US9271245B2 - Method for determining transmission power - Google Patents
Method for determining transmission power Download PDFInfo
- Publication number
- US9271245B2 US9271245B2 US14/065,084 US201314065084A US9271245B2 US 9271245 B2 US9271245 B2 US 9271245B2 US 201314065084 A US201314065084 A US 201314065084A US 9271245 B2 US9271245 B2 US 9271245B2
- Authority
- US
- United States
- Prior art keywords
- secret data
- transmitted
- data
- secret
- transmission power
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 230000005540 biological transmission Effects 0.000 title 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/04—Transmission power control [TPC]
- H04W52/30—Transmission power control [TPC] using constraints in the total amount of available transmission power
- H04W52/34—TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
- H04W52/343—TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading taking into account loading or congestion level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/04—Transmission power control [TPC]
- H04W52/18—TPC being performed according to specific parameters
- H04W52/28—TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
- H04W52/281—TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission taking into account user or data type priority
Definitions
- the present invention relates to a method for determining transmission power.
- FIG. 1 illustrates a wireless communication system
- the wireless communication system includes at least one base station (BS) 20 .
- Each base station 20 provides a communication service to specific geographical areas (generally, referred to as cells) 20 a , 20 b , and 20 c .
- the cell can be further divided into a plurality of areas (sectors).
- a terminal (user equipment, UE) 10 may be fixed or movable and may be called other terms such as a mobile station (MS), a mobile terminal (MT), a user terminal (UT), a subscriber station (SS), a wireless device, a personal digital assistant (PDA), a wireless modem, a handheld device, and the like.
- the base station 20 generally represents a fixed station that communicates with the terminal 10 , and may be called different terms such as an evolved-NodeB (eNB), a base transceiver system (BTS), an access point, and the like.
- eNB evolved-NodeB
- BTS base transceiver system
- access point and the like.
- the terminal generally belongs to one cell and the cell to which the terminal belong is referred to as a serving cell.
- a base station that provides the communication service to the serving cell is referred to as a serving BS. Since the wireless communication system is a cellular system, another cell that neighbors to the serving cell is present. Another cell which neighbors to the serving cell is referred to a neighbor cell.
- a base station that provides the communication service to the neighbor cell is referred to as a neighbor BS.
- the serving cell and the neighbor cell are relatively decided based on the terminal.
- a downlink means communication from the base station 20 to the terminal 10 and an uplink means communication from the terminal 10 to the base station 20 .
- a transmitter may be a part of the base station 20 and a receiver may be a part of the terminal 10 .
- the transmitter may be a part of the terminal 10 and the receiver may be a part of the base station 20 .
- the wireless communication system may be any one of a multiple-input multiple-output (MIMO) system, a multiple-input single-output (MISO) system, a single-input single-output (SISO) system, and a single-input multiple-output (SIMO) system.
- MIMO multiple-input multiple-output
- MISO multiple-input single-output
- SISO single-input single-output
- SIMO single-input multiple-output
- the MIMO system uses a plurality of transmit antennas and a plurality of receive antennas.
- the MISO system uses a plurality of transmit antennas and one receive antenna.
- the SISO system uses one transmit antenna and one receive antenna.
- the SIMO system uses one transmit antenna and one receive antenna.
- the transmit antenna means a physical or logical antenna used to transmit one signal or stream
- the receive antenna means a physical or logical antenna used to receive one signal or stream.
- the wireless communication system may be generally divided into a frequency division duplex (FDD) type and a time division duplex (TDD) type.
- FDD frequency division duplex
- TDD time division duplex
- uplink transmission and downlink transmission are achieved while occupying different frequency bands.
- the uplink transmission and the downlink transmission are achieved at different time while occupying the same frequency band.
- a channel response of the TDD type is substantially reciprocal. This means that a downlink channel response and an uplink channel response are approximately the same as each other in a given frequency area. Accordingly, in the TDD based wireless communication system, the downlink channel response may be acquired from the uplink channel response.
- the downlink transmission by the base station and the uplink transmission by the terminal may not be performed simultaneously.
- the uplink transmission and the downlink transmission are performed in different subframes.
- transmission power is a key matter to decide a cell coverage.
- the transmission power is increased, since the transmission power is overheard by a third person, the transmission power may not be thoughtlessly increased.
- one disclosure of the specification is to provide techniques for optimizing transmission power.
- the method may comprise: determining whether data to be transmitted by a transmitting device is sensitive to a delay; determining whether both the secret data and the non-secret data are required to be simultaneously transmitted when the data to be transmitted is sensitive to the delay; and applying different weights to the secret data and the non-secret data and deciding transmission power to maximize a total channel capacity according to the application, when it is determined that both the secret data and the non-secret data are required to be transmitted.
- the method may further comprise: determining whether both the secret data and the non-secret data are required to be simultaneously transmitted when it is determined that the data to be transmitted is not sensitive to the delay; deciding optimal transmission power by minimizing an outage probability when target secret transmission rate R s is given in the case where it is determined that only the secret data is required to be transmitted; and deciding the target secret transmission rate R s in order to maximize a system throughput.
- the method may further comprise: calculating the outage probability by considering both the non-secret data and the secret data when it is determined that the data to be transmitted is not sensitive to the delay and it is determined that both the secret data and the non-secret data are required to be transmitted; and deciding transmission power to minimize the outage probability.
- the method may further comprise: calculating the outage probability for each of the non-secret data and the secret data when it is determined that the data to be transmitted is not sensitive to the delay and it is determined that both the secret data and the non-secret data are required to be transmitted; and deciding transmission power to minimize the outage probability for the secret data while ensuring a maximum value of the outage probability for the non-secret data.
- the method may further comprise: determining whether both the secret data and the non-secret data are required to be transmitted when it is determined that only some of the data to be transmitted is sensitive to the delay; and deciding transmission power to maximize an ergodic channel capacity of the secret data while meeting a minimum outage probability of the secret data when it is determined that only some of the data to be transmitted is sensitive to the delay and it is determined that only the secret data is required to be transmitted.
- the method may further comprise: applying different weights to the non-secret data and the secret data in order to maximize a total channel capacity for the secret data and the non-secret data when it is determined that only some of the data to be transmitted is sensitive to the delay, but both the secret data and the non-secret data are required to be transmitted; and deciding the transmission power by considering both the outage probability for the non-secret data and the outage probability of the secret data.
- the method may further comprise: deciding transmission power to maximize a channel capacity for the secret data, but constrain the maximum value of the outage probability for the non-secret data in order to maximize the channel capacity for the secret data when it is determined that only some of the data to be transmitted is sensitive to the delay, but both the secret data and the non-secret data are required to be transmitted.
- the method may further comprise: deciding transmission power to maximize a channel capacity for the non-secret data, but constrain the maximum value of the outage probability for the secret data in order to maximize the channel capacity for the non-secret data when it is determined that only some of the data to be transmitted is sensitive to the delay, but both the secret data and the non-secret data are required to be transmitted.
- the transmission power of the wireless communication system is optimized by the methods proposed in the present invention, the following effects are obtained.
- transmitted data is not sensitive to a transmission delay, an ergodic channel capacity can be maximized by optimizing the transmission power.
- different weights are given to two different types to optimize the transmission power, thereby adjusting a non-secret channel capacity value and a secret channel capacity value.
- an outage probability can be minimized by optimizing the transmission power.
- an outage probability considering both the non-secret data and the secret data may be minimized, only an outage probability for the non-secret data may be minimized, or only an outage probability for the secret data may be minimized.
- target transmission rate at a receiver may be optimized so as to maximize a system throughput.
- the ergodic channel capacity can be maximized while preventing the outage probability from being increased to a predetermined reference value or more by optimizing the transmission power.
- the optimization of the transmission power can be performed in all of a case in which only the non-secret data is transmitted, a case in which only the secret data is transmitted, and a case in which both the secret data and the non-secret data are transmitted.
- FIG. 1 is view of an evolved mobile communication network
- FIG. 2 shows a downlink radio frame structure in 3rd generation partnership project (3GPP) long term evolution (LTE).
- 3GPP 3rd generation partnership project
- LTE long term evolution
- FIG. 3 shows the structure of an uplink subframe in 3rd generation partnership project (3GPP) long term evolution (LTE).
- 3GPP 3rd generation partnership project
- LTE long term evolution
- FIG. 4 shows a concept of a communication system by an information theory.
- FIG. 5 shows an example in which the concept by the information theory shown in FIG. 4 is applied to a mobile system.
- FIG. 6 shows an example, in which data which is not sensitive to transmission delay is transmitted according to a first embodiment.
- FIG. 7 shows an example, in which data which is sensitive to transmission delay is transmitted according to a second embodiment.
- FIG. 8 shows an example, in which data which is sensitive and data which is not sensitive to transmission delay is transmitted simultaneously according to a third embodiment.
- FIG. 9 shows an example of a concept of device to device (D2D) to which the embodiments can be applied.
- FIG. 10 is a flowchart shown by synthesizing the embodiments.
- FIG. 11 is a block diagram showing a wireless communication system to implement an embodiment of the present invention.
- the present invention will be described on the basis of a universal mobile telecommunication system (UMTS) and an evolved packet core (EPC).
- UMTS universal mobile telecommunication system
- EPC evolved packet core
- the present invention is not limited to such communication systems, and it may be also applicable to all kinds of communication systems and methods to which the technical spirit of the present invention is applied.
- technological terms used herein are merely used to describe a specific embodiment, but not to limit the present invention. Also, unless particularly defined otherwise, technological terms used herein should be construed as a meaning that is generally understood by those having ordinary skill in the art to which the invention pertains, and should not be construed too broadly or too narrowly. Furthermore, if technological terms used herein are wrong terms unable to correctly express the spirit of the invention, then they should be replaced by technological terms that are properly understood by those skilled in the art. In addition, general terms used in this invention should be construed based on the definition of dictionary, or the context, and should not be construed too broadly or too narrowly.
- first, second, etc. can be used to describe various elements, but the elements should not be limited by those terms. The terms are used merely to distinguish an element from the other element. For example, a first element may be named to a second element, and similarly, a second element may be named to a first element.
- the terminal may be referred to as terms such as a user equipment (UE), a mobile equipment (ME), a mobile station (MS), a user terminal (UT), a subscriber station (SS), a wireless device (WD), a handheld device (HD), an access terminal (AT), and etc.
- the terminal may be implemented as a portable device such as a notebook, a mobile phone, a PDA, a smart phone, a multimedia device, etc, or as an unportable device such as a PC or a vehicle-mounted device.
- the 3GPP LTE uses an orthogonal frequency division multiple access (OFDMI) in a downlink and a single carrier-frequency division multiple access (SC-FDMI) in an uplink.
- OFDM needs to know in order to understand the OFDMA.
- the OFDM may be used since an inter-symbol interference effect can be reduced due to low complexity.
- the OFDM converts data to be input in serial into N parallel data and transmits it by carrying N orthogonal sub-carriers.
- the sub-carriers maintains orthogonally in a frequency dimension.
- the OFDMA means a multiple access method to realize multiple accesses by providing a part of the available sub-carrier to each user independently, in a system using the OFDM in a modulation scheme.
- FIG. 2 shows a downlink radio frame structure in 3rd generation partnership project (3GPP) long term evolution (LTE).
- 3GPP 3rd generation partnership project
- LTE long term evolution
- the section 6 of 3GPP TS 36.211 V8.7.0 (2009-05) “Evolved Universal Terrestrial Radio Access (E-UTRI); Physical Channels and Modulation (Release 8)” may be incorporated herein.
- a radio frame includes 10 subframes indexed with 0 to 9.
- One subframe includes 2 consecutive slots.
- a time required for transmitting one subframe is defined as a transmission time interval (TTI).
- TTI transmission time interval
- one subframe may have a length of 1 millisecond (ms), and one slot may have a length of 0.5 ms.
- One slot may include a plurality of orthogonal frequency division multiplexing (OFDM) symbols in a time domain.
- OFDM orthogonal frequency division multiplexing
- the OFDM symbol is only for expressing one symbol period in the time domain, and there is no limitation in a multiple access scheme or terminologies.
- the OFDM symbol may also be referred to as another terminology such as a single carrier frequency division multiple access (SC-FDMI) symbol, a symbol period, etc.
- SC-FDMI single carrier frequency division multiple access
- one slot includes 7 OFDM symbols for example, the number of OFDM symbols included in one slot may vary depending on a length of a cyclic prefix (CP).
- CP cyclic prefix
- a resource block (RII) is a resource allocation unit, and includes a plurality of subcarriers in one slot. For example, if one slot includes 7 OFDM symbols in a time domain and the RB includes 12 subcarriers in a frequency domain, one RB can include 7 ⁇ 12 resource elements (REs).
- REs resource elements
- a DL subframe is divided into a control region and a data region in the time domain.
- the control region includes up to first three OFDM symbols of a 1st slot in the subframe. However, the number of OFDM symbols included in the control region may vary.
- a physical downlink control channel (PDCCH) and other control channels are allocated to the control region, and a physical downlink shared channel (PDSCH) is allocated to the data region.
- PDCCH physical downlink control channel
- PDSCH physical downlink shared channel
- the 3GPP LTE classifies a physical channel into a data channel and a control channel.
- the data channel include a physical downlink shared channel (PDSCH) and a physical uplink shared channel (PUSCH).
- Examples of the control channel include a physical downlink control channel (PDCCH), a physical control format indicator channel (PCFICH), a physical hybrid-ARQ indicator channel (PHICH), and a physical uplink control channel (PUCCH).
- the PCFICH transmitted in a 1st OFDM symbol of the subframe carries a control format indicator (CFI) regarding the number of OFDM symbols (i.e., a size of the control region) used for transmission of control channels in the subframe.
- CFI control format indicator
- the UE first receives the CFI on the PCFICH, and thereafter monitors the PDCCH.
- the PCFICH is transmitted by using a fixed PCFICH resource of the subframe, without having to perform blind decoding.
- the PHICH carries a positive-acknowledgement (ACK)/negative-acknowledgement (NACK) signal for an uplink hybrid automatic repeat request (HARQ).
- ACK positive-acknowledgement
- NACK negative-acknowledgement
- HARQ uplink hybrid automatic repeat request
- a physical broadcast channel (PBCH) is transmitted in first four OFDM symbols in a 2nd slot of a 1st subframe of a radio frame.
- the PBCH carries system information necessary for communication between the UE and the BS.
- the system information transmitted through the PBCH is referred to as a master information block (MIII).
- MIII master information block
- SIII system information transmitted on the PDCCH indicated by the PDCCH
- the DCI may include resource allocation of the PDSCH (this is referred to as a DL grant), resource allocation of a PUSCH (this is referred to as a UL grant), a set of transmit power control commands for individual UEs in any UE group, and/or activation of a voice over Internet protocol (VoIP).
- DCI downlink control information
- the DCI may include resource allocation of the PDSCH (this is referred to as a DL grant), resource allocation of a PUSCH (this is referred to as a UL grant), a set of transmit power control commands for individual UEs in any UE group, and/or activation of a voice over Internet protocol (VoIP).
- VoIP voice over Internet protocol
- the 3GPP LTE uses blind decoding for PDCCH detection.
- the blind decoding is a scheme in which a desired identifier is de-masked from a cyclic redundancy check (CRC) of a received PDCCH (referred to as a candidate PDCCH) to determine whether the PDCCH is its own control channel by performing CRC error checking.
- CRC cyclic redundancy check
- the BS determines a PDCCH format according to DCI to be transmitted to the UE, attaches a CRC to the DCI, and masks a unique identifier (referred to as a radio network temporary identifier (RNTI)) to the CRC according to an owner or usage of the PDCCH.
- RNTI radio network temporary identifier
- a control region in a subframe includes a plurality of control channel elements (CCEs).
- the CCE is a logical allocation unit used to provide the PDCCH with a coding rate depending on a radio channel state, and corresponds to a plurality of resource element groups (REGs).
- the REG includes a plurality of resource elements. According to an association relation of the number of CCEs and the coding rate provided by the CCEs, a PDCCH format and the number of bits of the available PDCCH are determined.
- One REG includes 4 REs.
- One CCE includes 9 REGs.
- the number of CCEs used to configure one PDCCH may be selected from a set ⁇ 1, 2, 4, 8 ⁇ . Each element of the set ⁇ 1, 2, 4, 8 ⁇ is referred to as a CCE aggregation level.
- the BS determines the number of CCEs used in transmission of the PDCCH according to a channel state. For example, a UE having a good DL channel state can use one CCE in PDCCH transmission. A UE having a poor DL channel state can use 8 CCEs in PDCCH transmission.
- a control channel consisting of one or more CCEs performs interleaving in an REG unit, and is mapped to a physical resource after performing cyclic shift based on a cell identifier (ID).
- ID cell identifier
- the UE may be located in any area in a cell.
- a UL signal transmitted by the UE may arrive to the BS at a different time according to the location of the UE.
- a signal arrival time of a UE located in a cell edge is longer than a signal arrival time of a UE located in a cell center.
- the signal arrival time of the UE located in the cell center is shorter than the signal arrival time of the UE located in the cell edge.
- the BS needs to perform scheduling so that UL signals transmitted by the UEs in the cell can be received every time within a boundary.
- the BS has to properly adjust transmission timing of each UE according to a situation of each UE. Such an adjustment is called a time alignment maintenance.
- a random access procedure is one of methods for managing the time alignment.
- the UE transmits a random access preamble to the BS.
- the BS calculates a time alignment value for advancing or delaying transmission timing of the UE on the basis of the received random access preamble.
- the BS transmits a random access response including the calculated time alignment value to the UE.
- the UE updates the transmission timing by using the time alignment value.
- the BS receives a sounding reference signal from the UE periodically or randomly, calculates the time alignment value of the UE by using the sounding reference signal, and reports a MAC control element (CE) to the UE.
- CE MAC control element
- the time alignment value is information sent by the BS to the UE to maintain uplink time alignment.
- a timing alignment command indicates this information.
- the transmission timing of the UE varies depending on a moving speed, a location, or the like of the UE. Therefore, the time alignment value received by the UE is preferably valid during a specific time period. For this, a time alignment timer is used.
- the UE When the time alignment is updated after receiving the time alignment value from the BS, the UE starts or restarts the time alignment timer.
- the UE can perform UL transmission only when the time alignment timer is running.
- a value of the time alignment timer may be reported by the BS to the UE by using system information or an RRC message such as a radio bearer reconfiguration message.
- the UE When the time alignment timer expires or when the time alignment timer does not run, the UE does not transmit any uplink signal except for the random access preamble under the assumption that time alignment is not achieved between the BS and the UE.
- FIG. 3 shows the structure of an uplink subframe in 3rd generation partnership project (3GPP) long term evolution (LTE).
- 3GPP 3rd generation partnership project
- LTE long term evolution
- an uplink subframe may be divided into a control region and a data region in the frequency domain.
- a physical uplink control channel (PUCCH) for transmitting uplink control information is allocated to the control region.
- a physical uplink shared channel (PUCCH) for transmitting data is allocated to the data region. If indicated by a higher layer, the user equipment may support simultaneous transmission of the PUCCH and the PUSCH.
- the PUSCH is mapped to a uplink shared channel (UL-SCH), a transport channel.
- Uplink data transmitted on the PUSCH may be a transport block, a data block for the UL-SCH transmitted during the TTI.
- the transport block may be user information.
- the uplink data may be multiplexed data.
- the multiplexed data may be data obtained by multiplexing the transport block for the UL-SCH and control information.
- control information multiplexed to data may include a channel quality indicator (CQI), a precoding matrix indicator (PMI), an HARQ, a rank indicator (RI), or the like.
- the uplink data may include only control information.
- the PUCCH for one UE is allocated in an RB pair.
- RBs belonging to the RB pair occupy different subcarriers in each of a 1st slot and a 2nd slot.
- a frequency occupied by the RBs belonging to the RB pair allocated to the PUCCH changes at a slot boundary. This is called that the RB pair allocated to the PUCCH is frequency-hopped at a slot boundary. Since the UE transmits UL control information over time through different subcarriers, a frequency diversity gain can be obtained.
- m is a location index indicating a logical frequency-domain location of the RB pair allocated to the PUCCH in the subframe.
- FIG. 4 shows a concept of a communication system by an information theory.
- a channel capacity induced by the information theory shows a maximum value of data transmission rate which is transmittable in the wireless communication system.
- a received signal in Bob r b is given as below.
- r b h b x+ ⁇ b [Equation 1]
- h b represents a channel between Alice and Bob
- x represents a transmit signal
- ⁇ b represents additive white Gaussian noise in Bob.
- the channel capacity in the wireless communication system is given as below.
- FIG. 5 shows an example in which the concept by the information theory shown in FIG. 4 is applied to a mobile system.
- a physical layer security method allows a signal transmitted by a transmitter to be normally received by a desired receiver, however, prevents the transmitted signal from being received by a wiretapper or decoded even though the transmitted signal is received by the wiretapper, by using the information theory and a signal processing theory.
- a lot of methods of secretly transmitting data through a wireless channel have been proposed and researched, based on the new approach.
- a maximum value of a data transmission rate which may be secretly transmitted without being overheard by using the physical layer secret method is referred to as a secrecy channel capacity and is given by [Equation 4] below.
- optimizing the transmission power in the wireless communication system is very important due to minimization of consumption of system power, maximization of battery use hours, minimization of interference to other users, assurance of quality of transmitted data (quality of service: QoS), and the like.
- the power optimization has been researched a lot up to now and the transmission power should be optimized differently depending on a type of data.
- the optimization of the transmission power is performed with respect to three cases below in this specification.
- an optimal power control method had been developed by regarding a case in which only the non-secret data is transmitted with respect to respective cases i), ii) and iii). Further, the optimal power control method had been developed even in a case in which only the secret data is transmitted, with respect to cases i) and ii). However, the optimal power control method has not been developed up to now in the case in which the secret data is transmitted, with respect to case iii). Further, the existing research, the optimal power control methods had been researched on the assumption of the case in which only the non-secret data is transmitted or only the secret data is transmitted.
- both the non-secret data and the secret data may be transmitted as described above.
- the wireless channel may be more efficiently used. Therefore, optimizing of power transmission in such a case is also important.
- the optimal power control method in such a case has not been developed up to now.
- an object of this specification is to present the optimal power control methods in the case in which the secret data is transmitted with respect to case iii) and a case in which both the non-secret data and the secret data are transmitted with respect to cases i), ii), and iii).
- transmission power p is expressed by p(
- the transmission power p is expressed by p(h) in the case of functions of channel gains
- h (
- mean power consumption is limited as below. [ p (
- P av represents an upper limit value of the mean power consumption.
- FIG. 6 shows an example in which data which is not sensitive to a transmission delay is transmitted according to a first embodiment.
- a block length or a codeword length of transmitted data may be sufficiently large and it may be assumed that a channel suffers a change in one block. Under this situation, an index of performance is a well-known ergodic channel capacity.
- Equation 8 a question of acquiring optimal power is given by Equation 8 below.
- Equation 9 A solution for the optimization question is very well-known classical “water-filling” and the optimal power is given by Equation 9 below.
- Equation 10 [ p *(
- )] P av [Equation 10]
- Equation 11 a question of acquiring optimal power is given by Equation 11 below.
- Equation 12 A solution to the optimization question is given as shown in Equation 12 below.
- Equation 14 A channel capacity of the non-secret data which may be transmitted simultaneously as above is given by Equation 14 below.
- Equation 16 a probability density function ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇
- the non-secret data is also actually transmitted with the channel capacity of C n (p ns (h)). That is, when power optimized by a predetermined ⁇ value is expressed by p ns *(h), actually transmitted data is given by Equation 17 below at all times.
- C ns ( p ns *( h )) C s ( p ns *( h ))+ C n ( p ns ( h )) [Equation 17]
- a solution for the optimization question may be mathematically acquired, and the solution is given as follows.
- ⁇ is acquired to meet the mean power condition [p*(
- h b )] P av .
- such an optimal power method 20 is called “combined water-filling (c-wf)”.
- FIG. 7 shows an example in which data which is sensitive to a transmission delay is transmitted according to a second embodiment.
- a block length or a codeword length of the transmitted data may not sufficiently be large.
- a channel does not almost suffer a change within one block and a performance index under this situation is an outage channel capacity or an outage probability.
- the outage channel capacity may be analyzed as a meaning of a disable channel capacity and the outage probability may be analyzed as a meaning a failure probability.
- a first method as a method for optimizing power minimizes the outage probability when the target non-secret transmission rate, R n is given.
- Equation 24 A solution for this question is given as illustrated in Equation 24 below.
- Equation 26 p n inv (
- ) represents the minimum power for meet the target non-secret transmission rate, R n and is given as illustrated in Equation 26 below.
- ) is referred to as a “channel inversion (inv)” power allocation method. Further, when a channel gain p n *(
- the power allocation is referred to as “truncated channel inversion” power allocation.
- Optimization according to a second method uses power allocation by the aforementioned truncated channel inversion as it is and optimizes the reference value itself.
- the target non-secret transmission rate R n is not given as a constant and the value is also changed.
- the truncated channel inversion method illustrated in Equation 27 below is considered.
- Equation 28 a value of ⁇ that meets a mean power condition ⁇ th [p*(
- )] ⁇ ⁇ th [1/
- 2 ] P av is given as illustrated in Equation 28 below.
- a throughput of an actual system is given by a product of a probability at which the channel gain
- the optimal reference value ⁇ th is decided to maximize the system throughput.
- the secret outage probability is given as below.
- the method for optimizing power optimizes the secret outage probability when the target secret transmission rate R s is given as below.
- p s s-inv (h) and s s-inv (z) are defined as below.
- Equation 29 the system throughput for the non-secret data may be expressed by Equation 29 as below.
- the target non-secret transmission rate R n may be optimized as below in order to maximize the system throughput.
- optimization for the reference value ⁇ th in Equation 30 may be actually the same concept as the optimization of the target non-secret transmission rate R n just as above.
- the target secret transmission rate R s is optimized as below in order to maximize a secret transmission throughput.
- the throughput in the secret data transmitting system may be maximized.
- the optimization question is difficult to mathematically solve and is solved by a numerical analytical method using a computer.
- the outage probability is defined by considering both the secret data and the non-secret data as below.
- C ns (p ns *(h)) R n ⁇ C s ( p n n-inv ( h )) ⁇ Pr ( h ⁇ ns c-inv ( z *) and p n n-inv ( h ) ⁇ p s s-inv ( h ))+ R s ⁇ C n ( p s s-inv ( h )) ⁇ Pr ( h ⁇ ns c-inv ( z *) and p s s-inv ( h )> p n n-inv ( h )) [Equation 45]
- the outage probability for each of the secret data and the non-secret data is defined as below.
- p ns * ⁇ ( h ) ⁇ p ns c - inv ⁇ ( h ) , if ⁇ ⁇ h ⁇ H n n - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R s s - inv ⁇ ( z * ) p n n - inv ⁇ ( h ) , if ⁇ ⁇ h ⁇ H n n - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R s s - inv ⁇ ( z * ) p s s - inv ⁇ ( h ) , if ⁇ ⁇ h ⁇ H n n - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R s s - inv ⁇ ( z * ) 0 , otherwise [ Equation ⁇ ⁇ 48 ]
- F x (h)(•) represents a cumulative distribution function (CDF) of a random variable X(h) given below.
- C _ ns ⁇ ( p ns * ⁇ ( h ) ) R n ⁇ C _ s ⁇ ( p n n - inv ⁇ ( h ) ) ⁇ Pr ⁇ ( h ⁇ H n n - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R s s - inv ⁇ ( z * ) ⁇ ⁇ and ⁇ ⁇ p n n - inv ⁇ ( h ) ⁇ p s s - inv ⁇ ( h ) ) + R s ⁇ C _ n ⁇ ( p s s - inv ⁇ ( h ) ) ⁇ Pr ⁇ ( h ⁇ H n n - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R s s - inv ⁇ ( z * ) ⁇ ⁇ and ⁇ ⁇ p s s - inv
- the outage probability for each of the secret data and the non-secret data is defined, however, the outage probability for the non-secret data is minimized while maintaining the maximum value of the outage probability for the secret data. This question is given as below.
- p ns * ⁇ ( h ) ⁇ p ns c - inv ⁇ ( h ) , if ⁇ ⁇ h ⁇ H s s - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R n n - inv ⁇ ( z * ) p s s - inv ⁇ ( h ) , if ⁇ ⁇ h ⁇ H s s - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R n n - inv ⁇ ( z * ) p n s - inv ⁇ ( h ) , if ⁇ ⁇ h ⁇ H s s - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R n n - inv ⁇ ( z * ) 0 , otherwise [ Equation ⁇ ⁇ 54 ]
- F Y (h)(•) represents a cumulative distribution function (CDF) of a random variable Y(h) given below.
- C _ ns ⁇ ( p ns * ⁇ ( h ) ) R n ⁇ C _ s ⁇ ( p n n - inv ⁇ ( h ) ) ⁇ Pr ⁇ ( h ⁇ H s s - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R n n - inv ⁇ ( z * ) ⁇ ⁇ and ⁇ ⁇ p n n - inv ⁇ ( h ) ⁇ p s s - inv ⁇ ( h ) ) + R s ⁇ C _ n ⁇ ( p s s - inv ⁇ ( h ) ) ⁇ Pr ⁇ ( h ⁇ H s s - inv ⁇ ⁇ and ⁇ ⁇ h ⁇ R n n - inv ⁇ ( z * ) ⁇ ⁇ and ⁇ ⁇ p s s - inv
- both R n and R s are optimized in order to optimize the sum in transmission rate of the non-secret data and the secret data, and the outage probability thereof. This is expressed by an equation below.
- R n is optimized as below.
- R s is optimized as below.
- FIG. 8 shows an example in which data which is sensitive to a transmission delay is transmitted according to a third embodiment.
- the power should be optimized by considering both the ergodic channel capacity and the outage probability discussed above.
- epsilon n represents a maximum outage probability which is permissible with respect to the non-secret data.
- ) represents the conventional water-filling and is given by an equation below.
- )]. Further, n inv is decided as below. n inv ⁇
- a method which maximizes the secret ergodic channel capacity while meeting the minimum secret outage probability condition when the data which is sensitive to the transmission delay and the secret data which is not sensitive to the transmission delay coexist.
- An optimization question based on such as method is given as below.
- ⁇ s represents a maximum outage probability which is permissible with respect to the secret data.
- a constraint condition is that a maximum value of the outage probability considering both the non-secret data and the secret data is constrained.
- ⁇ ns represents a permissible maximum value of the outage probability considering both the secret data and the non-secret data.
- p ns * ⁇ ( h ) ⁇ max ⁇ ⁇ p ns c - inv ⁇ ( h ) , p ns c - wf ⁇ ( h ) ⁇ , if ⁇ ⁇ h ⁇ H ns c - inv p ns c - wf ⁇ ( h ) , if ⁇ ⁇ h ⁇ H ns c - inv ⁇ ⁇ ⁇
- F z (h)(•) represents a cumulative distribution function of Z(h), a probability variable defined as below.
- the second method for optimizing the transmission power is maximizing the channel capacity for the secret data.
- the constraint condition is to constrain the maximum value of the outage probability for the non-secret data.
- p ns * ⁇ ( h ) ⁇ max ⁇ ⁇ p n n - inv ⁇ ( h ) , p s s - wf ⁇ ( h ) ⁇ , if ⁇ ⁇ h ⁇ H n n - inv p s s - wf ⁇ ( h ) , if ⁇ ⁇ h ⁇ H n n - inv [ Equation ⁇ ⁇ 76 ]
- the third method for optimizing the transmission power is maximizing the channel capacity for the non-secret data.
- the constraint condition is to constrain the maximum value of the outage probability for the secret data.
- p ns * ⁇ ( h ) ⁇ max ⁇ ⁇ p s s - inv ⁇ ( h ) , p n n - wf ⁇ ( h ) ⁇ if ⁇ ⁇ h ⁇ H s s - inv p n n - wf ⁇ ( h ) if ⁇ ⁇ h ⁇ H s s - inv [ Equation ⁇ ⁇ 79 ]
- the constraint condition is to make a constraint so that different maximum values are secured with respect to two outage probabilities separately considering the non-secret data and the secret data.
- the constraint condition is mathematically given as below.
- FIG. 9 shows an example of a concept of device to device (D2D) to which the embodiments can be applied.
- D2D device to device which is a communication between UEs is scheduled to be permitted.
- Alice, Bob, and Charlie may perform direct communication without intervention by a base station (eNodeB).
- Alice, Bob, and Charlie may directly communicate each other under the help of the base station (eNodeB).
- the aforementioned embodiments may be applied under the situation in which Alice, Bob, and Charlie may directly communicate with each other by the D2D.
- FIG. 10 is a flowchart shown by synthesizing the embodiments.
- the transmitting device applies different weights to the non-secret data and the secret data and the transmission power is optimized as shown in [Equation 16] to maximize an ergodic channel capacity of the sum thereof (S 1120 ).
- the transmission power may be maximized based on [Equation 18] in order to maximize the ergodic channel capacity of the sum of the non-secret data and the secret data.
- the transmission power may be maximized by using an existing water-filling method given in [Equation 21] in order to maximize the sum of the channel capacities of the non-secret data and the secret data.
- the transmitting device when it is determined that the data to be transmitted is not sensitive to the delay, the transmitting device also determines whether both the secret data and the non-secret data are required to be transmitted (S 1210 ).
- the optimal transmission power may be optimized by minimizing an outage probability when target secret transmission rate R s is given in the case where it is determined that only the secret data is required to be transmitted (S 122 ). Subsequently, the target secret transmission rate R s may be optimized as shown in [Equation 39] in order to maximize a system throughput (S 1230 ).
- the outage probability is calculated by considering both the non-secret data and the secret data as shown in [Equation 40] (S 1240 ) and the transmission power may be optimized so as to minimize the outage probability as shown in [Equation 41] (S 1250 ).
- [Equation 48] and [Equation 49] may be used in order to optimize the transmission power.
- the outage probabilities for both the non-secret data and the secret data are separately configured as shown in [Equation 46] and the transmission power may be optimized so as to minimize a secret outage probability while assuring a maximum value of a non-secret outage probability as shown in [Equation 47].
- [Equation 48] and [Equation 49] may be used in order to optimize the transmission power.
- the outage probabilities for both the non-secret data and the secret data are separately configured as shown in [Equation 46] and the transmission power may be optimized so as to minimize the non-secret outage probability while assuring a maximum value of the secret outage probability as shown in [Equation 53].
- [Equation 54] and [Equation 55] may be used in order to optimize the transmission power.
- both the target secret transmission rate R s and target non-secret transmission rate R n may be optimized as shown in [Equation 59].
- the target non-secret transmission rate R n may be optimized while the target secret transmission rate R s is given as shown in [Equation 60].
- the target secret transmission rate R s may be optimized while the target non-secret transmission rate R n is given as shown in [Equation 61].
- the transmitting device when it is determined that only some of the data to be transmitted is sensitive to the delay, the transmitting device also determines whether both the secret data and the non-secret data are required to be transmitted (S 1310 ).
- the transmission power is optimized so as to maximize the ergodic channel capacity of the secret data while meeting a minimum outage probability of the secret data as shown in [Equation 67] (S 1320 ).
- [Equation 68] may be used in order to optimize the transmission power.
- the transmission power may be optimized so as to maximize a channel capacity for the secret data, maximize a channel capacity for the non-secret data, or maximize a total channel capacity (S 1330 ).
- the transmission power may be optimized so as to maximize an ergodic channel capacity for the sum acquired by giving different weights to the non-secret data and the secret data and adding the weights as shown in [Equation 70], but constrain the maximum value of the outage probability by considering both the non-secret data and the secret data.
- [Equation 72] may be used in order to optimize the transmission power.
- the transmission power may be optimized so as to maximize the ergodic channel capacity for the sum acquired by giving different weights to the non-secret data and the secret data and adding the weights, but consider the outage probability for each of the non-secret data and the secret data and constrain the maximum value of each value.
- the transmission power may be optimized so as to maximize the ergodic channel capacity for the secret data as shown in [Equation 72], but constrain the maximum value of the outage probability for the non-secret data.
- [Equation 76] and [Equation 77] may be used in order to optimize the transmission power.
- the transmission power may be optimized so as to maximize the ergodic channel capacity for the non-secret data as shown in [Equation 78], but constrain the maximum value of the outage probability for the secret data.
- [Equation 79] may be used in order to optimize the transmission power.
- the embodiments of the present invention described above may be implemented through a variety of means.
- the embodiments of the present invention may be implemented by hardware, a firmware, software or a combination thereof.
- FIG. 11 is a block diagram showing a wireless communication system to implement an embodiment of the present invention.
- a terminal 100 includes a processor 101 , memory 102 , and a radio frequency (RF) unit 103 .
- the memory 102 is connected to the processor 101 and configured to store various information used for the operations for the processor 101 .
- the RF unit 103 is connected to the processor 101 and configured to send and/or receive a radio signal.
- the processor 101 implements the proposed functions, processed, and/or methods. In the described embodiments, the operation of the terminal may be implemented by the processor 101 .
- the processor may include Application-Specific Integrated Circuits (ASICs), other chipsets, logic circuits, and/or data processors.
- the memory may include Read-Only Memory (ROM), Random Access Memory (RAM), flash memory, memory cards, storage media and/or other storage devices.
- the RF unit may include a baseband circuit for processing a radio signal.
- the above-described scheme may be implemented using a module (process or function) which performs the above function.
- the module may be stored in the memory and executed by the processor.
- the memory may be disposed to the processor internally or externally and connected to the processor using a variety of well-known means.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
r b =h b x+η b [Equation 1]
r e =h e x+η e [Equation 3]
(x)+ =x if x>0 and (x)+=0 if x≦0 [Equation 5]
[p(|h b|)]≦
Or
[p(h)]≦
[p*(|h b|)]=
C ns(p ns(h))=C s(p ns(h))+C n(p ns(h)) [Equation 15]
C ns(p ns*(h))=C s(p ns*(h))+C n(p ns(h)) [Equation 17]
it may be thus mathematically illustrated that the system throughput for the non-secret data may be expressed by Equation 29 as below.
n n-inv(z)={h:p n n-inv(h)≦z}
z*=max{z: [p ns*(h)]≦
s s-inv :={{tilde over (h)}:F Y
n inv ={|{tilde over (h)} b |:F |h
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/065,084 US9271245B2 (en) | 2012-10-29 | 2013-10-28 | Method for determining transmission power |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261719524P | 2012-10-29 | 2012-10-29 | |
US14/065,084 US9271245B2 (en) | 2012-10-29 | 2013-10-28 | Method for determining transmission power |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140119283A1 US20140119283A1 (en) | 2014-05-01 |
US9271245B2 true US9271245B2 (en) | 2016-02-23 |
Family
ID=50547121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/065,084 Active 2034-03-21 US9271245B2 (en) | 2012-10-29 | 2013-10-28 | Method for determining transmission power |
Country Status (1)
Country | Link |
---|---|
US (1) | US9271245B2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015142141A1 (en) * | 2014-03-21 | 2015-09-24 | Samsung Electronics Co., Ltd. | Contention-based resource allocation method and apparatus for low power d2d communication |
US10122500B2 (en) * | 2015-08-26 | 2018-11-06 | Apple Inc. | Efficient sparse network resource usage and connection release |
CN111132298B (en) * | 2018-10-30 | 2021-05-28 | 大唐移动通信设备有限公司 | A power distribution method and device |
CN113163173B (en) * | 2021-04-27 | 2022-09-23 | 国网山东省电力公司泰安供电公司 | A method of video data acquisition, processing and transmission based on big data |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070249360A1 (en) * | 2005-12-22 | 2007-10-25 | Arnab Das | Methods and aparatus related to determining, communicating, and/or using delay information in a wireless communications system |
US20120163199A1 (en) * | 2010-12-23 | 2012-06-28 | Peter Marbach | System and method for controlling data transmission in a multihop wireless network |
-
2013
- 2013-10-28 US US14/065,084 patent/US9271245B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070249360A1 (en) * | 2005-12-22 | 2007-10-25 | Arnab Das | Methods and aparatus related to determining, communicating, and/or using delay information in a wireless communications system |
US20120163199A1 (en) * | 2010-12-23 | 2012-06-28 | Peter Marbach | System and method for controlling data transmission in a multihop wireless network |
Also Published As
Publication number | Publication date |
---|---|
US20140119283A1 (en) | 2014-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN115211204B (en) | PDCCH monitoring for single DCI to multi-cell scheduling | |
US9735925B2 (en) | Secure communication method and system based on bit error probability | |
US11038567B2 (en) | Adaptive autonomous uplink communication design | |
US8892151B2 (en) | Autonomous user equipment transmission power control in communication systems | |
US9756585B2 (en) | Method and apparatus for adjusting sound reference signal transmission power | |
US8755332B2 (en) | Radio communication control method, base station apparatus and mobile terminal apparatus | |
US11382100B2 (en) | Multiple start symbols for new radio-unlicensed (NR-U) physical uplink shared channel (PUSCH) | |
US20110116408A1 (en) | Substrate conveying device | |
CN109196933B (en) | Radio network node, wireless device and method performed therein | |
US9301287B2 (en) | Method and device for transmitting uplink control information in a wireless communication system | |
US20160374090A1 (en) | Method and apparatus for transmitting a reference signal in a wireless communication system | |
US20140078974A1 (en) | Power Control for Simultaneous Transmission of ACK/NACK and Channel-State Information in Carrier Aggregation Systems | |
EP3043498A1 (en) | User equipment, network node and methods therein for determining a transport block size in downlink transmissions in a telecommunications system | |
JP2017511665A (en) | Method and apparatus for processing aperiodic channel state information in a wireless communication system | |
US10841790B2 (en) | Method and apparatus for signaling UE capability for new radio access technology in wireless communication system | |
CN114270745A (en) | Configured grant Uplink Control Information (UCI) multiplexing for new radio unlicensed (NR-U) | |
EP2834936B1 (en) | Method and apparatus for signaling reference signals to a ue in an lte system | |
US9271245B2 (en) | Method for determining transmission power | |
US9516607B2 (en) | Method for determining transmission power | |
EP3566370B1 (en) | Long physical uplink control channel (pucch) design for 5th generation (5g) new radio (nr) | |
US20120294251A1 (en) | Method and apparatus for uplink transmission in wireless communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LG ELECTRONICS INC., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HWANG, DAE SUNG;KIM, IL MIN;REEL/FRAME:031500/0302 Effective date: 20131024 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |