IEEE 802.16m-09/0226r3 Project IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16> Title Proposed Text of Channel Coding and HARQ for the IEEE 802.16m Amendment Date Submitted 2009-01-15 Source(s) Yu-Chuan Fang, 1Zheng Yan-Xiu, Ren-Jr Chen, Chang-Lan Tsai, Chung-Lien Ho, Richard Li, Chien-Yu Kao, Cheng-Ming Chen, 3Yu-Tao Hsieh, Jen-Yuan Hsu, Pang-An Ting, ITRI Wern-Ho sheen, NCTU/ITRI Voice: 1 +886-3-5914715 2 +886-3-5917596 3 +886-3-5914854 E-mail: 1 zhengyanxiu@itri.org.tw 2 richard929@itri.org.tw 3 ythsieh@itri.org.tw Re IEEE 802.16m-08/053r1, “Call for Comments and Contributions on Project 802.16m Amendment Working Document”. Target topic: “11.13 Channel Coding and HARQ”. Abstract The contribution proposes the text for HARQ bit-rearrangement Purpose To be discussed and adopted by TGm for the 802.16m amendment. Notice Release Patent Policy This document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16. The contributor is familiar with the IEEE-SA Patent Policy and Procedures: <http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and <http://standards.ieee.org/guides/opman/sect6.html#6.3>. Further information is located at <http://standards.ieee.org/board/pat/pat-material.html> and <http://standards.ieee.org/board/pat>. Proposed Text of Channel Coding and HARQ for the IEEE 802.16m Amendment Yu-Chuan Fang, Zheng Yan-Xiu, Ren-Jr Chen, Chang-Lan Tsai, Chung-Lien Ho, Richard Li, Chien-Yu Kao, Cheng-Ming Chen Yu-Tao Hsieh, Jen-Yuan Hsu, Pang-An Ting, ITRI Wern-Ho sheen, NCTU/ITRI ITRI 1 IEEE 802.16m-09/0226r3 1. Introduction The contribution proposes the text of bit re-arrangement to be included in the 802.16m amendment. The proposed text is developed so that it can be readily combined with IEEE P802.16 Rev2/D7 [1], it is compliant to the 802.16m SRD [2] and it follows the style and format guidelines in [3]. In section 11.13.2.2 of [4], bit re-arrangement includes a bit-level interleaver and an inverter. Referring to [5,6,7,8], a scheme of a simple bit circular shifter with bit-priority mapping and a bit inverter is proposed for the bit re-arrangement. For chase combining (CC) mode, the bit circular shifter and inverter change the bit positions and bit reliabilities of a subpacket transmitted previously for retransmissions. Besides, the bit-priority mapping can improve the error rate of initial transmission and overall throughput. For incremental redundancy (IR) mode, the bit-priority mapping can protect relative significant bits in different redundancy versions more robustly and bit circular shifter can interleave the selected coded bits to achieve more diversity gain. 2. Motivation In the legacy transmitter the CTC encoder encodes NEP bits to generate a codeword of 3×NEP coded bits. After the interleaver and the bit selection including puncturing or repetition, a subpacket is formed and then fed into the modulator. The bit selection may product several subpackets as redundancy versions for retransmission. While receiving a NACK, the transmitter retransmits the subpacket or another subpacket of the codeword to enhance the decoding ability. However, it does not satisfy the requirement of better system performance and higher throughput. The bit rearrangement can help arrange coded bits by several BitRe versions to obtain diversity gain. Fig. 1 illustrates the transmitter with the bit rearrangement block. Through the bit selection and bit rearrangement the transmitter may make several versions of subpackets. data CRC NEP bits adder CTC encoder Interleaver Bit selection Bit Rearrangement Modulation Tx ACK/NACK Fig. 1 An illustration of the transmitter with bit rearrangement In order to improve the system performance, the diversity gain deserves attention for the bit re-arrangement. We introduce several familiar diversities. Constellation diversity: The bits have different reliabilities on some constellations. Taking 16-QAM for example, four bits, b3b2b1b0 , are mapping into a position on the constellation to form a 16-QAM symbol. b3 and b2 modulate the in-phase carrier and b1 and b0 modulate the quadrature carrier. Bits b3 and b1 respectively modulate the phases of the in-phase and quadrature carriers. In particular, the phase is 0 when b3 or b1 is 0 and 180 when b3 or b1 is 1. Bits b2 and b0 respectively modulate the amplitudes of the in-phase and quadrature carriers, where the amplitude is greater when b2 or b0 is 1 than otherwise. Thus, b3 and b1 have higher reliabilities than b2 and b0 . The diversity occurs due to different reliabilities. 2 IEEE 802.16m-09/0226r3 Frequency diversity: After the modulation, the modulation symbols may be allocated into the resource units with different subcarrier indices. Over the fading channel, the bits at different subcarrier indices should suffer from different fading, as generates diversity. Antenna diversity: While multiple antennas are used, the coded bits are separated into several streams. Different channels may cause different effects on the bits. The bit rearrangement should have two properties to take advantage of diversities, which are introduced as follows. Bit-priority mapping: The coded bits may be given different priority according to their relative significance, such as systematic or parity bits. More significant bits should be protected more robustly to improve the decoding performance. Therefore, more significant bits may be mapped into more reliable positions on the constellation, or mapped into streams passing better channels. The distribution of priority may change for multiple transmissions of a codeword. Especially, the bit-priority mapping can provide benefit at the initial transmission. Averaging reliability: If some specific bits are always given the highest priority at multiple retransmissions, the performance improvement would degrade. Thus, we let the bits exchange the priorities or reliabilities, i.e. the bit with higher/lower reliability at previous transmission is given lower/higher reliability at current transmission. After several transmissions, the bit reliability seems to be averaged. In the next section we propose a bit re-arrangement method which utilizes the bit-level interleaver and bit inverter to achieve the properties and advantage mentioned above. 3. Proposed bit re-arrangement method The proposed bit rearrangement method comprises the bit-level interleaver and bit inverter. For convenience of introduction the bit-level interleaver is separated into two blocks, bit-priority mapper and circular shifter. Thus, the block diagram shown in Fig. 2 has three function blocks, bit-priority mapper, circular shifter and bit inverter. The bit rearrangement for CC-HARQ and IR-HARQ modes are respectively introduced in two sections and its operations are also described in the sub-clauses. Bit rearrangement Bit-level interleaver Bit selection ak Bit-priority b k Mapper Fig. 2 Circular shifter ck bit inverter An illustration of the bit rearrangement method The parameters are defined as follows. 3 dk Modulator IEEE 802.16m-09/0226r3 k : the subpacket index NTX : the number of transmission N EP : the number of bits in the encoding packet (before encoding) Lk : the number of coded bits for the k -th subpacket mk : the modulation order for the k -th subpacket (2 for QPSK, 4 for 16-QAM and 6 for 64-QAM) N CMS Lk mk : the number of coded modulation symbols per subpacket N str : the number of streams N DT : the number of data tones per RU (resource units) N PT : the number of pilot tones per RU NT : the number of tones per RU (=N DT N PT ) TS : the symbol time occupied per RU ( 6) Lscd : the fundamental length of subcarriers for data, Lscd 3.1 3.1.1 17, if N str 1 16, if N str 2 14, if N 4 str CC-HARQ mode Bit-priority mapper After the bit selection, the coded bits are divided into two groups for 16-QAM and three groups for 64-QAM, and then the more/less significant bits are mapped to more/less reliable positions on the constellation as shown in Fig. 3. The coded bits of the subpacket at the initial transmission comprises systematic and parity parts, which are respectively regarded as the more and less significant parts. Assume the input is a k (a0 , a1 , , aLk 1 ) and the output is b k (b0 , b1 , , bLk 1 ) . Let the new address is denoted as BPM. 2i BPM (i) floor mk Then, bi aBPM (i ) , for i 0, 1, 2 Lk mk m i mod k 2 . , Lk 1 . Note that b k is used at the initial transmission. 4 IEEE 802.16m-09/0226r3 Coded bits of the subpacket Significant bits s0 s1 s 2 Insignificant bits … … i 0 i1 i 2 … Bit-priority mapping … … Bit sequence based on priority H L H L H L H L H L H L H L H L H L H L H L H L s 0 i 0 s1 i1 s 2 i 2 reliability order on the 16-QAM constellation (a) Coded bits of the subpacket Significant bits s0 s1 s 2 Middle significant bits … m 0 m1 m 2 … … … s 0 m 0 i 0 s 1 m1 i 1 s 2 m 2 i 2 … Insignificant bits i 0 i1 i 2 … … Bit-priority mapping Bit sequence based on priority H M L H M L H M L H M L H M L H M L H M L H M L H M L H M L H M L H M L reliability order on the 64-QAM constellation (b) Fig. 3 3.1.2 Bit-priority mapping (a) for 16-QAM (b) for 64-QAM Bit circular shifter For retransmission, the bit sequence based on priority is shifted rightward by a shift value N shift to obtain ck , and then ck is fed into the next block. Or, we can circularly access the bit sequence from the new initial index given by the shift value to obtain ck . The circular shift may change the bit reliability on the constellation, the corresponding subcarrier indices or the stream allocation to achieve diversity gain. Taking 16-QAM case for example, the shift value N shift can be controlled by two parameters, q1 and q2, and can be represented as the function of them, such as N shift f (q1 , q2 ) . q1 determines the subcarrier (or frequency) index and q2 determines the bit reliability on the constellation and antenna. Fig. 4 illustrates this example on condition of 16QAM. If a bit is located at different subcarriers at different transmissions, it may suffer from different fading. That could decrease the probability of invariant bad fading on the bit. In Fig. 4, q1 and q2 are equal to zero so that no shift occurs at the initial transmission. At the second transmission q1=2 lets the bit sequence be shift rightward about half length of the occupied subcarrier indices and q2=2 lets the bit sequence be shifted two units more across the original modulation symbols to obtain antenna diversity while multiple antennas are used. At the third transmission q1=3 lets the bit sequence be shifted rightward about three-fourths length of the occupied subcarrier indices and q2=1 lets the bit sequence be shifted one unit more to change the bit reliability on the constellation. At the fourth transmission q1=1 lets the bit sequence be shifted rightward 5 IEEE 802.16m-09/0226r3 about one-fourth length of the occupied subcarrier indices and q2=1 lets the bit sequence be shifted one unit more to change the bit reliability. x represents the logically inverting of x. At the second and third transmissions, some bits are logically inverted to change the positions on the constellation, as will be introduced in the next section. reliability order on the 16-QAM constellation 1 TX H L H L H L H L H L H L H L H L H L H L H L H L s 0 i 0 s1 i1 s 2 i 2 … Bit sequence based on priority 2 TX f(q1=2, q2=2) 3 TX s 0 i 0 s 1 i1 f(q1=3, q2=1) 4 TX f(q1=1, q2=1) … s 0 i 0 s 1 i1 … … s 0 i 0 s1 i1 Note that x represents the bit logically inverting of x. Fig. 4 An illustration of the circular shift for 16-QAM and CC-HARQ case The shift value is calculated by the following equations. if ( ( N CMS N str ) mod N DT ) N DT / 2 s0 floor ( N CMS / N str / N DT ) Lscd ; if s0 0 s0 Lscd ; else s0 ceil ( N CMS / N str / N DT ) Lscd ; , s1 floor ( s0 q1 / 4 / Lscd ); s2 floor ( s0 q1 / 4) mod Lscd ; N shift ( s1 N DT mk s2 mk ) N str q2 ; where q1 and q2 can be referred to Table 1. Table 1 The bit re-arrangement parameters for CC-HARQ Modulation NTX mod 4 q1 q2 Invert pattern QPSK 0 1 2 3 0 2 3 1 0 2 0 2 None None None None Modulation NTX mod 4 q1 q2 Invert pattern 16-QAM 0 1 2 3 0 2 3 1 0 2 1 1 None [0 1] [0 1] None Modulation NTX mod 6 q1 q2 Invert pattern 6 IEEE 802.16m-09/0226r3 64-QAM 3.1.3 0 1 2 3 4 5 0 2 3 1 0 2 0 3 2 1 2 1 None [0 1 1] None None [0 1 1] [0 1 1] Bit inverter The bit inverter is used to scramble the bit position with lower reliability on the constellation for some BitRe versions. It logically inverts bits by an invert patterns. For 16-QAM, the invert pattern is [0 1], when NTX mod 4 = 1 or 2, otherwise the invert pattern is none. For 64-QAM, the invert pattern is [0 1 1], when NTX mod 6 = 1, 4 or 5, otherwise the invert pattern is none. [0 1] means the last one per two bits is needed to be inverted and [0 1 1] means the last two per three bits are needed to be inverted. In other words, [0 1] represents every two bits are exclusive-ORed by the vector [0 1] and [0 1 1] represents every three bits are exclusive-ORed with the vector [0 1 1]. Besides, none means no inverting operation. The invert pattern can be referred to Table 1. Note that Table 1 shows four BitRe versions for QPSK and 16-QAM, and six BitRe versions for 64-QAM. However, in the later amendment draft we will suggest only first four BitRe versions for 64-QAM to keep the same signaling overhead for each modulation type. 3.2 3.2.1 IR-HARQ mode Bit-priority mapper Due to the different redundancy versions from bit-selection, the first NEP bits of coded bits of different redundancy versions are regarded as significant bits and other coded bits are regarded as insignificant bits. Then, the coded bits are divided into two groups for 16-QAM and three groups for 64-QAM, and the more/less significant bits are mapped to more/less reliable positions on the constellation as shown in Fig. 5. Let the new address is denoted as BPM. 2i BPM (i) floor mk 2 Lk mk m i mod k 2 7 , for i 0, 1, L , Lk 1 . IEEE 802.16m-09/0226r3 Coded bits of the subpacket Significant bits s0 s1 s 2 Insignificant bits … i 0 i1 i 2 … s0 s1 s 2 … … … i 0 i1 i 2 Bit-priority mapping … H H H H H H H H H H H H L L L L L L L L L L L L constellation reliability (a) Coded bits of the subpacket Significant bits s0 s1 s 2 … Middle significant bits m 0 m1 m 2 … s0 s1 s 2 … Insignificant bits i 0 i1 i 2 … … m 0 m1 m 2 … … … i 0 i1 i 2 Bit-priority mapping … H H H H H H H H H H H H M M M M M M M M M M M M L L L L L L L L L L L L constellation reliability (b) Fig. 5 3.2.2 Bit-priority mapping (a) for 16-QAM (b) for 64-QAM Bit circular shifter For retransmission, the bit sequence is divided into two groups based on priority and shifted rightward by a shift values N shift of different groups to obtain ck , and then ck is fed into the next block. We can obtain the shift value in accordance with which group the index BPM (i ) belongs to and access the bit from the position with the new index ADD (i ) . The circular shift may change the bit reliability on the constellation, the corresponding subcarrier indices or the stream allocation to achieve diversity gain. The shift value and the new index ADD (i ) are calculated by the following equations. 8 IEEE 802.16m-09/0226r3 ADD(i ) Q ((( P N shift ) ( BPM (i) Q)) mod P) ADD(i ) : the index of selected bit from transmitted coded packet where P : the number of significant or non - significant bits Q : a pre - defined starting index i 0,1, 2,...( Lk 1), if 0 BPM (i ) N EP P N EP , Q 0, P ( Lk - N EP ), Q N EP , if N EP BPM (i ) Lk if [ P ( Lk /(mk / 2)) ] N EP : the number of bits in the encoder packet (before encoding ) k : index of the subpacket. T : additional shifting length N str : the number of streams for the subpacket t 1 2, else if [ P ( Lk /(mk / 2)) ] Lk : the number of coded bits for the subpacket t 0, mk : the mod ulation order for the kth subpacket else [ P ( Lk /(mk / 2)) ] t 1, end and T 1, if N str 1 T 2, if N str 1 N shift ( NTX ( P t ( Lk /(mk / 2)) T )) mod P, Then, ci a ADD (i ) , for i 0, 1, L , Lk 1 . Note that a k is coded bit sequence selected by the bit selection. Coded bits of the subpacket H H H H H H H H H H H H L L L L L L L L L L L L 1 TX s0 s1 s 2 … 2 TX s0 s1 s 2 3 TX 4 TX Fig. 6 i 0 i1 i 2 s0 s1 s 2 s0 s1 s 2 … … i 0 i1 i 2 … i 0 i1 i 2 … i 0 i1 i 2 … … An illustration of the circular shift for 16-QAM and IR-HARQ case For IR-HARQ mode, the bit inverter is not needed. 4. Simulation Results Simulation parameters: Carrier Frequency 2.5GHz FFT Size (N) 1024 Guard Interval 1/8 MS Velocity Ped-B 3 km/hr 9 … IEEE 802.16m-09/0226r3 Permutation Type RB (18X6), symbol based random permutation Channel Coding CTCs with 8 iterations, Max-Log-MAP HARQ Type Chase Combining (CC), Incremental Redundancy (IR) NEP Chase case: 16QAM 1/2 : 480 bits * 2 FEC (5 RBs) 64QAM 1/2 : 432 bits * 2 FEC (3 RBs) IR case: 16QAM 1/2 : 480 bits * 2 FEC (5 RBs) 64QAM 1/2 : 288 bits * 2 FEC (2 RBs) Transmission Times For BLER Simulation: 1TX, 2TX, 3TX For Throughput Simulation: Maximal Trans. = 3 (including initial trans.) Retransmission Delay 2 frames (10 msec) MIMO Configuration SM 2x2 Fig.7 BLER performance for 16QAM 1/2 CC-HARQ under 1TX and 2TX 10 IEEE 802.16m-09/0226r3 Fig.8 BLER performance for 16QAM 1/2 CC-HARQ under 3TX Fig.9 Throughput performance for 16QAM 1/2 CC-HARQ 11 IEEE 802.16m-09/0226r3 Fig.10 BLER performance for 64QAM 1/2 CC-HARQ under 1TX and 2TX Fig.11 BLER performance for 64QAM 1/2 CC-HARQ under 3TX 12 IEEE 802.16m-09/0226r3 Fig.12 Fig.13 Throughput performance for 64QAM 1/2 CC-HARQ BLER performance for 16QAM 1/2 IR-HARQ under 1TX and 2TX 13 IEEE 802.16m-09/0226r3 Fig.14 BLER performance for 16QAM 1/2 IR-HARQ under 3TX Fig.15 Throughput performance for 16QAM 1/2 IR-HARQ 14 IEEE 802.16m-09/0226r3 Fig.16 BLER performance for 64QAM 1/2 IR-HARQ under 1TX and 2TX Fig.17 BLER performance for 64QAM 1/2 IR-HARQ under 3TX 15 IEEE 802.16m-09/0226r3 Fig.18 Throughput performance for 64QAM 1/2 IR-HARQ 5. References [1] IEEE P802.16 Rev2 / D7, “Draft IEEE Standard for Local and Metropolitan Area Networks: Air Interface for Broadband Wireless Access,” Oct. 2008. [2] IEEE 802.16m-07/002r6, “802.16m System Requirements” [3] IEEE C802.16m-08/043, “Style guide for writing the IEEE 802.16m amendment” [4] IEEE 802.16m-08/003r6, “The Draft IEEE 802.16m System Description Document” [5] IEEE C802.16m-08/581, “The Hybrid ARQ Physical Layer Architecture.” [6] IEEE C802.16m-08/1144r1, “New bit-rearrangement method to enhance HARQ performance.” [7] IEEE C802.16m-08/685r2, “Bit Priority Mapping to enhance CTC IR HARQ performance.” [8] IEEE C80216m-08_301r2, “Enhancing CTC HARQ performance by bit rearrangement.” [9] IEEE 802.16m-08/771r1, “Enhanced HARQ scheme with Signal Constellation Rearrangement.” [10] IEEE C80216m-07_292r1, “Enhanced HARQ technique using Constellation Rearrangement.” 16 IEEE 802.16m-09/0226r3 6. Text proposal for inclusion in the 802.16m amendment ------------------------------- Text Start --------------------------------------------------- Insert a new section 15: 15. Advanced Air Interface 15.3 Physical layer 15.3.A Channel coding and HARQ Concatenation rules BitRe version Burst partition into FEC blocks k Information Bits (Burst including CRC) FEC block CRC attachment k'j Information Bits in the jth FEC block FEC encoder kj Information Bits in the jth FEC block (including FEC block CRC) Bit selection & Repetition kj/RMC Mother code bits for the jth block where RMC is mother code rate Collection kj/R Coded bits for the jth block where R is code rate Bit rearrangement k'/R Coded bits Modulation k'/R Coded bits (k'/R)/M QAM symbols allocated to the burst where M is the modulation order Figure aaa—Block diagram of channel coding supporting HARQ 15.3.A.1 15.3.A.1.1 Channel coding Double binary turbo code The CTC in Section 8.4.9.2.3 is adopted. 15.3.A.1.2. Bit selection The bit selection is performed to generate the subpacket. The puncturing block is referred as bits selection in the viewpoint of subpacket generation. Mother code is transmitted with one of the subpackets. The bits of a subpacket are formed by selecting specific sequences of bits from the interleaved CTC encoder output sequence. The resulting subpacket sequence is a binary sequence of bits for the bit re-arrangement (if supporting HARQ) and the modulator. Note that Section 8.4.9.2.3.4.4 shall be not applied. Let 17 IEEE 802.16m-09/0226r3 k be the subpacket index when IR HARQ is enabled. k = 0 for the first transmission and increases by one for the next subpacket. k = 0 when IR-HARQ is not used. When there are more than one FEC blocks in a burst, the subpacket index for each FEC block shall be the same. NEP be the number of bits in the encoder packet (before encoding). Lk be the number of bits in the subpacket. mk be the modulation order for the k-th subpacket (mk = 2 for QPSK, 4 for 16-QAM, and 6 for 64-QAM). Also, let the scrambled and selected bits be numbered from zero with the 0-th bit being the first bit in the sequence. Then, the index of the i-th bit for the k-th subpacket shall be: F mod(3 N EP ), if F 3 N EP , where F k Lk i and i 0, 1, Sk , i ( F N EP ) mod(3 N EP ), if F 3 N EP , Lk 1 . The NEP, mk, and Lk are determined by the BS and can be inferred by the SS through the allocation size in the DL-MAP and UL-MAP. The first transmission includes the systematic part of the mother code. Thus, it can be used as the codeword for a burst where the HARQ is not applied or when Chase HARQ is applied. Besides, for different MIMO-HARQ formats, rank should be feed back for adjusting the total number of transmitted coded bits for retransmissions. Table zzz shows the all MIMO-HARQ formats. The total transmitted coded bits may be verified according to Ri, Rr and p. The “Ri“ is the rate of the previous transmission for the subpacket. The “Rr“ is the reduced rate of retransmissions for the same subpacket. Besides, due to the rate of each retransmission may be reduced, only partial bits may be retransmitted and equivalent pilot tones may be also reduced in accordance with the reduced rate. Therefore, additional non-used pilot tones can be used to send more coded bits in current retransmission. The “p” is defined as a ratio that the number of used tones between initial transmission and each retransmission in Table zzz. Where, Table zzz—Parameter Ri ,Rr and p for adaptive bit selection Ri Rr p 1 1 1 2 1 1 2 2 1 3 2 24/23 3 3 1 4 2 24/23 4 3 1 18 IEEE 802.16m-09/0226r3 4 4 1 If the rate of retransmissions is different from the rate of initial transmission, the index of the i-th bit for the k-th subpacket shall be: S k ,i ( Fk i ) mod(3 N EP ) where i 0,1, 2,...( Lk 1), if ( SPIDk =0 ) Fk 0, Lk 48 N SCHk mk , else Fk 48 N SCHk mk , j SPIDk , while ( j > 1 ) R p Fk Fk (48 N SCHk mk ) r , Ri j j 1, end R p Lk 48 N SCHk mk r Ri end Figure ttt-1, Figure ttt-2, and Figure ttt-3 show the different MIMO-HARQ formats with different rates between initial transmission and retransmissions. Transmitted Coded Bits Allocated LRU Transmitted Coded Bits Allocated LRU Transmitted Coded Bits Allocated LRU L 2 L L P1 P2 Rate = 2, Spatial Multiplexing for initial transmission P1 NULL Rate = 1, SFBC for retransmission P1 P2 Rate = 2, Spatial Multiplexing for retransmission Figure ttt-1—MIMO-HARQ with rate=2 for initial transmission and rate=1,2 for retransmission 19 IEEE 802.16m-09/0226r3 Transmitted Coded Bits Allocated LRU Transmitted Coded Bits Allocated LRU Transmitted Coded Bits Allocated LRU 16 L 23 L L P1 P3 P2 NULL P1 Rate = 3, Spatial Multiplexing for initial transmission P2 P1 P3 P2 NULL Rate = 3, Spatial Multiplexing for retransmission Rate = 2, Spatial Multiplexing for retransmission Figure ttt-2—MIMO-HARQ with rate=3 for initial transmission and rate=2,3 for retransmission Transmitted Coded Bits Allocated LRU Transmitted Coded Bits Allocated LRU 12 L 23 Transmitted Coded Bits Allocated LRU Transmitted Coded Bits Allocated LRU 3 L 4 L L P1 P3 P2 P4 Rate = 4, Spatial Multiplexing for initial transmission P1 P2 Rate = 2, Spatial Multiplexing for retransmission P1 P3 P1 P3 P2 NULL P2 P4 Rate = 3, Spatial Multiplexing for retransmission Rate = 4, Spatial Multiplexing for retransmission Figure ttt-3—MIMO-HARQ with rate=4 for initial transmission and rate=2,3,4 for retransmission 15.3.A.1.3 Modulation 20 IEEE 802.16m-09/0226r3 Gray-mapped QPSK, 16-QAM and 64-QAM shall be supported for data modulation (referring to Section 8.3.9.4.2) as shown in Fig. bbb. The constellations shall be normalized by multiplying the constellation point with the indicated factor c to achieve equal average power. For QPSK, b1 and b0 respectively modulate the in-phase and quadrature carriers. For 16-QAM, four bits, b3b2b1b0 , are mapping into a position on the constellation to form a 16-QAM symbol. b3 and b2 modulate the in-phase carrier and b1 and b0 modulate the quadrature carrier. Bits b3 and b1 respectively modulate the phases of the in-phase and quadrature carriers. In particular, the phase is 0 when b3 or b1 is 0 and 180 when b3 or b1 is 1. Bits b2 and b0 respectively modulate the amplitudes of the in-phase and quadrature carriers, where the amplitude is greater when b2 or b0 is 1 than otherwise. Thus, b3 and b1 have higher reliabilities than b2 and b0 . For 64-QAM, each modulation symbol consists of 6 bits, b5b4b3b2b1b0 , where b5 , b4 , and b3 modulate the in-phase carrier, and b2 , b1 , and b0 modulate the quadrature carrier. With three bits modulating each carrier, the amplitude thereof is defined with a finer resolution. Particularly, b5 and b2 still respectively modulate the phases of the carriers, but b4 and b3 together modulate the amplitude of the in-phase carrier at four discrete levels, and b1 and b0 together modulate the amplitude of the quadrature carrier at four discrete levels. The amplitude of the in-phase carrier is the greatest when b4 b3 =11, is the least when b4 b3 =01, and has intermediate values when b4 b3 =10 or 00. The modulation of the quadrature carrier is similar and not explained in detail herein. Each M interleaved bits (M = 2 for QPSK, 4 for 16-QAM, 6 for 64-QAM) shall be mapped to the constellation bits b(M – 1) – b0 in MSB-first order (i.e., the first bit shall be mapped to the higher index bit in the constellation). The interleaved bit sequence denoted as ck c0c1c2c3c4c5 L is input into the modulator and each M bits from the first bit c0 are mapped into the constellation point with the corresponding label bM 1 b0 . For example, the corresponding modulation symbols are [-1-i, -3-i] for 16-QAM, if the input sequence is ck 10001110 . 21 IEEE 802.16m-09/0226r3 Figure bbb—Block diagram of channel coding supporting HARQ 15.3.A.2 15.3.A.2.1 HARQ HARQ type Incremental redundancy Hybrid-ARQ (IR-HARQ) and Chase Combining HARQ (CC-HARQ) are adopted. In IR-HARQ mode, the k-th subpacket generated by the bit selection in Section 15.3.A.1.2 is transmitted at the k-th transmission. k=0 is for the initial transmission. CC-HARQ retransmits the subpacket at the initial transmission. 15.3.A.2.2 Bit selection The function of bit selection is described as that in Section 15.3.A.1.2. The subpacket is generated according to the number of transmission, HARQ mode and different MIMO-HARQ formats and then fed into the bit re-arrangement. 15.3.A.2.3 Bit re-arrangement For HARQ (re)transmissions, the subpacket after the bit selection may be arranged according to different bit re-arrangement (BitRe) versions based on the changes of the significance and reliability of each coded bit. The bit re-arrangement comprises the bit-level interleaver and bit inverter shown as in Fig. ccc. In the bit-level interleaver the coded bits from bit-selection will be mapped to different bit reliabilities according to their significance, as is called the bit-priority mapping (BPM) method. In other words, the significant bits will be mapped to relatively more reliable positions and non-significant bits will be mapped to relatively less reliable 22 IEEE 802.16m-09/0226r3 positions. Then, the bit-level interleaver arranges bits in a simple manner—circular shift. A shift value is calculated in accordance with the selected BitRe version. Instead of really shifting bits, we utilize a circular buffer to register the coded bits after BPM and access them from the initial position which is given by the shift value. Finally, the bit inverter may logically invert some of the coded bits according to the selected BitRe version. FEC Bit rearrangement ck Bit-level ak Bit inverter interleaver dk Modulator Figure ccc—bit re-arrangement block diagram The procedure of the bit-level interleaver can be integrated in the following equations to obtain the new address ADD(i). The parameters are defined as ADD(i) : the index of selected bit from transmitted coded subpacket N shift : the shift value for the k -th transmission k : the subpacket index NTX : the number of transmission N EP : the number of bits in the encoding packet (before encoding) Lk : the number of coded bits for the k -th subpacket mk : the modulation order for the k -th subpacket (2 for QPSK, 4 for 16-QAM and 6 for 64-QAM) N CMS Lk mk : the number of coded modulation symbols per subpacket N str : the number of streams N DT : the number of data tones per RU (resource unit) TS : the symbol time occupied per RU ( 6) Lscd : the fundamental length of subcarriers for data, Lscd 17, if N str 1 16, if N str 2 14, if N 4 str Assume the input sequence is denoted as a k [a0 , a1 , , aLk 1 ] and the output sequence is denoted as ck [c0 , c1 , , cLk 1 ] , where ci a ADD (i ) , for i 0, 1, , Lk 1 . ADD(i) can be calculated by the following equations. 23 IEEE 802.16m-09/0226r3 if [HARQ type = CC] for i 0, 1, , Lk 1 if ( ( N CMS N str ) mod N DT ) N DT / 2 s0 floor ( N CMS / N str / N DT ) Lscd ; if s0 0 s0 Lscd ; else s0 ceil ( N CMS / N str / N DT ) Lscd ; s1 floor ( s0 q1 / 4 / Lscd ); s2 floor ( s0 q1 / 4) mod Lscd ; N shift ( s1 N DT mk s2 mk ) N str q2 ; 2i ADD(i ) floor mk 2 Lk mk m i mod k 2 N shift mod Lk else if [HARQ type = IR] for i 0, 1, L , Lk 1 2i 2 Lk m j floor i mod k ; 2 mk mk if 0 j N EP P N EP ; Q 0; else P Lk N EP ; Q N EP ; if [ P ( Lk /( mk / 2)) ] t 1 2; else if [ P ( Lk /( mk / 2)) ] t 0; else [ P ( Lk /( mk / 2)) ] t 1; if N str 1 T 1; else T 2; N shift ( NTX ( P t ( Lk /(mk / 2)) T )) mod P; ADD(i) Q ((( P N shift ) ( j Q)) mod P); Herein, q1 and q2 can be referred to Table xxx. Table xxx The bit re-arrangement parameters for CC-HARQ Modulation NTX mod 4 q1 24 q2 Invert pattern IEEE 802.16m-09/0226r3 QPSK 16-QAM 64-QAM 0 1 2 3 0 1 2 3 0 1 2 3 0 2 3 1 0 2 3 1 0 2 3 1 0 2 0 2 0 2 1 1 0 3 2 1 None None None None None [0 1] [0 1] None None [0 1 1] None None Finally the bit inverter is used to scramble the bit position with lower reliability on the constellation for some BitRe versions in the CC-HARQ mode. It logically inverts bits by an invert patterns. For 16-QAM, the invert pattern is [0 1], when NTX mod 4 = 1 or 2, otherwise the invert pattern is none. For 64-QAM, the invert pattern is [0 1 1], when NTX mod 4 = 1, otherwise the invert pattern is none. [0 1] means the last one per two bits is needed to be inverted and [0 1 1] means the last two per three bits are needed to be inverted. In other words, [0 1] represents every two bits are exclusive-ORed by the vector [0 1] and [0 1 1] represents every three bits are exclusive-ORed with the vector [0 1 1]. Besides, none means no inverting operation. The invert pattern can be referred to Table xxx. It is noted that the bit inverter is not applied in the IR-HARQ mode. After all, the rearranged coded bits will be fed into the modulator. 15.3.A.2.4 SU-MIMO Mode Switch The dynamic or semi-dynamic rank is fed back for enhancing the reliability of retransmission. The retransmitted MIMO Mode is switched based on the relation of Ri and Rr. Table kkk lists the relation of SU-MIMO Mode Switching Rule. Table kkk—MIMO Mode HARQ Switching Table A Ri Rr Rank 1 SISO + precoding Rank 1 SISO + precoding or or Rank 1 SFBC + precoding Rank 1 SFBC + precoding Rank 2 SM +precoding Rank 1 SFBC + precoding Rank 2 SM + Rank 2 SM + 25 IEEE 802.16m-09/0226r3 15.3.A.2.5 precoding precoding Rank 3 SM + precoding Rank 2 SM + precoding Rank 3 SM + precoding Rank 3 SM + precoding Rank 4 SM + precoding Rank 2 SM + precoding Rank 4 SM + precoding Rank 3 SM + precoding Rank 4 SM + precoding Rank 4 SM + precoding MU-MIMO Mode Switch In the Multi-User MIMO mode, only the k users who reported a NACK will ask for retransmission. Hence, the data transmitted to M users in the previous transmission may retransmit to only k users. Each user who transmits a NACK may retransmit with k user with 1 stream. However, if only one user reported with a NACK message, the MU-MIMO Mode should be switched to SU-MIMO mode, and the retransmitted stream number may grow according to SU-MIMO rank. If ABS transmits with Nt=8 and each AMS equips with Nr=4 or Nr=2, the retransmitted combination is listed in Table uuu. Table sss—MU-MIMO switch to SU-MIMO HARQ Switching A Nt Nr Rank for NACK user SU-MIMO Mode 8 4 4 Rank 4 SM + precoding 8 4 3 Rank 3 SM + precoding 8 2/4 2 Rank 2 SM + precoding 8 2/4 1 Rank 1 SFBC + precoding If ABS transmits with Nt=4 and each AMS equips with Nr=4 or Nr=2, the retransmitted combination is listed in Table uuu. Table uuu—MU-MIMO HARQ Switching B Nt Nr Rank for NACK user SU-MIMO Mode 4 4 4 Rank 4 SM + precoding 4 4 3 Rank 3 SM + precoding 4 2/4 2 Rank 2 SM + precoding 26 IEEE 802.16m-09/0226r3 4 2/4 1 Rank 1 SFBC + precoding If ABS transmits with Nt=2 and each AMS equips with Nr=4 or Nr=2, the retransmitted combination is listed in Table vvv. Table vvv—MU-MIMO HARQ Switching C Nt Nr NACK Users k Each user received rate 2 2/4 2 Rank 2 SM + precoding 2 2/4 1 Rank 1 SFBC + precoding ------------------------------- Text End -------------------------------------------------------------------------- 27