalled to the user equipment or may be predetermined or pre-programmed.

    Code Rate Assessment



    [0052] In another embodiment, if both streams use the same modulation, the criterion for rank 2 transmission is that the difference in code rate between the primary and the secondary stream is smaller than a threshold. Since a low code rate means low percentage of information bits, it is not efficient to perform rank 2 transmission for such a small amount information bits especially if the transmission power in the secondary stream is high.

    [0053] In another embodiment, a rank 2 transmission is allowed if the absolute code rate for the secondary stream is above a threshold.

    [0054] These thresholds can be signalled to the user equipment or may be predetermined or pre-programmed.

    Modulation and Code Rate Assessment



    [0055] In another embodiment, if the streams use different modulation, the criterion for rank 2 transmission is that the difference in the product of the modulation order (i.e. the number of bits per symbol, e.g. 2 for QPSK, 4 for 16QAM) and the code rate between the two streams is smaller than a threshold. The product of the modulation order and the code rate gives the number of information bits per symbol. A small number of information bits being carried at high power is not efficient and therefore does not justify a rank 2 transmission.

    [0056] In another embodiment, a rank 2 transmission is allowed if the product of the modulation order and code rate on the secondary stream is above a threshold.

    [0057] These thresholds can be signalled to the user equipment or may be predetermined or pre-programmed.

    Example Operation



    [0058] In one embodiment, as illustrated in Figure 1, a base station signals a maximum rank of 2 to the user equipment as step S1. The user equipment is therefore allowed in principle to transmit 2 streams. The network also signals at step S1 a transport block size (TBS) imbalance ΔTBS, between the two streams, where the difference in TBS between the two streams needs to be below a threshold X if the UE is to be allowed to actually transmit with rank 2.

    [0059] In the 1st TTI, the user equipment establishes at steps S2 and S4 that it has sufficient data in its buffer such that the ΔTBS < X. The user equipment transmits with rank 2 at step S5.

    [0060] In the 2nd TTI, the user equipment establishes at steps S2 and S4 that it has sufficient data to fill up its primary stream but has very little data left for the secondary stream. Here ΔTBS > X. The user equipment therefore transmits with rank 1 at step S3, and holds back the remaining small amount of data that would not fit into the primary stream.

    [0061] In the 3rd TTI, the user equipment establishes at steps S2 that the capacity of the primary stream is not exceeded, transmits with rank 1 at step S3 and sends the remaining data in its buffer via the primary stream.

    [0062] It will be appreciated that the embodiments mentioned above are based on the recognition that if only a small amount of data remains to be transmitted on the secondary stream, the extra delay incurred in making it wait one more TTI for transmission (2ms or 10ms in High-Speed Packet Access (HSPA)) is not significant and will typically not impact the user experience. By contrast, the extra interference that would be caused by transmitting the data on the secondary stream with high power would be significant and is desirable to be avoided.

    [0063] Accordingly, embodiments prevent the secondary stream from inefficiently using unnecessarily high power to transmit a small amount of information bits in a (rank 2) buffer-limited environment.

    [0064] A person of skill in the art would readily recognize that steps of various above-described methods can be performed by programmed computers. Herein, some embodiments are also intended to cover program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine-executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods. The program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. The embodiments are also intended to cover computers programmed to perform said steps of the above-described methods.

    [0065] The functions of the various elements shown in the Figures, including any functional blocks labelled as "processors" or "logic", may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term "processor" or "controller" or "logic" should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), and non volatile storage. Other hardware, conventional and/or custom, may also be included. Similarly, any switches shown in the Figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the implementer as more specifically understood from the context.

    [0066] It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative circuitry embodying the principles of the invention. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.

    [0067] The description and drawings merely illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass equivalents thereof.


    Claims

    1. A method of controlling uplink multiple input multiple output transmission between user equipment and a base station of a wireless communications network, said method comprising the steps of:

    identifying (S2) whether insufficient capacity exists on a primary uplink stream to carry within a transmission time interval all uplink data packets pending for transmission; and characterized in that,

    if insufficient capacity exists, preventing (S4, S3) establishment of a secondary uplink stream when it is determined that pending uplink data packets which would not be carried by said primary uplink stream would not sufficiently utilise a capacity provided by said secondary uplink stream within said transmission time interval, wherein the insufficient utilisation of the capacity provided by a secondary uplink stream is determined when a transport block size of said secondary stream fails to achieve a threshold amount.


     
    2. The method of claim 1, wherein said secondary uplink stream would not sufficiently use its capacity when it is further determined that said pending uplink data packets which would not be carried by said primary uplink stream are transmittable on said primary uplink stream within a single transmission time interval.
     
    3. The method of claim 1, wherein said secondary uplink stream would not sufficiently use its capacity when it is further determined that a difference in a number of pending data packets which would be carried by said primary stream and by said secondary stream exceeds a threshold amount.
     
    4. The method of claim 1, wherein said secondary uplink stream would not sufficiently use its capacity when it is further determined that a number of pending data packets which would be carried by said secondary stream fails to achieve a threshold amount.
     
    5. The method of claim 1, wherein said secondary uplink stream would not sufficiently use its capacity when it is further determined that a difference between a transport block size of said primary stream and the transport block size of said secondary stream exceeds a threshold amount.
     
    6. The method of claim 1, wherein when said primary uplink stream and said secondary uplink stream use identical modulation, said secondary uplink stream would not sufficiently use its capacity when it is further determined that a difference in code rate of said primary stream and a code rate of said secondary stream exceeds a threshold amount.
     
    7. The method of claim 1, wherein when said primary uplink stream and said secondary uplink stream use identical modulation, said secondary uplink stream would not sufficiently use its capacity when it is further determined that a code rate of said secondary stream fails to achieve a threshold amount.
     
    8. The method of claim 1, wherein when said primary uplink stream and said secondary uplink stream use different modulation, said secondary uplink stream would not sufficiently use its capacity when it is further determined that a difference in a product of a modulation order and a code rate of said primary stream and a product of a modulation order and a code rate of said secondary stream exceeds a threshold amount.
     
    9. The method of any preceding claim, wherein when said primary uplink stream and said secondary uplink stream use different modulation, said secondary uplink stream would not sufficiently use its capacity when it is further determined that a product of a modulation order and a code rate of said secondary stream fails to achieve a threshold amount,
     
    10. The method of any one of claims 1, 3 to 9, comprising the step of receiving said threshold amount from a network node.
     
    11. The method of any preceding claim, wherein said step of preventing establishment of a secondary uplink stream prevents rank two transmissions.
     
    12. A computer program product operable, when executed on a computer, to perform the method steps of any one of claims 1 to 11.
     
    13. User equipment operable to control uplink multiple input multiple output transmission with a base station of a wireless communications network, said user equipment comprising:

    identification logic operable to identify whether insufficient capacity exists on a primary uplink stream to carry within a transmission time interval all uplink data packets pending for transmission; and characterized by.

    prevention logic operable, if insufficient capacity exists, to prevent establishment of a secondary uplink stream when it is determined that pending uplink data packets which would not be carried by said primary uplink stream would not sufficiently utilise a capacity provided by said secondary uplink stream within said transmission time interval, said prevention logic being operable to determine the insufficient utilisation of the capacity provided by a secondary uplink stream when a transport block size of said secondary stream fails to achieve a threshold amount.


     


    Ansprüche

    1. Ein Verfahren zur Steuerung einer Uplink-Mehrfach-Eingabe/Mehrfach-Ausgabe-Übertragung zwischen einem Benutzergerät und einer Basisstation eines Drahtlos-Kommunikationsnetzwerks, wobei dieses Verfahren folgende Schritte umfasst:

    Identifizieren (S2), ob auf einem primären Uplink-Stream eine unzureichende Kapazität vorhanden ist, um aller für die Übertragung ausstehenden Uplink-Datenpakete innerhalb eines Übertragungszeitintervalls überzutragen;

    und gekennzeichnet dadurch, dass

    wenn unzureichende Kapazität vorhanden ist, Verhindern (S4, S3) des Aufbaus eines sekundären Uplink-Streams, wenn festgelegt ist, dass die ausstehenden Uplink-Datenpakete, die vom primären Uplink-Stream nicht übertragen werden könnten, die Kapazität des sekundären Uplink-Streams innerhalb des Übertragungszeitintervalls nicht ausreichend nutzen würden, wobei die unzureichende Nutzung der Kapazität eines sekundären Uplink-Streams bestimmt wird, wenn eine Transportblockgröße des sekundären Streams einen Schwellenwert nicht erreicht.


     
    2. Das Verfahren nach Anspruch 1, wobei der sekundäre Uplink-Stream seine Kapazität nicht ausreichend nutzen würde, wenn ferner festgelegt ist, dass die ausstehenden Uplink-Datenpakete, die vom primären Uplink-Stream nicht übertragen werden könnten, über den primären Uplink-Stream innerhalb eines einzigen Übertragungszeitintervalls übertragbar sind.
     
    3. Das Verfahren nach Anspruch 1, wobei der sekundäre Uplink-Stream seine Kapazität nicht ausreichend nutzen würde, wenn ferner festgelegt ist, dass ein Unterschied in der Anzahl der ausstehenden Datenpakete, die vom primären Stream und vom sekundären Stream übertragen werden könnten, einen Schwellenwert überschreitet.
     
    4. Das Verfahren nach Anspruch 1, wobei der sekundäre Uplink-Stream seine Kapazität nicht ausreichend nutzen würde, wenn ferner festgelegt ist, dass eine Anzahl an ausstehenden Datenpaketen, die vom sekundären Stream übertragen werden könnte, einen Schwellenwert nicht erreicht.
     
    5. Das Verfahren nach Anspruch 1, wobei der sekundäre Uplink-Stream seine Kapazität nicht ausreichend nutzen würde, wenn ferner festgelegt ist, dass ein Unterschied zwischen einer Transportblockgröße des primären Streams und der Transportblockgröße des sekundären Streams einen Schwellenwert überschreitet.
     
    6. Das Verfahren nach Anspruch 1, wobei, wenn der primäre Uplink-Stream und der sekundäre Uplink-Stream eine identische Modulation verwenden, der sekundäre Uplink-Stream seine Kapazität nicht ausreichend nutzen würde, wenn ferner festgelegt ist, dass ein Unterschied in der Coderate des primären Streams und einer Coderate des sekundären Streams einen Schwellenwert überschreitet.
     
    7. Das Verfahren nach Anspruch 1, wobei, wenn der primäre Uplink-Stream und der sekundäre Uplink-Stream eine identische Modulation verwenden, der sekundäre Uplink-Stream seine Kapazität nicht ausreichend nutzen würde, wenn ferner festgelegt ist, dass eine Coderate des sekundären Streams einen Schwellenwert nicht erreicht.
     
    8. Das Verfahren nach Anspruch 1, wobei, wenn der primäre Uplink-Stream und der sekundäre Uplink-Stream eine unterschiedliche Modulation verwenden, der sekundäre Uplink-Stream seine Kapazität nicht ausreichend nutzen würde, wenn ferner festgelegt ist, dass ein Unterschied in einem Produkt von einer Modulationsreihenfolge und einer Coderate des primären Streams und einem Produkt von einer Modulationsreihenfolge und einer Coderate des sekundären Streams einen Schwellenwert überschreitet.
     
    9. Das Verfahren nach einem der vorstehenden Ansprüche, wobei, wenn der primäre Uplink-Stream und der sekundäre Uplink-Stream eine unterschiedliche Modulation verwenden, der sekundäre Uplink-Stream seine Kapazität nicht ausreichend nutzen würde, wenn ferner festgelegt ist, dass ein Produkt von einer Modulationsreihenfolge und einer Coderate des sekundären Streams einen Schwellenwert nicht erreicht.
     
    10. Das Verfahren nach einem der Ansprüche 1, 3 bis 9, das einen Schritt zum Erhalten des Schwellenwerts von einem Netzwerkknoten umfasst.
     
    11. Das Verfahren nach einem der vorstehenden Ansprüche, wobei der Schritt zum Verhindern des Aufbaus eines sekundären Uplink-Streams Übertragungen von Rang zwei verhindert.
     
    12. Ein Computerprogramm-Produkt, das bei Ausführen auf einem Computer eingesetzt werden kann, um die Schritte des Verfahrens nach einem der Ansprüche 1 bis 11 durchzuführen.
     
    13. Benutzergerät, das eingesetzt werden kann, um die Uplink-Mehrfach-Eingabe/Mehrfach-Ausgabe-Übertragung mit einer Basisstation eines Drahtlos-Kommunikationsnetzwerks zu steuern, wobei das Benutzergerät Folgendes umfasst:

    Identifikationslogik, die eingesetzt werden kann, um zu identifizieren, ob auf einem primären Uplink-Stream eine unzureichende Kapazität vorhanden ist, um aller für die Übertragung ausstehenden Uplink-Datenpakete innerhalb eines Übertragungszeitintervalls überzutragen; und gekennzeichnet durch

    Präventionslogik, die eingesetzt werden kann, wenn unzureichende Kapazität vorhanden ist, um den Aufbau eines sekundären Uplink-Streams zu verhindern, wenn festgelegt ist, dass die ausstehenden Uplink-Datenpakete, die vom primären Uplink-Stream nicht übertragen werden könnten, die Kapazität des sekundären Uplink-Streams innerhalb des Übertragungszeitintervalls nicht ausreichend nutzen würden, wobei die Präventionslogik eingesetzt werden kann, um eine unzureichende Nutzung der Kapazität eines sekundären Uplink-Streams zu bestimmen, wenn eine Transportblockgröße des sekundären Streams einen Schwellenwert nicht erreicht.


     


    Revendications

    1. Procédé de contrôle d'une transmission en liaison montante à plusieurs entrées et plusieurs sorties entre un équipement utilisateur et une station de base d'un réseau de communication sans fil, dans lequel ledit procédé comprend les étapes suivantes :

    identifier (S2) si une capacité insuffisante existe sur un flux de liaison montante principal afin d'acheminer pendant un intervalle de temps de transmission tous les paquets de données de liaison montante en attente de transmission ;

    et caractérisé en ce que,

    si une capacité insuffisante existe, empêcher (S4, S3) la création d'un flux de liaison montante secondaire lorsqu'il est déterminé que les paquets de données de liaison montante en attente qui ne seront pas acheminés par ledit flux de liaison montante principal n'utiliseront pas suffisamment une capacité fournie par ledit flux de liaison montante secondaire pendant ledit intervalle de temps de transmission, dans lequel l'utilisation insuffisante de la capacité fournie par un flux de liaison montante secondaire est déterminée lorsqu'une taille de bloc de transport dudit flux secondaire n'atteint pas une quantité de seuil.


     
    2. Procédé selon la revendication 1, dans lequel ledit flux de liaison montante secondaire n'utilise pas suffisamment sa capacité lorsqu'il est en outre déterminé que lesdits paquets de données de liaison montante en attente qui ne peuvent pas être acheminés par ledit flux de liaison montante principal peuvent être transmis sur ledit flux de liaison montante principal pendant un seul intervalle de temps de transmission.
     
    3. Procédé selon la revendication 1, dans lequel ledit flux de liaison montante secondaire n'utilise pas suffisamment sa capacité lorsqu'il est en outre déterminé qu'une différence de nombre de paquets de données en attente qui ne seront pas acheminés par ledit flux principal et par ledit flux secondaire dépasse une quantité de seuil.
     
    4. Procédé selon la revendication 1, dans lequel ledit flux de liaison montante secondaire n'utilise pas suffisamment sa capacité lorsqu'il est en outre déterminé qu'un nombre de paquets de données en attente qui seront acheminés par ledit flux secondaire n'atteint pas une quantité de seuil.
     
    5. Procédé selon la revendication 1, dans lequel ledit flux de liaison montante secondaire n'utilise pas suffisamment sa capacité lorsqu'il est en outre déterminé qu'une différence entre une taille de bloc de transport dudit flux principal et la taille de bloc de transport dudit flux secondaire dépasse une quantité de seuil.
     
    6. Procédé selon la revendication 1, dans lequel, lorsque ledit flux de liaison montante principal et ledit flux de liaison montante secondaire utilisent une modulation identique, ledit flux de liaison montante secondaire n'utilise pas suffisamment sa capacité lorsqu'il est en outre déterminé qu'une différence de taux de codage dudit flux principal et de taux de codage dudit flux secondaire dépasse une quantité de seuil.
     
    7. Procédé selon la revendication 1, dans lequel, lorsque ledit flux de liaison montante principal et ledit flux de liaison montante secondaire utilisent une modulation identique, ledit flux de liaison montante secondaire n'utilise pas suffisamment sa capacité lorsqu'il est en outre déterminé qu'un taux de codage dudit flux secondaire n'atteint pas une quantité de seuil.
     
    8. Procédé selon la revendication 1, dans lequel, lorsque ledit flux de liaison montante principal et ledit flux de liaison montante secondaire utilisent une modulation différente, ledit flux de liaison montante secondaire n'utilise pas suffisamment sa capacité lorsqu'il est en outre déterminé qu'une différence de produit d'un ordre de modulation et d'un taux de codage dudit flux principal et de produit d'un ordre de modulation et d'un taux de codage dudit flux secondaire dépasse une quantité de seuil.
     
    9. Procédé selon l'une quelconque des revendications précédentes, dans lequel, lorsque ledit flux de liaison montante principal et ledit flux de liaison montante secondaire utilisent une modulation différente, ledit flux de liaison montante secondaire n'utilise pas suffisamment sa capacité lorsqu'il est en outre déterminé qu'un produit d'un ordre de modulation et d'un taux de codage dudit flux secondaire n'atteint pas une quantité de seuil.
     
    10. Procédé selon l'une quelconque des revendications 1, 3 à 9, qui comprend l'étape de réception de ladite quantité de seuil de la part d'un nœud de réseau.
     
    11. Procédé selon l'une quelconque des revendications précédentes, dans lequel ladite étape d'empêchement de la création d'un flux de liaison montante secondaire empêche les transmissions de niveau 2.
     
    12. Programme informatique capable, lorsqu'il est exécuté sur un ordinateur, d'exécuter le procédé selon l'une quelconque des revendications 1 à 11.
     
    13. Équipement utilisateur capable de contrôler une transmission en liaison montante à plusieurs entrées et plusieurs sorties avec une station de base d'un réseau de communication sans fil, dans lequel ledit équipement utilisateur comprend :

    une logique d'identification capable d'identifier si une capacité insuffisante existe sur un flux de liaison montante principal afin d'acheminer pendant un intervalle de temps de transmission tous les paquets de données de liaison montante en attente de transmission ; et caractérisé par

    une logique d'empêchement capable, si une capacité insuffisante existe, d'empêcher la création d'un flux de liaison montante secondaire lorsqu'il est déterminé que les paquets de données de liaison montante en attente qui ne seront pas acheminés par ledit flux de liaison montante principal n'utiliseront pas suffisamment une capacité fournie par ledit flux de liaison montante secondaire pendant ledit intervalle de temps de transmission, dans lequel ladite logique d'empêchement est capable de déterminer l'utilisation insuffisante de la capacité fournie par un flux de liaison montante secondaire lorsqu'une taille de bloc de transport dudit flux secondaire n'atteint pas une quantité de seuil.


     




    Drawing








    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description