摘要:
There is disclosed a User Equipment for a MulteFire wireless communication network. The User Equipment comprises processing circuitry and a transmitter, the User Equipment being adapted for utilizing the processing circuitry and the transmitter for performing a Listen-Before-Talk (LBT) procedure for one or more transmission bandwidths; transmitting Physical Uplink Shared CHannel (PUSCH) signaling in a PUSCH subframe on one or more interlaces within the one or more transmission bandwidths; and transmitting Sounding Reference Signaling on the one or more interlaces in the PUSCH subframe.
摘要:
Methods and apparatus in a fifth-generation wireless communications, including an example method, in a wireless device, that includes receiving a downlink signal comprising an uplink access configuration index, using the uplink access configuration index to identify an uplink access configuration from among a predetermined plurality of uplink access configurations, and transmitting to the wireless communications network according to the identified uplink access configuration. The example method further includes, in the same wireless device, receiving, in a first subframe, a first Orthogonal Frequency-Division Multiplexing (OFDM) transmission formatted according to a first numerology and receiving, in a second subframe, a second OFDM transmission formatted according to a second numerology, the second numerology differing from the first numerology. Variants of this method, corresponding apparatuses, and corresponding network-side methods and apparatuses are also disclosed.
摘要:
Methods and apparatus in a fifth-generation wireless communications, including an example method, in a wireless device, that includes receiving a downlink signal comprising an uplink access configuration index, using the uplink access configuration index to identify an uplink access configuration from among a predetermined plurality of uplink access configurations, and transmitting to the wireless communications network according to the identified uplink access configuration. The example method further includes, in the same wireless device, receiving, in a first subframe, a first Orthogonal Frequency-Division Multiplexing (OFDM) transmission formatted according to a first numerology and receiving, in a second subframe, a second OFDM transmission formatted according to a second numerology, the second numerology differing from the first numerology. Variants of this method, corresponding apparatuses, and corresponding network-side methods and apparatuses are also disclosed.
摘要:
There is disclosed a method for operating a transmitting node (10, 100) for a wireless communication network, the transmitting node being adapted for transmitting data utilizing error detection coding, wherein the error detection coding has a coding length in bits, the method comprising adapting the coding length based on a retransmission status of the data. There are also disclosed a corresponding method for operating a receiving node and corresponding nodes and program products and storage media.
摘要:
A method (500) of generating a cryptographic checksum for a message M(x) is provided. The method comprises pseudo-randomly selecting (502) at least two irreducible polynomials pi(x). Each irreducible polynomial pi(x) is selected based on a first cryptographic key from the set of irreducible polynomials of degree ni over a Galois Field. The method further comprises calculating (503) a generator polynomial p(x) of degree n=formula (I) as a product of the N irreducible polynomials formula (II), and calculating (505) the cryptographic checksum as a first function g of a division of a second function of M(x), ƒ(M(x)), modulo p(x), i.e., g(ƒ(M(x)) mod p(x)). By replacing a standard checksum, such as a Cyclic Redundancy Check (CRC), with a cryptographic checksum, an efficient message authentication is provided. The proposed cryptographic checksum may be used for providing integrity assurance on the message, i.e., for detecting random and intentional message changes, with a known level of security. Further, a corresponding computer program, a corresponding computer program product, and a checksum generator for generating a cryptographic checksum, are provided. Σ i = 1 N n i ( I ) p i ( x ) , p ( x ) = Π i = 1 N p i ( x ) , ( II )
摘要:
The present disclosure relates to methods and devices in clustered alarm scenarios. More particularly the disclosure pertains to methods and arrangements for detecting several messages of a preconfigured message type, arriving sequentially in time. This disclosure proposes a method, performed in a radio network node, of detecting several messages of a preconfigured message type. The method comprises detecting SI a first message of the preconfigured message type, the first message being associated with an event. The method further comprises reconfiguring S3, in the radio network node, in response to the detection, at least one radio setting related to detecting further messages of the preconfigured message type and monitoring S4 a radio spectrum for further messages of the preconfigured message type using the reconfigured radio settings.
摘要:
There is disclosed a network node (100) for a wireless communication network. The network node (100) is adapted for performing interlacing based on a time and/or frequency structure and/or resource structure. There are also disclosed related devices and methods.
摘要:
There is disclosed a method for operating a transmitting node (10, 100) for a wireless communication network, the transmitting node being adapted for transmitting data utilizing error detection coding, wherein the error detection coding has a coding length in bits, the method comprising adapting the coding length based on a retransmission status of the data. There are also disclosed a corresponding method for operating a receiving node and corresponding nodes and program products and storage media.
摘要:
A physical uplink control channel (PUCCH) format for transmission of uplink control information (UCI) in unlicensed spectrum is either short PUCCH or long PUCCH. The short PUCCH occupies less than 1 subframe in the time domain and spans an entire system bandwidth in the frequency domain with interlacing on a resource block level. The long PUCCH occupies one subframe in the time domain and spans the entire system bandwidth in the frequency domain with interlacing on a resource block level.
摘要:
The present disclosure concerns radio communication. More particularly, the present disclosure concerns a possible reduction in overhead signaling. The radio link quality of a first radio link (e.g., DL) as well as a second radio link (e.g., UL) is obtained 130. Also, the obtained radio link quality of the first radio link is compared 140 with the obtained radio link quality of the second radio link. This is done in order to establish whether a similarity in the radio link quality is within a predefined tolerance. Next, the signaling for both the first radio link and the second radio link is controlled 150 if, or when, the similarity of the radio link quality is determined to be within said predefined tolerance.