Method and apparatus for time-based reception of transmissions in a wireless communication system

ABSTRACT

Method for segmented message transmission wherein each message is first divided into segments and the segments are fragmented. A segment parameter is applied to each segment, and a segment identifier to each fragment. The fragments are provided to a lower level for preparation into frames for transmission. One embodiment is applied to the transmission of short duration messages, such as control messages. A timer is used to detect an erasure within a plurality of transmission frames, wherein the timer uses an average inter-arrival time period between transmitted frames to determine a missing frame. In one embodiment, the time period is given as α*AIT, wherein α is a constant value, and AIT is the average inter-arrival time of frames.

RELATED APPLICATION

[0001] The following U.S. Patent Application is filed concurrently herewith as related to this application: “METHOD AND APPARATUS FOR MESSAGE SEGMENTATION IN A WIRELESS COMMUNICATION SYSTEM,” U.S. patent application Ser. No. ______ (Attorney Docket No. 010345).”

BACKGROUND

[0002] 1. Field

[0003] The present invention relates to communications systems. Specifically, the present invention relates to methods for segmenting and transmitting messages in a wireless communication system.

[0004] 2. Background

[0005] In a wireless communications system messages are transmitted from a transmitter to a mobile receiver. Messages are transmitted in frames, wherein a frame defines a predetermined period of time and a protocol is the set of procedures used to perform a given set of operations, such as the exchange of information, wherein a protocol defines the constituent information transmitted in a frame. As wireless communications are performed through a shared air interface, reception quality is interference limited. Poor quality reception at the receiver may result in the loss of a transmitted frame of data, i.e., received signal is not recognizable due to the addition of interference signals. When a frame is lost, typically, the entire message (multiple frames) is retransmitted. Retransmission of an entire message uses bandwidth otherwise used for additional messages. Additionally, retransmission adds to the delay time of a system, and may result in unacceptable performance of the wireless communication system.

[0006] Therefore, there is a need for an accurate method of transmitting messages in a wireless communication system. Additionally, there is a need for an efficient method of retransmitting information in a wireless communication system.

SUMMARY

[0007] Embodiments disclosed herein address the above stated needs by providing a method and apparatus for detecting an end of segment or end of message in a transmission. On receipt of a frame erasure, the receiver initiates a timer. The timer is used to determine a missing end of frame. Multiple timers may be implemented, wherein each timer stops any previously running timers.

[0008] According to one aspect, in a wireless communication system having a base station controller and a plurality of base stations, each of the plurality of base stations adapted for communication with a plurality of mobile stations, a method includes receiving a plurality of transmission frames, each of the plurality of transmission frames having an identifier, detecting a first frame erasure within the plurality of transmission frames, initiating a first timer, and on expiration of the first timer determining the identification of the first frame erasure.

[0009] According to another aspect, a wireless apparatus includes a receiver for receiving a plurality of transmission frames, a means for detecting a frame erasure, a first timer means responsive to detection of a first frame erasure, and a second timer means responsive to detection of a second frame erasure.

BRIEF DESCRIPTION OF THE DRAWINGS

[0010]FIG. 1 is a wireless communication system.

[0011]FIG. 2 is an architectural layering for implementing protocols in a wireless communication system.

[0012]FIG. 3A is a message transmission protocol applicable in a wireless communication system.

[0013]FIG. 3B is a frame configuration according to a transmission protocol such as illustrated in FIG. 3A.

[0014]FIG. 4A is a message transmission protocol implementing segmentation applicable in a wireless communication system.

[0015]FIG. 4B is a frame configuration according to a transmission protocol such as illustrated in FIG. 4A.

[0016]FIG. 5A is an example of a message transmission protocol such as illustrated in FIG. 4A.

[0017]FIG. 5B is a legend defining segmentation indicator bit values used in a message transmission protocol such as illustrated in FIG. 5A.

[0018]FIG. 5C is a legend defining segmentation indicator combinations used in a message transmission protocol such as illustrated in FIG. 5A.

[0019]FIG. 5D is a legend defining segmentation indicator bit values used in a message transmission protocol such as illustrated in FIG. 5A.

[0020]FIG. 5E is a legend defining segmentation indicator combinations used in a message transmission protocol such as illustrated in FIG. 5A.

[0021]FIG. 6 is a flow diagram of a method of message segmentation for transmission.

[0022]FIGS. 7A, 7B, and 7C are flow diagrams of a method of receiving a segmented message.

[0023]FIG. 8 is an example of message segmentation for transmission.

[0024]FIG. 9A is a timing diagram of a message transmission with retransmission of the message.

[0025]FIG. 9B is a timing diagram of a message segmentation and transmission with retransmission of at least one segment.

[0026]FIG. 10 is a block diagram of a transmitter supporting a message segmentation and transmission protocol.

[0027]FIG. 11 is a block diagram of a receiver supporting a message segmentation and transmission protocol.

[0028]FIG. 12 is a flow diagram illustrating erasure detection in a wireless communication system.

[0029]FIGS. 13A and 13B are timing diagrams of transmission frame in a wireless communication system.

DETAILED DESCRIPTION

[0030] The word “exemplary” is used exclusively herein to mean “serving as an example, instance, or illustration.” Any embodiment described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments. While the various aspects of the present invention are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.

[0031] In a spread spectrum system, such as a Code Division Multiple Access, CDMA, communications system, signals are spread over a wide bandwidth via the use of a code, such as a Pseudorandom Noise, PN, spreading sequence. The “TIA/EIA/IS-95 Mobile Station-Base Station Compatibility Standard for Dual-Mode Wideband Spread Spectrum Cellular System,” hereinafter referred to as “the IS-95 standard,” and the “TIA/EIA/IS-2000 Standards for cdma2000 Spread Spectrum Systems,” hereinafter referred to as “the cdma2000 standard,” detail spread spectrum CDMA systems.

[0032] Wireless communication systems are widely deployed to provide various types of communication such as voice, data, and so on. These systems may be based on code division multiple access (CDMA), time division multiple access (TDMA), or some other modulation techniques. A CDMA system provides certain advantages over other types of system, including increased system capacity.

[0033] A system may be designed to support one or more standards such as: (1) the “TIA/EIA/IS-95-B Mobile Station-Base Station Compatibility Standard for Dual-Mode Wideband Spread Spectrum Cellular System” referred to herein as the IS-95 standard; (2) the standard offered by a consortium named “3rd Generation Partnership Project” referred to herein as 3GPP; and embodied in a set of documents including Document Nos. 3G TS 25.211, 3G TS 25.212, 3G TS 25.213, and 3G TS 25.214, 3G TS 25.302, referred to herein as the WCDMA standard; (3) the standard offered by a consortium named “3rd Generation Partnership Project 2” referred to herein as 3GPP2, and TR-45.5 referred to herein as the cdma2000 standard, formerly called IS-2000 MC, or (4) some other wireless standard. The standards (1), (2), and (3) cited hereinabove are hereby expressly incorporated herein by reference.

[0034] Each standard specifically defines the processing of data for transmission from base station to mobile, and vice versa. For example, speech information may be coded at a particular data rate, formatted into a defined frame format, and processed (e.g., error correction and/or detection encoded, interleaved, and so on) in accordance with a particular processing scheme. As an illustration of this, the W-CDMA standard defines an Adaptive Multi-Rate, or AMR, speech coding scheme whereby speech information may be encoded based on one of a number of possible data rates and the coded speech data is provided in a particular format that depends on the selected data rate. The codec, frame formats and processing defined by a particular standard (e.g., cdma2000 standard) are likely to be different from those of other standards (e.g., W-CDMA standard).

[0035] There are any numbers of communication systems capable of supporting multiple transport formats, i.e., variable length transmission frames. One such system is defined by the cdma2000 standard. While a CDMA type system is used as an exemplar throughout the following discussion, the present methods and apparatus are applicable to any system that transmits messages in frames, and supports retransmission of frames and/or portions of a frame. Additionally, the methods described herein may be applied to forward link and reverse link, as well as downlink and uplink. For convenience, the descriptions herein use terminology consistent with a CDMA type system. For application to a W-CDMA type system, an uplink communication refers to a communication from a User Equipment, UE, to a node B, i.e., transmitter.

[0036] While some of the terminology used to describe a conventional CDMA type spread spectrum system is consistently used with respect to a WCDMA type system, there are several terms having specific definitions in each type system.

[0037] In a CDMA system, a mobile user is referred to as a Mobile Station. Multiple MSs communicate through a Base Station having a fixed location in the wireless communication system. The Reverse Link, RL, in a CDMA system refers to transmissions from a mobile user or Mobile Station, MS, to a Base Station, BS. The Forward Link, FL, refers to transmissions from the BS to a MS.

[0038] The terminology specific to a W-CDMA system refers to the mobile users as User Equipment, UE. Multiple UEs communicate through a “Node B” having a fixed location in the wireless communication system. Transmissions from the UE to the Node B are referred to as Up Link, UL. Down Link, DL, refers to transmissions from the Node B to the UE.

[0039]FIG. 1 is a diagram of a spread spectrum communication system 100 that supports a number of users. System 100 provides communication for a number of cells, with each cell being serviced by a corresponding base station 104. Various remote terminals 106 are dispersed throughout the system. System 100 may represent a CDMA wireless communication system, wherein each of the remote terminals 106 is referred to as a MS. Similarly, system 100 may represent a W-CDMA wireless communication system, wherein each of the remote terminals 106 is referred to as a UE. Each remote terminal 106 may communicate with one or more base stations 104 on the forward and reverse links at any particular moment, depending on whether or not the remote terminal is active and whether or not it is in soft handoff. For clarity of understanding, an exemplary embodiment is considered, wherein the system 100 is a CDMA type system consistent with the cdma2000 standard.

[0040] As shown in FIG. 1, base station 104A communicates with remote terminals 106A, 106B, 106C, and 106D, and base station 104B communicates with remote terminals 106D, 106E, and 106F.

[0041] A system controller 102 couples to base stations 104 and typically further couples to other systems, including, but not limited to, a Public Switched Telephone Network, PSTN, the Internet, or other communication network. System controller 102 provides coordination and control for the base stations coupled to it. System controller 102 further controls, via base stations 104, the routing of telephone calls among remote terminals 106, and between remote terminals 106 and the users coupled to other systems. System controller 102 is also referred to as a Base Station Controller, BSC.

[0042]FIG. 2 illustrates an architectural layering 110 of an exemplary embodiment of the present invention. The physical layer 112 indicates the channel structure, frequency, power output, modulation type, and encoding specifications for the forward and reverse links. The Medium Access Control, MAC, layer 114 defines the procedures used to receive and transmit over the physical layer 112.

[0043] The layered structure illustrated in FIG. 2 is designed to provide voice, packet data, and voice and packet data services simultaneously. The physical layer 112 performs coding, interleaving, modulation and spreading functions for the physical channels. The MAC layer 114 and the Link Access Control, LAC, layer 116 together form a link layer to provide protocol support and control mechanisms for data transport services. The link layer further maps the data transport needs of higher layers into specific, capabilities and characteristics of the physical layer 112. The link layer also maps logical and signaling channels into code channels specifically supported by the coding and modulation functions of the physical layer 112. As used herein, signaling refers to the transmission of control information, but may be extended to include data information or other information transmitted as messages in a communications system.

[0044] Control applications and high layer protocols utilize the services provided by the LAC layer 116. The LAC layer 116 performs the functions essential to set up, maintain, and release a logical link connection, including delivery of messages. The MAC layer 114 provides a control function that manages resources supplied by the physical layer 112. For example, the MAC layer 114 controls the physical code channels for communication of information over the air interface. The MAC layer 114 further coordinates the usage of those resources desired by various LAC service entities. Such coordination function resolves contention issues between LAC service entities within a single mobile station, as well as between competing mobile stations. The MAC layer 114 delivers Quality of Service, QoS, level requests from LAC services. For example, the MAC may reserve air interface resources or resolve priorities between competing LAC service entities.

[0045] For an HDR system, the MAC layer 114 includes scheduling capabilities to balance users or connections. Such balancing typically schedules low throughput for channels with poor coverage, thus freeing up resources allowing high throughput for channels with good connections. The next layer, the Link Access Control, LAC, layer 116, provides an access procedure for higher layer applications. In alternate architectures, a radio link, the Radio Link Protocol, RLP, layer (not shown) may provide retransmission and duplicate detection for an octet-aligned data stream in place of or in parallel with the LAC layer 116. In the context of a packet service, the LAC layer 116 carries Point-to-Point Protocol, PPP, packets. The High Level Data Link Control HDLC layer 120 is a link layer for PPP and ML-PPP communications. Control information is placed in specific patterns, which are dramatically different from the data in order to reduce errors. The HDLC layer 120 performs framing of the data prior to PPP processing. The PPP layer 122 then provides compression, authentication, encryption and multi-protocol support. The Internet Protocol, IP, layer 124 keeps track of Internet work addressing for different nodes, routes outgoing messages, and recognizes incoming messages.

[0046] Protocols running on top of PPP, such as IP layer 124, carry user traffic. Note that each of these layers may contain one or more protocols. Protocols use signaling messages and/or headers to convey information to a peer entity on the other side of the air-interface. For example, in a High Data Rate, HDR, system, protocols send messages with a default signaling application.

[0047] The architecture 110 is applicable to an Access Network, AN, for providing data connectivity between an IP network, such as the Internet, and access terminals, including wireless mobile units. Access Terminals, Ats, provide data connectivity to a user. An AT may be connected to a computing device such as a laptop personal computer or may be a self-contained data device such as a personal digital assistant. There are a variety of wireless applications and an ever-increasing number of devices, often referred to as IP appliances or web appliances. As illustrated in FIG. 2, layers above the LAC layer 116 are service network layers and layers below the HDLC layer 120 are radio network layers. In other words, the radio network layers affect the air-interface protocols. The radio network layers of the exemplary embodiment implement the “TL80-54421-1 HDR Air Interface Specification” referred to as “the HAI specification.” The HAI specification is sometimes referred to as “1×EVDO.” HDR generally provides an efficient method of transmitting data in a wireless communication system. Alternate embodiments may implement the “TIA/EIA/IS-2000 Standards for cdma2000 Spread Spectrum Systems” referred to as “the cdma2000 standard,” the “TIA/EIA/IS-95 Mobile Station-Base Station Compatibility Standard for Dual-Mode Wideband Spread Spectrum Cellular System,” hereinafter referred to as “the IS-95 standard,” or other per-user connection systems, such as the “ANSI J-STD-01 Draft Standard for W-CDMA (Wideband Code Division Multiple Access) Air Interface Compatibility Standard for 1.85 to 1.99 GHz PCS Applications” referred to as “W-CDMA.”

[0048] The use of a multiple access system for voice and data transmissions is disclosed in the following U.S. Patents:

[0049] U.S. Pat. No. 4,901,307, entitled “SPREAD SPECTRUM MULTIPLE ACCESS COMMUNICATION SYSTEM USING SATELLITE OR TERRESTRIAL REPEATERS;”

[0050] U.S. Pat. No. 5,103,459, entitled “SYSTEM AND METHOD FOR GENERATING WAVEFORMS IN A CDMA CELLULAR TELEPHONE SYSTEM;”

[0051] U.S. Pat. No. 5,504,773, entitled “METHOD AND APPARATUS FOR FORMATTING OF DATA FOR TRANSMISSION;” each assigned to the assignee hereof and expressly incorporated by reference herein. As the frequency spectrum is a finite resource, these systems provide methods for maximizing the use of this resource by sharing the spectrum while supporting a large number of users with minimal interference. The extension of these methods to the high speed transmission of data allows reuse of existing hardware and software. Designers already familiar with such standards and methods may use this knowledge and experience to extend these systems to high speed data transmissions.

[0052] As described hereinabove, in preparing a message for transmission, the transmitter typically spreads the message over multiple frames. The Frame Error Rate, FER, associated with a given communication link is defined as the probability of losing a given frame. Similarly, the Message Error Rate, MER, associated with a given communication link is defined as the probability of losing a given message. The MER is related to the FER as given in equation (1).

MER=1−(1−FER)^(n),  (1)

[0053] wherein the message is spread over n frames. Equation (1) assumes a statistical independence of events, specifically; the probability of an error in any given frame is equal to the probability of an error in any other frame. For a fixed FER value, the MER increases with increases in message length. If one frame is lost, the entire message is lost. Note that a frame is a basic timing interval in a wireless communication system. The time length defining a frame for different transmission channels may be different.

[0054] The risk of losing a message, i.e., MER, increases with the length of the message. As the message length increases, the number of frames required for transmission of the message increases. As the loss of one frame will result in the loss of the entire message, the risk of losing the message is affected by the number of frames per message. Additionally, for a constant length message, increases in the FER directly impacts the MER as given in equation (1).

[0055]FIGS. 3A and 3B illustrate a transmission protocol implemented in a LAC layer 114, wherein each message 200 includes multiple fields including: a header 202; multiple fields 204 to 206; information 208; and a tail 210. The header 202 includes control information for transmission and receipt of the message, including but not limited to, message length, message identifier, protocol version discriminator, etc. The fields 204 to 206 include any number of fields, including but not limited to addressing fields, encryption fields, authentication field and fields that are used to provide message retransmissions (ARQ). In one embodiment, the information field 208 provides signaling information, such as control messages, from the transmitter to receiver. The tail frame 210 includes termination information for the message, including a Code Redundancy Check, or CRC, to ensure the correctness of the message.

[0056] The message 200 is transmitted in a number of fragments, labeled as 1, 2, . . . , X. Each fragment 220 includes a Start Of Message, SOM, indicator 222, and an information portion 224. In one embodiment, the SOM is a one to indicate a first fragment in the message, and a zero to indicate successive fragments in the message. The MER of the message 200 is given in equation (1). The fragments are then provided to the MAC layer 114, which arranges the fragments into frames for transmission. The MAC layer 114 may add information to the fragments and may reorder the fragments for transmission. Each fragment 220 may correspond to a transmission frame. On receipt of the message at a receiver, if any fragment is lost, the entire message is retransmitted. A lost fragment is typically referred to as an erasure, wherein the receiver receives signal energy but is unable to process and/or decode the information. If a portion of a message is lost, the entire message may be considered lost if the receiver is not able to process the message without the lost portion. The lost portion may be referred to as an erasure or a missing portion.

[0057] In one system, when the receiver receives a message and is able to decode and process the message, the receiver acknowledges the receipt of the message by transmission of an Acknowledgement, ACK, message. If the message is lost, the receiver does not respond to the transmitter. The transmitter waits for receipt of the ACK message from the target recipient. If the ACK message is not received at the transmitter within a predetermined wait time period, the transmitter retransmits the message. The transmitter has little or no information as to the lost portion(s) of the message.

[0058] The retransmission of a message on the loss of only a portion, or fragment, of the message and upon the expiration of a wait time incurs delay time to the receiver and consumes transmission bandwidth of the transmitter. To provide retransmission of the lost portion(s) or fragment(s) an exemplary embodiment of the present invention provides a method of message segmentation, illustrated in FIGS. 4A and 4B, that separates the message 200 into multiple segments 302. Each of the segments 302 is assigned a unique identifier. The first segment of the message is further identified by a Start Segment, SS, indicator. The last segment of the message is identified by an End Segment, ES, indicator. The segmentation process is defined as segmenting a given message into multiple parts. The multiple segments 302 may have varying lengths. The determination of the length of each of the segments 302 may be based on a channel quality estimate, or other criteria specific to a given communication system. The determination of the length of segments balances efficiency and performance. Shorter segment length incurs a greater total number of segments for the same message. Shorter segment length provides increases reliability and thus enhanced performance. A large total number of segments incur processing and storage overhead that reduce efficiency, e.g., generation of transmission of more segment parameter bits to identify the multiple segments. Ideally a system will optimize performance while maintaining low overhead.

[0059] As illustrated in FIG. 4A, message 200 is segmented into K segments. Each of the K segments is then further divided into X fragments. According to the exemplary embodiment, the number of fragments X is variable for each of the segments 302. Alternate embodiments may specify a constant number X of fragments per segment within a given message. The determination of the length of each of the fragments 304 as well as the number of fragments X is determined by parameters of the physical layer 112 and the MAC layer 114. As illustrated in FIG. 4A, SEGMENT 3 of segments 302 is divided into X fragments 304. The fragments 304 are then provided to the MAC layer 114 for transmission via multiple transmission frames (not shown).

[0060] As discussed hereinabove, each of the K segments 302 is segmented into X fragments, wherein the total number of fragments n is given as:

n=K*X.  (2)

[0061] In the exemplary embodiment, the total number of fragments is equal to the total number of frames generated by the MAC layer 114 for transmission on the physical layer 112, while alternate embodiments may provide the total number of fragments as a function of the total number of frames. The resultant message error is defined as a function of the Segment Error Rate, SER, as:

MER=1−(1−SER)^(K),  (3)

[0062] wherein the SER is defined as:

SER=1−(1−FER)^(X).  (4)

[0063] As illustrated in FIG. 4B, each fragment 306 includes a Segment Identifier, SI, 308 and information 310. The information 310 is a portion of the content of a segment from segments 304. According to the exemplary embodiment, the SI includes at least two bits, SI₁ and SI₂. One of the bits indicates whether segmentation is enabled, and the other of the two bits identifies a first segment of the message.

[0064] In one embodiment of message transmission illustrated in FIG. 5A, a message 200 is divided into X fragments, identified as fragments 304 labeled MSG₁ to MSG_(X). As illustrated, boundaries between fragments 304 are not necessarily the same as boundaries between fields of the message 200, although some segment boundaries may coincide with some field boundaries. The fragments 304 are portions of the information contained in the message 200, including information contained in each of the fields 202, 204, 206, 208, and 210, as well as any other fields included in the message 200.

[0065] Each of the X fragments (of fragments 304) corresponds to a transmission frame of frames 360 for a total number of X frames per segment message. Each frame is referred to as containing a Service Data Unit, SDU. Each of the fragments 304 includes a Segment Identifier, SI, value appended as a prefix to a portion of the message 200. The fragment identifier is determined sequentially. Alternate embodiments may implement other methods of assigning identifiers to frames and segments. The identification is used to reconstruct the message at the receiver. Similarly, alternate embodiments may append the SI at the end of the segment information or may integrate the SI information with the segment information. In each of these embodiments, when the organization of the frame is known at the receiver, the receiver is then able to reconstruct the message accordingly.

[0066] As illustrated in FIG. 5A, the X fragments 304 include fragments 320, 330, 340, and 350, wherein each fragment 320, 330, 340, and 350 includes a portion of message 200 and an SI. In the embodiment of FIG. 5A, the system supports message segmentation as defined by the protocol of FIG. 4A, however for the example transmission message segmentation is inactive. For active segmentation, segment retransmission requests are supported. In other words, the receiver may request a retransmission of a segment or portion of the transmitted message. For inactive segmentation, segment retransmission requests are not supported. The receiver may request retransmission of the entire message, but not a smaller unit thereof.

[0067] In the embodiment of FIG. 5A, each SI includes three bits. The significance of the SI bits is illustrated in FIGS. 5B and 5C. As illustrated in FIG. 5B, the first bit of the SI, labeled SI₁, indicates whether segmentation is active or inactive, wherein a high logic value indicates segmentation is active, else segmentation is inactive. The first bit of the SI, labeled SI₂, identifies a segment start, wherein a high logic value indicates the start of a segment. The third bit of the SI, labeled SI₃, indicates a segment end, wherein a high logic value indicates the end of a segment. The significance of various bit combinations is provided in the table of FIG. 5C. Alternate embodiments may use any number of bits each having a predetermined significance. Additionally, alternate embodiments may implement an alternate polarity scheme for the SI bits.

[0068] Continuing with FIG. 5A, the first fragment 320 (of fragments 304) includes a segment identifier portion, SI 322, appended to a message portion MSG₁ 324. The frame 320 is the first fragment in the transmission of message 200, and therefore the SI 322 is designated as 010, wherein SI₁=0, SI₂=1, and SI₃=0. As segmentation is inactive for this example, the second bit, SI₂, may be used to identify the start of the message, and the third bit, SI₃, may be used to identify the end of the message. The next fragment 330 includes SI portion 332 and information portion 334. The SI 332 indicates a middle transmission fragment. As last fragment 350 includes SI portion 352 and information portion 354. The SI 352 indicates an end of segment, or message.

[0069] Each of the fragments 304 corresponds to an SDU 360 generated by the MAC layer 114. Specifically, as illustrated, fragment 320 corresponds to SDU 362, fragment 330 corresponds to SDU 364, fragment 340 corresponds to SDU 366, and fragment 350 corresponds to SDU 368. The SDUs 360 corresponds to transmission frames sent over the physical layer 112.

[0070] Continuing with FIG. 5A, SI 322 indicates segmentation inactive for this transmission. Even though segmentation is inactive, the message 200 is divided to form fragments 304 resulting in SDUs 360. SDUs 360 are modulated and transmitted. In one embodiment, an error checking mechanism is also applied to the SDUs 360. As the frames are received at the receiver, the error checking is evaluated to find frame errors. On detection of a frame error, the receiver is not able to request a particular segment for retransmission as segmentation is inactive. Instead the receiver will request retransmission of the entire message 200. As discussed hereinbelow, and particularly with respect to FIGS. 8 and 9, when segmentation is active, the receiver is provided sufficient information to request the segment in which a frame error was detected. In this way, bandwidth is conserved and transaction time is reduced.

[0071]FIGS. 5D and 5E illustrate an alternate embodiment, wherein the SI includes two bits. The first bit, SI₁, indicates whether segmentation is active. The second bit, SI₂, identifies the start of a segment. The significance of combinations of the two bits is provided in the table of FIG. 5E.

[0072]FIG. 6 illustrates a method 400 of message segmentation applied at a transmitter in a wireless communication system according to one embodiment. The transmitter receives a message for transmission at step 402. The message may be a control message or other short duration message for transmission to a target receiver. If segmentation is active at decision diamond 404, processing continues to step 412 to segment the message into K segments. The transmitter determines an appropriate Segment Parameter, SP, to add to each segment and generates the SP at step 414. The structures formed in step 414 are divided to form X fragments at step 416. The transmitter determines the appropriate SI to apply to each fragment. The SI is then appended to each fragment at step 418. Each fragment, including SI, is passed to the MAC layer for processing at step 420. Processing then returns to step 402 to process the next message.

[0073] Returning to decision diamond 404, if message segmentation is inactive, processing continues to step 406 to divide the message into X portions. An SI is appended to each message portion to form a fragment at step 408. The fragments are then passed to the MAC layer at step 410. Processing returns to step 402 to process a next message.

[0074] At the receiver, the SI bits are extracted from the received fragment to determine processing of a transmitted message. FIGS. 7A and 7B illustrate a method 420 of processing a transmitted segmented message at the receiver. The receiver receives a transmitted frame at step 422. The receiver determines if segmentation is active by evaluating the SI bits included in the frame. If segmentation is active processing continues to step 442 to process the fragment contained in the frame. Processing of the fragment is further detailed in FIG. 7B. The process then determines from the SI bits if the frame is a start of segment at decision diamond 444. If the frame is a start of segment, the receiver stores the information portion of the fragment in a memory storage buffer at step 446. Processing then returns to step 422 to receive a next frame.

[0075] Returning to decision diamond 444, if the received frame is not a start of segment, the receiver determines if the frame is an end of segment based on the SI bits at decision diamond 448. If the received frame is not an end of segment, the receiver stores the information from the fragment into the buffer and processing returns to step 422. If the frame is the end of a segment, the receiver reconstructs the segment and places the segment in order at step 450. If this segment completes a message at decision diamond 452, the receiver checks for missing segments at decision diamond 454. If there are no missing segments processing continues to step 432 to reconstruct the message. If missing segments are determined at decision diamond 454, the receiver sends a Negative Acknowledge, NACK, message at step 454 and processing returns to step 422. If the segment is not the end of the message at decision diamond 452, processing returns to step 422.

[0076] If segmentation is not active at decision diamond 424, processing continues to step 426 to process the fragment. Processing of the fragment is further detailed in FIG. 7B. The receiver then stores the information contained in the fragment into a memory storage buffer at step 428. The receiver determines if the frame marks the end of a message at decision diamond 430. If the receiver does not detect a message end, processing returns to step 422 to process a next frame. If the receiver detects a message end the message is reconstructed at step 432. The receiver then checks for errors in the message at decision diamond 434. On detection of an error, the receiver discards the message at step 436 and processing returns to step 422. If no error is detected in the message, the receiver delivers the message at step 438 to the corresponding application or service. The receiver sends an ACK message at step 440 and processing returns to step 433.

[0077] A portion of the processing of a fragment, as contained in a frame, is further detailed in FIG. 7B. The method 460 illustrates processing of a fragment in a wireless communication system supporting message segmentation. If the fragment is a start of segment, the receiver determines if the storage buffer is empty at step 470. If the buffer is not empty the method 460 flushes the buffer and stores the information from the received frame in the buffer at step 474. If the buffer is empty, the process stores the information in the buffer at step 474. If the fragment is not a start of segment, the receiver checks the status of the buffer at decision diamond 464. If the buffer is empty the receiver discards the received frame at step 468. For example, if the start of segment fragment is lost, the receiver will not process the remainder of the segment. If the buffer is not empty the information from the frame is stored in the buffer at step 466.

[0078] In one embodiment of message transmission illustrated in FIG. 8, a message 200 is segmented consistent with the method 400 of FIG. 6. Message segmentation is active in processing of the message 200 as illustrated in FIG. 8. The message 200 is segmented into segments 302. Each of the segments 302 includes a portion of the message 200. Each of the segments 302 has a sequential identifier. To each segment 350, 352, 354, . . . , 356 a Segment Parameter, SP, is added. The combination of segment plus SP is further divided to form fragments. The fragments are then modified to include an SI, wherein in the present embodiment the SI includes three bits and has significance as specified in FIGS. 5B and 5C. Each fragment is then used to generate an SDU.

[0079] Message segmentation allows retransmission of a portion of the message avoiding the time delays and resource allocation required by full retransmission of the entire message. A comparison of a method of message transmission without segmentation and a method of message transmission with segmentation is provided in FIGS. 9A and 9B.

[0080]FIG. 9A illustrates a message transmission without segmentation, wherein message retransmission is requested and completed. The transmitter, designated as Tx, sends the message from time t1. The receiver, designated as Rx, begins receiving the message at time t2 and the message is completed at time t3. The transmitter then waits for an ACK message from the receiver. The receiver is not able to process the received message and therefore no ACK is sent. At time t4 the transmitter retransmits the message. The receiver receives the retransmitted message at time t5. The entire message is received at time t6 and sends an ACK message at time t6. The transmitter receives the ACK message from time t8 to t9. At time t9 the message transmission and retransmissions are complete.

[0081] In comparison to FIG. 9A, FIG. 9B illustrates a message transmission with segmentation, wherein a segment retransmission is requested and completed. The transmitter transmits the message from time t1, and the receiver receives the message from time t2 to t3. A NAK message is sent from time t3 to t4, wherein the NAK identifies the missing segment of the transmitted message. The transmitter receives the NAK at time t11 and retransmits the segment, designated as SGM, at time t12. At time t14 the receiver receives the retransmitted segment, and sends an ACK at time t15. The transmitter receives the ACK from time t17 to t18. The retransmission of a segment or portion of a message reduces the latency of the entire message transmission and frees up transmitter resources for other transmissions. As illustrated, the segmented message transmission provides a reduction in the total transaction time.

[0082] A transmitter 500 is illustrated in FIG. 10 supporting segmented message transmission. A control processor 502 is coupled to a communication bus. The control processor 502 controls operation of a message generator 504. The message generator 504 provides a control and/or signaling message, or other short duration message, for transmission to a segmentation unit 506. When segmentation is active, the segmentation unit segments the message and adds a segment parameter to each segment. The segmentation unit 506 further divides each of combination of SP and segment into fragments. The segmentation unit 506 determines a Segment Identifier, SI, applicable to each segment. The fragments are then modified to include the appropriate SI. The segmentation unit 506 provides the multiple modified fragments to a framing unit 506 where transmission frames are prepared. An error check generator 510 applies an error checking mechanism to the transmission frames. The transmitter 500 further includes a modulation unit 512 and a transmission unit 514 coupled to an antenna 516. The transmitter 500 further includes a buffer 518 for storing the message or portions of a message in preparation for transmission.

[0083] A receiver 600 is illustrated in FIG. 11 supporting segmented message transmission. The receiver 600 includes a control processor 602 coupled to a communication bus. Frames are received at antenna 616 and processed by receive unit 614. A demodulation unit 612 demodulates the received frames and error check unit 610 checks for transmission errors. A deframing unit 608 extracts the individual fragments from the received frames. Segment extract unit 606 determines the segments of each fragment and determines the ordering of the segments based on the SI and SP information. The message is reconstructed by placing the segments in order in the message reconstruct unit 604. If the received message has no missing segments, the message is then passed to higher layer applications in the receiver 600. If the received message has a missing segment(s), the receiver 600 requests retransmission of the missing segment(s).

[0084] In one embodiment, a receiver method as in FIGS. 7A and 7B, further determines if an end of segment fragment is lost. FIG. 12 illustrates a method 700 of identifying a missing end of segment fragment or frame. The method 700 initializes an index at step 702. If a first erasure is detected at the receiver, the receiver starts a timer. The timer is scheduled for a time period defined as:

Timer i=α*AIT  (5)

[0085] wherein α is a constant value, and AIT is the average inter-arrival time of frames. The timer i continues to count until a message or erasure is received. If the timer i expires before a frame or erasure is received, the receiver considers the first erasure as an end of segment. If prior to expiration of the timer i a second erasure is received, the receiver resets the timer i and starts a timer i+1. The timer i+1 is defined by the time period:

Timer i+1=β*(timer I)+γ*(t2−t1)  (6)

[0086] wherein β and γ are constant values. Any number of additional timers may be used, each having a similar time assignment. Alternate embodiments may employ a variety of time periods and ways of implementing the timer. Effectively, each erasure initiates a timer. The number of erasures is then used to determine the length of the segment. When any timer expires without receipt of a frame or an erasure, the receiver identifies the end of segment as the last received erasure.

[0087] Continuing with method 700 of FIG. 12, if a frame is received at decision diamond 704, the information from the frame is stored in a memory storage buffer at step 718. The receiver updates an average inter-arrival time of segments referred to as AIT at step 720. At step 722 the receiver resets a timer i. At decision diamond 724, if the frame was the end of a segment, processing continues to step 726 to check for errors. If no segment errors are found the segment is processed as part of the message at step 730. If an error is found, the receiver requests a retransmission at step 728. If the frame was not the end of a segment at decision diamond 724, the index value i is incremented at step 716 and processing continues to decision diamond 704 to wait for a next frame. If no frame is received at decision diamond 704, the receiver checks for an erasure at step 706. An erasure is a message received that the receiver cannot process, such as due to a transmission error. If an erasure is received, the timer i is reset and a second timer i+1 is started. Processing then continues to step 716 to increment the index. If no erasure is found at decision diamond 706 the receiver checks for errors at decision diamond 712. If the timer i has not expired at decision diamond 712 processing returns to decision diamond 704 to wait for a next frame. If the timer has expired, the ordering of segments reflects the cumulative erasures.

[0088]FIGS. 13A and 13B provide examples at a receiver. In FIG. 13A, a first frame is received at time t1 and a second frame at time t2. The first and second frames are processed by the receiver and contained no errors. When the third frame is expected, an erasure is received at time t3. The occurrence of the erasure triggers the start of a first timer. The time period for expiration of the timer is defined by the average interval between frames. A fourth frame is received at time t4 prior to expiration of the timer. The timer is reset at time t4.

[0089] In the example of FIG. 13B, the first two frames are received and the next two frames are not. An erasure is received at time t3, and a first timer is started in response. A second erasure is received at time t4 prior to expiration of the first timer. The first timer is reset, and a second timer is started at time t4, wherein the timer period for expiration of the second timer is a function of the first timer value. Again, when any timer expires, the receiver is able to identify the last received erasure as an end of segment. Calculation of the number of erasures allows the receiver to calculate the number of frames per segment.

[0090] According to one embodiment, a method of using multiple timers to identify an end of segment or end of message (such as illustrated in FIG. 12) is applicable to an Asynchronous Transport Method, ATM, wherein the ATM protocol defines a start of message and an end of message. The timers described hereinabove with details provided in equations (5) and (6), identify an end of message and any intervening missing segments and/or fragments, thus avoiding the loss of an end of message in a transmission.

[0091] According to an alternate embodiment, a method of using multiple timers to identify an end of segment or end of message (such as illustrated in FIG. 12) is applicable to a Transport Communication Protocol, TCP, wherein the TCP protocol defines an end of message as a FIN field. The timers described hereinabove with details provided in equations (5) and (6), identify an end of message and any intervening missing segments and/or fragments, thus avoiding the loss of an end of message in a transmission. Alternate embodiments may apply implementation of a timing mechanism to determine missing portions of a transmission, wherein multiple timing mechanisms may be implemented.

[0092] As disclosed hereinabove, a method for segmented message transmission is provided. Each message is first segmented and then the segments are fragmented. A segment parameter is applied to each segment, and a segment identifier to each fragment. The fragments are provided to a lower level for preparation into frames for transmission. The exemplary embodiment may be applied to the transmission of short duration messages, such as control messages, etc.

[0093] Thus a variety of methods have been illustrated hereinabove for transmitting segmented messages in a wireless system. Each method finds application according to the design and resource requirements of a given system. While the various embodiments have been described with reference to a CDMA type spread spectrum communication system, the concepts are applicable to alternate spread spectrum type systems, as well as other type communication systems. The methods and algorithms presented hereinabove may be implemented in hardware, software, firmware, or a combination thereof. For example, using the MMSE approach to a non-time gated pilot, the equations for solving for the combiner weights may be performed in software or using a Digital Signal Processor, DSP, to perform the calculations. Similarly, the adaptive algorithms may be implemented in software in the form of computer readable instructions stored on a computer readable medium. A Central Processing Unit, such as a DSP core, operates to perform the instructions and provide signal estimates in response. Alternate embodiments may implement hardware, such as an Application Specific Integrated Circuit, ASIC, where feasible.

[0094] Those of skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.

[0095] Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.

[0096] The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.

[0097] The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be an integral part of the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.

[0098] The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein. 

What is claimed is:
 1. In a wireless communication system having a base station controller and a plurality of base stations, each of the plurality of base stations adapted for communication with a plurality of mobile stations, a method comprising: receiving a plurality of transmission frames, each of the plurality of transmission frames having an identifier; detecting a first frame erasure within the plurality of transmission frames; initiating a first timer; and on expiration of the first timer determining the identification of the first frame erasure.
 2. The method as in claim 1, further comprising: prior to expiration of the first timer, detecting a second frame erasure; and initiating a second timer; stopping the first timer; and on expiration of the second timer determining the identification of the second frame erasure.
 3. The method as in claim 2, wherein the first timer has a first time period and the second timer has a second time period.
 4. The method as in claim 3, wherein the first time period is determined by an average inter-arrival time period between transmitted frames.
 5. The method as in claim 4, wherein the first time period is given as: First Time Period=α*AIT, wherein α is a constant value, and AIT is the average inter-arrival time of frames.
 6. The method as in claim 5, wherein the second time period is given as: Second Time Period=β*(First Time Period)+γ*(Second Time Period−First Time Period), wherein β and γ are constant values.
 7. A wireless apparatus, comprising: receiver for receiving a plurality of transmission frames; means for detecting a frame erasure; first timer means responsive to detection of a first frame erasure; and second timer means responsive to detection of a second frame erasure.
 8. The wireless apparatus as in claim 7, further comprising: means for determining an identifier corresponding to a first frame associated with the first frame erasure.
 9. The wireless apparatus as in claim 8, wherein the means for determining an identifier is adapted to determine an identifier corresponding to a second frame associated with the second frame erasure.
 10. The wireless apparatus as in claim 9, further comprising: means for determining an average inter-arrival time for transmission frames.
 11. A wireless apparatus having a memory storage unit for storing: a first set of computer-readable instructions for receiving a plurality of transmission frames; a second set of computer-readable instructions for detecting a frame erasure; a third set of computer-readable instructions for a first timer responsive to detection of a first frame erasure; and a fourth set of computer-readable instructions for a second timer responsive to detection of a second frame erasure.
 12. The wireless apparatus as in claim 11, further comprising: a fifth set of computer-readable instructions for determining an identifier corresponding to a first frame associated with the first frame erasure.
 13. The wireless apparatus as in claim 12, wherein the fifth set of computer-readable instructions is adapted to determine an identifier corresponding to a second frame associated with the second frame erasure.
 14. The wireless apparatus as in claim 13, further comprising: A sixth set of computer-readable instructions for determining an average inter-arrival time for transmission frames. 