<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ep-patent-document PUBLIC "-//EPO//EP PATENT DOCUMENT 1.3//EN" "ep-patent-document-v1-3.dtd">
<ep-patent-document id="EP03765793B9W1" file="EP03765793W1B9.xml" lang="en" country="EP" doc-number="1527582" kind="B9" correction-code="W1" date-publ="20090325" status="c" dtd-version="ep-patent-document-v1-3">
<SDOBI lang="en"><B000><eptags><B001EP>ATBECHDEDKESFRGBGRITLILUNLSEMCPTIESI....FIRO..CY..TRBGCZEEHU..SK................</B001EP><B003EP>*</B003EP><B005EP>J</B005EP><B007EP>DIM360 Ver 2.15 (14 Jul 2008) -  2999001/0</B007EP><B078EP><date>20081114</date></B078EP></eptags></B000><B100><B110>1527582</B110><B120><B121>CORRECTED EUROPEAN PATENT SPECIFICATION</B121></B120><B130>B9</B130><B132EP>B1</B132EP><B140><date>20090325</date></B140><B150><B151>W1</B151><B155><B1551>de</B1551><B1552>Beschreibung</B1552><B1551>en</B1551><B1552>Description</B1552><B1551>fr</B1551><B1552>Description</B1552><B1551>de</B1551><B1552>Ansprüche EN</B1552><B1551>en</B1551><B1552>Claims EN</B1552><B1551>fr</B1551><B1552>Revendications EN</B1552></B155></B150><B190>EP</B190></B100><B200><B210>03765793.9</B210><B220><date>20030718</date></B220><B240><B241><date>20050119</date></B241><B242><date>20060503</date></B242></B240><B250>en</B250><B251EP>en</B251EP><B260>en</B260></B200><B300><B310>396822 P</B310><B320><date>20020718</date></B320><B330><ctry>US</ctry></B330><B310>399864 P</B310><B320><date>20020731</date></B320><B330><ctry>US</ctry></B330></B300><B400><B405><date>20090325</date><bnum>200913</bnum></B405><B430><date>20050504</date><bnum>200518</bnum></B430><B450><date>20080213</date><bnum>200807</bnum></B450><B452EP><date>20070709</date></B452EP><B472><B475><date>20080213</date><ctry>AT</ctry><date>20080213</date><ctry>BE</ctry><date>20080213</date><ctry>CZ</ctry><date>20080213</date><ctry>DK</ctry><date>20080213</date><ctry>NL</ctry><date>20080714</date><ctry>PT</ctry><date>20080213</date><ctry>RO</ctry><date>20080213</date><ctry>SI</ctry><date>20080213</date><ctry>SK</ctry></B475></B472><B480><date>20090325</date><bnum>200913</bnum></B480></B400><B500><B510EP><classification-ipcr sequence="1"><text>H04L  27/30        20060101AFI20050124BHEP        </text></classification-ipcr><classification-ipcr sequence="2"><text>H04J  11/00        20060101ALI20050718BHEP        </text></classification-ipcr><classification-ipcr sequence="3"><text>H04Q   7/38        20060101ALI20050718BHEP        </text></classification-ipcr><classification-ipcr sequence="4"><text>H04Q   7/36        20060101ALI20050718BHEP        </text></classification-ipcr><classification-ipcr sequence="5"><text>H04B   7/26        20060101ALI20050718BHEP        </text></classification-ipcr></B510EP><B540><B541>de</B541><B542>ZUTEILUNG VON ORTHOGONALEN KODES MIT VARIABLEN SPREIZFAKTOREN (OVSF)</B542><B541>en</B541><B542>ORTHOGONAL VARIABLE SPREADING FACTOR (OVSF) CODE ASSIGNMENT</B542><B541>fr</B541><B542>ATTRIBUTION DE CODE DE FACTEUR D'ETALEMENT VARIABLE ORTHOGONAL (OVSF)</B542></B540><B560><B561><text>EP-A- 1 035 676</text></B561><B561><text>US-A- 6 091 757</text></B561><B561><text>US-A- 6 163 524</text></B561><B561><text>US-A1- 2002 051 437</text></B561><B561><text>US-B1- 6 222 875</text></B561><B561><text>US-B1- 6 233 231</text></B561><B561><text>US-B1- 6 400 755</text></B561><B561><text>US-B1- 6 400 755</text></B561><B561><text>US-B1- 6 526 065</text></B561><B561><text>US-B2- 6 552 996</text></B561><B562><text>TSENG Y-C ET AL: "CODE PLACEMENT AND REPLACEMENT STRATEGIES FOR WIDEBAND CDMA OVSF CODE TREE MANAGEMENT" GLOBECOM'01. 2001 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE. SAN ANTONIO, TX, NOV. 25 - 29, 2001, IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, NEW YORK, NY : IEEE, US, vol. VOL. 1 OF 6, 25 November 2001 (2001-11-25), pages 562-566, XP001090318 ISBN: 0-7803-7206-9</text></B562><B562><text>MINN T ET AL: "DYNAMIC ASSIGNMENT OF ORTHOGONAL VARIABLE-SPREADING-FACTOR CODES INW-CDMA" IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, IEEE INC. NEW YORK, US, vol. 18, no. 8, August 2000 (2000-08), pages 1429-1440, XP000998091 ISSN: 0733-8716</text></B562><B562><text>CHENG R-G ET AL: "OVSF CODE CHANNEL ASSIGNMENT FOR IMT-2000" VTC 2000-SPRING. 2000 IEEE 51ST. VEHICULAR TECHNOLOGY CONFERENCE PROCEEDINGS. TOKYO, JAPAN, MAY 15-18, 2000, IEEE VEHICULAR TECHNOLGY CONFERENCE, NEW YORK, NY : IEEE, US, vol. VOL. 3 OF 3. CONF. 51, 15 May 2000 (2000-05-15), pages 2188-2192, XP000968392 ISBN: 0-7803-5719-1</text></B562><B565EP><date>20051007</date></B565EP></B560></B500><B700><B720><B721><snm>ZUNIGA, Juan, Carlos</snm><adr><str>955 Rue Gohier Nille St. Laurent</str><city>Montreal, Quebec H4L 3J4</city><ctry>CA</ctry></adr></B721><B721><snm>IACONO, Ana, Lucia</snm><adr><str>16 Clinch Avenue</str><city>Garden City, NY 11530</city><ctry>US</ctry></adr></B721><B721><snm>STERN-BERKOWITZ, Janet</snm><adr><str>41-20 Glenwood Street</str><city>Little Neck, NY 11363</city><ctry>US</ctry></adr></B721></B720><B730><B731><snm>INTERDIGITAL TECHNOLOGY CORPORATION</snm><iid>07457070</iid><irf>PC-EP-21018098</irf><adr><str>3411 Silverside Road 
Concord Plaza, Suite 105 
Hagley Building</str><city>Wilmington, DE 19801</city><ctry>US</ctry></adr></B731></B730><B740><B741><snm>Giver, Sören Bo</snm><sfx>et al</sfx><iid>00079101</iid><adr><str>Awapatent AB 
P.O. Box 5117</str><city>200 71 Malmö</city><ctry>SE</ctry></adr></B741></B740></B700><B800><B840><ctry>AT</ctry><ctry>BE</ctry><ctry>BG</ctry><ctry>CH</ctry><ctry>CY</ctry><ctry>CZ</ctry><ctry>DE</ctry><ctry>DK</ctry><ctry>EE</ctry><ctry>ES</ctry><ctry>FI</ctry><ctry>FR</ctry><ctry>GB</ctry><ctry>GR</ctry><ctry>HU</ctry><ctry>IE</ctry><ctry>IT</ctry><ctry>LI</ctry><ctry>LU</ctry><ctry>MC</ctry><ctry>NL</ctry><ctry>PT</ctry><ctry>RO</ctry><ctry>SE</ctry><ctry>SI</ctry><ctry>SK</ctry><ctry>TR</ctry></B840><B860><B861><dnum><anum>US2003022637</anum></dnum><date>20030718</date></B861><B862>en</B862></B860><B870><B871><dnum><pnum>WO2004010591</pnum></dnum><date>20040129</date><bnum>200405</bnum></B871></B870></B800></SDOBI><!-- EPO <DP n="1"> -->
<description id="desc" lang="en">
<p id="p0001" num="0001">This invention generally relates to wireless communication systems. In particular, the invention relates to code assignment is such systems.</p>
<p id="p0002" num="0002">BACKGROUND</p>
<p id="p0003" num="0003">In code division multiple access (CDMA) communication systems, communications are sent over a shared frequency spectrum. To minimize cross interference between the transmitted signals, orthogonal codes are used. Communications transmitted with orthogonal codes through an ideal wireless channel experience no cross code correlation, although in practice due to multipath, the orthogonal nature of the codes may break down to some extent.</p>
<p id="p0004" num="0004"><figref idref="f0001">Figure 1</figref> is an illustration of a code tree for orthogonal variable spreading factors (OVSF). At the top of the tree is a code for a spreading factor of one. Codes in each row further down the tree have a spreading factor twice the factor of the row above that code. For the code tree of the time division duplex (TDD) mode of a third generation partnership project (3GPP) wideband code division multiple access (WCDMA) communication system, the maximum spreading factor as shown in <figref idref="f0001">Figure 1</figref> is sixteen (16). In other systems, the maximum spreading factor may be significantly larger, such as 256 or 512.</p>
<p id="p0005" num="0005"><figref idref="f0001">Figure 1</figref> is an illustration of an OVSF code tree having a maximum spreading factor of 16. The tree has one code of spreading factor 1, C1(1) of a value "1". Two codes, C2(2) having a value of "1,1" and C2(1) having a value of "1,-1", have a spreading factor of 2. Four codes, C4(4) to C4(1), have a spreading factor of 4. Eight codes, C8(8) to C8(1) have a spreading factor of 8 and sixteen codes, C16(16) to C16(1) have a spreading factor of 16.</p>
<p id="p0006" num="0006">The lines connecting the codes in the tree identify codes that are not orthogonal to each other in the tree. Codes connected by lines in either only an upward or downward direction are not orthogonal. To illustrate, code C 16(16) is<!-- EPO <DP n="2"> --> not orthogonal to code C2(2), since tracing a path from code C16(16) to code C2(2) can be done using four upward connecting lines. Conversely, codes C16(16) and C8(7) are orthogonal to each other. Tracing a path from C16(16) to C8(7) involves using two upward connecting lines and one downward connecting line.</p>
<p id="p0007" num="0007">To minimize interference between communications, it is desirable to only assign codes that are orthogonal to each other. It is also desirable to assign the codes in an optimal manner such that the maximum number of orthogonal codes are available for use. In an operating wireless communication system as codes are assigned and released, unoptimal code assignments may occur reducing the system's capacity.</p>
<p id="p0008" num="0008"><figref idref="f0002">Figure 2A</figref> is an illustration of an unoptimal OVSF code assignment. One problem with using OVSF codes is the efficient use of the codes. After the assigning and release of codes, codes C16(16), C16(13), C16(9) and C16(5) are still active, as shown with filled circles. To prevent the assignment of a code not orthogonal to these codes, all the codes above these codes are blocked from assignment, as shown by an "X". Accordingly, the use of C16(5) blocks C8(3), C4(2), C2(1) and C1(1). As shown in <figref idref="f0002">Figure 2A</figref>, a total often codes are blocked, C1(1), C2(1), C2(2), C4(2), C4(3), C4(4), C8(3), C8(5), C8(7) and C8(8) are blocked. As a result of assigning four spreading factor (SF) sixteen codes, no SF 2 codes are available and only one SF4 code is available. Accordingly, services requiring an SF 2 code or multiple SF 4 codes can not be supported.</p>
<p id="p0009" num="0009"><figref idref="f0003">Figure 2B</figref> illustrates an efficient assignment of four SF 16 codes. Codes C16(16) to C16(13) are used. Only five codes are blocked as a result of this assignment, codes C1(1), C2(2), C4(4), C8(8) and C8(7). As a result, one SF 2 code is available and three SF 4 codes are available to support additional services. The assignment of <figref idref="f0003">Figure 2B</figref> allows for greater latitude in code assignment than <figref idref="f0002">Figure 2A</figref>.</p>
<p id="p0010" num="0010">Accordingly, it is desirable to have alternate approaches to code assignment.<br/>
<!-- EPO <DP n="3"> -->In "<nplcit id="ncit0001" npl-type="s"><text>Code Placement and Replacement Strategies for Wideband CDMA OVSF Code Tree Management", Nov 25-29, 2001, IEEE, pages 562-566, Tseng Y-C</text></nplcit> et al. disclose code reassignment in a OVSF code tree of a WCDMA system. When the code tree becomes fragmented, a dynamic code assignment algorithm is used to vacate the tree with a minimum cost by relocating busy codes one-by-one in a recursive manner. The steps of the algorithm are performed in case a new call requests a certain transmission rate, but there is no free code of such rate. The first step involves checking if there is enough free capacity in the code tree.<br/>
<patcit id="pcit0001" dnum="US2002051437A"><text>US 2002/051437</text></patcit> discloses code switching in a OVSF code tree. When a new call requests a transmission rate, and there are no assignable codes, code switching is performed in order to be able to accept the call request.<br/>
In "<nplcit id="ncit0002" npl-type="s"><text>Dynamic Assignment Of Orthogonal Variable-Spreading-Factor Codes in W-CDMA", IEEE Journal on Selected Areas in Communications, Vol 18, NO. 8, August 2000, pages 1429-1440, Minn T.</text></nplcit> et al. disclose elimination of code blocking in a OVSF code tree by reassigning codes. The scheme minimizes the codes that must be assigned to support a new call. At the time of a new call request, it is checked whether the system can support the rate required by the new call. If the system has excess capacity to support the new call, the codes are reassigned.<br/>
<patcit id="pcit0002" dnum="EP1035676A"><text>EP 1035676</text></patcit> discloses a method of communicating a selected channelisation code for a downlink to a user.<!-- EPO <DP n="4"> --></p>
<p id="p0011" num="0011">SUMMARY</p>
<p id="p0012" num="0012">The invention includes a system and methods for orthogonal variable spreading factor (OVSF) code assignment, de-allocation and code tree pruning. The invention also includes OVSF code identification and storage schemes. Embodiments are provided for code tree pruning, code assignment and de-allocation. These embodiments apply to both slotted and non-slotted code division multiple access systems.</p>
<p id="p0013" num="0013">BRIEF DESCRIPTION OF THE DRAWING(S)</p>
<p id="p0014" num="0014"><figref idref="f0001">Figure 1</figref> is an illustration of an OVSF code tree.</p>
<p id="p0015" num="0015"><figref idref="f0002">Figures 2A</figref> and <figref idref="f0003">2B</figref> are illustrations of code allocations and the resulting blocked codes.</p>
<p id="p0016" num="0016"><figref idref="f0004">Figure 3</figref> is a simplified block diagram of an OVSF code assignment system.</p>
<p id="p0017" num="0017"><figref idref="f0005">Figure 4</figref> is a preferred OVSF code identification scheme.</p>
<p id="p0018" num="0018"><figref idref="f0004">Figure 5</figref> is an illustration of a code vector.</p>
<p id="p0019" num="0019"><figref idref="f0006">Figure 6</figref> is a flow chart for OVSF code tree pruning over multiple time slots.</p>
<p id="p0020" num="0020"><figref idref="f0007">Figure 7</figref> is a flow chart for OVSF code tree pruning.</p>
<p id="p0021" num="0021"><figref idref="f0008">Figure 8</figref> is a flow chart of periodic code tree pruning.</p>
<p id="p0022" num="0022"><figref idref="f0009 f0010">Figure 9</figref> is a flow chart of OVSF code assignment and code tree updating procedures.</p>
<p id="p0023" num="0023"><figref idref="f0011 f0012">Figure 10</figref> is a flow chart of OVSF code de-allocation and code tree updating procedures.</p>
<p id="p0024" num="0024"><figref idref="f0013 f0014">Figure 11</figref> is a flow chart modifying <figref idref="f0008">Figure 8</figref> for use with a default midamble code assignment scheme.</p>
<p id="p0025" num="0025">DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)</p>
<p id="p0026" num="0026">Hereafter, a wireless transmit/receive unit (WTRU) includes but is not limited to a user equipment, mobile station, fixed or mobile subscriber unit, pager, or any other type of device capable of operating in a wireless environment.<!-- EPO <DP n="5"> --></p>
<p id="p0027" num="0027"><figref idref="f0004">Figure 3</figref> is a simplified diagram of a wireless communication system using OVSF code assignment. A radio network controller (RNC) 26 has a radio resource management (RRM) device 46 for use in assigning and releasing codes. The RRM device 46 has an associated memory for use in storing the code assignments and other information. A Node-B has a code assignment device 42 which receives the resource allocation from the RRM device 46. The code assignment device 42 assigns codes to the uplink, downlink or both communications. A transmitter (TX) 40 uses the downlink code assignments to transfer communications through the downlink channel(s) 36 of the wireless interface 22. A receiver (RX) 38 uses the uplink code assignments to receive communications over the uplink channel(s) 34. A WTRU 20 has a code assignment device 32. for assigning uplink and downlink codes. The code assignments may be signaled from the RRM device 46 to the WTRU 20. The TX 28 uses the uplink code assignments to send uplink commumications and the RX 30 uses the downlink code assignments to receive downlink communications.</p>
<p id="p0028" num="0028">The following are embodiments for assigning and/or reassigning OVSF codes. <figref idref="f0005">Figure 4</figref> is an illustration of a preferred technique for identifying the codes of the code tree. In the technique of <figref idref="f0005">Figure 4</figref>, the codes are identified as sequential numbers. The spreading factor 1 code, C1(1), is identified as 1. The spreading factor 2 codes are identified as: C2(2) as 2 and C2(1) as 3. The spreading factor 4 codes are identified as: C4(4) as 4, C4(3) as 5, C4(2) as 6, C4(1) as 7. The spreading factor 8 codes are identified as: C8(8) as 8, C8(7) as 9, C8(6) as 10, C8(5) as 11, C8(4) as 12, C8(3) as 13, C8(2) as 14 and C8(1) as 16. The spreading factor 16 codes are identified as: C16(16) as 16, C16(15) as 17, C16(14) as 18, C16(13) as 19, C16(12) as 20, C16(11) as 21, C16(10) as 22, C16(9) as 23, C16(8) as 24, C16(7) as 25, C16(6) as 26, C16(5) as 27, C16(4) as 28, C16(3) as 29, C16(2) as 30 and C16(1) as 31. For systems using spreading factors larger than 16, such as FDD/CDMA, the code tree can be expanded accordingly. Although <figref idref="f0005">Figure 4</figref> illustrates one number scheme other versions may be used. To illustrate the sequential numbering across the rows may be done from right to left or in<!-- EPO <DP n="6"> --> another order.</p>
<p id="p0029" num="0029">As shown at the bottom of <figref idref="f0005">Figure 4</figref>, the sequential code identifiers can be grouped by spreading factor and remain in sequence. To illustrates, SF 16 code identifiers are identifiers 16 to 31. The use of such a code identifier technique allows for reduced storage space for code assignments. <figref idref="f0004">Figure 5</figref> is an illustration of such a code assignment storage. Each code identifier, 1 to 31, has an associated bit or word 48<sub>1</sub> to 48<sub>31</sub> to indicate the current status of the code, such as being "currently assigned", "blocked" or "available". A "blocked" code is a code that cannot be assigned due to another "currently assigned" code. To illustrate, C8(1) is blocked if either C16(1), C16(2), C4(1), C2(1) or C(1) is being used. Additional status information may be provided, such as an indicator of the number of blocking codes may also be provided.</p>
<p id="p0030" num="0030">This code identification storage approach allows for essentially a concise vector to contain the code assignment information, instead of utilizing some form of list or table. However, the following code assignment approaches can be used or adapted for use with a vector, table, list or other storage techniques.</p>
<p id="p0031" num="0031">One preferred code status word uses a two bit element. The first bit indicates if the code is blocked. A "0" indicates that the code is not blocked and a "1" indicates that the code is blocked. The second bit indicates if the code is blocked by one code in its sub-tree or both codes in the sub-tree. A "0" indicates one code and a "1" indicates two codes. For example, if code 8 is used and code 9 is free, then code 4 is blocked by one code only, and it is marked as "10"; if codes 8 and 9 are used, then code 4 is blocked by both codes in its sub-tree, and it is marked as "11". If a code is being used currently, it is marked as "11". "01" preferably indicates that the code cannot be used in that timeslot.</p>
<p id="p0032" num="0032"><figref idref="f0006">Figure 6</figref> is a preferred tree pruning approach for use in slotted CDMA communication systems, such as in TDD/CDMA. Tree pruning is a reassignment of codes to allow for more flexibility in future code assignments. Although the following describes code pruning in a left to right fashion, other code assignment orders can be used such as right to left among others.<!-- EPO <DP n="7"> --></p>
<p id="p0033" num="0033">A new call is to be added and codes are assigned to the call, step 100. The pruning is begun with a first time slot of set of time slots for potential assignment and reassignment. To illustrate, in a TDD/CDMA system in which slots 2, 4, 6 and 10 may be used for uplink transmissions, slot 2 could be deemed the first slot, slot 4 the second and so on. The leftmost available code of the highest spreading factor (SF) in that time slot is evaluated, step 102. If there are no codes of that SF available in the first time slot, subsequent time slots are searched until a code is found. Although the flow chart of <figref idref="f0006">Figure 6</figref> is described as by moving from a highest to lowest spreading factor, the differing spreading factors can be processed from lowest to highest or in another order.</p>
<p id="p0034" num="0034">After a code is found, a highest SF code in any time slot that can be moved left into this time slot is determined, step 104. That determined code is relocated leftwards, step 110. If other codes can be moved leftwards, these codes are also relocated, step 112. The relocation procedure is repeated for the next time slot, steps 106 and 108. If there are no time slots that have not been evaluated, the leftward relocation is performed for the next higher spreading factor, steps 114 and 118. This process is repeated until the lowest spreading factor is reached, such as SF 1, step 116. Codes having an SF of 1 are preferably not relocated and the process ends.</p>
<p id="p0035" num="0035">The algorithm of <figref idref="f0006">Figure 6</figref> is preferably invoked for every new call. The algorithm, in summary, starts pruning the trees with the lowest layer codes and from the rightmost timeslot and code. If a code can be reallocated to any other place to the left, the code is moved. After all the possible codes in the lowest layer are moved, the algorithm moves up one level and repeats the same procedure. It continues until one layer before the highest is reached (i.e. in the TDD case, codes with SF1 typically do not need to be reallocated).</p>
<p id="p0036" num="0036">Another approach, as per <figref idref="f0007">Figure 7</figref>, limits the tree pruning to pruning within individual time slots. This code approach can be applied also to non-slotted system as well, After the new call is assigned a code, step 120, the rightmost code with a highest SF is selected, step 122. If the rightmost highest SF code can be relocated leftward, step 124, the code is relocated leftward, step<!-- EPO <DP n="8"> --> 130. If another highest SF code can be relocated leftward, step 132, it is relocated, step 130. The leftward relocating is repeated for each lower spreading factor in order, step 126. After the lowest SF is reached, such as SF 1, step 128, the procedure is ended.</p>
<p id="p0037" num="0037">In summary, after every new arrival, the algorithm of <figref idref="f0007">Figure 7</figref> is invoked. The algorithm starts pruning the tree with the lowest layer codes and from the rightmost code. If a code can be reallocated to any other place to the left, the code is moved. In the preferred approach, each code is reallocated as far to the left as possible. After all the possible codes in the lowest layer are moved, the algorithm moves up one level and repeats the same procedure. It continues until one layer before the highest is reached.</p>
<p id="p0038" num="0038"><figref idref="f0008">Figure 8</figref> is another preferred algorithm for tree pruning. This algorithm acts only periodically and limits the maximum number of reallocations. Such an approach reduces the overall processing required. Additionally, the overhead associated with reassignment is also reduced. This algorithm also looks at the tree's code fragmentation. Code tree fragmentation is a measure of the number of blocked codes within that tree. Although this approach is described with its preferred application in a slotted CDMA system, it can also be applied to non-slotted systems.</p>
<p id="p0039" num="0039">After a certain number of arrivals, such as "X", step 134, the algorithm is invoked. The algorithm initially looks at the fragmentation of the trees in each time slot. If at least one of the trees is fragmented more than a certain threshold, such as T, step 136, the algorithm starts pruning the trees with the lowest layer codes and from the rightmost timeslot and code, step 138. If a code can be reallocated to any other place to the left, step 150, the code is moved and a counter, such as tracked by a variable "Num_reall", that keeps track of the number of reallocations is updated. If the maximum number of reallocations is reached, step 152, the algorithm ends. If the maximum number of reallocations is not reached, the algorithm continues. After all the possible codes in the highest spreading factor are moved, steps 154 and 142, the algorithm moves up to the next highest spreading factor and repeats the same procedure,<!-- EPO <DP n="9"> --> steps 146 and 148. The procedure is repeated for each lower spreading factor, unit the lowest spreading factor, steps 148, 156.</p>
<p id="p0040" num="0040">Variations to these code management schemes may also be used. Codes with a low SF can be allocated right-to-left, whereas codes with high SF can be allocated from left-to-right, thus concentrating codes for similar services in the same timeslots. The code tree pruning algorithms may also make use of the code management scheme in order to give priority to arrivals that request either a high or low SF.</p>
<p id="p0041" num="0041"><figref idref="f0009 f0010">Figure 9</figref> is a preferred algorithm for assigning OVSF codes. A preferred use for this algorithm is in uplink code assignment for the TDD/CDMA, although the algorithm can be used for other applications. The preferred algorithm uses a code vector having two bit code status elements as previously described and the code tree of <figref idref="f0005">Figure 4</figref>.</p>
<p id="p0042" num="0042">Initially, a variable, such as "x" is set to Q, where Q is the SF of the code requiring assignment, step 200. An initial node having that SF in the tree is checked to see if it is free (v(x) = "00"), step 202. If it is, the parent node (the connected node having a lower spreading factor) is checked to see if it is blocked ("10"), step 204. If it is blocked, node x is assigned, step 216. A variable "S" representing the assignment is set to "x", step 218, and the algorithm proceeds to step 220.</p>
<p id="p0043" num="0043">If the parent node is not blocked, assigning that node may not be optimal ("non_optimal" = "x"), step 206. The next node is checked (x =x+1), step 208. If the next node has the same SF (x &lt; 2*Q), step 210, the algorithm goes to step 202 to determine if that node is optimal or not. If not, the "non_optimal" node is selected for assignment, step 212. The variable "S" is set to "non-optimal", step 214, and the algorithm proceeds to step 220.</p>
<p id="p0044" num="0044">The element of node S is marked as assigned (v(S) = "11"), step 220. The connected node having an SF lower than the assigned node is updated (Upnode = └s/2┘), step 222. IfUpNode = 0, that indicates that all the nodes have been updated, step 224, and the algorithm proceeds to step 234. If not v(UpNode)<!-- EPO <DP n="10"> --> = "00", indicating that the node is available, step 226, that node is blocked (v(UpNode) = "10"), step 228. The next higher node (having a lower SF) is checked (UpNode = └UpNode/2┘, step 230. Ifv(UpNode) = "11" (indicating that the node was blocked by one and now is blocked by two codes), step 232, the procedure to go up the tree is finished, step 234.</p>
<p id="p0045" num="0045">The algorithm proceeds to update down the tree (initialize DownNode = S*2), step 236. The number of nodes to be checked below the current node is two (initialize number_nodes = 2), step 238. The algorithm checks to see that the bottom of the tree has not been passed (DownNode &lt; 32), step 240. If the bottom is passed, the update is complete, step 254. If the bottom was not passed, a count is initialized (initialize count = 0), step 242. The node indicated by the count is blocked (v(DownNode+count) = "11"), step 244. The algorithm increments the count and proceeds to the next node (count = count + 1), step 248. If count is &lt; number_nodes, step 248, the algorithm checks the next node and goes to step 244. If count is &gt;= number_nodes, the algorithm checks on level lower in the tree (DownNode = 2*DownNode), step 250. The nodes checked in the lower level is doubled (number_nodes = 2*number_nodes), step 252.</p>
<p id="p0046" num="0046"><figref idref="f0011">Figures 10a</figref> and <figref idref="f0012">10b</figref> show a preferred algorithm to update a tree after a code has been released (de-allocated). A variable "S" is set to the value of the node being de-allocated, step 256. That node, S, is marked as free (v(S) = "00"), step 258. The nodes higher in the tree are updated (initialize UpNode = [s/2]), step 260. The algorithm checks to see if the top of the tree has not been passed (UpNode = 0), step 262. If the top of the tree is passed, lower nodes in the tree are checked, step 272. If the top is not passed, the current node is blocked by one code (v(UpNode) = "10"), step 264, that node is marked as being available (v(UpNode) = "00"), step 266. The algorithm proceeds to check the next higher node in the tree (UpNode = [UpNode/2]), step 268, and the algorithm checks this node. If the node was blocked by two codes, it is set as being blocked by one node (v(UpNode) = "10"), step 270.</p>
<p id="p0047" num="0047">To update down the tree, the "DownNode" variable is initialized<!-- EPO <DP n="11"> --> (DownNode = S*2), step 274. The number of nodes to update below the node is initialized (number_nodes = 2), step 276. If the bottom of the tree is passed (DownNode &gt;= 32), the tree has been updated, step 292. If not (DownNode &lt; 32), a count is initialized (count = 0), step 280. The node indicated by the count is freed for assignment (v(DownNode+count) = "00"), step 282. The count is incremented (count = count + 1), step 284. If the number of nodes updated is not passed (count &lt; number_nodes), the updating is repeated for the next count, step 286. If it is passed (count &gt;= number_nodes), the next level down the tree is checked (DownNode = 2*DownNode), step 288. The number of analyzed nodes in the lower level is twice that of the prior level (number_nodes = 2* number_nodes), step 290, and the updating is repeated.</p>
<p id="p0048" num="0048">One embodiment of the invention relates to code assignment for the default midamble allocation scheme of the TDD mode of 3GPP W-CDMA. Midambles are part of the physical channel configuration for TDD. Different midamble allocation schemes exist for TDD. One is a WTRU specific midamble allocation, applying to both the uplink and downlink. For the WTRU specific midamble allocation, a specific midamble is explicitly assigned to all physical channels of a specific user. Another scheme is default midamble allocation, which also applies to both the uplink and downlink. For this scheme, the midamble used is determined by a pre-defined association between the midambles and the assigned channelization codes.</p>
<p id="p0049" num="0049">Another scheme is the common midamble allocation, which applies only to the downlink. In this scheme, a common midamble is allocated to all physical channels in a specific timeslot. For the WTRU specific and common midamble schemes, the codes may be assigned to users without considering the midamble assignment.</p>
<p id="p0050" num="0050">However, for the default midamble, the association between the midambles and the channelization codes is used in the code allocation scheme. Depending on the burst type and the value of Kcell, as defined by the standards, different associations apply. The burst type and the value of Kcell are individually configurable in the Radio Network Controller (RNC) for each<!-- EPO <DP n="12"> --> timeslot by, for example, an operations and maintenance (O&amp; M) function, or a function in the RNC such as radio resource management (RRM) dynamic channel allocation (DCA). The configuration is signaled to the WTRU via RRC signaling and, accordingly, the association is known by the WTRU.</p>
<p id="p0051" num="0051">For default midamble allocation, the association between midambles and channelization codes defines primary and secondary channelization codes. The following rules apply: each secondary channelization code is associated with a single primary channelization code; each secondary channelization code uses the same midamble as the primary channelization code with which it is associated; secondary codes can only be allocated if the associated primary code is also allocated; all channelization codes associated with the same midamble can only be allocated to the same WTRU; and for common and WTRU specific midamble allocations, all codes can be considered to be primary codes.</p>
<p id="p0052" num="0052">In order to perform code assignment for the default midamble scheme, each code is preferably given an additional flag indicating whether it is a primary or secondary channelization code, a midamble designation (which could also be called a code group designation) with one of Kcell different possible values (e.g., 0 through Kcell-1), and a tag to be used for the WTRU association.</p>
<p id="p0053" num="0053"><figref idref="f0013 f0014">Figure 11</figref> is a flow chart for replacing steps 200-220 of <figref idref="f0009 f0010">Figure 9</figref> for use in allocating codes for the default midamble scheme. The tag for WTRU association could be provided for each channelization code or just for each midamble, since each code is already associated with a given midamble. The association with a midamble for a WTRU would imply association with that WTRU.</p>
<p id="p0054" num="0054">The procedure attempts to find the most optimal available code (code marked "00") for a given user (WTRU). The first (most desirable) choice is a secondary code associated with a midamble that is already assigned to the user. This type of code is classified as a class 1 code. The second choice is a primary code that has a parent, which is already blocked by one code (parent marked as "10"). This code is classified as a class 2 code. The third choice is a primary code that has a parent which is not blocked, which is classified as a class 3 code.<!-- EPO <DP n="13"> --> Secondary codes associated with a midamble belonging to a different user would not be considered for assignment.</p>
<p id="p0055" num="0055">The most preferred algorithm scans from left to right, starting at the left-most code in the tree in that level, although other scanning directions may be used. For each available code, we determine which, if any, class it belongs to. If a class 1 is found, an immediate assignment is made. Otherwise, the left most codes in classes 2 and/or 3 are remembered for possible assignment in the case the scan ends without finding a class 1 code.</p>
<p id="p0056" num="0056">The following variables are used in the preferred algorithm: Optimal_Primary for a code in class 2 and Non_Optimal_Primary for a code in class 3. A variable, x, is initialized the value of the spreading factor, x = Q, step 300. Q is the SF of the code to allocate. Optimal_Primary and Non_Optimal_Primary are set to zero. The variable v(x) is checked to see if it equals "00", indicating that it is free, step 302. Ifx is a secondary code, step 304, and the midamble associated with code x is assigned to the user, step 306, the selected code S is set to x (S=x), step 308. Then, the algorithm jumps to step 336.</p>
<p id="p0057" num="0057">If x is not a secondary and is a primary, step 310, and Optimal_Primary = 0, step 312, (an optimal code has not been found optimal yet), the left most primary code is saved as optimal for later use, if a secondary code is not found. The parent code is checked to see if it is blocked by one (v(x/2) = "10"), step 314. If it is, Optimal_Primary is set to the current x (Optimal_Primary = 0), step 320, and the next code is checked (x=x+1), step 322. If the parent is blocked, a check is done to determine whether a non-optimal primary code is found (Non_Optimal_Primary = 0), step 318. Subsequently, the next code is checked (x=x+1), step 322.</p>
<p id="p0058" num="0058">If the next code is within the same spreading factor, (x&lt;2*Q), step 324, the procedure is repeated for the next code and the algorithm goes to step 302. If the next code is not in the same spreading factor, a check is done to see if an optimal primary code is found (Optimal_Primary = 0), step 326. If an optimal primary has been found, the code is set to the optimal primary (S = Optimal_Primary), step 328. The midamble of the assigned code S is assigned to<!-- EPO <DP n="14"> --> the user, step 330.</p>
<p id="p0059" num="0059">If a non-optimal primary is found (Non_Optimal_Primary = 0), step 332, S is set to the non-optimal primary (S = Non_Optimal_Primary), step 334. The midamble of the assigned code S is assigned to the user, step 330. After the midamble is assigned, the assigned code is marked as being assigned (v(S) = "11"), step 336, and the code tree is updated accordingly, step 338. If no secondary or primary codes are available, a code cannot be assigned, step 340.</p>
<p id="p0060" num="0060">Since the de-allocation procedure simply consists of updating the code tree, the previously described procedure for code de-allocation can be used in case of default midamble allocation with the addition of one step. After the completion of the de-allocation of a primary code, the midamble associated with that code would be disassociated from that user (WTRU).</p>
<p id="p0061" num="0061">Preferably, the entity that invokes the procedure after deciding which code to de-allocate (e.g., a Radio Resource Management function) ensures that a primary code is only de-allocated if all its secondary codes are not assigned. Optionally, a step could be added at the beginning of the de-allocation procedure to verify that a primary code is not being de-allocated when its associated secondary codes are still assigned. If any associated secondary is still assigned, the de-allocation procedure would exit and indicate a code assignment failure.</p>
</description><!-- EPO <DP n="15"> -->
<claims id="claims01" lang="en">
<claim id="c-en-01-0001" num="0001">
<claim-text>A method for reassigning codes of an orthogonal variable spreading factor, OVSF, code tree in a code division multiple access communication system, the code tree having a plurality of codes at differing spreading factors and having a plurality of branches between the codes of different spreading factors, if a particular code of the code tree is assigned, a lower spreading factor code of the code tree connected to that code by one of the branches is blocked from assignment, if a code of the code tree is blocked, a code of the tree of a lower spreading factor connected to that code by one of the branches is blocked from assignment, the method comprising:
<claim-text>starting at a first spreading factor (step 138):
<claim-text>(a) determining selected assigned codes of that spreading factor that can be reassigned to other codes of that spreading factor in a desired direction of the code tree (step 140); and</claim-text>
<claim-text>(b) reassigning the selected assigned codes to the other codes (steps 150, 154); and for each other spreading factor, repeating steps (a) and (b) (steps 146, 156),</claim-text></claim-text>
<b>characterised in that</b> the steps of determining and reassigning are invoked periodically and are performed if the code tree has a number of blocked codes which is above a certain threshold (step 136).</claim-text></claim>
<claim id="c-en-01-0002" num="0002">
<claim-text>The method of claim 1 wherein the other codes are within a same time slot as the selected codes.</claim-text></claim>
<claim id="c-en-01-0003" num="0003">
<claim-text>The method of claim 1 wherein at least one of the other codes is in a different time slot than the selected codes.<!-- EPO <DP n="16"> --></claim-text></claim>
<claim id="c-en-01-0004" num="0004">
<claim-text>The method of claim 1 wherein the first spreading factor is a highest spreading factor.</claim-text></claim>
<claim id="c-en-01-0005" num="0005">
<claim-text>A radio network controller, RNC, having a radio resource management device, the radio resource management device having a memory for storing a representation of an orthogonal variable spreading factor, OVSF, code tree, the code tree having a plurality of codes at differing spreading factors and having a plurality of branches between the codes of different spreading factors, if a particular code of the code tree is assigned, a lower spreading factor code of the code tree connected to that code by one of the branches is blocked from assignment, if a code of the code tree is blocked, a code of the tree of a lower spreading factor connected to that code by one of the branches is blocked from assignment, the radio resource management device capable of performing steps comprising:
<claim-text>starting at a highest spreading factor.
<claim-text>(a) determining selected assigned codes of that spreading factor that can be reassigned to other codes of that spreading factor in a desired direction of the code tree (step 140); and</claim-text>
<claim-text>(b) reassigning the selected assigned codes to the other codes (steps 150,154); and for each lower spreading factor in sequence, repeating steps (a) and (b) (steps 146, 156)</claim-text></claim-text>
<b>characterised in that</b> the steps of determining and reassigning are invoked periodically and are performed if the code tree has a number of blocked codes which is above a certain threshold (step 136).</claim-text></claim>
<claim id="c-en-01-0006" num="0006">
<claim-text>The RNC of claim 7 wherein the other code are within a same time slot as the selected codes.</claim-text></claim>
<claim id="c-en-01-0007" num="0007">
<claim-text>The RNC of claim 7 wherein at least one of the other codes is in a different time slot than the selected codes.<!-- EPO <DP n="17"> --></claim-text></claim>
<claim id="c-en-01-0008" num="0008">
<claim-text>The RNC of claim 5 wherein the representation of the code tree is stored as a vector.</claim-text></claim>
<claim id="c-en-01-0009" num="0009">
<claim-text>The RNC of claim 8 wherein the vector includes an element for each code of the code tree in sequence.</claim-text></claim>
<claim id="c-en-01-0010" num="0010">
<claim-text>The RNC of claim 9 wherein all the element of codes having a same spreading factor are contiguous.</claim-text></claim>
<claim id="c-en-01-0011" num="0011">
<claim-text>The RNC of claim 9 wherein each element has two bits, one bit of the two bits indicating whether the code of that element is blocked and another bit of the two bits indicating whether one or multiple codes are blocked by the code of that element.</claim-text></claim>
</claims><!-- EPO <DP n="18"> -->
<claims id="claims02" lang="de">
<claim id="c-de-01-0001" num="0001">
<claim-text>Verfahren zum Neuzuweisen von Kodes eines Kodebaums mit einem orthogonalen variablen Spreizfaktor OVSF in einem Codemultiplex-Vielfachzugriff-Kommunikationssystem, wobei der Kodebaum eine Vielzahl von Kodes mit unterschiedlichen Spreizfaktoren hat und eine Vielzahl von Zweigen zwischen den Kodes mit unterschiedlichen Spreizfaktoren hat, wobei, wenn ein bestimmter Kode des Kodebaums zugewiesen wird, ein niedrigerer Spreizfaktorkode des Kodebaums, der durch einen der Zweige mit diesem Kode verbunden ist, gegen eine Zuweisung gesperrt wird, wobei, wenn ein Kode des Kodebaums gesperrt ist, ein Kode des Baums mit einem niedrigeren Spreizfaktor, der durch einen der Zweige mit diesem Kode verbunden ist, gegen eine Zuweisung gesperrt wird, wobei das Verfahren aufweist:
<claim-text>beginnend mit dem ersten Spreizfaktor (Schritt 138):
<claim-text>(a) Bestimmen ausgewählter zugewiesener Kodes mit diesem Spreizfaktor, die an andere Kodes mit diesem Spreizfaktor in einer gewünschten Richtung des Kodebaums neu zugewiesen werden können (Schritt 140); und</claim-text>
<claim-text>(b) Neuzuweisen der ausgewählten zugewiesenen Kodes an die anderen Kodes (Schritte 150, 154); und Wiederholen der Schritte (a) und (b) für jeden anderen Spreizfaktor (Schritte 146, 156),</claim-text></claim-text>
<b>dadurch gekennzeichnet, daß</b> die Schritte zum Bestimmen und Neuzuweisen regelmäßig aufgerufen werden und durchgeführt werden, wenn der Kodebaum eine Anzahl gesperrter Kodes hat, die über einer gewissen Schwelle ist (Schritt 136).</claim-text></claim>
<claim id="c-de-01-0002" num="0002">
<claim-text>Verfahren nach Anspruch 1, wobei die anderen Kodes in dem gleichen Zeitschlitz sind wie die ausgewählten Kodes.<!-- EPO <DP n="19"> --></claim-text></claim>
<claim id="c-de-01-0003" num="0003">
<claim-text>Verfahren nach Anspruch 1, wobei zumindest einer der anderen Kodes in einem zu den ausgewählten Kodes unterschiedlichen Zeitschlitz ist.</claim-text></claim>
<claim id="c-de-01-0004" num="0004">
<claim-text>Verfahren nach Anspruch 1, wobei der erste Spreizfaktor ein höchster Spreizfaktor ist.</claim-text></claim>
<claim id="c-de-01-0005" num="0005">
<claim-text>Funknetzsteuerung RNC mit einer Funkressourcenverwaltungsvorrichtung, wobei die Funkressourcenverwaltungsvorrichtung einen Speicher zum Speichern einer Darstellung eines Kodebaums mit einem orthogonalen variablen Spreizfaktor OVSF hat, wobei der Kodebaum eine Vielzahl von Kodes mit unterschiedlichen Spreizfaktoren hat und eine Vielzahl von Zweigen zwischen den Kodes mit unterschiedlichen Spreizfaktoren hat, wobei, wenn ein bestimmter Kode des Kodebaums zugewiesen wird, ein niedrigerer Spreizfaktorkode des Kodebaums, der durch einen der Zweige mit diesem Kode verbunden ist, gegen eine Zuweisung gesperrt wird, wobei, wenn ein Kode des Kodebaums gesperrt ist, ein Kode des Baums mit einem niedrigeren Spreizfaktor, der durch einen der Zweige mit diesem Kode verbunden ist, gegen eine Zuweisung gesperrt wird, wobei die Funkressourcenverwaltungsvorrichtung fähig ist, Schritte durchzuführen, die aufweisen:
<claim-text>beginnend mit einem höchsten Spreizfaktor:
<claim-text>(a) Bestimmen ausgewählter zugewiesener Kodes mit diesem Spreizfaktor, die an andere Kodes mit diesem Spreizfaktor in einer gewünschten Richtung des Kodebaums neu zugewiesen werden können (Schritt 140); und</claim-text>
<claim-text>(b) Neuzuweisen der ausgewählten zugewiesenen Kodes an die anderen Kodes (Schritte 150, 154); und der Reihe nach Wiederholen der Schritte (a) und (b) für jeden niedrigeren Spreizfaktor (Schritte 146, 156),</claim-text></claim-text>
<b>dadurch gekennzeichnet, daß</b> die Schritte zum Bestimmen und Neuzuweisen regelmäßig aufgerufen werden und durchgeführt werden, wenn der Kodebaum eine Anzahl gesperrter Kodes hat, die über einer gewissen Schwelle ist (Schritt 136).<!-- EPO <DP n="20"> --></claim-text></claim>
<claim id="c-de-01-0006" num="0006">
<claim-text>RNC nach Anspruch 7, wobei die anderen Kodes in dem gleichen Zeitschlitz sind wie die ausgewählten Kodes.</claim-text></claim>
<claim id="c-de-01-0007" num="0007">
<claim-text>RNC nach Anspruch 7, wobei zumindest einer der anderen Kodes in einem zu den ausgewählten Kodes unterschiedlichen Zeitschlitz ist.</claim-text></claim>
<claim id="c-de-01-0008" num="0008">
<claim-text>RNC nach Anspruch 5, wobei die Darstellung des Kodebaums als ein Vektor gespeichert ist.</claim-text></claim>
<claim id="c-de-01-0009" num="0009">
<claim-text>RNC nach Anspruch 8, wobei der Vektor der Reihe nach ein Element für jeden Kode des Kodebaums umfaßt.</claim-text></claim>
<claim id="c-de-01-0010" num="0010">
<claim-text>RNC nach Anspruch 9, wobei alle Elemente von Kodes mit einem gleichen Spreizfaktor benachbart sind.</claim-text></claim>
<claim id="c-de-01-0011" num="0011">
<claim-text>RNC nach Anspruch 9, wobei jedes Element zwei Bits hat, wobei ein Bit der zwei Bits anzeigt, ob der Kode dieses Elements gesperrt ist und ein anderes Bit der zwei Bits anzeigt, ob einer oder mehrere Kodes durch den Kode dieses Elements gesperrt sind.</claim-text></claim>
</claims><!-- EPO <DP n="21"> -->
<claims id="claims03" lang="fr">
<claim id="c-fr-01-0001" num="0001">
<claim-text>Procédé de réattribution de codes d'un facteur d'étalement variable orthogonal, OVSF, d'un arbre de codes dans un système de communication à accès multiple par répartition de codes, l'arbre de codes ayant une pluralité de codes à des facteurs d'étalement différents et une pluralité de branches entre les codes de facteurs d'étalement différents, si un code particulier de l'arbre de codes est attribué, un code de facteur d'étalement inférieur de l'arbre de codes relié à ce code par une des branches est bloqué et ne peut pas être attribué, si un code de l'arbre de codes est bloqué, un code de l'arbre du facteur d'étalement inférieur relié à ce code par une des branches est bloqué et ne peut pas être attribué, le procédé comprenant les étapes suivantes:
<claim-text>en commençant à un premier facteur d'étalement (étape 138) :
<claim-text>(a) déterminer des codes attribués sélectionnés de ce facteur d'étalement pouvant être réattribués à d'autres codes de ce facteur d'étalement suivant une direction souhaitée de cet arbre de codes (étape 140) ; et</claim-text>
<claim-text>(b) réattribuer les codes attribués sélectionnés aux autres codes (étapes 150, 154) ; et pour chaque autre facteur d'étalement, répéter les étapes (a) et (b) (étapes 146 et 156) ;</claim-text></claim-text>
<b>caractérisé en ce que</b> les étapes de détermination et de réattribution sont invoquées de manière périodique et sont réalisées si l'arbre de codes a un certain nombre de codes bloqués au-dessus d'un certain seuil (étape 136).<!-- EPO <DP n="22"> --></claim-text></claim>
<claim id="c-fr-01-0002" num="0002">
<claim-text>Procédé selon la revendication 1, dans lequel les autres codes sont compris dans le même intervalle temporel que celui des codes sélectionnés.</claim-text></claim>
<claim id="c-fr-01-0003" num="0003">
<claim-text>procédé selon la revendication 1, dans lequel au moins un des autres codes est dans un intervalle de temps différent de celui des codes sélectionnés.</claim-text></claim>
<claim id="c-fr-01-0004" num="0004">
<claim-text>Procédé selon la revendication 1, dans lequel le premier facteur d'étalement est un facteur d'étalement supérieur.</claim-text></claim>
<claim id="c-fr-01-0005" num="0005">
<claim-text>Contrôleur de réseau radio, RNC, ayant un dispositif de gestion de ressource radio, le dispositif de gestion de ressource radio ayant une mémoire destinée à mémoriser une représentation d'un arbre de codes à facteur d'étalement variable orthogonal, OVSF, l'arbre de codes ayant une pluralité de codes à des facteurs d'étalement différents et une pluralité de branches entre les codes de facteurs d'étalement différents, si un code particulier de l'arbre de codes est attribué, un code de facteur d'étalement inférieur de l'arbre de codes relié à ce code par une des branches est bloqué et ne peut pas être attribué, si un code de l'arbre de codes est bloqué, un code de l'arbre d'un facteur d'étalement inférieur relié à ce code par une des branches est bloqué et ne peut pas être attribué, le dispositif de gestion de ressource radio pouvant exécuter les étapes consistant à :
<claim-text>en commençant au niveau d'un facteur d'étalement supérieur :<!-- EPO <DP n="23"> -->
<claim-text>(a) déterminer des codes attribués sélectionnés de ce facteur d'étalement pouvant être réattribués à d'autres codes de ce facteur d'étalement suivant une direction souhaitée de cet arbre de codes (étape 140) ; et</claim-text>
<claim-text>(b) réattribuer les codes attribués sélectionnés aux autres codes (étapes 150, 154) ; et pour chaque facteur d'étalement inférieur en séquence, répéter les étapes (a) et (b) (étapes 146, 156) ;</claim-text></claim-text>
<b>caractérisé en ce que</b> les étapes de détermination et de réattribution sont invoquées de manière périodique et sont réalisées si l'arbre de codes a un certain nombre de codes bloqués au-dessus d'un certain seuil (étape 136).</claim-text></claim>
<claim id="c-fr-01-0006" num="0006">
<claim-text>RNC selon la revendication 7, dans lequel les autres codes sont compris dans un même intervalle de temps que celui des codes sélectionnés.</claim-text></claim>
<claim id="c-fr-01-0007" num="0007">
<claim-text>RNC selon la revendication 7, dans lequel au moins un des autres codes est compris dans un intervalle de temps différent de celui des codes sélectionnés.</claim-text></claim>
<claim id="c-fr-01-0008" num="0008">
<claim-text>RNC selon la revendication 5, dans lequel la représentation de l'arbre de codes est mémorisée en tant que vecteur.</claim-text></claim>
<claim id="c-fr-01-0009" num="0009">
<claim-text>RNC selon la revendication 8, dans lequel le vecteur comprend un élément pour chaque code de l'arbre de codes en séquence.<!-- EPO <DP n="24"> --></claim-text></claim>
<claim id="c-fr-01-0010" num="0010">
<claim-text>RNC selon la revendication 9, dans lequel l'ensemble des éléments des codes ayant un facteur d'étalement identique sont contigus.</claim-text></claim>
<claim id="c-fr-01-0011" num="0011">
<claim-text>RNC selon la revendication 9, dans lequel chaque élément a deux bits, un bit des deux bits indiquant si le code de cet élément est bloqué et un autre bit des deux bits indiquant si un ou plusieurs codes sont bloqués par le code de cet élément.</claim-text></claim>
</claims>
<drawings id="draw" lang="en">
<figure id="f0001" num="1"><img id="if0001" file="imgf0001.tif" wi="126" he="210" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="25"> -->
<figure id="f0002" num="2A"><img id="if0002" file="imgf0002.tif" wi="130" he="214" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="26"> -->
<figure id="f0003" num="2B"><img id="if0003" file="imgf0003.tif" wi="130" he="215" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="27"> -->
<figure id="f0004" num="3,5"><img id="if0004" file="imgf0004.tif" wi="155" he="182" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="28"> -->
<figure id="f0005" num="4"><img id="if0005" file="imgf0005.tif" wi="144" he="213" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="29"> -->
<figure id="f0006" num="6"><img id="if0006" file="imgf0006.tif" wi="151" he="231" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="30"> -->
<figure id="f0007" num="7"><img id="if0007" file="imgf0007.tif" wi="142" he="195" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="31"> -->
<figure id="f0008" num="8"><img id="if0008" file="imgf0008.tif" wi="157" he="233" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="32"> -->
<figure id="f0009" num="9A"><img id="if0009" file="imgf0009.tif" wi="147" he="233" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="33"> -->
<figure id="f0010" num="9B"><img id="if0010" file="imgf0010.tif" wi="164" he="232" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="34"> -->
<figure id="f0011" num="10A"><img id="if0011" file="imgf0011.tif" wi="136" he="220" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="35"> -->
<figure id="f0012" num="10B"><img id="if0012" file="imgf0012.tif" wi="120" he="230" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="36"> -->
<figure id="f0013" num="11A"><img id="if0013" file="imgf0013.tif" wi="163" he="232" img-content="drawing" img-format="tif"/></figure><!-- EPO <DP n="37"> -->
<figure id="f0014" num="11B"><img id="if0014" file="imgf0014.tif" wi="163" he="233" img-content="drawing" img-format="tif"/></figure>
</drawings>
<ep-reference-list id="ref-list">
<heading id="ref-h0001"><b>REFERENCES CITED IN THE DESCRIPTION</b></heading>
<p id="ref-p0001" num=""><i>This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.</i></p>
<heading id="ref-h0002"><b>Patent documents cited in the description</b></heading>
<p id="ref-p0002" num="">
<ul id="ref-ul0001" list-style="bullet">
<li><patcit id="ref-pcit0001" dnum="US2002051437A"><document-id><country>US</country><doc-number>2002051437</doc-number><kind>A</kind></document-id></patcit><crossref idref="pcit0001">[0010]</crossref></li>
<li><patcit id="ref-pcit0002" dnum="EP1035676A"><document-id><country>EP</country><doc-number>1035676</doc-number><kind>A</kind></document-id></patcit><crossref idref="pcit0002">[0010]</crossref></li>
</ul></p>
<heading id="ref-h0003"><b>Non-patent literature cited in the description</b></heading>
<p id="ref-p0003" num="">
<ul id="ref-ul0002" list-style="bullet">
<li><nplcit id="ref-ncit0001" npl-type="s"><article><author><name>TSENG Y-C</name></author><atl/><serial><sertitle>Code Placement and Replacement Strategies for Wideband CDMA OVSF Code Tree Management</sertitle><pubdate><sdate>20011125</sdate><edate/></pubdate></serial><location><pp><ppf>562</ppf><ppl>566</ppl></pp></location></article></nplcit><crossref idref="ncit0001">[0010]</crossref></li>
<li><nplcit id="ref-ncit0002" npl-type="s"><article><author><name>MINN T.</name></author><atl>Dynamic Assignment Of Orthogonal Variable-Spreading-Factor Codes in W-CDMA</atl><serial><sertitle>IEEE Journal on Selected Areas in Communications</sertitle><pubdate><sdate>20000800</sdate><edate/></pubdate><vid>18</vid><ino>8</ino></serial><location><pp><ppf>1429</ppf><ppl>1440</ppl></pp></location></article></nplcit><crossref idref="ncit0002">[0010]</crossref></li>
</ul></p>
</ep-reference-list>
</ep-patent-document>
