(19)
(11)EP 3 010 301 A1

(12)EUROPEAN PATENT APPLICATION

(43)Date of publication:
20.04.2016 Bulletin 2016/16

(21)Application number: 15190259.0

(22)Date of filing:  16.10.2015
(51)International Patent Classification (IPC): 
H04W 72/08(2009.01)
H04W 72/04(2009.01)
(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
MA

(30)Priority: 17.10.2014 US 201462065219 P
17.10.2014 US 201462065249 P
13.10.2015 US 201514881771

(71)Applicant: ASUSTeK Computer Inc.
Peitou, Taipei 112 (TW)

(72)Inventors:
  • OU, Meng-Hui
    112 Taipei City (TW)
  • LI, Ming-Che
    112 Taipei City (TW)
  • GUO, Yu-Hsuan
    112 Taipei City (TW)

(74)Representative: Hoefer & Partner Patentanwälte mbB 
Pilgersheimer Straße 20
81543 München
81543 München (DE)

  


(54)METHOD AND APPARATUS FOR IMPROVING RESOURCE CONTROL IN A WIRELESS COMMUNICATION SYSTEM


(57) Methods and apparatuses are disclosed for improving resource control and device to device (D2D) transmission in a wireless communication system. In one method, a device receives a configuration including at least a first contention-based resource pool and a second contention-based resource pool, wherein the first contention-based resource pool includes resources for multiplexing D2D transmission(s) and Downlink (DL) transmission(s) in power domain, and the second contention-based resource pool does not include the resources for multiplexing D2D transmission(s) and DL transmission(s) in power domain. The device also receives at least one threshold value related to a power. The device then selects the first contention-based resource pool or the second contention-based resource pool for D2D transmission based on at least the threshold value.




Description

CROSS-REFERENCE TO RELATED APPLICATIONS



[0001] The present Application claims the benefit of U.S. Provisional Patent Application Serial No. 62/065,219 filed on October 17, 2014 and U.S. Provisional Patent Application Serial No. 62/065,249 filed on October 17, 2014, the entire disclosures of which are incorporated herein by reference.

FIELD



[0002] This disclosure generally relates to wireless communication networks, and more particularly, to a method and apparatus for improving resource control and device to device (D2D) transmission in a wireless communication system.

BACKGROUND



[0003] With the rapid rise in demand for communication of large amounts of data to and from mobile communication devices, traditional mobile voice communication networks are evolving into networks that communicate with Internet Protocol (IP) data packets. Such IP data packet communication can provide users of mobile communication devices with voice over IP, multimedia, multicast and on-demand communication services.

[0004] An exemplary network structure for which standardization is currently taking place is an Evolved Universal Terrestrial Radio Access Network (E-UTRAN). The E-UTRAN system can provide high data throughput in order to realize the above-noted voice over IP and multimedia services. The E-UTRAN system's standardization work is currently being performed by the 3GPP standards organization. Accordingly, changes to the current body of 3GPP standard are currently being submitted and considered to evolve and finalize the 3GPP standard.

SUMMARY



[0005] The invention is defined in the independent claims. The dependent claims define preferred embodiments. Methods and apparatuses are disclosed for improving resource control and device to device transmission in a wireless communication system. In one method, a device receives a configuration including at least a first contention-based resource pool and a second contention-based resource pool, wherein the first contention-based resource pool includes resources for multiplexing D2D transmission(s) and Downlink (DL) transmission(s) in power domain, and the second contention-based resource pool does not include the resources for multiplexing D2D transmission(s) and DL transmission(s) in power domain. The device also receives at least one threshold value related to a power. The device then selects the first contention-based resource pool or the second contention-based resource pool for D2D transmission based on at least the threshold value.

BRIEF DESCRIPTION OF THE DRAWINGS



[0006] 

FIG. 1 shows a diagram of a wireless communication system according to one exemplary embodiment.

FIG. 2 is a block diagram of a transmitter system (also known as access network) and a receiver system (also known as user equipment or UE) according to one exemplary embodiment.

FIG. 3 is a functional block diagram of a communication system according to one exemplary embodiment.

FIG. 4 is a functional block diagram of the program code of FIG. 3 according to one exemplary embodiment.

FIG. 5 is a reproduction of a Network topology shown in METIS Deliverable D2.3, "Components of a new air interface - building blocks and performance".

FIG. 6 is a flow diagram according to one exemplary embodiment.

FIG. 7 is a flow diagram according to another exemplary embodiment.

FIG. 8 is a flow diagram according to yet another exemplary embodiment.

FIG. 9 is a diagram illustrating signaling flow according to one exemplary embodiment.

FIG. 10 is diagram illustrating signaling flow according to one exemplary embodiment.


DETAILED DESCRIPTION



[0007] The exemplary wireless communication systems and devices described below employ a wireless communication system, supporting a broadcast service. Wireless communication systems are widely deployed to provide various types of communication such as voice, data, and so on. These systems may be based on code division multiple access (CDMA), time division multiple access (TDMA), orthogonal frequency division multiple access (OFDMA), 3GPP LTE (Long Term Evolution) wireless access, 3GPP LTE-A or LTE-Advanced (Long Term Evolution Advanced), 3GPP2 UMB (Ultra Mobile Broadband), WiMax, or some other modulation techniques.

[0008] In particular, the exemplary wireless communication systems devices described below may be designed to the wireless technology discussed in various documents of the Mobile and wireless communications Enablers for Twenty-twenty (2020) Information Society (METIS) project, including: N. Pratas, P. Popovski, "Underlay of Low-Rate Machine-Type D2D Links on Downlink Cellular Links", ICC 2014 Workshop, June 10-14, 2014, Sydney, Australia;METIS Deliverable D2.1, "Requirement analysis and design approaches for 5G air interface"; METIS Deliverable D2.2, "Novel radio link concepts and state of the art analysis"; METIS Deliverable D2.3, "Components of a new air interface - building blocks and performance".

[0009] Furthermore, the exemplary wireless communication systems devices described below may be designed to support one or more standards such as the standard offered by a consortium named "3rd Generation Partnership Project" referred to herein as 3GPP, including: 3GPP TR 23.887 V12.0.0, "Study on Machine-Type Communications (MTC) and other mobile data applications communications enhancements"; 3GPP TR 36.843 V12.0.1, "Study on LTE device to device proximity services; Radio aspects"; 3GPP TS 36.300 V12.3.0, "E-UTRA and E-UTRAN; Overall description; Stage 2"; 3GPP TS 36.321 V12.3.0, "E-UTRA; MAC protocol specification"; 3GPP TS 36.331 V12.3.0, "E-UTRA; RRC protocol specification"; and 3GPP R2-144542, "Introduction of ProSe." The standards and documents listed above are hereby expressly incorporated by reference in their entirety.

[0010] FIG. 1 shows a multiple access wireless communication system according to one embodiment of the invention. An access network 100 (AN) includes multiple antenna groups, one including 104 and 106, another including 108 and 110, and an additional including 112 and 114. In FIG. 1, only two antennas are shown for each antenna group, however, more or fewer antennas may be utilized for each antenna group. Access terminal 116 (AT) is in communication with antennas 112 and 114, where antennas 112 and 114 transmit information to access terminal 116 over forward link 120 and receive information from access terminal 116 over reverse link 118. Access terminal (AT) 122 is in communication with antennas 106 and 108, where antennas 106 and 108 transmit information to access terminal (AT) 122 over forward link 126 and receive information from access terminal (AT) 122 over reverse link 124. In a FDD system, communication links 118, 120, 124 and 126 may use different frequency for communication. For example, forward link 120 may use a different frequency then that used by reverse link 118.

[0011] Each group of antennas and/or the area in which they are designed to communicate is often referred to as a sector of the access network. In the embodiment, antenna groups each are designed to communicate to access terminals in a sector of the areas covered by access network 100.

[0012] In communication over forward links 120 and 126, the transmitting antennas of access network 100 may utilize beamforming in order to improve the signal-to-noise ratio of forward links for the different access terminals 116 and 122. Also, an access network using beamforming to transmit to access terminals scattered randomly through its coverage causes less interference to access terminals in neighboring cells than an access network transmitting through a single antenna to all its access terminals.

[0013] An access network (AN) may be a fixed station or base station used for communicating with the terminals and may also be referred to as an access point, a Node B, a base station, an enhanced base station, an evolved Node B (eNB), or some other terminology. An access terminal (AT) may also be called user equipment (UE), a wireless communication device, terminal, access terminal or some other terminology.

[0014] FIG. 2 is a simplified block diagram of an embodiment of a transmitter system 210 (also known as the access network) and a receiver system 250 (also known as access terminal (AT) or user equipment (UE)) in a MIMO system 200. At the transmitter system 210, traffic data for a number of data streams is provided from a data source 212 to a transmit (TX) data processor 214.

[0015] In one preferred embodiment, each data stream is transmitted over a respective transmit antenna. TX data processor 214 formats, codes, and interleaves the traffic data for each data stream based on a particular coding scheme selected for that data stream to provide coded data.

[0016] The coded data for each data stream may be multiplexed with pilot data using OFDM techniques. The pilot data is typically a known data pattern that is processed in a known manner and may be used at the receiver system to estimate the channel response. The multiplexed pilot and coded data for each data stream is then modulated (i.e., symbol mapped) based on a particular modulation scheme (e.g., BPSK, QPSK, M-PSK, or M-QAM) selected for that data stream to provide modulation symbols. The data rate, coding, and modulation for each data stream may be determined by instructions performed by processor 230.

[0017] The modulation symbols for all data streams are then provided to a TX MIMO processor 220, which may further process the modulation symbols (e.g., for OFDM). TX MIMO processor 220 then provides NT modulation symbol streams to NT transmitters (TMTR) 222a through 222t. In certain embodiments, TX MIMO processor 220 applies beamforming weights to the symbols of the data streams and to the antenna from which the symbol is being transmitted.

[0018] Each transmitter 222 receives and processes a respective symbol stream to provide one or more analog signals, and further conditions (e.g., amplifies, filters, and upconverts) the analog signals to provide a modulated signal suitable for transmission over the MIMO channel. NT modulated signals from transmitters 222a through 222t are then transmitted from NT antennas 224a through 224t, respectively.

[0019] At receiver system 250, the transmitted modulated signals are received by NR antennas 252a through 252r and the received signal from each antenna 252 is provided to a respective receiver (RCVR) 254a through 254r. Each receiver 254 conditions (e.g., filters, amplifies, and downconverts) a respective received signal, digitizes the conditioned signal to provide samples, and further processes the samples to provide a corresponding "received" symbol stream.

[0020] An RX data processor 260 then receives and processes the NR received symbol streams from NR receivers 254 based on a particular receiver processing technique to provide NT "detected" symbol streams. The RX data processor 260 then demodulates, deinterleaves, and decodes each detected symbol stream to recover the traffic data for the data stream. The processing by RX data processor 260 is complementary to that performed by TX MIMO processor 220 and TX data processor 214 at transmitter system 210.

[0021] A processor 270 periodically determines which pre-coding matrix to use (discussed below). Processor 270 formulates a reverse link message comprising a matrix index portion and a rank value portion.

[0022] The reverse link message may comprise various types of information regarding the communication link and/or the received data stream. The reverse link message is then processed by a TX data processor 238, which also receives traffic data for a number of data streams from a data source 236, modulated by a modulator 280, conditioned by transmitters 254a through 254r, and transmitted back to transmitter system 210.

[0023] At transmitter system 210, the modulated signals from receiver system 250 are received by antennas 224, conditioned by receivers 222, demodulated by a demodulator 240, and processed by a RX data processor 242 to extract the reserve link message transmitted by the receiver system 250. Processor 230 then determines which pre-coding matrix to use for determining the beamforming weights then processes the extracted message.

[0024] Turning to FIG. 3, this figure shows an alternative simplified functional block diagram of a communication device according to one embodiment of the invention. As shown in FIG. 3, the communication device 300 in a wireless communication system can be utilized for realizing the UEs (or ATs) 116 and 122 in FIG. 1 or the base station (or AN) 100 in FIG. 1, and the wireless communications system is preferably the LTE system. The communication device 300 may include an input device 302, an output device 304, a control circuit 306, a central processing unit (CPU) 308, a memory 310, a program code 312, and a transceiver 314. The control circuit 306 executes the program code 312 in the memory 310 through the CPU 308, thereby controlling an operation of the communications device 300. The communications device 300 can receive signals input by a user through the input device 302, such as a keyboard or keypad, and can output images and sounds through the output device 304, such as a monitor or speakers. The transceiver 314 is used to receive and transmit wireless signals, delivering received signals to the control circuit 306, and outputting signals generated by the control circuit 306 wirelessly. The communication device 300 in a wireless communication system can also be utilized for realizing the AN 100 in FIG. 1.

[0025] FIG. 4 is a simplified block diagram of the program code 312 shown in FIG. 3 in accordance with one embodiment of the invention. In this embodiment, the program code 312 includes an application layer 400, a Layer 3 portion 402, and a Layer 2 portion 404, and is coupled to a Layer 1 portion 406. The Layer 3 portion 402 generally performs radio resource control. The Layer 2 portion 404 generally performs link control. The Layer 1 portion 406 generally performs physical connections.

[0026] For LTE or LTE-A systems, the Layer 2 portion 404 may include a Radio Link Control (RLC) layer and a Medium Access Control (MAC) layer. The Layer 3 portion 402 may include a Radio Resource Control (RRC) layer.

[0027] Generally, machine type communication (MTC) and device-to-device (D2D) communication are both considered as emerging technology trends in future communication system. In 3GPP, these two types of communications have been taken into account for the design of LTE-A system as described in 3GPP TR 23.887 V12.0.0 and 3GPP TR 36.843 V12.0.1. The overall architecture of LTE/LTE-A is described in 3GPP TS 36.300 V12.3.0.

[0028] In METIS 2020 Project (https://www.metis2020.com), Massive Machine Communication (MMC) and direct device-to-device (D2D) communication have also been identified as two of the horizontal topics (HTs) that would be investigated in several work packages (WPs) of METIS.

[0029] Among the Work Packages (WPs) of METIS, WP2 takes care of radio link concepts, and various radio link related research topics have been identified including optimized signaling for low-cost MMC devices (SIG-MMC) (See METIS Deliverable D2.1). And according to section 2.2.1 of METIS Deliverable 2.2:

The MMC devices are expected to be low-cost, which implies that these will have reduced transceiver complexity such as lower transmission power, single antenna, reduced RF bandwidth, and low baseband computational power. All these factors will introduce a reduction of the coverage; therefore there is the need to investigate low-cost enhancements for improving the coverage, which can range from alternative transmission schemes to the use of aggregation devices. This motivates the recourse to alternative approaches that can take advantage of legacy systems (such as the paging network) to achieve large scale downlink coverage for MMC and the use of the coordinated relay and device-to-device paradigm to enable reliable uplink coverage for MMC and efficient coexistence with non-MMC devices.



[0030] Furthermore, in technology component cluster (TeCC) #2 of METIS Deliverable 2.3, "MMC type D2D links" is the solution proposed currently for low-cost MMC devices:

MTC devices (MTDs) pose new challenges to the cellular network, such as low transmission power and massive access that can lead to overload of the radio interface. In this research track we explore the opportunity opened by D2D links for supporting Low-rate Low-power MTDs that are connected to a nearby device, such as an on-body MTD connected to a mobile phone that acts as a relay towards a Base Station.



[0031] According to a research paper entitled "Underlay of low-rate machine-type D2D links on downlink cellular links" by N. Pratas and P. Popovski, the MTC device which is suitable for using D2D links may have following characteristics: constrained battery life; delay tolerant (e.g. non-threatening life condition); in close proximity to a smart phone; and requires low rate and a very low transmission power, insufficient to connect directly to the base station.

[0032] The low-rate requirement for the MTD-D2D connection allows underlay operation with Successive Interference Cancellation (SIC) during the cellular downlink transmissions. The MTD signal can be decoded after cancelling the interference caused by the downlink signal from the based station.

[0033] As an example, FIG. 5 shows a D2D transmission from a MTD M1 to a cellular device U1 can be an underlay transmission that occurs simultaneously with a downlink transmission from a base station B to another cellular device U2 using the same resource in the same frequency and in the same time. The M1-U1 transmission is interfered by the B-U2 transmission, while it is assumed that there is no interference from M1 to any cellular device due to the very low transmission power. The low rate and the low transmission power of M1 may allow U1 to successfully decode the downlink transmission B-U2, cancel it, and then attempt to decode the signal from M1.

[0034] The results of analysis in the Pratas et al. paper show the possibility for low power and fixed rate Machine-Type devices to share the air interface with normal cellular devices, but there can be a rate penalty for the cellular users. The results show that the cellular transmissions directed to distant (e.g. cell-edge located) cellular devices that due to the pathloss attenuation lead to lower achievable rates are seen as good candidates to be underlay by machine-type D2D links.

[0035] In LTE, network can use a control signaling, e.g. via PDCCH, indicating either a downlink (DL) transmission or resource for a uplink (UL) transmission as described in 3GPP TS 36.300 V12.3.0:

11.1.1 Downlink Scheduling
In the downlink, E-UTRAN can dynamically allocate resources (PRBs and MCS) to UEs at each TTI via the C-RNTI on PDCCH(s). A UE always monitors the PDCCH(s) in order to find possible allocation when its downlink reception is enabled (activity governed by DRX when configured).
[...]

11.1.2 Uplink Scheduling
In the uplink, E-UTRAN can dynamically allocate resources (PRBs and MCS) to UEs at each TTI via the C-RNTI on PDCCH(s). A UE always monitors the PDCCH(s) in order to find possible allocation for uplink transmission when its downlink reception is enabled (activity governed by DRX when configured).



[0036] The method disclosed in METIS Deliverable D2.2 and D2.3 provides the possibility for a device to device (D2D) signal to reuse the same resource in the same timing as used by a downlink (DL) signal. If a pair of the D2D signal and the DL signal can be selected properly, throughput can be increased because the same resource is used by two transmissions simultaneously with the aid of Successive Interference Cancellation (SIC). In addition to a machine-type D2D transmission, a normal D2D transmission (e.g. non-machine-type D2D) can also apply the same technique. In other words, D2D transmission can be performed using the same resource of DL transmission simultaneously with the aid of SIC regardless of whether the D2D transmission is machine-type or not.

[0037] A D2D resource needs to be allocated to a D2D device to perform a D2D transmission. The D2D resource may be contention-based or non-contention-based. For a contention-based resource, it may be allocated via a dedicated signaling or a broadcast signaling. For example, a resource pool can be configured using broadcast signaling, and a D2D device selects a resource from the resource pool for D2D transmission. However, if a technique such as SIC to multiplex D2D transmission and DL transmission in a power domain is used, the D2D resource allocation requires further control since not all D2D transmissions are suitable to be multiplexed with DL transmission in power domain and share the same time/frequency resource due to power ratio constraint to perform SIC successfully. The technique of multiplexing D2D transmission and DL transmission in a power domain may require a D2D receiver to decode a DL transmission from the received signal (and cancel the DL transmission from the received signal) before decoding a D2D transmission.

[0038] In order to control the resource properly, there should be a differentiation between the resource for D2D transmission which may be multiplexed with DL transmission in a power domain and the resource for D2D transmission which is not to be multiplexed with DL transmission in power domain. Otherwise, a base station cannot identify which D2D resource can be used for DL transmission. One possibility is that these two types of resources are differentiated using at least two different resource pools. Even with differentiation, a further issue which needs to be solved is how a D2D device determines which type of resources to select.

[0039] In the various embodiments disclosed herein, resources to be used for D2D transmission(s) and DL transmission(s) multiplexed in the power domain are differentiated from resources not to be used for D2D transmission(s) and DL transmission(s) multiplexed in the power domain. A D2D device uses a threshold to select which type of resource is used for the D2D transmission. For example, a first resource pool is configured for D2D resources to be reused with DL transmission, and a second resource pool is configured for a D2D resource dedicated to a D2D transmission.

[0040] In one preferred embodiment, a second device provides an indication to a first device based on the threshold. The indication may indicate whether the first device should select a first resource or a second resource. Alternatively, the indication may indicate whether a measured result or a computed result exceeds the threshold or not. Preferably the first device may be a transmitter of a D2D transmission and the second device may be a receiver of the D2D transmission. A measured result or a computed result is compared with the threshold. Preferably or alternatively a received power of a D2D transmission is taken into account. For example, the received power of a D2D transmission is compared with the threshold. Further preferably or alternatively a received power of a DL transmission is taken into account. For example, the received power of a DL transmission is compared with the threshold. Further preferably or alternatively a ratio of the received power of the D2D transmission and the received power of the DL transmission is compared with the threshold. More specifically, the indication indicates that the first resource should be selected if the measured result or the computed result exceeds the threshold. The indication indicates that the second resource should be selected if the measured result or the computed result does not exceed the threshold.

[0041] In general, the threshold value is configured by a network node, e.g. via broadcast signaling, system information, or dedicated signaling. Preferably the threshold value is related to a received power. Additionally or alternatively preferably, the threshold value is related to one of more of the following: Signal to Interference plus Noise Ratio (SINR), Reference Signal Received Power (RSRP), Reference Signal Receive Quality (RSRQ), or pathloss. The received power (or SINR, RSRP, RSRQ, pathloss) value may be for a DL transmission or a D2D transmission. Alternatively, the threshold value is related to a ratio of a received power (or SINR, RSRP, RSRQ, pathloss) between a DL transmission and a D2D transmission.

[0042] Preferably the first resource for D2D transmission is multiplexed with DL transmission in the power domain. The second resource is not multiplexed with DL transmission in the power domain. The first resource may belong to a first resource pool which may be multiplexed with DL transmission in the power domain. The second resource may belong to a second resource pool not to be multiplexed with DL transmission in the power domain. Additionally, the first resource is contention-based. The second resource is contention-based.

[0043] FIG. 6 is a flow chart 600 according to one exemplary embodiment from the perspective of a device. In Step 602, a device receives a configuration including at least a first contention-based resource pool and a second contention-based resource pool. At step 604, the device receives at least one threshold value related to power. At step 606, the device provides an indication to another device based on at least the threshold value.

[0044] FIG. 7 is a flow chart 700 according to another exemplary embodiment from the perspective of a network node. In Step 702, the network node configures a device with a first contention-based resource pool and a second contention-based resource pool for D2D transmission. At step 704, the network node configures the device with at least one threshold value related to power. At step 706, the network node transmits a signaling including information related to SIC to the device, wherein the information associated with the first contention-based resource pool but not the second contention-based resource pool.

[0045] FIG. 8 is a flow chart 800 according to yet another exemplary embodiment from the perspective of a device. In Step 802, a device receives a configuration including at least a first contention-based resource pool and a second contention-based resource pool. At step 804, the device received at least one threshold value related to power. At step 806, the device determines which contention-based resource pool(s) to monitor based on at least the threshold value.

[0046] FIG. 9 illustrates one exemplary embodiment of signal flow in a network 900. As shown in FIG. 9, there is a network node 902 in communication with first, second, and third devices 904, 906, 908. As shown in FIG. 9, a resource pool configuration is sent to the first and second devices 904, 906. An indication is sent from the second device 906 to the first device 904. The first device 904 performs a resource selection. As discussed in previous embodiments, the first device 904 selects a type of resource for transmitting D2D transmission based on the indication and the second device 906 uses a threshold to select which type of resource is used for monitoring the D2D transmission. As shown in FIG. 9, the first device 904 sends a D2D transmission to the second device 906 on the same resource that is used by the network node 902 to send DL transmissions.

[0047] In one exemplary method for resource control, a device receives a configuration including at least a first contention-based resource pool and a second contention-based resource pool. The device also receives at least one threshold value related to a power. The device then uses the threshold value to select the first contention-based resource pool or the second contention-based resource pool for D2D transmission.

[0048] In another exemplary method for resource control, a device receives a configuration including at least a first contention-based resource pool and a second contention-based resource pool. The device also receives at least one threshold value related to a power. The device then determines which contention-based resource pool(s) to monitor based on at least the threshold value.

[0049] In one embodiment, the first contention-based resource pool is monitored if a measured (or computed) result exceeds the threshold value. The second contention-based resource pool is monitored if a measured (or computed) result doesn't exceed the threshold. Preferably both the first contention-based resource pool and the second contention-based resource pool are monitored if the measured (or computed) result exceeds the threshold. Alternatively preferably, both the first contention-based resource pool and the second contention-based resource pool are monitored if the measured (or computed) result doesn't exceed the threshold.

[0050] In another exemplary method for resource control in a wireless communication system, the method includes a second device receiving a configuration including at least a first contention-based resource pool and a second contention-based resource pool. The second device also receives at least one threshold value related to a power. The second device then determines providing an indication to a first device based on at least the threshold value.

[0051] In another exemplary method for resource control in a wireless communication system, the method includes a network node configuring a second device with a first contention-based resource pool and a second contention-based resource pool for transmission. The method further includes transmitting, by the network node, a signaling including information related to Successive Interference Cancellation (SIC) to the second device, wherein the information is associated with the first contention-based resource pool but not associated with the second contention-based resource pool.

[0052] In these exemplary methods described above, the first contention-based resource pool is configured for D2D resources to be reused with DL transmission. More specifically, the D2D transmission using a resource of the first contention-based resource pool is multiplexed with DL transmission in power domain. In other words, the second device needs to decode a DL transmission before decoding the D2D transmission when the D2D transmission and the DL transmission use the same resource of the first contention-based resource pool. On the other hand, the second contention-based resource pool is configured for D2D resources dedicated to D2D transmission. More specifically, the D2D transmission using a resource of the second contention-based resource pool is not multiplexed with DL transmission in power domain. In other words, the second device does not need to decode a DL transmission before decoding the D2D transmission when the D2D transmission uses a resource of the second contention-based resource pool. Preferably the threshold value is configured together with the first contention-based resource pool and the second contention-based resource pool.

[0053] Referring back to FIGS. 3 and 4, in one embodiment from the perspective of a device, the device 300 includes a program code 312 stored in memory 310. The CPU 308 could execute program code 312 (i) to receive a configuration including at least a first contention-based resource pool and a second contention-based resource pool, wherein the first contention-based resource pool is configured for D2D resources to be reused with downlink transmission and the second contention-based resource pool is configured for D2D resources dedicated to D2D transmission, (ii) to receive at least one threshold value related to a power, and (iii) to use the threshold value to select the first contention-based resource pool or the second contention-based resource pool for D2D transmission. In addition, the CPU 308 can execute the program code 312 to perform all of the above-described actions and steps or others described herein.

[0054] Referring back to FIGS. 3 and 4, in one embodiment from the perspective of a device, the device 300 includes a program code 312 stored in memory 310. The CPU 308 could execute program code 312 (i) to receive a configuration including at least a first contention-based resource pool and a second contention-based resource pool, wherein the first contention-based resource pool is configured for D2D resources to be reused with downlink transmission and the second contention-based resource pool is configured for D2D resources dedicated to D2D transmission, (ii) to receive at least one threshold value related to a power, and (iii) to determine which contention-based resource pool to monitor based on at least the threshold value. In addition, the CPU 308 can execute the program code 312 to perform all of the above-described actions and steps or others described herein.

[0055] Referring back to FIGS. 3 and 4, in one embodiment from the perspective of a second device, the device 300 includes a program code 312 stored in memory 310. The CPU 308 could execute program code 312 (i) to receive a configuration including at least a first contention-based resource pool and a second contention-based resource pool, wherein the first contention-based resource pool is configured for D2D resources to be reused with downlink transmission and the second contention-based resource pool is configured for D2D resources dedicated to D2D transmission, (ii) to receive at least one threshold value related to a power, and (iii) to determine providing an indication to a first device based on at least the threshold value. In addition, the CPU 308 can execute the program code 312 to perform all of the above-described actions and steps or others described herein.

[0056] Referring back to FIGS. 3 and 4, in one embodiment from the perspective of a network node, the device 300 includes a program code 312 stored in memory 310. The CPU 308 could execute program code 312 (i) to configure a second device with a first contention-based resource pool and a second contention-based resource pool for transmission, and (ii) to transmit a signaling including information related to Successive Interference Cancellation (SIC) to the second device, wherein the information is associated with the first contention-based resource pool but not associated with the second contention-based resource pool. In addition, the CPU 308 can execute the program code 312 to perform all of the above-described actions and steps or others described herein.

[0057] As described above, some types of Machine Type Communication Devices (MTDs) may be low-cost devices with reduced transceiver complexity having lower transmission power. As a result, the coverage of these MTDs, e.g., uplink (UL) coverage, would be smaller than UEs with a normal transceiver. In other words, these MTDs may not be able to connect to a base station even though these MTDs are within the coverage of the base station, yet these MTDs may still be able to receive signaling from the base station, e.g., system information.

[0058] In METIS Deliverable 2.2 and 2.3, a disclosed method proposes that these MTDs use D2D transmission to directly communicate with other UEs. However, since these MTDs are not able to establish a connection to the base station and request dedicated resources from the base station for D2D transmission, e.g. due to limited UL coverage, these MTDs cannot identify the target of a dedicated signaling, e.g. used to provide dedicated resource, from the base station. Using contention-based resources for D2D transmission, e.g. broadcasted via system information, seems to be the only way to perform D2D transmission. LTE also provides contention-based resources for D2D transmission, e.g. Type 1 resource for ProSe direct discovery and Mode2 resource for ProSe direct communication as disclosed in 3GPP R2-144542. It still needs to be considered how the method disclosed in METIS Deliverable 2.2 and 2.3 works under the scenario when MTD uses contention-based resources, e.g. randomly select a resource for D2D transmission.

[0059] In addition to a MTD, non-MTD may also use the method disclosed in METIS Deliverable 2.2 and 2.3. In other words, D2D transmission can be performed using the same resource of DL transmission simultaneously with the aid of SIC regardless of whether the D2D transmission is from a MTD or not. For a non-MTD, contention-based resources may also be used. In order to perform SIC by the receiver of a D2D transmission, the receiver needs to know information, e.g., Modulation and Coding Scheme (MCS), used to decode a DL transmission that using the same resource in the same timing as the D2D transmission. Since the transmitter of the D2D transmission uses contention-based resources for the D2D transmission, the base station may not be aware of who is the receiver. Accordingly, there is a need for the base station to be able to efficiently provide the information to the receiver.

[0060] In various embodiments disclosed herein, a base station provides a contention-based D2D resource pool by broadcast, e.g. in system information. And the base station transmits a signaling, for example, via Physical Downlink Control Channel (PDCCH) or Enhanced Physical Downlink Control Channel (EPDCCH) as defined in 3GPP TS 36.300 V12.3.0, based on at least a sequence number such as UE identifier, Radio Network Temporary Identifier (RNTI) as defined in 3GPP TS 36.300 V12.3.0, or Device-to-Device Radio Network Temporary Identifier (D2D-RNTI), corresponding to the resource pool to all UEs receiving D2D transmissions using resources of the resource pool. This signaling also indicates information for SIC, such as MCS.

[0061] If a UE decides to receive the D2D transmissions using resources of the resource pool, the UE would monitor the signaling from the base station based on the sequence number. If the signaling is received, the UE would decode the D2D transmissions by SIC based on the information. For example, the base station uses the sequence number to scramble the signaling. The UE uses the sequence number to descramble the signaling. Preferably the sequence number is provided together with the resource pool. Alternatively, the sequence number is a fixed value.

[0062] Referring now to FIG. 10, an exemplary method is shown in which Mx 1000 and Ux 1002 may be normal UEs or MTDs, and B 1004 is a base station. As shown in FIG. 10, Ux 1002 may receive step 2 signaling earlier than step 3 signaling. Alternatively, Ux 1002 may receive step 2 signaling and step 3 signaling in the same timing. Ux 1002 may receive DL signaling from B 1004 and step 3 signaling at the same time. As a result, Ux 1002 decodes the DL signaling based on step 2 signaling and decodes step 3 signaling by SIC.

[0063] In one exemplary method for device to device (D2D) transmission in a wireless communication, the method includes a network node providing at least one resource pool for at least one contention-based D2D transmission. The network node further transmits a signaling based on at least a same sequence number associated with the at least one resource pool, wherein the signaling is transmitted to all user equipment (UE) that receive the at least one contention-based D2D transmission.

[0064] In another exemplary method for D2D transmission, the method includes an user equipment receiving at least one resource pool for at least one contention-based D2D transmission by system information. The UE further receives a signaling from a network node based on at least a sequence number associated with the at least one resource pool if the UE is monitoring the at least one resource pool. The UE decodes the at least one contention-based D2D transmission based on at least the signaling. More specifically, the at least one contention-based D2D transmission is transmitted by other UE(s).

[0065] In the exemplary methods described above, the at least one resource pool includes resources for a plurality of the at least one contention-based D2D transmission within one subframe. The at least one resource pool may be indicated by broadcasting, such as system information, or dedicated signaling. Additionally, the signaling may be transmitted to all the UEs at once by broadcasting or multicasting. The signaling may not be transmitted to UEs that do not receive the at least one contention-based D2D transmission. The signaling may be transmitted via PDCCH or EPDCCH. Transmitting the signaling based on at least the sequence number means to scramble the signaling by the sequence number. Receiving the signaling based on at least the sequence number means to descramble the signaling by the sequence number.

[0066] In the exemplary methods described above, the at least one contention-based D2D transmission may be multiplexed with at least one DL transmission in power domain. Steps of decoding the at least one contention-based D2D transmission include: firstly decoding at least one DL transmission indicated by the signaling, cancelling the at least one DL transmission, and decoding the at least one contention-based D2D transmission.

[0067] In the exemplary methods described above, the signaling may indicate information related to SIC, or information for the UE(s) to perform SIC to decode the at least one contention-based D2D transmission. The signaling may indicate information related to DL transmission(s), MCS used by DL transmission(s), or information used to check integrity of DL transmission(s).

[0068] In the exemplary methods described above, the sequence number may be a fixed value, UE identifier, RNTI, or D2D-RNTI. The sequence number may be indicated by broadcasting, system information, or dedicated signaling. The sequence number may be indicated together with the at least one resource pool.

[0069] In the exemplary methods described above, the at least one resource pool for the at least one contention-based D2D transmission means that UE (randomly) selects a resource of the at least one resource pool by itself to perform the at least one contention-based D2D transmission. Preferably the resource pool for the at least one contention-based D2D transmission means that a plurality of the at least one contention-based D2D transmission uses the same resource of the at least one resource pool at the same time. In these various methods, the at least one contention-based D2D transmission may be used for D2D discovery or D2D communication.

[0070] In the exemplary methods described above, the first device is a UE, the second device is a UE. More specifically, the UE is a MTD, and the network node may be a base station, Node B, or eNB.

[0071] Referring back to FIGS. 3 and 4, in one embodiment from the perspective of a UE, the device 300 includes a program code 312 stored in memory 310. The CPU 308 could execute program code 312 (i) to receive at least one resource pool for at least one contention-based D2D transmission by system information, (ii) to receive a signaling from a network node based on at least a sequence number associated with the at least one resource pool if the UE is monitoring the at least one resource pool, and (iii) to decode the at least one contention-based D2D transmission based on at least the signaling. In addition, the CPU 308 can execute the program code 312 to perform all of the above-described actions and steps or others described herein.

[0072] Referring back to FIGS. 3 and 4, in one embodiment from the perspective of a UE, the device 300 includes a program code 312 stored in memory 310. The CPU 308 could execute program code 312 (i) to receive a configuration including at least a first contention-based resource pool and a second contention-based resource pool, wherein the first contention-based resource pool includes resources for multiplexing D2D transmission(s) and Downlink (DL) transmission(s) in power domain, and the second contention-based resource pool does not include the resources for multiplexing D2D transmission(s) and DL transmission(s) in power domain, (ii) to receive at least one threshold value related to a power, and (iii) to select the first contention-based resource pool or the second contention-based resource pool for D2D transmission based on at least the threshold value. In addition, the CPU 308 can execute the program code 312 to perform all of the above-described actions and steps or others described herein.

[0073] Referring back to FIGS. 3 and 4, in one embodiment from the perspective of a network node, the device 300 includes a program code 312 stored in memory 310. The CPU 308 could execute program code 312 (i) to provide at least one resource pool for at least one contention-based D2D transmission, and (ii) to transmit a signaling based on at least a same sequence number associated with the at least one resource pool, wherein the signaling is transmitted to all user equipment (UE) that receive the at least one contention-based D2D transmission. In addition, the CPU 308 can execute the program code 312 to perform all of the above-described actions and steps or others described herein.

[0074] Based on above embodiments and method, a D2D device can determine whether to select a D2D resource which may be simultaneously used by DL transmission(s). Resource utilization can be improved even for contention-based D2D transmissions. Also, the base station can efficiently provide information related to SIC to proper UEs.

[0075] Various aspects of the disclosure have been described above. It should be apparent that the teachings herein may be embodied in a wide variety of forms and that any specific structure, function, or both being disclosed herein is merely representative. Based on the teachings herein one skilled in the art should appreciate that an aspect disclosed herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented or a method may be practiced using any number of the aspects set forth herein. In addition, such an apparatus may be implemented or such a method may be practiced using other structure, functionality, or structure and functionality in addition to or other than one or more of the aspects set forth herein. As an example of some of the above concepts, in some aspects concurrent channels may be established based on pulse repetition frequencies. In some aspects concurrent channels may be established based on pulse position or offsets. In some aspects concurrent channels may be established based on time hopping sequences. In some aspects concurrent channels may be established based on pulse repetition frequencies, pulse positions or offsets, and time hopping sequences.

[0076] Those of skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.

[0077] Those of skill would further appreciate that the various illustrative logical blocks, modules, processors, means, circuits, and algorithm steps described in connection with the aspects disclosed herein may be implemented as electronic hardware (e.g., a digital implementation, an analog implementation, or a combination of the two, which may be designed using source coding or some other technique), various forms of program or design code incorporating instructions (which may be referred to herein, for convenience, as "software" or a "software module"), or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.

[0078] In addition, the various illustrative logical blocks, modules, and circuits described in connection with the aspects disclosed herein may be implemented within or performed by an integrated circuit ("IC"), an access terminal, or an access point. The IC may comprise a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, electrical components, optical components, mechanical components, or any combination thereof designed to perform the functions described herein, and may execute codes or instructions that reside within the IC, outside of the IC, or both. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.

[0079] It is understood that any specific order or hierarchy of steps in any disclosed process is an example of a sample approach. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged while remaining within the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.

[0080] The steps of a method or algorithm described in connection with the aspects disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module (e.g., including executable instructions and related data) and other data may reside in a data memory such as RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of computer-readable storage medium known in the art. A sample storage medium may be coupled to a machine such as, for example, a computer/processor (which may be referred to herein, for convenience, as a "processor") such the processor can read information (e.g., code) from and write information to the storage medium. A sample storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in user equipment. In the alternative, the processor and the storage medium may reside as discrete components in user equipment. Moreover, in some aspects any suitable computer-program product may comprise a computer-readable medium comprising codes relating to one or more of the aspects of the disclosure. In some aspects a computer program product may comprise packaging materials.

[0081] While the invention has been described in connection with various aspects, it will be understood that the invention is capable of further modifications. This application is intended to cover any variations, uses or adaptation of the invention following, in general, the principles of the invention, and including such departures from the present disclosure as come within the known and customary practice within the art to which the invention pertains.


Claims

1. A method for improving resource control in a wireless communication system, the method comprising:

Receiving, by a device, a configuration including at least a first contention-based resource pool and a second contention-based resource pool, wherein the first contention-based resource pool includes resources for multiplexing Device-to-Device , named D2D hereinafter, transmission(s) and Downlink, named DL hereinafter, transmission(s) in power domain, and the second contention-based resource pool does not include the resources for multiplexing D2D transmission(s) and DL transmission(s) in power domain;

receiving, by the device, at least one threshold value related to a power; and

selecting, by the device, the first contention-based resource pool or the second contention-based resource pool for D2D transmission based on at least the threshold value.


 
2. The method of claim 1, further comprising:

decoding, by the device, a DL transmission before decoding the D2D transmission when the D2D transmission and the DL transmission use a same resource of the first contention-based resource pool.


 
3. The method of claim 1 or claim 2, further comprising:

providing, by the device, an indication to another device based on at least the threshold value.


 
4. The method of claim 3, wherein the indication designates whether a resource from the first contention-based resource pool or second contention-based resource pool should be used by another device to perform a D2D transmission.
 
5. The method of any preceding claim, wherein selecting the first contention-based resource pool or the second contention-based resource pool for D2D transmission means to monitor the first contention-based resource pool, the second contention-based resource pool, or both the first contention-based resource pool and the second contention-based resource pool.
 
6. The method of any preceding claim, wherein the selection is based on at least comparison between a measured result and the threshold value.
 
7. The method of any preceding claim, wherein the threshold value is related to a received power, Signal to Interference plus Noise Ratio, named SINR, Reference Signal Received Power, named RSRP, Reference Signal Receive Quality, named RSRQ, or pathloss.
 
8. A method for improving device to device, named D2D hereinafter, transmission in a wireless communication system, the method comprising:

receiving, by a user equipment (116), named UE hereinafter, at least one resource pool for at least one contention-based D2D transmission by system information;

receiving a signaling from a network node based on at least a sequence number associated with the at least one resource pool if the UE (116) is monitoring the at least one resource pool; and

decoding the at least one contention-based D2D transmission based on at least the signaling.


 
9. The method of claim 8, wherein receiving the signaling comprises descrambling the signaling by the sequence number.
 
10. The method of claim 8 or claim 9, wherein decoding the at least one contention-based D2D transmission comprises decoding at least one downlink, named DL hereinafter, transmission indicated by the signaling, canceling the at least one DL transmission, and decoding the at least one contention-based D2D transmission.
 
11. The method of any one of claims 8 to 10, wherein the signaling indicates information related to Successive Inference Cancelation, named SIC hereinafter, information for the UE(116) to perform SIC to decode the at least one contention-based D2D transmission, information related to DL transmission(s), Modulation and Coding Scheme, named MCS, used by DL transmission(s), or information used to check integrity of DL transmission(s).
 
12. The method of any one of claims 8 to 11, wherein the at least one contention-based D2D transmission is multiplexed with at least one DL transmission in power domain.
 
13. The method of any one of claims 8 to 12, wherein the sequence number is a fixed value or indicated by broadcasting, the system information, or dedicated signaling.
 
14. A communication device (300) for improving resource control in a wireless communication system, the communication device comprising:

a control circuit (306);

a processor (308) installed in the control circuit (306); and

a memory (310) installed in the control circuit (306) and operatively coupled to the processor (308);

wherein the processor (308) is configured to execute a program code stored in the memory for carrying out the method steps according to any one of claims 1 to 13.


 




Drawing


































Search report












Search report




Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description




Non-patent literature cited in the description