摘要:
A method in a network node for assigning resource blocks to a Mobile Station, MS, served by the network node. The MS is capable of downlink multicarrier operation. The network node receives from the MS an indication of a maximum number of consecutive downlink timeslots that the MS is capable of receiving on a given carrier during a TTI. The network node receives, from the MS, an indication of a maximum number of resource blocks that the MS is capable of processing during a TTI. The network node receives, from the MS, an indication of a maximum number of carriers supported by the MS. The network node assigns resource blocks to the MS, based on the received indication of a maximum number of consecutive downlink TS, the received indication of a maximum number of resource blocks and the received indication of a maximum number of carriers.
摘要:
The embodiments herein provide liberty to mobile terminal users. This means that a user will be alerted about public warning messages even in a case where the user has a mobile terminal that is in an active voice or data call or during establishment of a voice or data call. After receiving the alerting indication, the user can take a decision about whether to disconnect the voice or data call and go to idle mode for receiving the actual warning message via a broadcast channel, such as CBCH in case of a GSM system, or skip the warning message.
摘要:
A high-sensitivity receiver may be made by using multiple demodulators to demodulate a given signal. For example, the receiver may use a first demodulator to demodulate an input signal into a first sequence of soft bits and a second demodulator to demodulate the same input signal into a second sequence of soft bits. The two sequences of soft bits may then be compared and combined to create a sequence of hard bits. For example, in some embodiments, a soft bit combiner may combine the two sequences of soft bits into a third sequence of soft bits, which may then be input into a decoder to produce the final decoded hard bits. The secondary demodulator may be less complex, less expensive, demand less power, and/or require fewer computational resources when operating, than the first demodulator.
摘要:
Techniques for decoding repeated messages sent from a transmitter are improved with information obtained from the decoding of the first transmission and by augmenting Chase combining techniques with a voting-based combining method. In an example method, first encoded bits corresponding to a first instance of the repeated message and demodulated to obtain first soft bits, which are decoded to obtain first decoded bits. Second encoded bits corresponding to a second instance of the repeated message are demodulated to obtain second soft bits. The first decoded bits are re-encoded to obtain re-encoded bits. Sign values for modified soft bits are determined from sign values for the first soft bits, the sign values for the second soft bits, and the sign values for the re-encoded bits. The modified soft bits are combined with the first soft bits and decoded.
摘要:
A mobile station, a core network node, a base station subsystem, and various methods are described herein for implementing longer paging cycles (longer Discontinuous Reception (DRX) mode) in a cellular network which has a benefit of reducing the energy consumption of the mobile station's battery.
摘要:
Selective deciphering of a received signal, as taught herein, provides a number of advantages, including greater efficiency through the elimination or at least reduction of wasted decoding cycles. The technique, such as practiced in a user equipment or other wireless communication device, capitalizes on the advantageous recognition herein that the demodulation results obtained for at least some types of received data blocks may be inspected or otherwise evaluated for characteristic patterns that are indicative of whether the data block was or was not ciphered for transmission. That evaluation informs the selective deciphering decision.