[go: up one dir, main page]

WO2017041690A1 - Procédé, dispositif et système de transmission de données à base de modulation à double porteuse - Google Patents

Procédé, dispositif et système de transmission de données à base de modulation à double porteuse Download PDF

Info

Publication number
WO2017041690A1
WO2017041690A1 PCT/CN2016/098166 CN2016098166W WO2017041690A1 WO 2017041690 A1 WO2017041690 A1 WO 2017041690A1 CN 2016098166 W CN2016098166 W CN 2016098166W WO 2017041690 A1 WO2017041690 A1 WO 2017041690A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
bit
punctured
bits
puncturing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/098166
Other languages
English (en)
Chinese (zh)
Inventor
向铮铮
徐正勳
陈特彦
刘晟
庞继勇
朱俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2017041690A1 publication Critical patent/WO2017041690A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0059Convolutional codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems

Definitions

  • Embodiments of the present invention relate to communication technologies, and in particular, to a data transmission method, apparatus, and system based on dual carrier modulation.
  • Orthogonal Frequency Division Multiplexing technology is widely used in today's wireless communication networks.
  • the core idea is to divide the wireless channel into several mutually orthogonal subcarriers, and then to transmit high-speed wireless signals. Converted into multiple parallel data streams and modulated onto each subcarrier for transmission.
  • the bandwidth of each subcarrier is small and can be approximated as a flat fading. Therefore, Inter-symbol Interference (ISI) can be attenuated, and the complexity of the equalization algorithm can be reduced.
  • ISI Inter-symbol Interference
  • DCM Dual Carrier Modulation
  • the mapping A after the data is modulated by the mapping A, it is modulated on the subcarrier m, and the same data is modulated on the subcarrier n after being modulated by the mapping B; when the signal on the subcarrier n is affected by the interference signal
  • the signal on subcarrier m can still help the receiving end (not shown) to correctly decode the signal, thereby effectively suppressing the influence of the interfering signal.
  • the existing DCM-based signal transmission block diagram is shown in Figure 2.
  • the data is first subjected to a Binary Convolutional Code (BCC) encoder.
  • BCC Binary Convolutional Code
  • the transmission code rate is greater than one-half, the encoded data needs to be punctured;
  • the subsequent data is interleaved by the interleaver; then, the data output by the interleaver is copied into two identical data, that is, data repetition, wherein one data is modulated onto the first half of the subcarrier by the constellation mapping A, and the other data passes through the constellation.
  • Map B is modulated onto the second half of the subcarrier; finally, fast inverse Fourier transform is performed on the data on all subcarriers (Inverse Fast Fourier Transform, hereinafter referred to as: IFFT).
  • IFFT Inverse Fast Fourier Transform
  • the above technology is used for data transmission, so that the receiving end cannot obtain the bit data that is knocked out in the punching process, resulting in a higher bit error rate of data transmission.
  • Embodiments of the present invention provide a data transmission method, apparatus, and system based on dual carrier modulation, to reduce a bit error rate of data transmission based on dual carrier modulation, and improve reliability of data transmission.
  • an embodiment of the present invention provides a data transmission method based on dual carrier modulation, which is applied to a wireless network based on orthogonal frequency division multiplexing (OFDM) transmission, where the method includes:
  • the first data is punctured by using a first puncturing mode to obtain first punctured data
  • the first data is punctured by using a second puncturing mode to obtain second puncturing data, the first puncturing mode is different from the bit punctured by the second puncturing mode, the first puncturing The data is the same as the transmission rate of the second punctured data;
  • the modulated two channels of data are respectively mapped to different two-part subcarriers in the set of subcarriers, where each subcarrier in the set of subcarriers is used to carry useful data, and the number of subcarriers in the two partial subcarriers is the same ;
  • an embodiment of the present invention provides a data transmission method based on dual carrier modulation, which is applied to a wireless network based on orthogonal frequency division multiplexing (OFDM) transmission, where the method includes:
  • first path data and second path data Performing fast Fourier transform FFT on the received data to obtain first path data and second path data, where the first path data and the second path data are respectively carried on different two partial subcarriers,
  • the number of subcarriers in the two partial subcarriers is the same, and is used to carry useful data;
  • the two channels of data after zero-filling are summed, and the summed data is Viterbi-decoded to obtain the required data.
  • an embodiment of the present invention provides a data transmission apparatus based on dual carrier modulation, which is applied to a wireless network based on orthogonal frequency division multiplexing (OFDM) transmission, where the apparatus includes:
  • An encoding module configured to perform binary convolutional coding BCC on the data to be transmitted, to obtain the first data
  • a first puncturing module configured to punct the first data obtained by the encoding module by using a first puncturing mode to obtain first puncturing data
  • a second puncturing module configured to punct the first data obtained by the encoding module by using a second puncturing mode, to obtain second puncturing data, the first puncturing mode and the second puncturing mode
  • the bits of the hole punch mode are different, and the first punched data has the same transmission code rate as the second punched data;
  • the interleaving module is configured to perform interleaving processing on the first puncturing data obtained by the first puncturing module and the second puncturing data obtained by the second puncturing module, respectively;
  • a modulation module configured to separately modulate two channels of data obtained by the interleaving module
  • mapping module configured to map the modulated two channels of data obtained by the modulation module to different two partial subcarriers in the set of subcarriers, where each subcarrier in the set of subcarriers is used to carry useful data, The number of subcarriers in the two partial subcarriers is the same;
  • a sending module configured to quickly perform data on all subcarriers in the set of subcarriers Issued after the inverse Fourier transform IFFT.
  • an embodiment of the present invention provides a data transmission apparatus based on dual carrier modulation, which is applied to a wireless network based on orthogonal frequency division multiplexing (OFDM) transmission, where the apparatus includes:
  • a receiving module configured to perform fast Fourier transform FFT on the received data, to obtain first path data and second path data, where the first path data and the second path data are respectively carried in different two On some subcarriers, the number of subcarriers in the two partial subcarriers is the same, and is used to carry useful data;
  • a demodulation module configured to demodulate the first path data and the second path data obtained by the receiving module, respectively;
  • a deinterleaving module configured to perform deinterleaving processing on the two channels of data demodulated by the demodulation module to obtain first punctured data and second punctured data, the first punctured data and the second
  • the transmission code rate of the punctured data is the same, and the first punctured data is different from the bit that is erased in the second punctured data;
  • a zero-filling module configured to fill in the bits of the first punched data obtained by the de-interleaving module according to the first puncturing mode used by the transmitting end to obtain the first punctured data And processing, according to the second puncturing mode used by the sending end to obtain the second puncturing data, performing zero-filling processing on the bits that are erased in the second punctured data obtained by the de-interleaving module;
  • the processing module is configured to add the two channels of data after zero-filling, and perform Viterbi decoding on the summed data to obtain the required data.
  • the embodiment of the present invention provides a data transmission system based on dual carrier modulation, which is applied to a wireless network based on orthogonal frequency division multiplexing (OFDM) transmission, where the system includes: A dual carrier modulation based data transmission device, and the dual carrier modulation based data transmission device according to any of the fourth aspects.
  • OFDM orthogonal frequency division multiplexing
  • Embodiments of the present invention are based on dual carrier modulation data transmission methods, devices, and systems.
  • binary convolutional coding is used and the transmission code rate is greater than one-half
  • different puncturing modes that is, the first puncturing mode and the first puncturing mode are adopted.
  • the two puncturing mode the first data obtained by the binary convolutional coding is punctured.
  • the obtained puncturing data is The first punctured data and the second punctured data have a transmission rate
  • the receiving end can obtain the bit of the other data from the one channel data, thereby obtaining the coding gain, and can reduce the bit error rate of the data transmission based on the dual carrier modulation and improve the data compared with the existing DCM technology. The reliability of the transmission.
  • 1 is a schematic diagram of the principle of dual carrier modulation
  • FIG. 2 is a block diagram of an existing DCM-based signal transmission
  • FIG. 3 is a flowchart of a data transmission method based on dual carrier modulation according to the present invention.
  • mapping data to subcarriers according to the present invention.
  • 5 is a schematic diagram of a punching process when the transmission code rate is 2/3 in the existing 802.11 standard
  • FIG. 6 is a schematic diagram of a punching process when the transmission code rate is 2/3 according to the present invention.
  • FIG. 7 is another schematic diagram of a puncturing process when the transmission code rate is 2/3 according to the present invention.
  • FIG. 8 is still another schematic diagram of a puncturing process when the transmission code rate is 2/3 according to the present invention.
  • 9 is a schematic diagram of a puncturing process when the transmission code rate is 3/4 in the existing 802.11 standard
  • FIG. 10 is another schematic diagram of a prior hole punching process when the transfer rate is 3/4;
  • 11 is another schematic diagram of a punching process when the conventional transmission code rate is 3/4;
  • 12 is a schematic diagram of a punching process when the transmission code rate is 5/6 in the existing 802.11 standard
  • FIG. 13 is a schematic diagram of a punching process when the transmission code rate is 5/6 according to the present invention.
  • 14 is another schematic diagram of a puncturing process when the transmission code rate is 5/6 according to the present invention.
  • 15 is a block diagram of signal transmission in a data transmission method based on dual carrier modulation according to the present invention.
  • 16 is a block diagram of another signal transmission in a data transmission method based on dual carrier modulation according to the present invention.
  • 17 is a block diagram of still another signal transmission in the data transmission method based on dual carrier modulation according to the present invention.
  • 18A and 18B show two constellation diagrams of 16QAM in an existing DCM transmission system
  • 19 is a block diagram of still another signal transmission in a data transmission method based on dual carrier modulation according to the present invention.
  • Figure 20A shows a 16QAM constellation diagram used in an existing non-DCM transmission system
  • Figure 20B shows a constellation diagram of the 16QAM provided by the present invention
  • 21 is a diagram showing an example of a process of DCM bit mapping of the present invention.
  • FIG. 22 is a diagram showing an example of an implementation process of a 16QAM constellation diagram provided by the present invention.
  • Figure 23 shows another constellation diagram of the 16QAM provided by the present invention.
  • 24 is a block diagram of still another signal transmission in a data transmission method based on dual carrier modulation according to the present invention.
  • 25 is a block diagram of still another signal transmission in a data transmission method based on dual carrier modulation according to the present invention.
  • 26 is another schematic diagram of mapping data to subcarriers according to the present invention.
  • 27 is another flow chart of a data transmission method based on dual carrier modulation according to the present invention.
  • FIG. 28 is a schematic view showing a zero-filling process corresponding to the punching mode shown in FIG. 5;
  • Figure 29 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 6;
  • Figure 30 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 7;
  • Figure 31 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 8;
  • Figure 32 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 9;
  • Figure 33 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 10;
  • Figure 34 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 11;
  • Figure 35 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 12;
  • Figure 36 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 13;
  • Figure 37 is a view showing a zero-filling process corresponding to the punching mode shown in Figure 14;
  • 38 is a block diagram of signal reception in a data transmission method based on dual carrier modulation according to the present invention.
  • 39 is another block diagram of signal reception in a data transmission method based on dual carrier modulation according to the present invention.
  • 40 is a block diagram of still another signal receiving in the data transmission method based on dual carrier modulation according to the present invention.
  • 41 is a diagram showing an example of a process of DCM bit demapping of the present invention.
  • FIG. 42 is a diagram showing an example of an implementation process of a preset demodulation process provided by the present invention.
  • 43 is a block diagram of still another signal receiving in the data transmission method based on dual carrier modulation according to the present invention.
  • 44 is a block diagram of still another signal receiving in the data transmission method based on dual carrier modulation according to the present invention.
  • 45 is a block diagram of still another signal receiving in the data transmission method based on dual carrier modulation according to the present invention.
  • FIG. 46 is a schematic structural diagram of a data transmission apparatus based on dual carrier modulation according to the present invention.
  • 47 is another schematic structural diagram of a data transmission apparatus based on dual carrier modulation according to the present invention.
  • FIG. 48 is a schematic structural diagram of a data transmission system based on dual carrier modulation according to the present invention.
  • Wi-Fi Wireless Fidelity
  • APs Wi-Fi access points
  • STA station
  • a wireless network access point that provides a wireless local area network (WLAN), for example, Wi-Fi wireless access, can receive an association request sent by a terminal (STA), and establishes with the terminal (STA) Associate and provide communication services for the terminal (STA).
  • WLAN wireless local area network
  • STA A terminal device with Wi-Fi connection capability, which can be connected to the AP for network access.
  • the AP modulates the same two streams of data to different terminals with different frequency intervals and transmits them to the terminal (STA); the terminal (STA) pairs the received two channels of data streams. Combine and decode to get the data.
  • the terminal (STA) modulates the same two streams of data to be transmitted to different APs on different sub-carriers with different frequency intervals; the AP combines and decodes the received two streams of data to obtain data. That is, for an AP and a terminal (STA), when one of them is the transmitting end of the data, the other is the receiving end of the data.
  • the following describes how the transmitting end sends data through the dual carrier modulation based data transmission method provided by the embodiment of the present invention.
  • FIG. 3 is a flowchart of a data transmission method based on dual carrier modulation according to the present invention.
  • Embodiments of the present invention provide a data transmission method based on dual carrier modulation, which is applied to a wireless network based on OFDM transmission, and can be performed by a data transmission apparatus based on dual carrier modulation, and the apparatus can be integrated in an AP or have Wi -Fi network interface terminal (STA) and other devices.
  • the method includes:
  • binary convolutional encoding is performed on the data to be transmitted to obtain a coding gain.
  • the first data is data obtained by binary convolutional coding of the data to be transmitted.
  • the data bits to be transmitted are block-encoded, and the coded output bits of each code group are related not only to the information bits of the packet but also to the information bits of other packets at the previous time.
  • the coded output bits of each code group are related not only to the information bits of the packet but also to the information bits of other packets at the previous time.
  • the binary convolutional decoding process not only the decoding information is acquired from the packets received at the current time, but also the related information is extracted from the previously associated packets. It is precisely because the correlation of each packet is fully utilized in the convolutional coding process that the binary convolutional coding has a better performance gain.
  • channel coding techniques need to consider various transmission rate and modulation methods.
  • the channel coding technique often uses a puncturing method to extract a predetermined length bit sequence from the first data to obtain first punctured data, that is, data after puncturing.
  • S303 Punching the first data by using the second puncturing mode to obtain the second puncturing data, wherein the first puncturing mode is different from the bit punctured by the second puncturing mode, and the first puncturing data and the second The transmission code rate of the punched data is the same.
  • the first data obtained by the binary convolutional coding is punctured by using the first puncturing mode and the second puncturing mode, wherein the bits punctured by the first puncturing mode and the second puncturing mode are different.
  • the two channels of data obtained after the punching that is, the first punched data and the second punched data, the bits that are knocked out are different, so that the receiving end can obtain the second hit according to the first punched data.
  • the receiving end can obtain the bit that is knocked out in the first punctured data according to the second punctured data.
  • S302 and S303 are executed may be parallel, that is, executed at the same time; or may be serial, that is, one is executed first, and the other is executed after completion, which is not limited in the embodiment of the present invention.
  • the first and second of the first puncturing mode and the second puncturing mode are only naming manners for distinguishing different puncturing modes, and do not represent playing The order between the hole patterns.
  • the first punctured data and the second punctured data are only naming methods for distinguishing different punctured data, and do not represent the order between obtaining punctured data.
  • S304 Perform interleaving processing on the first punctured data and the second punctured data, respectively.
  • the interleaving technique is a method of spreading successive bits in a data, that is, successive bits in a data are transmitted in a non-sequential manner. In this way, even if a string of errors occurs during transmission, and the data is restored to a successive bit string, the error becomes a single (or a very short length), and then the channel coding error correction function is used to correct the error and restore the original. data.
  • a data packet consisting of 4 bits is taken out, and the first bit of 4 consecutive packets is taken out, and the 4 first bits are grouped into a new 4-bit packet, called a first frame, and 4 message packets.
  • Bits 2 to 4 in the same process are also treated in the same manner; then, the frame composed of the 1st bit, the frame composed of the 2nd bit, ..., are sequentially transmitted.
  • the frame consisting of the 2nd bit is lost, if there is no interleaving, then an entire data packet will be lost, but interleaving is used, only the 2nd bit of each data packet is lost, and then channel coding is used, and all data is used. The data in the group can still be recovered.
  • modulation is also a constellation map
  • constellation mapping may include phase shift keying (phase Shift keying) and Quadrature Amplitude Modulation (QAM), etc., are not limited herein.
  • the modulated two channels of data are respectively mapped to different two-part subcarriers in the subcarrier set, where each subcarrier in the subcarrier set is used to carry useful data, and the number of subcarriers in the two partial subcarriers is the same.
  • the modulated first path data may be mapped to the first half of the subcarrier set, and the modulated second path data may be mapped to the subcarrier set.
  • the latter half of the subcarriers the process of which is shown in Figure 4.
  • the number of subcarriers is 64, and the number of 64 subcarriers is ⁇ -32, -31, ..., -1, 0, 1, ..., 31 ⁇ , wherein the available 52 subcarrier numbers are ⁇ -26 , -25,...,-1,1,...,25,26 ⁇ .
  • the subcarriers numbered ⁇ -21, -7, 7, 21 ⁇ carry the pilot signals, and the remaining 48 subcarriers are used to carry the useful data, that is, the subcarrier set includes 48. Subcarriers.
  • the first half of the subcarriers are subcarriers numbered ⁇ -26, -25, ..., -22, -20, ..., -8, -7, ..., -1 ⁇ , and the second half.
  • the subcarriers are subcarriers numbered ⁇ 1,...,6,8,...,20,22,...,26 ⁇ .
  • the data after IFFT is also inserted into a cyclic prefix, which is then modulated onto a carrier frequency and transmitted through a radio frequency circuit, which can refer to the transmission principle of an existing OFDM-based wireless transmitter. I will not repeat them here.
  • the second convolutional coding when binary convolutional coding is adopted and the transmission code rate is greater than one-half, the second convolutional coding is obtained by adopting different puncturing modes, that is, the first puncturing mode and the second puncturing mode.
  • a data is punctured, because the first puncturing mode and the second puncturing mode are different for the two channels of the same data, but the obtained puncturing data, that is, the first puncturing data and the second puncturing data,
  • the transmission code rate is the same. Therefore, the receiving end can obtain the bit of the other data from the one channel data, thereby obtaining the coding gain, and the bit error rate of the data transmission based on the dual carrier modulation can be reduced compared with the existing DCM technology. Improve the reliability of data transmission.
  • the puncturing patterns used are different for different transmission code rates.
  • the puncturing mode provided by the embodiment of the present invention is described by distinguishing the transmission code rate.
  • the transmission rate of the first punctured data and the second punctured data is three-thirds two.
  • S302 may include: deleting the fourth bit from every 4 bits from the first bit to the last bit of the first data to obtain the first punctured data.
  • the S303 may include: deleting any one of the 4 bits except the 4th bit from the first bit to the last bit of the first data to obtain the second punctured data .
  • FIG. 5 is a schematic diagram of a puncturing process when the transmission code rate is 2/3 in the existing 802.11 standard. As shown in FIG. 5 to be transmitted includes data a 0, a 1, a 2 and a 3 four information bits; S301, by the following, to obtain coded bits, i.e.
  • a first data expressed as: A 0, A 1 , A 2 , A 3 , A 4 , A 5 , A 6 and A 7 ; then the fourth bit of every 4 bits is deleted by S302: A 3 and A 7 , wherein the bit knocked off is oblique
  • the line indicates; after that, the data after the punching, that is, the first punched data, is expressed as: A 0 , A 1 , A 2 , A 4 , A 5 , and A 6 .
  • FIG. 6 is a schematic diagram of a puncturing process when the transmission code rate is 2/3 according to the present invention.
  • the data to be transmitted include a 0, a 1, a 2 and a 3 four information bits; S301, by the following, to obtain coded bits, i.e.
  • a first data expressed as: A 0, A 1 , A 2 , A 3 , A 4 , A 5 , A 6 and A 7 ; and then the second bit of each of the 4 bits is erased by S303: A 1 and A 5 , wherein the bit that is erased is slanted
  • the line indicates; after that, the data after the punching, that is, the second punched data, is obtained as: A 0 , A 2 , A 3 , A 4 , A 6 and A 7 .
  • FIG. 7 is another schematic diagram of a puncturing process when the transmission code rate is 2/3.
  • 7-be-transmitted data comprises a 0, a 1, a 2 and a 3 four information bits; S301, by the following, to obtain coded bits, i.e. a first data expressed as: A 0, A 1 , A 2 , A 3 , A 4 , A 5 , A 6 and A 7 ; and then the third bit of every 4 bits is deleted by S303: A 2 and A 6 , wherein the bit that is erased is slanted
  • the line indicates; after that, the data after the punching, that is, the second punched data, is obtained as: A 0 , A 1 , A 3 , A 4 , A 5 , and A 7 .
  • FIG. 8 is still another schematic diagram of a puncturing process when the transmission code rate is 2/3.
  • the data to be transmitted include a 0, a 1, a 2 and a 3 four 8 information bits; S301, by the following, to obtain coded bits, i.e. a first data expressed as: A 0, A 1 , A 2 , A 3 , A 4 , A 5 , A 6 and A 7 ; then the first bit of every 4 bits is deleted by S303: A 0 and A 4 , wherein the bit that is erased is slanted
  • the line indicates; after that, the data after the punching, that is, the second punched data, is obtained as: A 1 , A 2 , A 3 , A 5 , A 6 and A 7 .
  • the embodiment of the present invention can obtain the second hit in any manner as shown in FIG. 6, FIG. 7, or FIG. Hole data.
  • the first puncturing mode is any one of the modes shown in FIG. 5 to FIG. 8
  • the second puncturing mode is another mode shown in FIGS. 5 to 8 different from the first puncturing mode.
  • the transmission rate of the first punctured data and the second punctured data is three-quarters.
  • S302 may include: deleting the 4th bit and the 5th bit from every 6 bits from the first bit to the last bit of the first data to obtain the first punctured data.
  • S303 may include: from the first bit of the first data to the last bit, and discard any two of the other bits except the 4th bit and the 5th bit in every 6 bits. Bits, the second punctured data is obtained.
  • FIG. 9 is a schematic diagram of a puncturing process when the transmission code rate is 3/4 in the existing 802.11 standard.
  • the data to be transmitted includes 6 information bits of a 0 , a 1 , a 2 , a 3 , a 4 , and a 5 ; after S301, the encoded bit, that is, the first data, is represented as :A 0 , A 1 , A 2 , A 3 , A 4 , A 5 , A 6 , A 7 , A 8 , A 9 , A 10 and A 11 ; the second of every 6 bits is erased by S302 4 bits and 5th bit: A 3 and A 4 , and A 9 and A 10 , wherein the bit that is erased is indicated by a slash; after that, the data after the puncturing is obtained, that is, the first punctured data, indicating They are: A 0 , A 1 , A 2 , A 5 , A 6 , A 7 , A 8 and A 11
  • FIG. 10 is another schematic diagram of a prior puncturing process when the transmission code rate is 3/4.
  • the data to be transmitted includes 6 information bits of a 0 , a 1 , a 2 , a 3 , a 4 , and a 5 ; after S301, the encoded bit, that is, the first data, is expressed as :A 0 , A 1 , A 2 , A 3 , A 4 , A 5 , A 6 , A 7 , A 8 , A 9 , A 10 and A 11 ; the third of every 6 bits is removed by S303 2 bits and 3rd bits: A 1 and A 2 , and A 7 and A 8 , wherein the bit that is erased is indicated by a slash; after that, the data after the puncturing is obtained, that is, the second punctured data, indicating They are: A 0 , A 3 , A 4 , A 5 , A 6 , A 9 , A 10 and A 11 .
  • FIG. 11 is still another schematic diagram of a punching process when the conventional transfer rate is 3/4.
  • the data to be transmitted includes 6 information bits of a 0 , a 1 , a 2 , a 3 , a 4 , and a 5 ; after S301, the encoded bit, that is, the first data, is represented as :A 0 , A 1 , A 2 , A 3 , A 4 , A 5 , A 6 , A 7 , A 8 , A 9 , A 10 and A 11 ; the third of every 6 bits is removed by S303 1 bit and 6th bit: A 0 and A 5 , and A 6 and A 11 , wherein the bit that is erased is indicated by a slash; after that, the data after the puncturing is obtained, that is, the second punctured data indicates They are: A 1 , A 2 , A 3 , A 4 , A 7 , A 8 , A 9 and A 10 .
  • the method of obtaining the second punctured data according to the first data may be The following four ways are implemented: or, the first bit and the second bit of each of the 6 bits are deleted by S303 (not shown); or, the first of every 6 bits is deleted by S303. a bit and a third bit (not shown); or, by S303, the second bit and the sixth bit of each of the six bits are deleted (not shown); or, each of the six bits is deleted by S303. The third and sixth bits of the bits (not shown).
  • the first puncturing mode may be any one of the foregoing modes in the scenario, and the second puncturing mode may be different from the first puncturing mode. Mode, the other way of the above in the scene.
  • the transmission rate of the first punctured data and the second punctured data is five-sixths.
  • S302 may include: cutting out the 4th bit, the 5th bit, the 8th bit, and the 9th bit in every 10 bits from the first bit to the last bit of the first data. , obtain the first punch data.
  • S303 may include: from the first bit of the first data to the last bit, the 4th bit, the 5th bit, the 8th bit, and the like are deleted in every 10 bits.
  • the second punctured data is obtained by any four bits other than the ninth bit.
  • FIG. 12 is a schematic diagram of a puncturing process when the transmission code rate is 5/6 in the existing 802.11 standard. As shown in FIG. 12 to be transmitted includes the data a 0, a 1, a 2 , a 3 and a 4 five information bits; S301, by the following, to obtain coded bits, i.e.
  • a first data expressed as: A 0 , A 1 , A 2 , A 3 , A 4 , A 5 , A 6 , A 7 , A 8 and A 9 ;
  • the second 4th bit, the 5th bit of every 10 bits are removed by S302,
  • the 8th bit and the 9th bit A 3 , A 4 , A 8 , and A 9 , wherein the bit that is erased is indicated by a slash; after that, the data after the puncturing is obtained, that is, the first punctured data, indicating They are: A 0 , A 1 , A 2 , A 5 , A 6 and A 9 .
  • FIG. 13 is a schematic diagram of a puncturing process when the transmission code rate is 5/6 according to the present invention.
  • the sixth bit and the seventh bit are: A 0 , A 3 , A 4 , A 7 , A 8 and A 9 .
  • FIG. 14 is another schematic diagram of a puncturing process when the transmission code rate is 5/6 according to the present invention.
  • data to be transmitted include a 0, a 1, a 2 , a 3 and a 4 five information bits; S301, by the following, to obtain coded bits, i.e.
  • a first data expressed as: A 0 , A 1 , A 2 , A 3 , A 4 , A 5 , A 6 , A 7 , A 8 and A 9 ;
  • the third bit and the sixth bit of every 10 bits are deleted by S303,
  • the 7th bit and the 10th bit : A 2 , A 5 , A 6 , and A 9 , wherein the bit that is erased is indicated by a slash; after that, the data after the puncturing is obtained, that is, the second punctured data indicates They are: A 0 , A 1 , A 3 , A 4 , A 7 and A 8 .
  • the method for obtaining the second punctured data according to the first data may be implemented by the following methods: or, by S303, the first bit, the sixth bit, and the first of every 10 bits are deleted. 7 bits and 10th bit (not shown); or, by S303, the 2nd bit, the 6th bit, the 7th bit, and the 10th bit of every 10 bits are deleted (not shown ), etc., as long as any four bits other than the 4th bit, the 5th bit, the 8th bit, and the 9th bit are erased out of every 10 bits.
  • the transmission code rate is 3/4.
  • the first bit and the second bit are transmitted every 6 bits.
  • the third bit and the sixth bit so the receiving end can obtain the log likelihood of the first bit, the second bit, the third bit, and the sixth bit of every six bits according to the first path data.
  • Log Likelihood Ratio (LLR) for the first data, after the second puncturing mode shown in FIG. 10 is provided by the embodiment of the present invention, the transmission is performed every 6 bits.
  • the receiving end can obtain the 1st bit, the 4th bit, the 5th bit and the first of every 6 bits according to the second way data.
  • 6-bit LLR Then, after the receiver combines the LLRs of the two channels of data, an LLR of any one of every 6 bits can be obtained, that is, an LLR of all coded bits is obtained.
  • the second channel data also adopts the first puncturing mode as shown in FIG. 9, the LLR of the two channels of data obtained by the receiving end is the first, second, third, and sixth of every six encoded bits.
  • the LLR of the bits so that the receiver can not obtain the LLR of all the encoded bits. Therefore, in the embodiment of the present invention, compared with the existing DCM technology, the coding gain can be obtained, and the error rate of data transmission is reduced.
  • the above-mentioned puncturing mode provided by the embodiment of the present invention may be used as long as the scenario involving puncturing the same two parts of data is used.
  • S304 may include at least the following two implementations.
  • Manner 1 Interleave processing is performed on the first punctured data and the second punctured data by using interleaver parameters corresponding to the transmission bandwidth.
  • Manner 2 obtaining the number N of STAs served by the AP simultaneously; determining that the interleaver parameter for interleaving the first punctured data and the second punctured data is one of 2N of the interleaver parameter corresponding to the transmission bandwidth; The interleaver parameter performs interleaving processing on the first punctured data and the second punctured data, respectively. If the eNB is the STA, the STA does not need to perform the step of acquiring the number of STAs that the AP simultaneously serves, and only needs to use the 2N score of the interleaver parameter corresponding to the transmission bandwidth. For example, the first puncturing data and the second puncturing data may be interleaved separately.
  • the first interpolating data and the second punctured data are interleaved by using the same interleaver parameters as the existing interleaving process.
  • the first data and the second data are obtained, wherein the second data is obtained by copying the first data, and the two are the same, if no data is repeated.
  • the subsequent processing of the second data is considered to be processing of the first data; the first puncturing mode is performed on the first data to obtain the first puncturing data, and the second data is used as the second puncturing data.
  • the punching mode performs the punching process to obtain the second punching data; the same interleaver parameter, that is, the full bandwidth interleaver parameter, is used to interleave the first punched data and the second punched data;
  • the processed data is subjected to modulation processing, subcarrier mapping to the first half of the subcarrier or the latter half of the subcarrier, and is performed after the IFFT is performed on the data on all the subcarriers.
  • the input data stream processed for the first round of interleaving that is, the first punctured data or the second punctured data to be interleaved
  • a first round of interleaver output data stream processed i SS where a sequence number of spatial data streams, and 1 ⁇ i SS ⁇ N SS, wherein, N SS is the total number of spatial data streams.
  • the process of the first round of interleaving is as follows:
  • N CBPSS is the number of coded bits contained in one OFDM symbol in each spatial data stream
  • N COL is a bandwidth-dependent interleaver parameter, which is related to the number of subcarriers ; mod represents the remainder symbol; Indicates that the symbol is rounded down.
  • VHT Very High Throughput
  • N COL 16.
  • the input data stream is the output data of the first round of interleaving processing.
  • the output data is recorded as The relationship between the two is as follows:
  • FIG. 16 is a block diagram of another signal transmission in the data transmission method based on dual carrier modulation according to the present invention.
  • the first data and the second data are obtained, wherein the second data is obtained by copying the first data, and the two are the same, if no data is repeated.
  • the subsequent processing of the second data is considered to be processing of the first data; the first puncturing mode is performed on the first data to obtain the first puncturing data, and the second data is used as the second puncturing data.
  • the punching mode performs the punching process to obtain the second punching data; the first punching data and the second punching data are interleaved by using the 1/2N bandwidth interleaver parameter; and the data after the interleaving processing is modulated and processed.
  • the carrier is mapped to the first half of the subcarrier or the second half of the subcarrier, and is sent after IFFT on the data on all subcarriers.
  • the interleaver parameter for interleaving the first punctured data and the second punctured data is one-half of the interleaver parameter corresponding to the transmission bandwidth, and adopting The interleaver parameter performs interleaving processing on the first punctured data and the second punctured data, respectively. Specifically, setting the interleaver parameters Half of the existing interleaver parameter N COL , ie
  • the input data stream processed for the first round of interleaving that is, the first punched data or the second punched data
  • a first round of interleaver output data stream processed i SS where a sequence number of spatial data streams, and 1 ⁇ i SS ⁇ N SS, where N SS is the total number of spatial data streams.
  • the process of the first round of interleaving is as follows:
  • N CBPSS is the number of coded bits contained in each spatial data stream.
  • N CBPSS is the number of coded bits contained in each spatial data stream.
  • the input data stream is recorded as the output data of the first round of interleaving processing.
  • the output data is recorded as The relationship between the two is as follows:
  • the interleaver parameters are related to the transmission bandwidth, i.e., to the number of subcarriers.
  • S305 may be specifically: using a standard constellation diagram, respectively interleaving
  • the processed two channels of data are modulated, and the standard constellation is a constellation diagram in the 802.11 standard.
  • FIG. 17 is a block diagram of still another signal transmission in the data transmission method based on dual carrier modulation according to the present invention.
  • the first data and the second data are obtained, wherein the second data is obtained by copying the first data, and the two are the same, if no data is repeated.
  • the subsequent processing of the second data is considered to be processing of the first data; the first puncturing mode is performed on the first data to obtain the first puncturing data, and the second data is used as the second puncturing data.
  • the punching mode performs the punching process to obtain the second punching data; the first punched data and the second punched data are interleaved by using the 1/2N bandwidth interleaver parameter or the full bandwidth interleaver parameter; and the standard constellation mapping is adopted. And performing modulation processing on the data after the interleaving process; mapping the data after the modulation processing to the first half subcarrier or the second half subcarrier through the subcarrier, and issuing the data after performing IFFT on the data on all the subcarriers.
  • 18A and 18B show two constellation diagrams of 16QAM in the existing DCM transmission system. The constellation shown in Fig. 18A and the constellation shown in Fig. 18B do not have the characteristics of a Gray map.
  • the S305 may be specifically: modulating one of the two channels of the interleaved data by using a standard constellation diagram, wherein the standard constellation is a constellation diagram in the 802.11 standard; The other of the two pieces of data is modulated, and the preset constellation is a constellation having a Gray code characteristic different from the above-described standard constellation.
  • the embodiment of the present invention can further improve the performance of data transmission by adopting a preset constellation diagram with Gray code characteristics for modulation processing.
  • FIG. 19 is a block diagram of still another signal transmission in the data transmission method based on dual carrier modulation according to the present invention.
  • the first data and the second data are obtained, wherein the second data is obtained by copying the first data, and the two are the same, if no data is repeated.
  • the subsequent processing of the second data is considered to be processing of the first data; the first puncturing mode is performed on the first data to obtain the first puncturing data, and the second data is used as the second puncturing data.
  • the punching mode performs the punching process to obtain the second punching data; the first punching data and the second punching data are interleaved by using the 1/2N bandwidth interleaver parameter or the full bandwidth interleaver parameter; respectively, using the standard constellation diagram Mapping and preset constellation mapping, modulating one channel of data in the data after the interleaving process; mapping the data after the modulation processing to the first half subcarrier or the second half subcarrier through the subcarrier, and to all The data on the subcarrier is sent after the IFFT.
  • 20A shows a 16QAM constellation used in the existing non-DCM transmission system
  • FIG. 20B shows a constellation diagram of the 16QAM provided by the present invention.
  • the constellation shown in FIG. 20A and the constellation shown in FIG. 20B have the characteristics of a Gray map.
  • using the preset constellation diagram to modulate another one of the two channels of data after the interleaving process may include: performing DCM bit mapping on another data, where the DCM bit mapping refers to an odd number in the data stream.
  • the data in the bit is inverted and the data in the even bit is interchanged, and the inverse is binary inversion; the DCM bit-mapped data is modulated using a standard constellation.
  • This embodiment further improves the design difficulty by further improving the constellation of the DCM to a constellation diagram having Gray code properties, so that existing constellations can be used therein.
  • DCM bit mapping is first performed on the other channel data; then, the standard 16QAM constellation mapping process is performed. Wherein, the DCM bit map swaps the data of the odd bits in the data stream and the data in the even bits.
  • Fig. 21 is a diagram showing an example of the procedure of the DCM bit map of the present invention.
  • the data streams represented by B 0 , B 1 , B 2 , B 3 , B 4 , B 5 , B 6 , and B 7 are obtained by DCM bit mapping, and are represented as B 1 , -B 0 , B. 3 , -B 2 , B 5 , -B 4 , B 7 and -B 6 data streams.
  • the inversion of the bit is a binary inversion operation, that is,
  • the preset constellation diagram can be implemented by cascading the above DCM bit map and the standard 16QAM constellation, that is, as shown in FIG.
  • Fig. 23 shows an example of a 16QAM constellation diagram which satisfies the above two conditions.
  • the S305 may be specifically: performing standard QAM on one of the two channels of data after the interleaving process, and the standard QAM is a QAM in the 802.11 standard;
  • the other data in the two channels of data is subjected to DCM bit mapping and standard QAM, wherein DCM bit mapping refers to swapping data in odd bits of the data stream and data in even bits, and inverting to binary Negate.
  • the AP transmits data to a STA, where the transmission bandwidth is 20 MHz, the number of subcarriers is 256, and the number of the subcarriers is ⁇ -128,,...,-1,0,1,...,127 ⁇ , the available subcarrier numbers are ⁇ -122,...,-2,2,...,122 ⁇ , a total of 242.
  • the 242 available subcarriers 8 subcarriers ⁇ -116, -90, -48, -22, 22, 48, 90, 116 ⁇ are used to carry pilot signals, and the remaining 234 subcarriers are used to carry useful data.
  • the AP sends data of 702 bits to the STA, and the Modulation and Coding Scheme (MCS) is 16QAM 3/4.
  • MCS Modulation and Coding Scheme
  • the AP modulates one channel of data by using standard 256QAM, and modulates another channel by using 256QAM composed of DCM bit mapping and standard 256QAM cascading; the AP maps two channels of data to the first half of the subcarrier and the second half respectively.
  • Subcarrier the numbers of the first half of the subcarriers are ⁇ -122,...,-117,-115,...,-91,-89,...,-49,-47,... , -23, -21, ... -2 ⁇ , the latter half of the subcarriers are encoded as ⁇ 2,...,21,23,...,47,49,...,89,91,... , 115, 117, ... 122 ⁇ .
  • the S306 may specifically include: acquiring the number N of STAs served by the AP simultaneously; and mapping the modulated two channels of data to different two partial subcarriers in the subcarrier set, where the two subcarriers are The number of subcarriers per part is 1/2N.
  • N 1
  • a simple method is to map the first path data into the set of subcarriers, the first half of the subcarriers based on the subcarrier number, and the second path data is mapped to Half of the subcarriers; but the mapping method of other subcarriers is also possible, as long as the two channels of data occupy half of the subcarriers respectively.
  • the eNB is the STA
  • the sub-carriers used by the STA to transmit data are allocated by the AP. Therefore, the STA does not need to perform the step of acquiring the number N of STAs served by the AP at the same time. It is mapped to different two-part subcarriers in the subcarrier set, and the two partial subcarriers are allocated to the STA by the AP.
  • the AP is the sending end
  • the STA is the receiving end.
  • the embodiment of the present invention is not limited thereto, and the STA is the transmitting end and the AP is the receiving end.
  • the specific process is similar, and therefore is not described again.
  • the transmission mode provided by the embodiment sends a signal field B (signal field B, hereinafter referred to as: SIGB) signal to the STA.
  • SIGB signal field B
  • the transmission bandwidth is 20 MHz and the number of subcarriers is 64. Let these 64 subcarrier numbers be ⁇ -32, -31, ..., -1, 0, 1, ..., 31 ⁇ . Among them, the available 52 subcarrier numbers are ⁇ -26, -25, ..., -1, 1, ..., 25, 26 ⁇ .
  • subcarriers numbered ⁇ -21, -7, 7, 21 ⁇ are used to carry pilot signals, and the remaining 48 subcarriers are used to carry useful data.
  • the size of the data to be transmitted is set to 72 bits, denoted as ⁇ x 0 , . . . , x 71 ⁇ , and the modulation coding mode for setting the transmission data is QPSK 3/4.
  • Figure 24 shows the sender flow of the proposed transmission scheme.
  • the AP first inputs the data to be transmitted ⁇ x 0 , . . . , x 71 ⁇ into the BCC encoder with a coding rate of 1/2, and obtains the encoded bits ⁇ X 0 , . . . , X 143 ⁇ . That is, the first data; and the first data is copied to obtain the second data ⁇ Y 0 , . . . , Y 143 ⁇ , where the first data ⁇ X 0 , . . .
  • the AP uses different puncturing patterns for the first data ⁇ X 0 , . . . , X 143 ⁇ and the second data ⁇ Y 0 , . . . , Y 143 ⁇ are punctured.
  • the AP adopts the existing puncturing mode, that is, the puncturing mode shown in FIG.
  • the AP puncturing using a different puncturing mode than the existing puncturing mode, such as the puncturing mode as shown in any of FIG. 10 or FIG.
  • the AP performs interleaving processing on the two channels of data after the puncturing process by using the 1/2 bandwidth interleaver parameters.
  • the AP modulates two data streams using a standard 16QAM constellation and the proposed 16QAM constellation, respectively.
  • the AP maps the modulated two channels of data to the first half of the subcarrier and the second half of the subcarrier, respectively, and the process is as shown in FIG. 4.
  • the first half of the subcarriers are also the children numbered ⁇ -26, -25, ..., -22, -20, ..., -8, -7, ..., -1 ⁇ .
  • Carrier, the latter half of the subcarrier is also numbered Subcarriers of ⁇ 1,...,6,8,...,20,22,...,26 ⁇ . Then, the AP sends the data on all subcarriers to the STA after performing IFFT.
  • the size of the data to be transmitted is set to 64 bits, denoted as ⁇ x 0 , . . . , x 63 ⁇ , and the modulation coding mode for setting the transmission data is QPSK 2/3.
  • the AP On the AP side (transmitting end), the AP first inputs the data to be transmitted ⁇ x 0 , . . . , x 63 ⁇ into the BCC encoder with a coding rate of 1/2, and obtains the encoded bit ⁇ X 0 ,... , X 127 ⁇ , that is, the first data; copying the first data to obtain the second data ⁇ Y 0 , . . . , Y 127 ⁇ , where the first data ⁇ X 0 , . . .
  • the second data is the same as ⁇ Y 0 ,...,Y 127 ⁇ , except that the symbol indicates that different letters are used; then, in order to obtain a sequence with a transmission rate of 2/3, the AP adopts different puncturing modes respectively.
  • the first data ⁇ X 0 , . . . , X 127 ⁇ and the second data ⁇ Y 0 , . . . , Y 127 ⁇ are punctured.
  • the AP adopts the existing puncturing mode of 2/3 transmission rate, that is, the puncturing mode shown in FIG.
  • the second data ⁇ Y 0 , . . . , Y 127 ⁇
  • the AP adopts a 2/3 transmission rate puncturing mode provided by the embodiment of the present invention, such as the punching shown in FIG. 6 or FIG. 7 or FIG. Any of the modes.
  • the size of the data to be transmitted is set to 80 bits, denoted as ⁇ x 0 , . . . , x 79 ⁇ , and the modulation coding mode for setting the transmission data is QPSK 5/6.
  • the AP On the AP side (transmitting end), the AP first inputs the data to be transmitted ⁇ x 0 , . . . , x 79 ⁇ into the BCC encoder with a coding rate of 1/2, and obtains the encoded bit ⁇ X 0 ,... , X 159 ⁇ , that is, the first data; copying the first data to obtain the first data ⁇ Y 0 , . . . , Y 159 ⁇ , where ⁇ X 0 , . . .
  • the AP uses different puncturing patterns for the first data ⁇ X 0 ,...,X 159 ⁇ and the first data ⁇ Y 0 ,...,Y 159 ⁇ are punctured.
  • the AP puncturing using the existing 5/6 transmission rate puncturing pattern shown in FIG.
  • the AP punches holes using a different punch mode than the existing punch mode, such as any one of the punch patterns shown in FIG. 13 or FIG.
  • the AP sends data to STA1 on the first half of the subcarriers, that is, the number is ⁇ -26, -25,...,-22.
  • the subcarriers of -20, ..., -8, -6, ..., -1 ⁇ are used to carry the data of STA1, and the subcarriers numbered ⁇ -21, -7 ⁇ are used to carry the pilot of STA1.
  • Signal; the AP transmits data to STA2 on the second half of the subcarriers, that is, subcarriers numbered ⁇ 1,...,6,8,...,20,22,...,25,26 ⁇ are used for the signal.
  • the data carrying STA2, the subcarrier numbered ⁇ 7, 21 ⁇ is used to carry the pilot signal of STA2.
  • the modulation coding method for selecting the transmission data is QPSK 3/4.
  • the data sent to STA1 is 36 bits, which is recorded as
  • the data sent to STA2 is 36 bits, which is recorded as
  • Figure 25 shows the sender flow of the proposed transmission scheme.
  • the processing flow of the AP for each STA data is substantially the same as that of Embodiment 1, except that:
  • the AP will send the data to be transmitted to STA2. Enter a BCC encoder with a coding rate of 1/2 for BCC, and obtain the encoded bits. That is, the first data, and the first data is copied to obtain the second data.
  • First data here And second data Is the same, except that the symbol indicates that different letters are used; then, the AP uses the existing puncturing pattern to map the first data of STA2. Performing puncturing, the AP uses the puncturing mode corresponding to the transmission rate 3/4 provided by the embodiment of the present invention to perform second data on STA2. Punch.
  • the AP uses the 1/4 bandwidth interleaver parameters to interleave the two channels of STA1 and the two channels of STA2, that is, the 1/4 bandwidth interleaver parameters.
  • the AP maps the first path data modulated by STA1 to the first 1/4 subcarrier, that is, the number is ⁇ -26,,...,-22,-20,...,-14 Subcarrier of ⁇ , and map the second path data of STA1 to the second 1/4 subcarrier, that is, the number is ⁇ -13,,...,-8,-6,...,-1
  • the AP maps the STA2 modulated first path data to the third 1/4 subcarrier, that is, the number is ⁇ 1,,...,6,8,...,13 Subcarriers of ⁇ , and map the second channel data after STA2 modulation to the fourth 1/4 subcarrier, that is, numbered ⁇ 14,,...,20,22,...,26 ⁇
  • the subcarriers the process of which is shown in Figure 26; then, the AP then sends the data on all subcarriers to the STA1 and STA2 after IFFT.
  • the step of repeating the data is optional. when there is a step of data repetition, copying the first data to obtain the second data, in the subsequent punching process, The first data and the second data are respectively punched by different punching methods to obtain the first punching data and the second punching data; when there is no data repeating step, in the subsequent punching processing, respectively Different punching methods punch the first data to obtain first punched data and second punched data.
  • the following describes, by using a specific embodiment, how the receiving end receives data by using the dual carrier modulation based data transmission method provided by the embodiment of the present invention.
  • FIG. 27 is another flow chart of a data transmission method based on dual carrier modulation according to the present invention.
  • Embodiments of the present invention provide a data transmission method based on dual carrier modulation, which is applied to a wireless network based on OFDM transmission, and can be performed by a data transmission apparatus based on dual carrier modulation, and the apparatus can be integrated in an AP or have Wi -Fi network interface terminal (STA) and other devices.
  • the method includes:
  • S401 Perform fast Fourier transform (FFT) on the received data to obtain first path data and second path data, where the first path data and the second path data are respectively carried in different
  • FFT fast Fourier transform
  • S402. Demodulate the first path data and the second path data respectively.
  • S403. Perform deinterleaving processing on the two channels of data obtained by demodulation, respectively, to obtain first punched data and second punched data.
  • the first punched data and the second punched data have the same transmission code rate, and the first punched hole The data is different from the bit that was erased in the second punctured data.
  • S404 and S405 are executed may be parallel, that is, executed at the same time; or may be serial, that is, one is executed first, and the other is executed after completion, which is not limited by the embodiment of the present invention.
  • the embodiment shown in FIG. 27 is the opposite end of the embodiment shown in FIG. 3.
  • the embodiment shown in FIG. 3 is a flow for transmitting data by the transmitting end
  • the embodiment shown in FIG. 27 is a flow for receiving data by the receiving end. Therefore, those skilled in the art can understand that the embodiment is the reverse process of the embodiment shown in FIG. 3, and therefore, the description is not repeated here.
  • the second convolutional coding when binary convolutional coding is adopted and the transmission code rate is greater than one-half, the second convolutional coding is obtained by adopting different puncturing modes, that is, the first puncturing mode and the second puncturing mode.
  • a data is punctured, because the first puncturing mode and the second puncturing mode are different for the two channels of the same data, but the obtained puncturing data, that is, the first puncturing data and the second puncturing data,
  • the transmission code rate is the same. Therefore, the receiving end can obtain the bit of the other data from the one channel data, thereby obtaining the coding gain, and the bit error rate of the data transmission based on the dual carrier modulation can be reduced compared with the existing DCM technology. Improve the reliability of data transmission.
  • the puncturing mode is described by distinguishing the transmission code rate corresponding to the embodiment of the transmitting end.
  • FIG. 28 shows a schematic diagram of the zero-filling process corresponding to the punching mode shown in FIG.
  • Fig. 29 is a view showing a zero-filling process corresponding to the punching mode shown in Fig. 6.
  • Fig. 30 is a view showing a zero-filling process corresponding to the punching mode shown in Fig. 7.
  • Fig. 31 is a view showing a zero-filling process corresponding to the punching mode shown in Fig. 8.
  • the receiving end executes S404, that is, the pair is destroyed.
  • the bits are subjected to zero-filling processing to obtain data after bit-filling, that is, first punctured data, expressed as: A 0 , A 1 , A 2 , 0, A 4 , A 5 , A 6 , and 0;
  • decoded bits are obtained: b 0 , b 1 , b 2 , and b 3 .
  • the receiving end executes S405, that is, the pair is destroyed.
  • the bits are subjected to zero-filling processing to obtain data after bit-filling, that is, second punctured data, expressed as: A 0 , 0, A 2 , A 3 , A 4 , 0, A 6 and A 7 ;
  • decoded bits are obtained: b 0 , b 1 , b 2 , and b 3 .
  • the receiving end executes S405, that is, the pair is destroyed.
  • the bits are subjected to zero-filling processing to obtain data after bit-filling, that is, second punctured data, expressed as: A 0 , A 1 , 0, A 3 , A 4 , A 5 , 0, and A 7 ;
  • decoded bits are obtained: b 0 , b 1 , b 2 , and b 3 .
  • the receiving end executes S405, that is, the pair is destroyed.
  • the bits are subjected to zero-filling processing to obtain data after bit-filling, that is, second punctured data, expressed as: 0, A 1 , A 2 , A 3 , 0, A 5 , A 6 , and A 7 ;
  • decoded bits are obtained: b 0 , b 1 , b 2 , and b 3 .
  • the first puncturing mode may be: from the first bit of the first punctured data to the last bit, at each The 4th bit and the 5th bit are deleted from the 6 bits to obtain the first punctured data, and the first punctured data is the data after the BCC; correspondingly, the second puncturing mode can be: From the first bit of the second punctured data up to the last bit, any two bits other than the 4th bit and the 5th bit are erased in every 6 bits to obtain a second hit Hole Data, the second punctured data is data after BCC.
  • FIG. 32 shows a schematic diagram of the zero-filling process corresponding to the punching mode shown in FIG.
  • the receiving end executes S404. That is, the bits that have been erased are zero-filled, and the data after the bit is filled, that is, the first punctured data, is expressed as: A 0 , A 1 , A 2 , 0, 0, A 5 , A 6 , A 7 , A 8 , 0, 0, and A 11 ;
  • decoded bits are obtained: b 0 , b 1 , b 2 , b 3 , b 4 , and b 5 .
  • the first puncturing mode may be: from the first bit of the first punctured data to the last bit, the first bit and the sixth bit are erased in every 6 bits to obtain the first Punching data, the first punctured data is data after BCC;
  • the second puncturing mode may be: from the first bit of the second punctured data to the last bit, in every 6 bits Any two bits other than the first bit and the sixth bit are erased to obtain the second punctured data, and the second punctured data is the data after the BCC.
  • FIG. 33 shows a schematic diagram of the zero-filling process corresponding to the punching mode shown in FIG.
  • the receiving end executes S404. That is, the bits that have been erased are zero-filled, and the data after the bit is filled, that is, the first punctured data, is expressed as: A 0 , 0 , 0, A 3 , A 4 , A 5 , A 6 0, 0, A 9 , A 10 and A 11 ; After decoding the first punctured data, decoded bits are obtained: b 0 , b 1 , b 2 , b 3 , b 4 and b 5 .
  • the first puncturing mode may be: from the first bit of the first punctured data to the last bit, the second bit and the third bit are removed from every 6 bits to obtain the first Punching data, the first punctured data is data after BCC;
  • the second puncturing mode may be: from the first bit of the second punctured data to the last bit, in every 6 bits Any two bits other than the second bit and the third bit are erased to obtain the second punctured data, and the second punctured data is the data after the BCC.
  • FIG. 34 shows a schematic diagram of the zero-filling process corresponding to the punching mode shown in FIG.
  • the first puncturing mode may be: from the first bit of the first punctured data to the last bit, at each The 4th bit, the 5th bit, the 8th bit, and the 9th bit are deleted from the 10 bits to obtain the first punctured data, and the first punctured data is the data after the BCC; accordingly,
  • the second puncturing mode may be: from the first bit of the second punctured data to the last bit, the fourth bit, the fifth bit, and the eighth bit are deleted from every 10 bits. And any four bits other than the ninth bit, the second punctured data is obtained, and the second punctured data is the data after the BCC.
  • FIG. 35 shows a schematic diagram of the zero-filling process corresponding to the punching mode shown in FIG.
  • Fig. 36 is a view showing a zero-filling process corresponding to the punching mode shown in Fig. 13.
  • Fig. 37 is a view showing a zero-filling process corresponding to the punching mode shown in Fig. 14.
  • the receiving end executes S404, that is, the pair is destroyed.
  • the bits are zero-filled to obtain the bit-filled data, that is, the first punctured data, expressed as: A 0 , A 1 , A 2 , 0, 0, A 5 , A 6 , 0, 0, and A. 9; after the first puncturing is subjected to decoded data to obtain decoded bits: b 0, b 1, b 2, b 3 and b 4.
  • the receiving end executes S405, that is, the pair is destroyed.
  • the bits are zero-filled to obtain the bit-filled data, that is, the second punctured data, expressed as: A 0 , 0 , 0, A 3 , A 4 , 0, 0, A 7 , A 8 , and A 9; after the second puncturing is subjected to the decoded data to obtain decoded bits: b 0, b 1, b 2, b 3 and b 4.
  • the receiving end executes S405, that is, the pair is destroyed.
  • the bits are zero-filled to obtain the bit-filled data, that is, the second punctured data, expressed as: A 0 , A 1 , 0, A 3 , A 4 , 0, 0, A 7 , A 8 and 0; after decoding the second punctured data, decoding bits are obtained: b 0 , b 1 , b 2 , b 3 , and b 4 .
  • the deinterleaving processing at the receiving end also includes at least the following two methods:
  • Manner 1 The interleaver parameters corresponding to the transmission bandwidth are respectively used for demodulation. The two channels of data are deinterleaved to obtain the first punctured data and the second punctured data.
  • Manner 2 using 2N of the interleaver parameter corresponding to the transmission bandwidth, respectively de-interleaving the two channels of data obtained by demodulation to obtain the first punctured data and the second punctured data, and N is the AP simultaneously serving The number of STAs.
  • the same interleaver parameters are used to process the demodulation, and the two channels of data obtained by the demodulation are deinterleaved.
  • 38 is a block diagram of signal reception in a data transmission method based on dual carrier modulation according to the present invention. 38 corresponds to FIG. 15.
  • the first path data and the second path data are obtained, where the first path data and the second path data are respectively carried on different two partial subcarriers, which are shown as the first half.
  • the subcarrier and the latter half of the subcarriers have the same number of subcarriers in the two subcarriers, and are used for carrying useful data; respectively demodulating the first channel data and the second channel data; using the same solution as the existing interleaving process
  • the interleaver parameter that is, the full bandwidth deinterleaver parameter, respectively deinterleaves the two channels of data obtained by the demodulation process, and obtains the first punctured data and the second punctured data, the first punctured data and the second punctured data.
  • the transmission rate of the data is the same, and the first punctured data is different from the bit that is punctured in the second punctured data; according to the first puncturing mode used by the transmitting end to obtain the first punctured data, the first punctured data is used.
  • the bit that is erased is subjected to zero-filling processing; according to the second puncturing mode used by the transmitting end to obtain the second punctured data, the bit that is knocked out in the second punctured data is zero-filled; Two-way data And data encryption, and the added rows and Viterbi decoding, to obtain the desired data.
  • FIG. 39 is another block diagram of signal reception in the data transmission method based on dual carrier modulation according to the present invention.
  • Figure 39 corresponds to Figure 16.
  • the difference between the two is only that, in the embodiment shown in FIG. 39, different deinterleaver parameters, that is, 1/2N bandwidth deinterleaver parameters, are used in the existing interleaving process, and the demodulation process is respectively obtained.
  • the two channels of data are deinterleaved to obtain first punctured data and second punctured data.
  • the deinterleave processing is explained.
  • the receiving end for example, the STA, uses the 1/2 bandwidth deinterleaver parameter to deinterleave the two channels of data obtained by the demodulation process.
  • the first round of deinterleaving corresponds to the second round of interleaving of the transmitting end interleaver. Record the input data as The output data is recorded as The relationship between the two is as follows:
  • the second round of deinterleaving corresponds to the first round of interleaving at the transmitting end.
  • the second round of deinterleaved input data stream remember For the second round of interleaved output data streams, the second round of deinterleaving is as follows:
  • S402 may include: demodulating the first channel data by using standard demodulation processing, and standard demodulation processing corresponding to a standard constellation diagram used by the transmitting end, the standard constellation The figure shows a constellation diagram in the 802.11 standard; using standard demodulation processing, demodulating the second data to obtain first demodulated data; performing DCM bit demapping on the first demodulated data, wherein DCM bit demapping It refers to the data in the odd-numbered bits in the data stream is inverted and the data in the even-numbered bits are interchanged, and the inverse is the real-number field.
  • FIG. 40 is still another block diagram of signal reception in the data transmission method based on dual carrier modulation according to the present invention.
  • the embodiment shown in Fig. 40 corresponds to the embodiment shown in Fig. 19.
  • the first path data and the second path data are obtained, where the first path data and the second path data are respectively carried on different two partial subcarriers, which are shown as the first half.
  • the subcarrier and the second half of the subcarriers have the same number of subcarriers in the two subcarriers, and are used to carry useful data; perform standard demodulation processing on the first data, and perform preset demodulation processing on the second data.
  • the preset demodulation process first adopts standard demodulation processing, The two channels of data are demodulated to obtain the first demodulated data; and then the first demodulated data is subjected to DCM bit demapping; as for the deinterleaving process, those skilled in the art can understand that the same deinterleaver can be used as the existing interleaving process.
  • the parameter that is, the full bandwidth deinterleaver parameter, respectively deinterleaves the two channels of data obtained by the demodulation process to obtain the first punctured data and the second punctured data, or may also adopt a 1/2N bandwidth deinterleaver
  • the parameters respectively decompose the two channels of data obtained by the demodulation process to obtain the first punctured data and the second punctured data, and the first punctured data and the second punctured data have the same transmission code rate, the first hit
  • the hole data is different from the bit that is knocked out in the second punched data; according to the first punching mode used by the transmitting end to obtain the first punched data, the bit that is erased in the first punched data is zero-filled.
  • the bits that are knocked out in the second punctured data are zero-filled; the two-way data after zero-filling is added, and After the addition
  • the data is Viterbi decoded to obtain the required data.
  • FIG. 41 shows an example of a process of DCM bit demapping of the present invention.
  • the represented data stream after being demapped by the DCM bit, is obtained as with The data stream.
  • the S402 may include: demodulating the first path data and the second path data by using a standard demodulation process, where the standard demodulation process corresponds to a standard constellation diagram used by the transmitting end, and the standard constellation diagram A constellation diagram in the 802.11 standard.
  • FIG. 43 is a block diagram of still another signal receiving in the data transmission method based on dual carrier modulation according to the present invention.
  • the embodiment shown in Fig. 43 corresponds to the embodiment shown in Fig. 17.
  • the difference between the two embodiments is that, in Fig. 43, the first path data and the second path data are respectively demodulated using standard demodulation processing.
  • S402 may include: performing standard quadrature amplitude demodulation on the first path data, standard quadrature amplitude demodulation as a quadrature amplitude demodulation in the 802.11 standard, and performing standard on the second path data. Performing amplitude demodulation to obtain second demodulated data; performing DCM demapping on the second demodulated data, wherein DCM bit demapping refers to inverting data in odd bits in the data stream and in even bits Data interchange, inversion to real field anti.
  • FIG. 44 is a block diagram of still another signal receiving in the data transmission method based on dual carrier modulation according to the present invention.
  • the embodiment shown in FIG. 44 corresponds to the embodiment of FIG. 24, and is an inverse process.
  • the number of subcarriers in each of the two partial subcarriers is 1/2N, and N is the number of STAs that the AP simultaneously serves.
  • the AP is the sending end
  • the STA is the receiving end.
  • the embodiment of the present invention is not limited thereto, and the STA is the transmitting end and the AP is the receiving end.
  • the specific process is similar, and therefore is not described again.
  • STA1 obtains the first path data of STA1 from the first 1/4 subcarrier, and obtains the second path data of STA1 from the second 1/4 subcarrier; STA2 from the third 1/4 subcarrier The first channel data of STA2 is obtained, and the second channel data of STA2 is selected from the fourth 1/4 subcarrier; each STA demodulates the received two channels of data by using demodulation processing corresponding to the AP side.
  • Each of STA1 and STA2 uses a 1/4 bandwidth deinterleaver parameter to deinterleave the two channels of data obtained by demodulation.
  • the receiving end only needs to adopt the existing LLR combining based receiving algorithm, and therefore, is convenient to implement.
  • FIG. 46 is a schematic structural diagram of a data transmission apparatus based on dual carrier modulation according to the present invention.
  • Embodiments of the present invention provide a data transmission apparatus based on dual carrier modulation, which is applied to a wireless network based on OFDM transmission, and the apparatus may be integrated in an AP or a terminal (STA) having a Wi-Fi network interface.
  • the data transmission apparatus 100 based on dual carrier modulation includes an encoding module 110, a first puncturing module 120, a second puncturing module 130, an interleaving module 140, a modulating module 150, a mapping module 160, and a transmitting module 170.
  • the encoding module 110 is configured to perform BCC on the data to be transmitted, and obtain the first data.
  • the first punching module 120 is configured to punch the first data obtained by the encoding module 110 by using the first punching mode to obtain the first punching data.
  • the second punching module 130 is configured to punch the first data obtained by the encoding module 110 by using the second punching mode to obtain the second punching data, and the first punching The mode is different from the bit that is knocked out by the second puncturing mode, and the first punctured data has the same transmission rate as the second punctured data.
  • the interleaving module 140 is configured to perform interleaving processing on the first punctured data obtained by the first puncturing module 120 and the second punctured data obtained by the second puncturing module 130, respectively.
  • the modulation module 150 is configured to separately modulate the two channels of data obtained by the interleaving module 140.
  • the mapping module 160 is configured to map the modulated two channels of data obtained by the modulation module 150 to different two-part subcarriers in the subcarrier set, where each subcarrier in the subcarrier set is used to carry useful data, and the two parts of the subcarriers are used.
  • the number of neutron carriers is the same.
  • the sending module 170 is configured to perform IFFT on the data on all subcarriers in the set of subcarriers.
  • the device in this embodiment may be used to implement the technical solution of the method embodiment shown in FIG. 3, and the implementation principle and technical effects are similar, and details are not described herein again.
  • the first puncturing module 120 may be specifically configured to: from the first bit of the first data to The last bit, the fourth bit of each of the four bits is deleted, and the first punctured data is obtained; correspondingly, the second puncturing module 130 can be specifically configured to: from the first bit of the first data to The last bit, any one of the 4 bits except the 4th bit is erased every 4 bits to obtain the second punctured data.
  • the first puncturing module 120 may be specifically configured to: from the first bit of the first data to the last bit, at each The 4th bit and the 5th bit are deleted from the 6 bits to obtain the first punctured data; correspondingly, the second puncturing module 130 can be specifically used to: from the first bit of the first data to the last One bit, in which any two bits other than the 4th bit and the 5th bit are erased in every 6 bits, and the second punctured data is obtained.
  • the first puncturing module 120 may be specifically configured to: remove the first bit and the sixth bit from each of the 6 bits from the first bit to the last bit of the first data to obtain the first Punching data; correspondingly, the second puncturing module 130 may be specifically configured to: from the first bit of the first data to the last bit, in each of the 6 bits, except for the first bit and the first Any two bits other than 6 bits obtain the second punctured data.
  • the first puncturing module 120 may be specifically configured to: remove the second bit and the third bit from each of the 6 bits from the first bit to the last bit of the first data to obtain the first Punching data; correspondingly, the second puncturing module 130 can be specifically configured to: from the first bit of the first data to the last bit, at each The second punctured data is obtained by discarding any two of the 6 bits except the 2nd bit and the 3rd bit.
  • the first puncturing module 120 may be specifically configured to: from the first bit of the first data to the last bit, at each The 4th bit, the 5th bit, the 8th bit, and the 9th bit are deleted from the 10 bits to obtain the first punctured data; correspondingly, the second puncturing module 130 can be specifically used to: The first bit of the first data up to the last bit, and any four bits other than the 4th bit, the 5th bit, the 8th bit, and the 9th bit are erased in every 10 bits. , obtaining the second punch data.
  • the interleaving module 140 may be specifically configured to perform interleaving processing on the first punctured data and the second punctured data respectively by using interleaver parameters corresponding to the transmission bandwidth.
  • the interleaving module 140 may be specifically configured to: obtain the number N of STAs that the AP simultaneously serves; determine an interleaver parameter that performs interleaving processing on the first punctured data and the second punctured data, and a transmission bandwidth. Corresponding to 2N of the interleaver parameter; using the interleaver parameters, the first punctured data and the second punctured data are respectively interleaved.
  • the modulation module 150 may include a first modulation unit (not shown) and a second modulation unit (not shown).
  • the first modulation unit is configured to modulate one of the two channels of the interleaved data by using a standard constellation diagram, which is a constellation diagram in the 802.11 standard.
  • the second modulating unit may be configured to modulate another one of the two channels of the interleaved data by using a preset constellation diagram, where the preset constellation is a constellation having a Gray code characteristic different from the standard constellation diagram. Figure.
  • the second modulating unit may be specifically configured to: perform DCM bit mapping on another channel of data, where the DCM bit mapping refers to inverting data in odd bits in the data stream and data in even bits For the change, the inversion here is binary inversion; the DCM bit-mapped data is modulated by using the above standard constellation diagram.
  • the modulation module 150 is specifically configured to: separately modulate two channels of data after interleaving by using a standard constellation diagram, where the standard constellation is a constellation diagram in the 802.11 standard.
  • the modulation module 150 may be specifically configured to: perform standard QAM on one of the two channels of data after the interleaving process, where the standard QAM is a QAM in the 802.11 standard;
  • the other of the two pieces of data is subjected to DCM bit mapping and the above standard QAM, wherein the DCM bit mapping refers to exchanging data in odd bits of the data stream and data in even bits.
  • the inversion is a binary inversion.
  • mapping module 160 may be specifically configured to: obtain the number N of STAs served by the AP simultaneously; and map the modulated two channels of data to different two partial subcarriers in the subcarrier set, the two subcarriers The number of subcarriers in each part is 1/2N.
  • FIG. 47 is another schematic structural diagram of a data transmission apparatus based on dual carrier modulation according to the present invention.
  • Embodiments of the present invention provide a data transmission apparatus based on dual carrier modulation, which is applied to a wireless network based on OFDM transmission, and the apparatus may be integrated in an AP or a terminal (STA) having a Wi-Fi network interface.
  • STA terminal
  • the dual carrier modulation based data transmission apparatus 300 includes a receiving module 310, a demodulation module 320, a deinterleaving module 330, a zero padding module 340, and a processing module 350.
  • the receiving module 310 is configured to perform FFT on the received data to obtain first path data and second path data, where the first path data and the second path data are respectively carried on different two partial subcarriers, where the two The number of subcarriers in some subcarriers is the same and is used to carry useful data.
  • the demodulation module 320 is configured to demodulate the first path data and the second path data obtained by the receiving module 310, respectively.
  • the deinterleaving module 330 is configured to perform deinterleaving processing on the two channels of data demodulated by the demodulation module 320, respectively, to obtain first punched data and second punched data, and the first punched data and the second punched data are transmitted.
  • the code rate is the same, and the first punctured data is different from the bit that is erased in the second punctured data.
  • the zero-filling module 340 is configured to perform zero-filling processing on the bits that are erased in the first punctured data obtained by the de-interleaving module 330 according to the first puncturing mode used by the transmitting end to obtain the first punctured data; and, according to The transmitting end obtains the second puncturing mode used by the second puncturing data, and performs zero-filling processing on the bits that are erased in the second punctured data obtained by the de-interleaving module 330.
  • the processing module 350 is configured to add the two channels of data after the zero-filling, and perform Viterbi decoding on the added data to obtain the required data.
  • the device in this embodiment may be used to implement the technical solution of the method embodiment shown in FIG. 27, and the implementation principle and technical effects are similar, and details are not described herein again.
  • the first puncturing mode may be: from the first bit of the first punctured data to The last bit, the fourth bit is erased in every 4 bits to obtain the first punctured data, and the first punctured data is the data after the second BCC.
  • the second puncturing mode may be: from the first bit of the second punctured data to the last bit, and any one of the 4 bits except the 4th bit is erased in every 4 bits. The second punctured data is obtained, and the second punctured data is the data after the BCC.
  • the first puncturing mode may be: from the first bit of the first punctured data to the last bit, at each The 4th bit and the 5th bit are deleted from the 6 bits to obtain the first punctured data, and the first punctured data is the data after the BCC.
  • the second puncturing mode may be: from the first bit of the second punctured data to the last bit, the 4th bit and the 5th bit are eliminated in every 6 bits.
  • the second punctured data is obtained by any two bits outside, and the second punctured data is the data after the BCC.
  • the first puncturing mode may be: from the first bit of the first punctured data to the last bit, The first bit and the sixth bit are erased in every 6 bits to obtain first punctured data, and the first punctured data is data after BCC.
  • the second puncturing mode may be: from the first bit of the second punctured data to the last bit, the first bit and the sixth bit are erased in every 6 bits.
  • the second punctured data is obtained by any two bits outside, and the second punctured data is the data after the BCC.
  • the first puncturing mode may be: from the first bit of the first punctured data to the last bit, The second bit and the third bit are erased in every 6 bits to obtain first punctured data, and the first punctured data is data after BCC.
  • the second puncturing mode may be: from the first bit of the second punctured data to the last bit, the second bit and the third bit are removed from each of the 6 bits.
  • the second punctured data is obtained by any two bits outside, and the second punctured data is the data after the BCC.
  • the first puncturing mode may be: from the first bit of the first punctured data to the last bit, at each The 4th bit, the 5th bit, the 8th bit, and the 9th bit are deleted from the 10 bits to obtain the first punctured data, and the first punctured data is the data after the BCC.
  • the second puncturing mode may be: from the first bit of the second punctured data to the last bit, the fourth bit, the fifth bit, and the eighth bit are deleted from every 10 bits.
  • the second punctured data is obtained by using any bit other than the ninth bit and the ninth bit, and the second punctured data is the data after the BCC.
  • the deinterleaving module 330 may be specifically configured to: perform deinterleaving processing on the demodulated two-way data by using an interleaver parameter corresponding to the transmission bandwidth, and obtain the first punctured data and the second Punch data.
  • the de-interleaving module 330 is specifically configured to: perform de-interleaving on the demodulated two-way data by using a 2N sub-parameter of the interleaver parameter corresponding to the transmission bandwidth, to obtain the first punctured data and the first Two punctured data, where N is the number of STAs that the AP simultaneously serves.
  • the demodulation module 320 may be specifically configured to: perform demodulation on the first path data by using a standard demodulation process, where the standard demodulation process corresponds to a standard constellation diagram used by the transmitting end, and the standard constellation picture is in the 802.11 standard. a constellation diagram; using standard demodulation processing, demodulating the second data to obtain first demodulated data; performing DCM bit demapping on the first demodulated data, wherein the DCM bit demapping refers to data The data in the odd bit in the stream is inverted and the data in the even bit is swapped, and the inverse is the real field inversion.
  • the demodulation module 320 may be specifically configured to: perform demodulation on the first path data and the second path data by using standard demodulation processing, where the standard demodulation process corresponds to a standard constellation diagram used by the transmitting end, and the standard constellation The picture shows a constellation diagram in the 802.11 standard.
  • the demodulation module 320 may be specifically configured to: perform standard quadrature amplitude demodulation on the first path data, the standard quadrature amplitude demodulation is a quadrature amplitude demodulation in the 802.11 standard; and standardize the second path data.
  • Quadrature amplitude demodulation to obtain second demodulated data; DCM demapping on the second demodulated data, wherein the DCM bit demapping refers to inverting and even data in odd bits of the data stream The data in the bit is swapped, and the inverse is the inverse of the real field.
  • the number of subcarriers in each of the two partial subcarriers is 1/2N, where N is the number of STAs served by the AP simultaneously.
  • FIG. 48 is a schematic structural diagram of a data transmission system based on dual carrier modulation according to the present invention.
  • Embodiments of the present invention provide a data transmission system based on dual carrier modulation, which is applied to a wireless network based on OFDM transmission.
  • the dual carrier modulation based data transmission system 500 includes a dual carrier modulation based data transmission device 100 as shown in FIG. 46, and a dual carrier modulation based data transmission device 300 as shown in FIG.
  • the system of the present embodiment can be used to implement the technical solution of the method embodiment shown in FIG. 3 and FIG. 27, and the implementation principle and technical effects are similar, and details are not described herein again.
  • the embodiments of the present invention can be applied to a wireless local area network, including but not limited to a Wi-Fi system represented by 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac, and can also be applied to a next-generation Wi-Fi system.
  • a wireless local area network including but not limited to a Wi-Fi system represented by 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac
  • a next-generation Wi-Fi system In the next generation wireless LAN system, and including indoor scenes and outdoor scenes.
  • the disclosed apparatus and methods may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit or module is only a logical function division.
  • there may be another division manner for example, multiple units or modules may be used. Combinations can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or module, and may be electrical, mechanical or otherwise.
  • the modules described as separate components may or may not be physically separated.
  • the components displayed as modules may or may not be physical modules, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • the aforementioned program can be stored in a computer readable storage medium.
  • the program when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes various media that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Error Detection And Correction (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

Des modes de réalisation de la présente invention concernent un procédé, un dispositif et un système de transmission de données à base de modulation à double porteuse (DCM). Lorsqu'un codage à convolution binaire est adopté et un débit binaire de transmission est supérieur à 1/2, le mode de réalisation de la présente invention utilise différents motifs de perforation, c'est-à-dire, un premier motif de perforation et un deuxième motif de perforation, pour perforer des premières données obtenues par le codage à convolution binaire. Bien que le premier motif de perforation et le deuxième motif de perforation soient utilisés pour perforer différents bits pour deux données identiques, les données perforées obtenues, des premières données perforées et des deuxièmes données perforées, ont le même débit binaire de transmission et, par conséquent, une extrémité de réception peut obtenir les bits perforés d'une donnée parmi les autres données et obtenir ainsi un gain de codage. De plus, contrairement à la technique DCM existante, la présente invention peut réduire un taux d'erreur sur les bits de transmission de données à base de DCM et augmenter la fiabilité de transmission de données.
PCT/CN2016/098166 2015-09-10 2016-09-06 Procédé, dispositif et système de transmission de données à base de modulation à double porteuse Ceased WO2017041690A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510573775.2A CN106533610B (zh) 2015-09-10 2015-09-10 基于双载波调制的数据传输方法、装置及系统
CN201510573775.2 2015-09-10

Publications (1)

Publication Number Publication Date
WO2017041690A1 true WO2017041690A1 (fr) 2017-03-16

Family

ID=58240540

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/098166 Ceased WO2017041690A1 (fr) 2015-09-10 2016-09-06 Procédé, dispositif et système de transmission de données à base de modulation à double porteuse

Country Status (2)

Country Link
CN (1) CN106533610B (fr)
WO (1) WO2017041690A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021180790A1 (fr) * 2020-03-13 2021-09-16 Telefonaktiebolaget Lm Ericsson (Publ) Commande de transmissions ofdm basée sur un motif de poinçonnage

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11239948B2 (en) * 2019-03-06 2022-02-01 Huawei Technologies Co., Ltd. BCC puncturing patterns for data retransmission in wireless network
US20210288752A1 (en) * 2020-03-13 2021-09-16 Jung Hoon SUH Modulation and binary convolutional coding for multiple resource units in wireless network
CN115002926B (zh) * 2022-06-23 2023-10-10 中国电信股份有限公司 双载波方案配置方法、装置、电子设备及可读存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050204269A1 (en) * 2004-01-20 2005-09-15 Shoemake Matthew B. Coding apparatus, and associated method, for forming a punctured binary convolutional code for use in a radio communication system
CN1822582A (zh) * 2005-02-18 2006-08-23 三星电子株式会社 双载波调制器、ofdm发送器及其方法
CN101662438A (zh) * 2008-08-28 2010-03-03 华为技术有限公司 无线通信方法、发送方法、接收解码方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050204269A1 (en) * 2004-01-20 2005-09-15 Shoemake Matthew B. Coding apparatus, and associated method, for forming a punctured binary convolutional code for use in a radio communication system
CN1822582A (zh) * 2005-02-18 2006-08-23 三星电子株式会社 双载波调制器、ofdm发送器及其方法
CN101662438A (zh) * 2008-08-28 2010-03-03 华为技术有限公司 无线通信方法、发送方法、接收解码方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021180790A1 (fr) * 2020-03-13 2021-09-16 Telefonaktiebolaget Lm Ericsson (Publ) Commande de transmissions ofdm basée sur un motif de poinçonnage

Also Published As

Publication number Publication date
CN106533610B (zh) 2020-01-17
CN106533610A (zh) 2017-03-22

Similar Documents

Publication Publication Date Title
US11309905B2 (en) Communication of user specific control information in a wireless network
CN112910602B (zh) 数据编码和交织方法以及无线站点
US10142151B2 (en) Peak to average power ratio (PAPR) reduction in a wireless network
US10225122B2 (en) Low PAPR dual sub-carrier modulation scheme for BPSK in WLAN
CN104506289B (zh) 多分量载波ofdma通信系统
US20040257979A1 (en) Apparatus and method for tranmitting and receiving a pilot pattern for identification of a base station in an OFDM communication system
CN106961317B (zh) 一种数据发送方法及装置
EP3266158B1 (fr) Support destiné à un temps de traitement de décodage supplémentaire dans des systèmes lan sans fil
CN107078991A (zh) 基于使用的调制利用旋转角的信号空间分集
CN108471393B (zh) 双子载波调制方法和无线站点
WO2018008744A1 (fr) Dispositif de station de base, dispositif terminal, procédé de communication, et circuit intégré
WO2016127324A1 (fr) Procédé, appareil, dispositif et système de réduction de rapport puissance maximale sur puissance moyenne
JP7367178B2 (ja) 検出可能なwlanバージョン識別を伴うプリアンブル
US10212019B1 (en) Sub-carrier adaptation in multi-carrier communication systems
WO2017041690A1 (fr) Procédé, dispositif et système de transmission de données à base de modulation à double porteuse
CN111478759A (zh) 一种被用于无线通信的用户设备、基站中的方法和装置
KR20070014169A (ko) 다중-입력-다중-출력 ofdm 무선 근거리 네트워크를구현하기 위한 방법 및 시스템
WO2008009015A1 (fr) Activation d'antennes commutées mobiles
CN101778079B (zh) 一种多媒体广播无线信号抗干扰传输方法
CN107147604B (zh) 基于ofdm的智能三模自适应传输方法
TWI643474B (zh) 發送資料分組的方法及無線站
CN106572042A (zh) 传输数据的方法和设备
CN104168248B (zh) 基于数据单元块旋转的交织和解交织方法及装置
WO2017024456A1 (fr) Procédé et appareil de modulation et de démodulation de code
CN101297577A (zh) 用于正交频分多址通信系统的带内率控制

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16843628

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16843628

Country of ref document: EP

Kind code of ref document: A1