Method and device for uplink resource allocation

ABSTRACT

A method for receiving an uplink signal in a wireless communication system, and a device therefore. The method according to one embodiment includes transmitting a control channel signal including a resource allocation (RA) field; and receiving an uplink signal. A size of the RA field is represented by an expression including RASizeA and RASizeB. RASizeA is a first number of bits required for representing a resource indication value (RIV) corresponding to a starting resource block (RB) and a length of contiguously allocated RBs within a given uplink bandwidth. RASizeB is a second number of bits required for representing a combinatorial index r corresponding to 4 indexes used to indicate a start resource block group (RBG) index and an end RBG index of a first RB set and a start RBG index and an end RBG index of a second RB set within the given uplink bandwidth.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of co-pending U.S. patent application Ser. No. 14/221,120 filed on Mar. 20, 2014 (now U.S. Pat. No. 9,197,384, issued on Nov. 24, 2015), which is a continuation of U.S. patent application Ser. No. 13/805,312 filed on Dec. 18, 2012 (now U.S. Pat. No. 8,737,344, issued on May 27, 2014), which is the National Phase of PCT/KR2011/006770 filed on Sep. 14, 2011, which claims priority to U.S. Provisional Application Nos. 61/382,890 filed on Sep. 14, 2010, 61/414,398 filed on Nov. 16, 2010, 61/419,234 filed on Dec. 2, 2010 and 61/422,655 filed on Dec. 13, 2010. The contents of all of these applications are hereby incorporated by reference as fully set forth herein in their entirety.

BACKGROUND OF THE INVENTION

Field of the Invention

The present invention relates to a wireless communication system, and more particularly to a method and apparatus for performing contiguous or non-contiguous uplink resource allocation.

Discussion of the Related Art

Wireless communication systems have been widely used to provide various kinds of communication services such as voice or data services. Generally, a wireless communication system is a multiple access system that can communicate with multiple users by sharing available system resources (bandwidth, transmission (Tx) power, and the like). A variety of multiple access systems can be used. For example, a Code Division Multiple Access (CDMA) system, a Frequency Division Multiple Access (FDMA) system, a Time Division Multiple Access (TDMA) system, an Orthogonal Frequency Division Multiple Access (OFDMA) system, a Single Carrier Frequency-Division Multiple Access (SC-FDMA) system, and the like.

SUMMARY OF THE INVENTION

Accordingly, the present invention is directed to a method and apparatus for performing uplink resource allocation in a wireless communication system that substantially obviate one or more problems due to limitations and disadvantages of the related art. An object of the present invention is to provide a method and apparatus for efficiently allocating resources in a wireless communication system. Another object of the present invention is to provide a method and apparatus for contiguously or non-contiguously allocating resources to transmit an uplink (UL) signal.

It will be appreciated by persons skilled in the art that the objects that can be achieved through the present invention are not limited to what has been particularly described hereinabove and the above and other objects that the present invention can achieve will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings.

The object of the present invention can be achieved by providing a method for transmitting an uplink signal in a wireless communication system, the method including: receiving a control channel signal including a resource allocation (RA) field; and transmitting an uplink signal according to the control channel signal, wherein a size of the resource allocation field is represented by the following equation:

$\begin{matrix} {{Max}\left( {\left\lceil {\log_{2}\left( \begin{pmatrix} \left\lceil {{N_{RB}^{UL}/P} + 1} \right\rceil \\ 4 \end{pmatrix} \right)} \right\rceil,\left\lceil {\log_{2}\left( {{N_{RB}^{UL}\left( {N_{RB}^{UL} + 1} \right)}/2} \right)} \right\rceil} \right)} & \lbrack{Equation}\rbrack \end{matrix}$

where, N_(RB) ^(UL) is the number of uplink (UL) resource blocks (RBs), P is a size of uplink (UL) Resource Block Group (RBGs), ┌ ┐ is a ceiling function, Max(x, y) is a higher one of x and y, and

$\quad\begin{pmatrix} x \\ y \end{pmatrix}$ is

$\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.$

In another aspect of the present invention, a communication device for use in a wireless communication system includes: a radio frequency (RF) unit; and a processor, wherein the processor is configured to receive a control channel signal including a resource allocation (RA) field, and to transmit an uplink signal according to the control channel signal, wherein a size of the resource allocation field is represented by the following equation:

$\begin{matrix} {{Max}\left( {\left\lceil {\log_{2}\left( \begin{pmatrix} \left\lceil {{N_{RB}^{UL}/P} + 1} \right\rceil \\ 4 \end{pmatrix} \right)} \right\rceil,\left\lceil {\log_{2}\left( {{N_{RB}^{UL}\left( {N_{RB}^{UL} + 1} \right)}/2} \right)} \right\rceil} \right)} & \lbrack{Equation}\rbrack \end{matrix}$

where, N_(RB) ^(UL) is the number of uplink (UL) resource blocks (RBs), P is a size of uplink (UL) Resource Block Group (RBGs), ┌ ┐ is a ceiling function, Max(x, y) is a higher one of x and y, and

$\quad\begin{pmatrix} x \\ y \end{pmatrix}$ is

$\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.$

P may be given by the following table:

TABLE Size of UL RBG N_(RB) ^(UL) (P) ≦10 1 11-26 2 27-63 3  64-110 4

where the size of UL RBG is the number of contiguous RBs.

The resource allocation (RA) field may include information indicating a combinatorial index (r) used to indicate two resource block (RB) sets, wherein each RB set includes one or more contiguous RBGs, and the combinatorial index (r) is given by the following equation:

$\begin{matrix} {{r = {\sum\limits_{i = 0}^{M^{\prime} - 1}\;\left\langle \begin{matrix} {N - s_{i}} \\ {M^{\prime} - i} \end{matrix} \right\rangle}},{\left\langle \begin{matrix} x \\ y \end{matrix} \right\rangle = \left\{ \begin{matrix} {\quad\begin{pmatrix} x \\ y \end{pmatrix}} & {{{if}\mspace{14mu} x} \geq y} \\ 0 & {{{if}\mspace{14mu} x} < y} \end{matrix} \right.}} & \lbrack{Equation}\rbrack \end{matrix}$

where M′ is 4, N is (number of UL RBGs+1),

s₀ and s₁ are used to indicate a start RBG index and an end RBG index of a first RB set, respectively, and s₂ and s₃ are used to indicate a start RBG index and an end RBG index of a second RB set, respectively.

The start RBG index and the end RBG index of the first RB set may be denoted by s₀ and s₁−1, respectively, and the start RB index and the end RBG index of the second RB set may be denoted by s₂ and s₃−1, respectively.

{s_(i)}_(i=0) ^(M′−1) may satisfy 1≦s_(i)≦N and s_(i)<s_(i+1).

$\log_{2}\left( \begin{pmatrix} \left\lceil {{N_{RB}^{UL}/P} + 1} \right\rceil \\ 4 \end{pmatrix} \right\rceil$ bits indicating the combinatorial index (r) may be contained in a Least Significant Part (LSB) part of the resource allocation (RA) field.

The control channel signal may be a Physical Downlink Control Channel (PDCCH) signal, and the uplink signal may be a Physical Uplink Shared Channel (PUSCH) signal.

Exemplary embodiments of the present invention have the following effects. In accordance with the embodiments of the present invention, resources can be efficiently allocated in a wireless communication system. In more detail, contiguous or non-contiguous resource allocation for uplink transmission can be efficiently carried out.

It will be appreciated by persons skilled in the art that the effects that can be achieved through the present invention are not limited to what has been particularly described hereinabove and other advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are included to provide a further understanding of the invention, illustrate embodiments of the invention and together with the description serve to explain the principle of the invention.

FIG. 1 exemplarily shows a radio frame structure for use in a 3rd Generation Partnership Project (3GPP) system.

FIG. 2 exemplarily shows a resource grid of a downlink (DL) slot.

FIG. 3 exemplarily shows a downlink (DL) frame structure.

FIG. 4 exemplarily shows an uplink (UL) subframe structure.

FIG. 5 exemplarily shows mapping between a virtual resource block (VRB) and a physical resource block (PRB).

FIGS. 6A to 6C exemplarily show resource allocation types 0˜2 of the legacy LTE.

FIGS. 7A and 7B are block diagrams illustrating a Discrete Fourier Transform Spread Orthogonal Frequency Division Multiple Access (DFT-s-OFDMA) transmitter and receiver.

FIG. 8 is a conceptual diagram illustrating localized DFT-s-OFDMA resource mapping.

FIG. 9 is a conceptual diagram illustrating clustered DFT-s-OFDMA resource mapping.

FIG. 10 exemplarily shows RBG grouping.

FIGS. 11 to 13A and 13B are conceptual diagrams illustrating a non-contiguous uplink resource allocation method according to an embodiment of the present invention.

FIGS. 14 and 15 exemplarily show uplink transmission according to an embodiment of the present invention.

FIG. 16 is a flowchart illustrating an uplink transmission procedure according to an embodiment of the present invention.

FIG. 17 is a block diagram illustrating a base station (BS) and a user equipment (UE) applicable to embodiments of the present invention.

FIG. 18 illustrates an RBG size for each of bandwidths (BWs) in LTE, and also a number of RBGs.

DETAILED DESCRIPTION OF THE INVENTION

Reference will now be made in detail to the preferred embodiments of the present invention with reference to the accompanying drawings. The detailed description, which will be given below with reference to the accompanying drawings, is intended to explain exemplary embodiments of the present invention, rather than to show the only embodiments that can be implemented according to the invention. The following embodiments of the present invention can be applied to a variety of wireless access technologies, for example, CDMA, FDMA, TDMA, OFDMA, SC-FDMA, MC-FDMA, and the like. CDMA can be implemented by wireless communication technologies, such as Universal Terrestrial Radio Access (UTRA) or CDMA2000. TDMA can be implemented by wireless communication technologies, for example, Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Enhanced Data rates for GSM Evolution (EDGE), etc. OFDMA can be implemented by wireless communication technologies, for example, IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, E-UTRA (Evolved UTRA), and the like. UTRA is a part of the Universal Mobile Telecommunications System (UMTS). 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) is a part of Evolved UMTS (E-UMTS) that uses E-UTRA. The LTE-Advanced (LTE-A) is an evolved version of 3GPP LTE. Although the following embodiments of the present invention will hereinafter describe inventive technical characteristics on the basis of the 3GPP LTE/LTE-A system, it should be noted that the following embodiments will be disclosed only for illustrative purposes and the scope and spirit of the present invention are not limited thereto.

Although the following embodiments of the present invention will hereinafter describe inventive technical characteristics on the basis of the 3GPP LTE/LTE-A system, it should be noted that the following embodiments will be disclosed only for illustrative purposes and the scope and spirit of the present invention are not limited thereto. Specific terms used for the exemplary embodiments of the present invention are provided to aid in understanding of the present invention. These specific terms may be replaced with other terms within the scope and spirit of the present invention.

FIG. 1 exemplarily shows a radio frame structure for use in a 3rd Generation Partnership Project (3GPP) system.

Referring to FIG. 1, a radio frame includes 10 subframes, and one subframe includes two slots in a time domain. A time required for transmitting one subframe is defined as a Transmission Time Interval (TTI). For example, one subframe may have a length of 1 ms and one slot may have a length of 0.5 ms. One slot may include a plurality of Orthogonal Frequency Division Multiplexing (OFDM) symbols or a Single Carrier Frequency Division Multiple Access (SC-FDMA) symbol in a time domain. Since the LTE system uses OFDMA in downlink and uses SC-FDMA in uplink, the OFDM or SC-FDMA symbol indicates one symbol duration. A resource block (RB) is a resource allocation unit and includes a plurality of contiguous carriers in one slot. The structure of the radio frame is only exemplary. Accordingly, the number of subframes included in the radio frame, the number of slots included in the subframe or the number of symbols included in the slot may be changed in various manners.

FIG. 2 exemplarily shows a resource grid of a downlink slot.

Referring to FIG. 2, a downlink slot includes a plurality of OFDM symbols in a time domain. One downlink slot includes 7 (or 6) OFDM symbols and a resource block (RB) includes 12 subcarriers in a frequency domain. Each element on a resource grid may be defined as a resource element (RE). One RB includes 12×7 (or 12×6) REs. The number (N_(RB) ^(DL)) of RBs contained in a downlink slot is dependent upon a downlink transmission bandwidth. An uplink slot structure is identical to the downlink slot structure, but OFDM symbols are replaced with SC-FDMA symbols in the uplink slot structure differently from the downlink slot structure, and N_(RB) ^(DL) is replaced with N_(RB) ^(UL).

FIG. 3 is a downlink subframe structure.

Referring to FIG. 3, a maximum of three (or four) OFDM symbols located in the front part of a first slot of the subframe may correspond to a control region to which a control channel is allocated. The remaining OFDM symbols correspond to a data region to which a Physical Downlink Shared Channel (PDSCH) is allocated. A variety of downlink control channels may be used in LTE, for example, a Physical Control Format Indicator Channel (PCFICH), a Physical Downlink Control Channel (PDCCH), a Physical hybrid ARQ indicator Channel (PHICH), etc. PCFICH is transmitted from a first OFDM symbol of the subframe, and carries information about the number of OFDM symbols used for transmitting a control channel within the subframe. PHICH carries a Hybrid Automatic Repeat request acknowledgment/negative-acknowledgment (HARQ ACK/NACK) signal as a response to an uplink transmission signal.

Control information transmitted over a PDCCH is referred to as Downlink Control Information (DCI). DCI includes resource allocation information for either a UE or a UE group and other control information. For example, DCI includes uplink/downlink (UL/DL) scheduling information, an uplink transmission (UL Tx) power control command, etc.

PDCCH carries a variety of information, for example, transmission format and resource allocation information of a downlink shared channel (DL-SCH), transmission format and resource allocation information of an uplink shared channel (UL-SCH), paging information transmitted over a paging channel (PCH), system information transmitted over the DL-SCH, resource allocation information of an upper-layer control message such as a random access response transmitted over PDSCH, a set of Tx power control commands of each UE contained in a UE group, a Tx power control command, activation indication information of Voice over IP (VoIP), and the like. A plurality of PDCCHs may be transmitted within a control region. A user equipment (UE) can monitor a plurality of PDCCHs. PDCCH is transmitted as an aggregate of one or more contiguous control channel elements (CCEs). CCE is a logical allocation unit that is used to provide a coding rate based on a radio channel state to a PDCCH. CCE may correspond to a plurality of resource element groups (REGs). The format of PDCCH and the number of PDCCH bits may be determined according to the number of CCEs. A base station (BS) decides a PDCCH format according to DCI to be sent to the UE, and adds a Cyclic Redundancy Check (CRC) to control information. The CRC is masked with an identifier (e.g., Radio Network Temporary Identifier (RNTI)) according to a PDCCH owner or a purpose of the PDCCH. For example, provided that the PDCCH is provided for a specific UE, an identifier of the corresponding UE (e.g., cell-RNTI (C-RNTI)) may be masked with the CRC. If PDCCH is provided for a paging message, a paging identifier (e.g., paging-RNTI (P-RNTI)) may be masked with a CRC. If PDCCH is provided for system information (e.g., system information block (SIC)), system information RNTI (SI-RNTI) may be masked with CRC. If PDCCH is provided for a random access response, random access-RNTI (RA-RNTI) may be masked with CRC. For example, CRC masking (or scrambling) may perform an XOR operation between CRC and RNTI at a bit level.

FIG. 4 is a diagram showing the structure of an uplink subframe used in LTE.

Referring to FIG. 4, the uplink subframe includes a plurality of slots (e.g., two). The number of SC-FDMA symbols included in one slot may be changed according to the length of a CP. For example, in the case of the normal CP, the slot may include seven SC-FDMA symbols. The uplink subframe is divided into a data region and a control region in a frequency domain. The data region includes a PUSCH and is used to transmit a data signal such as voice data. The control region includes a PUCCH and is used to transmit control information. The PUCCH includes RB pairs (e.g., m=0, 1, 2, 3) located at both ends of the data region on a frequency axis and hops between slots. The control information includes HARQ ACK/NACK, channel quality information (CQI), precoding matrix indicator (PMI), rank indication (RI), etc.

Hereinafter, resource block mapping will be described. A physical resource block (PRB) and a virtual resource block (VRB) are defined. The PRB is equal to that shown in FIG. 2. That is, the PRB is defined as N_(symb) ^(DL) contiguous OFDM symbols in a time domain and N_(sc) ^(RB) subcarriers in a frequency domain. PRBs are numbered from 0 to N_(RB) ^(DL)−1 in the frequency domain. A relationship between a PRB number n_(PRB) and an RE (k, l) in a slot is shown in Equation 1.

$\begin{matrix} {n_{PRB} = \left\lfloor \frac{k}{N_{sc}^{RB}} \right\rfloor} & \left\lbrack {{Equation}\mspace{14mu} 1} \right\rbrack \end{matrix}$

In Equation 1, k denotes a subcarrier index and N_(sc) ^(RB) the number of subcarriers included in one RB.

The VRB has the same size as the PRB. A localized VRB (LVRB) of a localized type and a distributed VRB (DVRB) of a distributed type are defined. Regardless of the type of the VRB, a pair of RBs is allocated over two slots by a single VRB number n_(VRB).

FIG. 5 is a diagram showing a method of mapping a virtual resource block (VRB) to a physical resource block (PRB).

Referring to FIG. 5, since an LVRB is directly mapped to a PRB, a VRB number n_(VRB) equally corresponds to a PRN number n_(PRB) (n_(PRB)=n_(VRB)). The VRB is numbered from 0 to N_(VRB) ^(DL)−1 and N_(VRB) ^(DL)=N_(RB) ^(DL). The DVRB is mapped to the PRB after being interleaved. More specifically, the DVRB may be mapped to the PRB as shown in Table 1. Table 1 shows an RB gap value.

TABLE 1 Gap (N_(gap)) System BW 1^(st) Gap 2^(nd) Gap (N_(RB) ^(DL)) (N_(gap, 1)) (N_(gap, 2))  6-10 ┌N_(RB) ^(DL) /2┐ N/A 11 4 N/A 12-19 8 N/A 20-26 12 N/A 27-44 18 N/A 45-49 27 N/A 50-63 27  9 64-79 32 16  80-110 48 16

N_(gap) denotes a frequency gap (e.g., PRB unit) when VRBs having the same number are mapped to PRBs of a first slot and a second slot. In case of 6≦N_(RB) ^(DL)≦49, only one gap value is defined (N_(gap)=N_(gap,1)). In case of 50≦N_(RB) ^(DL)≦110, two gap values N_(gap,1) and N_(gap,2) are defined. N_(gap)=N_(gap,1) or N_(gap)=N_(gap,2) is signaled through downlink scheduling. DVRBs are numbered from 0 to N_(VRB) ^(DL)−1, is N_(VRB) ^(DL)=N_(VRB,gap1) ^(DL)=2·min(N_(gap),N_(RB) ^(DL)−N_(gap)) with respect to N_(gap)=N_(gap,1), and is N_(VRB) ^(DL)=N_(VRB,gap2) ^(DL)=└N_(RB) ^(DL)/2N_(gap)┘·2N_(gap) with respect to N_(gap)=N_(gap,2). min(A,B) denotes the smaller of A or B.

Contiguous Ñ_(VRB) ^(DL) numbers configure a unit for VRB number interleaving, is Ñ_(VRB) ^(DL)=N_(VRB) ^(DL) in case of N_(gap)=N_(gap,1), and is Ñ_(VRB) ^(DL)=2N_(gap) in case of N_(gap)=N_(gap,2). VRB number interleaving of each interleaving unit may be performed using four columns and N_(row) rows. N_(row)=┌Ñ_(VRB) ^(DL)/(4P)┐·P and P denotes the size of a Resource Block Group (RBG). The RBG is defined by P contiguous RBs. The VRB number is written in a matrix on a row-by-row basis and is read in a column-by-column basis. N_(null) null values are inserted into last N_(null)/2 rows of second and fourth columns and N_(null)=4N_(row)−Ñ_(VRB) ^(DL). The null value is ignored upon reading.

Hereinafter, a resource allocation scheme defined in the legacy LTE will hereinafter be described in detail. In LTE, frequency resource allocation may be indicated through a PDCCH per subframe. In case of resource allocation, a Physical Resource Block (PRB) of a first half (i.e., a first slot) of a subframe is paired with the same-frequency PRB of a second half (i.e., a second slot). For convenience of description, the present invention will be described in terms of a first half of a subframe. The legacy LTE uses a variety of methods for resource allocation as shown in Tables 2 and 3. Table 2 shows a downlink resource allocation method, and Table 3 shows an uplink resource allocation method.

TABLE 2 DL RA Number of method Description necessary bits Type 0: Bitmap indicates RBG. RGB size ┌N_(RB) ^(DL)/P┐ bitmap is based on a system band. Type 1: Bitmap indicates RBs within an ┌N_(RB) ^(DL)/P┐ bitmap RBG subset, respectively. The number of subsets is dependent upon a system band. The number of bits is established in the same manner as in Type 0. Therefore, the same DCI format is used to carry Type 0 or Type 1 information. Type 2: This indicates a start position of a ┌log₂ (N_(RB) ^(DL) (N_(RB) ^(DL) + contiguous resource block and the number of 1)/2)┐ allocation contiguous resource blocks.

TABLE 3 UL RA Number of method Description necessary bits Contiguous This indicates a start position of ┌log₂ (N_(RB) ^(UL) (N_(RB) ^(UL) + allocation a resource block and the number 1)/2)┐ of contiguous resource blocks.

In Tables 2 and 3, N_(RB) ^(DL) is a downlink bandwidth denoted by a multiple of N_(sc) ^(RB). That is, N_(RB) ^(DL) is a downlink bandwidth in units of an RB. Similarly, N_(RB) ^(UL) is an uplink bandwidth denoted by a multiple of N_(sc) ^(RB). That is, N_(RB) ^(UL) is an uplink bandwidth in units of an RB. P is the number of RBs contained in an RBG.

FIGS. 6A to 6C exemplarily show resource allocation types 0˜2 of the legacy LTE. FIG. 6A shows a Type 0 RA (Resource Allocation) control information format and its associated resource allocation example. FIG. 6B shows a Type 1 RA control information format and its associated resource allocation example. FIG. 6C shows a Type 2 RA control information format and its associated resource allocation example.

A user equipment (UE) interprets a resource allocation field based on a detected PDCCH DCI format. The resource allocation field in each PDCCH includes two parts: a resource allocation header field and actual resource block allocation information. PDCCH DCI formats 1, 2 and 2A for Type 0 and Type 1 RA have the same format and are distinguished via a single bit resource allocation header field present according to a downlink system bandwidth. More specifically, Type 0 RA is indicated by 0 and Type 1 RA is indicated by 1. While PDCCH DCI formats 1, 2 and 2A are used for Type 0 or Type 1 RA, PDCCH DCI formats 1A, 1b, 1C and 1D are used for Type 2 RA. The PDCCH DCI format having Type 2 RA does not have a resource allocation header field.

Referring to FIG. 6A, in Type 0 RA, resource block allocation information includes a bitmap indicating an RBG allocated to a UE. The RBG is a set of contiguous PRBs. The size P of the RBG depends on a system bandwidth as shown in Table 4.

TABLE 4 System Bandwidth RBG Size N_(RB) ^(DL) (P) ≦10 1 11-26 2 27-63 3  64-110 4

In a downlink system bandwidth having N PRBs, the total number N_(RBG) of RBGs is N_(RBG)=┌N_(RB) ^(DL)/P┐, the size of └N_(RB) ^(DL)/P┘ RBGs is P, and the size of one RBG is N_(RB) ^(DL)−P·└N_(RB) ^(DL)/P┘ in case of N_(RB) ^(DL) modP>0. Mod denotes a modulo operation, ┌ ┐ denotes a ceiling function, and └ ┘ denotes a flooring function. The size of a bitmap is N_(RBG) and each bit corresponds to one RBG. All RBGs are indexed by 0 to N_(RBG)−1 in a frequency increase direction and RBG 0 to RBG N_(RBG)−1 are mapped from a most significant bit (MSB) to a least significant bit (LSB) of a bitmap.

Referring to FIG. 6B, in Type 1 RA, resource block allocation information having the size of N_(RBG) informs a scheduled UE of resources in an RBG subset in PRB units. The RBG subset p (0≦p<P) starts from an RBG p and includes every P-th RBG. The resource block allocation information includes three fields. A first field has ┌ log₂(P)┐ bits and indicates an RBG subset selected from among P RBG subsets. A second field has 1 bit and indicates resource allocation span shift within a subset. Shift is triggered if a bit value is 1 and is not triggered if a bit value is 0. A third field includes a bitmap and each bit indicates one PRB within a selected RBG set. The size of a bitmap part used to indicate a PRB within the selected RBG subset is N_(RB) ^(TYPE1) and is defined by Equation 2. N _(RB) ^(TYPE1) =┌N _(RB) ^(DL) /P┐−┌ log₂(P)┐−1  [Equation 2]

An addressable PRB number in the selected RBG subset may start from an offset Δ_(shift)(p) from a smallest PRB number within the selected RBG subset and may be mapped to a MSB of a bitmap. The offset is represented by the number of PRBs and is applied within the selected RBG subset. If the bit value within a second field for resource allocation span shift is set to 0, an offset for an RBG subset p is Δ_(shift)(p)=0. In the other case, an offset for an RBG subset p is Δ_(shift)(p)=N_(RB) ^(RBG subset)(p)−N_(RB) ^(TYPE1). N_(RB) ^(RBG subset)(p) denotes the number of PRBs within the RBG subset p and may be obtained by Equation 3.

$\begin{matrix} {{N_{RB}^{{RBG}\mspace{14mu}{subset}}(p)} = \left\{ \begin{matrix} {{{\left\lfloor \frac{N_{RB}^{DL} - 1}{P^{2}} \right\rfloor \cdot P} + P},} & {p < {\left\lfloor \frac{N_{RB}^{DL} - 1}{P} \right\rfloor{mod}\; P}} \\ {\begin{matrix} {\left\lfloor \frac{N_{RB}^{DL} - 1}{P^{2}} \right\rfloor \cdot} \\ {P + {\left( {N_{RB}^{DL} - 1} \right){mod}\; P} + 1} \end{matrix},} & {p = {\left\lfloor \frac{N_{RB}^{DL} - 1}{P} \right\rfloor{mod}\; P}} \\ {{\left\lfloor \frac{N_{RB}^{DL} - 1}{P^{2}} \right\rfloor \cdot P},} & {p > {\left\lfloor \frac{N_{RB}^{DL} - 1}{P} \right\rfloor{mod}\; P}} \end{matrix} \right.} & \left\lbrack {{Equation}\mspace{14mu} 3} \right\rbrack \end{matrix}$

Referring to FIG. 6C, in Type 2 RA, resource block allocation information indicates an LVRB or DVRB set contiguously allocated to a scheduled UE. If resource allocation is signaled in PDCCH DCI format 1A, 1B or 1C, a 1-bit flag indicates whether an LVRB or DVRB is allocated (e.g., 0 denotes LVRB allocation and 1 denotes DVRB allocation). In contrast, if resource allocation is signaled in PDCCH DCI format 1C, only DVRB is always allocated. A Type 2 RA field includes a resource indication value (RIV) and the RIV corresponds to a start resource block RB_(start) and a length. The length denotes the number of virtually and contiguously allocated resource blocks.

FIGS. 7A and 7B are block diagrams illustrating a Discrete Fourier Transformation-spread-Orthogonal Frequency Division Multiple Access (DFT-s-OFDMA) transmitter and a DFT-s-OFDMA receiver. The DFT-s-OFDMA scheme is different from the OFDMA scheme, because the DFT-s-OFDMA scheme spreads a plurality of data symbols (i.e., a data symbol sequence) over a frequency domain before performing IFFT processing, differently from the OFDMA scheme. The DFT-s-OFDMA scheme may also be referred to as an SC-FDMA scheme. For convenience of description and better understanding of the present invention, the DFT-s-OFDMA scheme and the SC-FDMA may be used together as necessary.

Referring to FIG. 7a , a DFT-s-OFDMA transmitter 700 includes a constellation mapping module 702, a Serial/Parallel (S/P) converter 704, a N_(u)-point FFT spreading module 706, a symbol to subcarrier mapping module 708, an N_(c)-point IFFT module 710, a cyclic prefix module 712, and a Parallel/Serial (P/S) converter 714. The above-mentioned modules are disclosed only for illustrative purposes, and the DFT-s-OFDMA transmitter 700 may further include additional modules. If necessary, some modules among the above-mentioned modules may be integrated into one function, so that the modules may also be integrated into one module. In this case, N_(u) is an FFT spreading module input size, and means the number of scheduled subcarriers. N_(c) means the total number of subcarriers existing in the system bandwidth (system BW). Accordingly, an N_(u) value and its associated DFT Input/Output (I/O) size may be variable within the range of N_(u)≦N_(c) according to the amount of data symbols scheduled at each scheduling time.

A signal processing step for the DFT-s-OFDMA transmitter 700 will hereinafter be described in detail. Firstly, a bit stream is modulated into a data symbol sequence by the constellation mapping module 702. After that, a serial data symbol sequence is converted into N_(u) parallel data symbol sequences by the S/P converter 704. The N_(u)-length parallel data symbol sequences are converted into N_(u)-length frequency domain sequences through the same-sized FFT processing by the N_(u)-point FFT spreading module 706. The FFT process may be carried out by the N_(u)-point DFT processing. In the embodiments of the present invention, FFT and DFT may be used together as necessary, and a DFT process may be used together with DFT spreading or DFT precoding. After that, the N_(u)-length frequency domain sequences are mapped to N_(u) subcarriers allocated from among a total of N_(c) subcarriers, and the N_(c)−N_(u) remaining subcarriers are each padded with ‘0’ by the symbol to subcarrier mapping module 708. Sequences mapped to N_(c) subcarriers are converted into N_(c)-length time domain sequences by the N_(c)-point IFFT module 710. In order to reduce Inter-Symbol Interference (ISI) and Inter-Carrier Interference (ICI), the last N_(p) samples from among time domain sequences are copied and attached to the front of the time domain sequences so as to configure a cyclic prefix (CP) by the cyclic prefix module 712. The generated time domain sequences may correspond to one transmission symbol, and may be converted into a serial sequence by the P/S converter 714. After that, the serial sequence is transmitted to a receiver through frequency up-conversion or the like. Another UE (i.e., the latter UE) receives available subcarriers from among the N_(c)−N_(u) remaining subcarriers that have been left after being used by the former UE, so that the latter UE transmits data using the allocated available subcarriers.

Referring to FIG. 7B, a receiver 720 includes an S/P converter 722, an Nc-point FFT module 724, a subcarrier to symbol mapping module 726, an N_(u)-point DFT despreading module 728, a P/S converter 730, and a constellation mapping module 732. The signal processing steps of the receiver 720 are arranged in opposite order of those of the transmitter 700 and as such a detailed description thereof will be described by referring to FIG. 7A.

The LTE uses the OFDMA scheme on downlink whereas it uses the SC-FDMA scheme on uplink. If the N_(u)-point FFT spreading module 706 is removed from the block diagram of FIG. 7A, the OFDMA transmitter can be achieved. If the N_(u)-point DFT dispreading module 728 is removed from the block diagram of FIG. 7B, the OFDMA receiver can be achieved.

FIG. 8 is a conceptual diagram illustrating localized DFT-s-OFDMA resource mapping. FIG. 9 is a conceptual diagram illustrating clustered DFT-s-OFDMA resource mapping. A method for mapping a frequency-domain sequence generated by DFT precoding to a subcarrier will hereinafter be described with reference to FIGS. 8 and 9. The legacy LTE has been designed to allocate only one contiguous frequency resource to one UE on uplink. However, the LTE-A (since Rel-10) system can allocate one contiguous frequency resource to one UE on uplink, and can also allocate a plurality of non-contiguous frequency resources to one UE on uplink, so that frequency resource utilization and the demand of high-speed communication can be maximized.

FIG. 8 is a block diagram illustrating an example of a localized DFT-s-OFDMA transmitter. FIG. 8 shows a resource allocation method of the legacy LTE. In other words, a frequency domain sequence having a length of N_(u) is mapped to N_(u) contiguous subcarriers. The localized DFT-s-OFDMA scheme can transmit data only through consecutive subcarriers at a given time, so that flexibility of scheduling may be unavoidably deteriorated. For example, when a transmitter and a receiver have good radio channel response characteristics in a plurality of frequency domains spaced apart from each other at a certain time, it is impossible for the localized DFT-s-OFDMA scheme of FIG. 8 to simultaneously transmit data to the plurality of frequency domains spaced apart from each other.

FIG. 9 is a block diagram illustrating an example of a clustered DFT-s-OFDMA transmitter. FIG. 9 shows a resource allocation method additionally used in LTE-A. The LTE-A UE can use the scheme of FIG. 8 or the scheme of FIG. 9 on the basis of resource allocation information.

Referring to FIG. 9, frequency domain sequences generated from the DFT module 906 are non-contiguously mapped to a frequency band at irregular intervals by the symbol to subcarrier mapping module 908. It can be recognized that the clustered DFT-s-OFDMA scheme of FIG. 9 is implemented when the localized DFT-s-OFDMA scheme is independently applied to a plurality of frequency domains spaced apart from each other. Each frequency band (or each resource set) to which the localized DFT-s-OFDMA scheme is applied is referred to as a cluster. The cluster includes one or more consecutive subcarriers. Accordingly, in the scheme of FIG. 9, a plurality of DFT-precoded data symbols are mapped to consecutive subcarriers contained in each of M clusters (M≧1) separated from each other on a frequency axis. FIG. 9 exemplarily shows the case of three clusters. The sizes of respective clusters (i.e., the number of subcarriers) may be equal to each other or may be independently established. If M is equal to or higher than 1, a PAPR value of the transmission signal becomes higher than that of the localized DFT-s-OFDMA scheme. In contrast, if M is set to a specific value within an appropriately small range, a PAPR less than that of the OFDMA scheme is still guaranteed and scheduling flexibility can be improved according to the clustered DFT-s-OFDMA scheme of FIG. 9.

Embodiment

Since the non-contiguous uplink resource allocation (for convenience of description, referred to as UL RA Type 1) method has been introduced to the LTE-A system, a variety of methods for efficiently signaling UL RA Type 1 have been intensively discussed in the technology.

Firstly, there is proposed a first scheme configured to employ a bitmap designed to individually indicate UL RB (or RBG) in the same manner as in DL RA Type 0. In accordance with the present invention, although perfect scheduling freedom is guaranteed, an n-bit RA field is needed when n RBs (or n RBGs) are present in a UL band so that the amount of control information can be excessively increased. Moreover, considering that the size of RA field for conventional PUSCH scheduling is fixed to ┌ log₂(N_(RB) ^(UL)(N_(RB) ^(UL)+1)/2)┐, a new DCI format for supporting the first scheme must be defined.

Secondly, there is proposed a method for reusing a conventional contiguous allocation scheme (RA Type 2) and limiting a resource region to which each cluster can be allocated. For example, provided that the UL band includes 10 RBGs, a first cluster can be allocated only to RBGs 0˜4 and a second cluster can be allocated only to RBGs 5˜9. in this case, the RA field may have the size of 2·┌ log₂(N_(RBG) ^(Cluster Span)·(N_(RBG) ^(Cluster Span)+1)/2┐. N_(RBG) ^(Cluster Span) is the size of a specific region to which each cluster can be allocated, and is denoted in units of an RBG. In accordance with the second scheme, it may be possible to perform non-contiguous resource allocation using the legacy RA field according to adjustment of the size of N_(RB) ^(Cluster Span). However, since the region to which each cluster can be allocated is limited, the scheduling freedom can be reduced.

As described above, when using a bitmap indicating an individual RB (or RBG) in case of non-contiguous UL resource allocation, the amount of control information can be greatly increased so that it is impossible to reuse the legacy DCI format. In addition, when using the legacy contiguous allocation scheme (i.e., RIV) or DCI format in case of non-contiguous UL resource allocation, the size of a region capable of being used for cluster allocation is limited to maintain the legacy DCI format size, resulting in reduction of scheduling freedom.

A non-contiguous UL resource allocation method capable of guaranteeing scheduling freedom without increasing the amount of resource allocation information will hereinafter be described with reference to the attached drawings. In more detail, the present invention proposes a method for using a combinatorial index corresponding to a plurality of non-contiguously allocated resource sets. The combinatorial index may be contained in an RA field of a DCI format for PUSCH scheduling. The combinatorial index may be used to indicate a specific case in which indices of a specific combination are selected from among all cases. For convenience of description, a set of a specific combinatorial index is denoted by {s_(i)}_(i=0) ^(M′−1). M′ is identical to 2M (M′=2M), where M is the number of allocated resource sets (e.g., clusters). In this case, {s₀,s₁} corresponds to a first resource set, and {s₂,s₃} corresponds to a second resource set. That is, {s_(2m-2),s_(2m-1)} corresponds to a m^(th) resource set (where m=1, 2, . . . , M). Correspondence relationship may be defined in different ways. A resource allocation method using the combinatorial index will be described later.

Prior to describing the following description, either a total UL system bandwidth or a total number of RBs corresponding to a UL bandwidth available for resource allocation is defined as N_(RB) ^(UL). For convenience of description, although the embodiment of the present invention uses an RBG as a minimum resource allocation unit (i.e., granularity), the scope or spirit of the present invention is not limited thereto, and the minimum resource allocation unit may be defined in different ways. Provided that the number of RBs contained in an RBG is P (P=1, 2, . . . ), a total of N_(RBG) ^(UL) resource allocation RBGs can be defined for a total of N_(RB) ^(UL) RBs. In more detail, N_(RBG) ^(UL) may be denoted by ┌N_(RB) ^(UL)/P┐ (or, ceiling(N_(RB) ^(UL)/P)). ┌x┐ or ceiling(x) is a minimum integer equal to or greater than x. Meanwhile, according to definition and size of the resource allocation field, N_(RBG) ^(UL) may be denoted by └N_(RB) ^(UL)/P┘ (or, floor(N_(RB) ^(UL)/P)) or round(N_(RB) ^(UL)/P). └x┘ or floor(x) is a maximum integer equal to or less than x. round(x) represents the rounded value of x.

In addition, the number of resource sets (e.g., RBG clusters) non-contiguously allocated to the UE is defined by M (M=2, 3, . . . ). M may be set as a value common to all UEs (i.e., a cell-specific value) or may be set as an independent value for each UE (i.e., a UE-specific value). Preferably, M may be fixed to 2 (i.e., M=2) for all UEs.

FIG. 10 exemplarily shows an RBG map based on RBG indexing for resource allocation. In FIG. 10, it is assumed that the UL band includes 20 RBs (N_(RB) ^(UL)=20). Here, RBG includes two RBs as shown in Table 4. Therefore, RBs #1˜#20 are grouped into RBGs #1˜#10. In the following description, RBG is used as a basic UL resource allocation unit. Although FIG. 10 shows that the RB index or the RBG index starts from 1, an RB index and/or an RBG index may start from 0 according to an implementation example.

Method 1: A Combination of RBG Indexes is Indicated by a Combinatorial Index

Method 1 relates to a method for allocating a plurality of non-contiguous UL resource sets (e.g., RBG clusters) on the basis of RBG indexing. For convenience of description, a start RBG index of the RBG cluster allocated to the UE is denoted by S, and an end RBG index thereof is denoted by E. The start RBG index of the m-th RBG set is denoted by S_(m), and the end RBG index thereof is denoted by E_(m). For convenience of description, the following description will focus upon an exemplary case in which two RBG clusters are allocated. In this case, the combinatorial index may be used to indicate {s_(i)}_(i=0) ^(M′−1)(M′=4).

For resource allocation, {s₀,s₁}={S₁,E₁} or {s₂,s₃}={S₂,E₂} may be defined. However, considering that the RBG cluster is composed of one RBG, the combinatorial index needs to indicate a combination of s₀=s₁ and/or s₂=s₃. In this case, a total number of combinations is increased due to duplicate selection, so that much more control information may be needed. In order to exclude duplicate selection, limitation of s_(i)<s_(i+1) may be used. However, in case of using the limitation of s_(i)<s_(i+1), it may be impossible to allocate a resource set composed of one RBG.

Therefore, the following method may be used. {s ₀ ,s ₁ }={S ₁ E ₁+1},{s ₂ ,s ₃ }={S ₂ ,E ₂}  Method 1-1: {s ₀ ,s ₁ }={S ₁−1,E ₁ },{s ₂ ,s ₃ }={S ₂−1,E ₂+1}  Method 1-2:

In Method 1-1, the RBG index of the allocated resource set is denoted by {S_(m),E_(m)}={s_(2m-2),s_(2m-1)−1} (where, m=1, 2, . . . , M). Similarly, according to Method 1-2, the RBG index of the allocated resource set is denoted by {S_(m),E_(m)}={s_(2m-2)+1,s_(2m-1)}.

Method 1-1 and Method 1-2 will hereinafter be described with reference to the attached drawings.

Method 1-1) Start/End-Rear RBG Indication of RBG Clusters

FIG. 11 shows exemplary resource allocation of Method 1-1.

Referring to FIG. 11, Method 1-1 is based on RBG indexing, {S_(m),E_(m)+1} (i.e., a start RBG index and an end-rear RBG index) is notified to each of M RBG clusters allocated to the UE from among a total of N_(RBG) RBGs. As described above, a combinatorial index (also called a combinatorial index) contained in a DCI format for PUSCH scheduling indicates {s_(i)}_(i=0) ^(M′−1)(M′=2M), and the UE may confirm {S_(m),E_(m)} on the basis of {s_(2m-2),s_(2m-1)}={S_(m),E_(m)+1}.

In Method 1-1, it is possible to define one additional virtual RBG at the rear side of (i.e., at a higher RBG index side) of the end RBG index as shown in FIG. 11 so as to allow the end RBG of the RBG cluster to be allocated to the end RBG index. In case of virtual RBG, it is impossible to perform actual resource allocation, or the virtual RBG may be used only for indexing as necessary.

In Method 1-1, 2M (=M′) indices for allocation of M RBG clusters may be encoded into different bits or may be encoded into different bits of individual clusters, or all indices of all clusters may be joint-encoded together in order to reduce the number of bits required for resource allocation. In addition, as described above, only a non-overlapping index combination may be selected and signaled from among the 2M (=M′) indices for discriminating M RBG clusters. For the sake of convenience, when it is assumed that N=N_(RBG), the total number of RBG indices includes the virtual RBG such that the total number of RBG indices is N+1 and therefore the number of bits required for resource allocation in Method 1-1 is ceiling(log₂(_(N+1)C_(2m))). More specifically, when N+1 RBG indices (i.e., RBG indices 1 to N+1) are defined in Method 1-1, a combinatorial index (r) for signaling resource allocation of M RBG clusters may be represented by the following equation 4.

$\begin{matrix} {{r = {\sum\limits_{i = 0}^{M^{\prime} - 1}\;\left\langle \begin{matrix} {\left( {N + 1} \right) - s_{i}} \\ {M^{\prime} - i} \end{matrix} \right\rangle}},{\left\langle \begin{matrix} x \\ y \end{matrix} \right\rangle = \left\{ \begin{matrix} \begin{pmatrix} x \\ y \end{pmatrix} & {{{if}\mspace{14mu} x} \geq y} \\ 0 & {{{if}\mspace{14mu} x} < y} \end{matrix} \right.}} & \left\lbrack {{Equation}\mspace{14mu} 4} \right\rbrack \end{matrix}$

In Equation 4, {s_(i)}_(i=0) ^(M′−1) (1≦s_(i)≦N+1,s_(i)<s_(i+1)) denotes M′(=2M) sorted RBG indices, and

$\quad\begin{pmatrix} x \\ y \end{pmatrix}$ is denoted by

$\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1} = {\frac{x!}{{\left( {x - y} \right)!}{y!}}.}$

In another scheme, when N+1 RBG indices (i.e., RBG indices 0 to N) are defined, a combinatorial index r for signaling resource allocation of M RBG clusters may be expressed by the following equation 5.

$\begin{matrix} {{r = {\sum\limits_{i = 0}^{M^{\prime} - 1}\;\left\langle \begin{matrix} {N - s_{i}} \\ {M^{\prime} - i} \end{matrix} \right\rangle}},{\left\langle \begin{matrix} x \\ y \end{matrix} \right\rangle = \left\{ \begin{matrix} \begin{pmatrix} x \\ y \end{pmatrix} & {{{if}\mspace{14mu} x} \geq y} \\ 0 & {{{if}\mspace{14mu} x} < y} \end{matrix} \right.}} & \left\lbrack {{Equation}\mspace{14mu} 5} \right\rbrack \end{matrix}$

Here, {s_(i)}_(i=0) ^(M′−1) (0≦s_(i)≦N,s_(i)<s_(i+1)) denotes M′(=2M) sorted RBG indices, and

$\quad\begin{pmatrix} x \\ y \end{pmatrix}$ is denoted by

$\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.$

In Equations 4 and 5, N may be given by the following equation 6. ┌N _(RB) ^(UL) /P┐+1  [Equation 6]

Here, N_(RB) ^(UL) is the number of resource blocks (RBs) of a UL band. P is the number of RBs contained in RBG. ┌ ┐ is a ceiling

Table 5 exemplarily shows the RBG size (P) depending upon a system band.

TABLE 5 System bandwidth RBG size N_(RB) ^(UL) (P) ≦10 1 11-26 2 27-63 3  64-110 4

In addition, {E_(m)+1}={s_(2m-1)} may be interpreted as a start RBG index of a non-allocation RBG region adjacent to a rear portion of the m-th RBG cluster.

Method 1-2) Start-Front/End RBG Indication of RBG Clusters

FIG. 12 shows exemplary resource allocation of Method 1-1.

Referring to FIG. 12, Method 1-2 is based on RBG indexing, {S_(m)−1,E_(m)} (i.e., a start-front RBG index and an end RBG index) is notified to each of M RBG clusters allocated to the UE from among a total of N_(RBG) RBGs. As described above, a combinatorial index (also called a combinatorial index) contained in a DCI format for PUSCH scheduling indicates {s_(i)}_(i=0) ^(M′−1)(M′=2M), and the UE may confirm {S_(m),E_(m)} on the basis of {s_(2m-2),s_(2m-1)}={S_(m)−1,E_(m)}.

In Method 1-2, it is possible to define one additional virtual RBG at the front side of (i.e., at a lower RBG index side) of the first RBG index as shown in FIG. 12 so as to allow the end RBG of the RBG cluster to be allocated to the end RBG index. In case of virtual RBG, it is impossible to perform actual resource allocation, or the virtual RBG may be used only for indexing as necessary.

In Method 1-2, 2M (=M′) indices for allocation of M RBG clusters may be encoded into different bits or may be encoded into different bits of individual clusters, or all indices of all clusters may be joint-encoded together in order to reduce the number of bits required for resource allocation. In addition, as described above, only a non-overlapping index combination may be selected and signaled from among the 2M (=M′) indices for discriminating M RBG clusters. For the sake of convenience, when it is assumed that N=N_(RBG), the total number of RBG indices includes the virtual RBG such that the total number of RBG indices is N+1 and therefore the number of bits required for resource allocation in Method 1-1 is ceiling(log₂(_(N+1)C_(2M))).

More specifically, when N+1 RBG indices (i.e., RBG indices 1 to N+1) are defined in Method 1-2, a combinatorial index (r) for signaling resource allocation of M RBG clusters may be represented by the following equation 4. In addition, when N+1 RGB indices (i.e., RBG indices 1 to N+1) are defined in Method 1-2, a combinatorial index (r) for signaling resource allocation of M RBG clusters can be represented by Equation 5.

In Method 1-2, {S_(m)−1}={S_(2m-2)} may be interpreted as the end RBG index of a non-allocation RBG region adjacent to a front portion of the m-th RBG cluster.

Method 2: Combination of RBG Borders is Indicated by Combinatorial Index

Method 2 relates to a method for allocating a plurality of non-contiguous UL resource sets (e.g., RBG clusters) on the basis of RBG border indexing. For convenience of description, a start RBG border index and an end RBG border index of an RBG cluster allocated to a UE are denoted by SB and EB, respectively. The start RBG border index and the end RBG border index of the m-th RBG set are denoted by SB_(m), and EB_(m), respectively. For convenience of description, a detailed description of Method 2 will focus upon an exemplary case in which two RBG clusters are allocated. In this case, a combinatorial index may be used to indicate {s_(i)}_(i=0) ^(M′−1)(M′=4).

FIGS. 13A and 13B exemplarily show resource allocation based on Method 2.

Referring to FIGS. 13A and 13B, Method 2 is based on RBG indexing, {SB_(m),EB_(m)} (i.e., a start RBG border index and an end RBG border index) is notified to each of M RBG clusters allocated to the UE from among a total of N_(RBG) RBGs. As described above, a combinatorial index (also called a combinatorial index) contained in a DCI format for PUSCH scheduling indicates {s_(i)}_(i=0) ^(M′−1)(M′=2M), and the UE may confirm {SB_(m),EB_(m)} on the basis of {s_(2m-2),s_(2m-1)}={SB_(m),EB_(m)}.

In Method 2, 2M (=M′) indices for allocation of M RBG clusters may be encoded into different bits or may be encoded into different bits of individual clusters, or all indices of all clusters may be joint-encoded together in order to reduce the number of bits required for resource allocation. In addition, as described above, only a non-overlapping index combination may be selected and signaled from among the 2M (=M′) indices for discriminating M RBG clusters. For the sake of convenience, when it is assumed that N=N_(RBG), a total number of RBG indices is N+1 and therefore the number of bits required for resource allocation in Method 2 is ceiling(log₂(_(N+1)C_(2m))).

More specifically, when N+1 RBG indices (i.e., RBG indices 1 to N+1) are defined in Method 2, a combinatorial index (r) for signaling resource allocation of M RBG clusters may be represented by the following equation 7.

$\begin{matrix} {{r = {\sum\limits_{i = 0}^{M^{\prime} - 1}\;\left\langle \begin{matrix} {\left( {N + 1} \right) - s_{i}} \\ {M^{\prime} - i} \end{matrix} \right\rangle}},{\left\langle \begin{matrix} x \\ y \end{matrix} \right\rangle = \left\{ \begin{matrix} \begin{pmatrix} x \\ y \end{pmatrix} & {{{if}\mspace{14mu} x} \geq y} \\ 0 & {{{if}\mspace{14mu} x} < y} \end{matrix} \right.}} & \left\lbrack {{Equation}\mspace{14mu} 7} \right\rbrack \end{matrix}$

In Equation 7, {s_(i)}_(i=0) ^(M′−1) (1≦s_(i)≦N+1,s_(i)<s_(i+1)) denotes M′(=^(2M)) sorted RBG indices, and

$\quad\begin{pmatrix} x \\ y \end{pmatrix}$ is denoted by

$\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.$

In another scheme, when N+1 RBG indices (i.e., RBG indices 0 to N) are defined, a combinatorial index r for signaling resource allocation of M RBG clusters may be expressed by the following equation 8.

$\begin{matrix} {{r = {\sum\limits_{i = 0}^{M^{\prime} - 1}\;\left\langle \begin{matrix} {N - s_{i}} \\ {M^{\prime} - i} \end{matrix} \right\rangle}},{\left\langle \begin{matrix} x \\ y \end{matrix} \right\rangle = \left\{ \begin{matrix} \begin{pmatrix} x \\ y \end{pmatrix} & {{{if}\mspace{14mu} x} \geq y} \\ 0 & {{{if}\mspace{14mu} x} < y} \end{matrix} \right.}} & \left\lbrack {{Equation}\mspace{14mu} 8} \right\rbrack \end{matrix}$

Here, {s_(i)}_(i=0) ^(M′−1) (0≦s_(i)≦N,s_(i)<s_(i+1)) denotes M′(=2M) sorted RBG indices, and

$\quad\begin{pmatrix} x \\ y \end{pmatrix}$ is denoted by

$\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.$

While Method 2 is designed to use RBG border indexing instead of RBG indexing, Method 2 need not define additional virtual RBG shown in Method 1.

FIG. 14 is a flowchart illustrating UL signal transmission according to an embodiment of the present invention.

Referring to FIG. 14, the UE receives resource allocation information including a combinatorial index from a network node (e.g., a BS or a relay) in step S1402. A field for resource allocation information is contained in DCI and may be received through a downlink control channel (e.g., PDCCH).

If a PDCCH having a DCI format for PUSCH scheduling is detected at a subframe (n), the UE performs PUSCH transmission on the basis of PUCCH information at a subframe (n+4). For this purpose, the UE analyzes resource allocation information. In more detail, the UE obtains {s_(i)}_(i=0) ^(M′−1) corresponding to a combinatorial index in step S1404, and confirms a resource set corresponding to {s_(i)}_(i=0) ^(M′−1). Therefore, the UE maps an uplink signal to a plurality of contiguous resource sets (e.g., RBG clusters) corresponding to {s_(i)}_(i=0) ^(M′−1) in step S1406. FIG. 14 shows the relationship between {s_(i)}_(i=0) ^(M′−1) of Methods 1-1, 1-2, and 2 and a resource set on the assumption that two RBG clusters are assigned. The UL signal includes uplink shared channel (UL-SCH) data and/or control information. Finally, the UE performs UL transmission using the resource set allocated from the network node (e.g., BS or relay) in step S1408. UL transmission may be carried out through a PUSCH.

FIG. 15 shows exemplary interpretation of resource allocation information according to an embodiment of the present invention. In FIG. 15, it is assumed that the number of RBGs is 0 and two resource sets (e.g., RBG clusters) are allocated. Each resource set is composed of contiguous resources (e.g., RBGs).

Referring to FIG. 15, if a combinatorial index (r) contained in resource allocation information indicates 117, r is denoted by r=70+35+10+2=117 so that {s₀,s₁,s₂,s₃}={2,3,5,8}_(RBG) is achieved. In Method 1-1, since {S_(m),E_(m)}={s_(2m-2),s_(2m-1)−1} is given, {S₁,E₁}={s₀,s₁−1}={2,2}_(RBG) and {S₂,E₂}={s₂,s₃−1}={5,7}_(RBG) can be achieved. Therefore, RBG #2 and RBGs #5˜#7 may be used to transmit UL signals.

Although not shown in FIG. 14, Method 1-2 and Method 2 can also use UL signals as follows.

     Method  1-2:  {S_(m), E_(m)} = {s_(2 m − 2) + 1, s_(2 m − 1)} =  > {S₁, E₁} = {s₀ + 1, s₁} = {3, 3}_(RBG){S₂, E₂} = {s₂ + 1, s₃} = {6, 8}_(RBG) =  > RBG  #3  and  RBG  #6 ∼ 8  may  be  used  to  transmit  UL  signals.Method  2:  {SB_(m), EB_(m)} = {s_(2 m − 2), s_(2 m − 1)} =  > {S_(m), E_(m)} = {s_(2 m − 2) + 1, s_(2 m − 1)} =  > {S − 1, E − 1} = {s₀ + 1, s₁} = {3, 3}_(RBG){S₂, E₂} = {s₂ + 1, s₃} = {6, 8}_(RBG) =  > RBG  #3  and  RBG  #6 ∼ 8  may  be  used  to  transmit  UL  signals.

The above-mentioned description has been disclosed centering on non-contiguous UL resource allocation. The LTE-A system can support not only contiguous UL resource allocation (also referred to as UL RA Type 0) and non-contiguous UL resource allocation (also referred to as UL RA Type 1). The two resource allocation schemes can be signaled through the same DCI format. In this case, the actually applied resource allocation type can be discriminated using flag bits. For example, as shown in DL RA Types 0/1, a 1-bit flag (also referred to as an RA type bit) is assigned to a DCI format for PUSCH scheduling, so that UL RA Type 0 and UL RA Type 1 can be selectively signaled.

Meanwhile, the RBG size P (i.e., (maximum) P RBs per RBG) for DL RA in the legacy LTE has been defined in Table 5 according to the BW size (e.g., the number N_(RB) ^(DL) of DL RBs in DL RW). In addition, DCI format 0 for UL scheduling for use in LTE supports RIV (Resource Indication Value)-based RA Type 2. The number of bits contained in the RA field is ┌ log₂(N_(RB) ^(UL)(N_(RB) ^(UL)+1)/2)┐ (excluding an 1-bit frequency hopping (FH) flag). N_(RB) ^(UL) is the number of DL RBs in DL RW. Legacy DCI format 0 based on the RBG size defined in the legacy LTE is applied to LTE-A without any change

LTE-A uses UL non-contiguous RA in which the LTE-A uses the legacy DCI format 0 without changing the RA field size on the basis of the RBG size defined in the legacy LTE so that it can allocate two RBG clusters. For this purpose, the LTE-A can use a total of O_(DCI0)=┌ log₂(N_(RB) ^(UL)(N_(RB) ^(UL)+1) 2)┐+1 bits including the 1-bit FH flag (that is, FH is not performed in non-contiguous RA) as the RA field. In this case, when using Method 1 and Method 2 for UL non-contiguous RA, a total of O_(cluster)=┌ log₂(_(N+1)C₄)┐ bits is needed (N=┌N_(RB) ^(UL)/P┐). Therefore, O_(cluster)≦O_(DCI0) must be satisfied to implement UL non-contiguous RA using the legacy DCI format 0 without change.

FIG. 18 shows not only the RBG size P for each BW in LTE calculated on the basis of Table 5, but also the number N of RBGs. In FIG. 18, shaded parts (BWs: 7, 9˜10, 55˜63, 85˜90, and 101˜110 RBs) shown in FIG. 18 may indicate BWs not satisfying O_(cluster)≦O_(DCI0).

The following description proposes a method for satisfying the above condition O_(cluster)≦O_(DCI0) to support UL non-contiguous RA based on Methods 1 and 2. One case in which the legacy DCI format 0 is used will be first described and another case in which a DCI format (for convenience of description, referred to as DCI format X) for UL MIMO is used will then be described.

UL Non-Contiguous RA Using DCI Format 0

The following methods Alt 0) to Alt 5) can be considered to satisfy the above-mentioned condition (O_(cluster)≦O_(DCI0)).

Alt 0) This method supports non-contiguous RA only to a BW satisfying O_(cluster)≦O_(DCI0).

Alt 1) Some parts of the RBG size for each BW defined in legacy LTE is changed.

Alt 2) RBG size per BW defined in the legacy LTE is used without change, and a BW to which RA is applied is separately defined.

Alt 3) RBG or RB range for RA application is indicated through RRC signaling.

Alt 4) RA field is extended by borrowing/adding a specific bit in DCI format 0.

Alt 5) New RA field of DCI format 0 is defined for LTE-A.

Detailed description of the above-mentioned Alt 1) to Alt 5) methods is as follows.

Alt 0) This method supports non-contiguous RA only to BW satisfying O_(cluster)≦O_(DCI0)

In order to support a non-contiguous RA only using the RA field composed of O_(DCI0) bits in a BW satisfying O_(cluster)>O_(DCI0), the number of RBGs per BW defined in the legacy LTE, the application range of RBGs, and/or the RBG size may be unavoidably adjusted. For example, the number of RBGs and the application may be reduced or the RBG size may be extended. As a result, scheduling flexibility and granularity may be deteriorated. Therefore, in association with the BW satisfying O_(cluster)≦O_(DCI0), contiguous RA based on the legacy Rel-8 RIV scheme and non-contiguous RA based on Methods 1 and 2 are simultaneously supported. In association with a BW satisfying O_(cluster)>O_(DCI0), a method for supporting only the contiguous RA may be considered. Provided that the RA type bit indicates the non-contiguous RA scheme at the BW of O_(cluster)>O_(DCI0), the UE may determine the occurrence of errors and may drop UL transmission.

Alt 1) Some parts of RBG size for each BW defined in the legacy Rel-8 are changed.

First, when considering RA application for N RBGs, the per-BW UL RBG size may be changed as shown in Table 7 (N=┌N_(RB) ^(UL)/P┐, O_(cluster)=┌ log₂(_(N+1)C₄)┐)

TABLE 7 System bandwidth UL RBG size N_(RB) ^(UL) (P) ≦10 undefined 11-26 2 27-54 3 55-84 4  85-110 5

When considering RA application to (N−1) UL RBGs contained in BW, the UL RBG size for each BW may be changed as shown in Table 8 (N=┌N_(RB) ^(UL)/P┐, O_(cluster)=┌ log₂(_(N)C₄)┐). In this case, one RBG excluded from an RA object may be an RBG having the first or last RBG index. Since the number of RBs contained in the last RBG may be equal to or less than P, RBG having the last RBG index may be excluded.

TABLE 8 Sydtem bandwidth UL RBG size N_(RB) ^(UL) (P) ≦9 1 10-26 2 27-57 3 58-88 4  89-110 5

When considering RA application to (N−2) UL RBGs contained in BW, the UL RBG size for each BW may be changed as shown in Table 9 (N=┌N_(RB) ^(UL)/P┐, O_(cluster)=┌ log₂(_(N−1)C₄)┐). In this case, two RBGs excluded from an RA object may be an RBG having the first or last RBG index. PUCCH transmission is hopped to the opposite side of the frequency band on the basis of a slot, RBGs excluded from both ends of the frequency band may be utilized for PUCCH signal transmission.

TABLE 9 System bandwidth UL RBG size N_(RB) ^(UL) (P) ≦10 1 11-26 2 27-60 3  61-108 4 109-110 5

Alt 2) RBG size for each BW defined in legacy Rel-8 is applied without change, and BW to which RA is applied is independently defined.

In Alt 2), RBG indexing based on Table 5 is applied, and a BW (simply, BW for RA (BW_(RA))) to which RA is applied can be independently defined. For example, BW_(RA) can be defined using the number N_(RBG) ^(UL,ex) of RBGs excluded from the actual BW. That is, RA can be applied only to an RA-purposed BW (i.e., a total of N−N_(RBG) ^(UL,ex) RBGs) (N=┌N_(RB) ^(UL)/P┐, O_(cluster)=log₂(_(N−N) _(RBG) _(UL,ex) ₊₁C₄)┐).

In case of N_(RBG) ^(UL,ex)=1, one RBG to be excluded may be an RBG having the last RBG index. In case of N_(RBG) ^(UL,ex)f=2, two RBGs to be excluded may include an RBG having a first RBG index and an RBG having a last RBG index. As a result, PUCCH resource efficiency can be increased considering that PUCCH transmission is hopped to the opposite side of a frequency band on the basis of a slot. In case of N_(RBG) ^(UL,ex)=3, three RBGs to be excluded may be an RBG having a first RBG index, an RBG having the last RBG index, and an RBG having an index (i.e., the last RBG index—1) contiguous to the last RBG index.

Table 10 exemplarily shows N_(RBG) ^(UL,ex) changing with BW.

TABLE 10 Number of System bandwidth excluded UL RBGs N_(RB) ^(UL) (N_(RBG) ^(ex)) 6, 8, 11-54, 0 64-84,91-100 7, 9, 55-57, 1 85-88, 101-104 10, 58-60, 2 89-90, 105-108 61-63, 3 109-110

For BW_(RA) definition, the number N_(RB) ^(UL,ex) of UL RBs actually excluded from BW can be defined as shown in Table 11. In this case, RBG indexing based on Table 5 is performed only for BW_(RA) (a total of N_(RB) ^(UL)−N_(RB) ^(UL,ex) RBs) and RA can be applied to BW_(RA) (N=┌(N_(RB) ^(UL)−N_(RB) ^(UL,ex))/P┐, O_(cluster)=┌ log₂(_(N+1)C₄)┐). Here, in case of N_(RB) ^(UL,ex)=2a−1 (where a is a positive integer), RBs to be excluded may be an RB corresponding to the first (a−1) RB indices and an RB corresponding to the last a RB indices. In case of N_(RB) ^(UL,ex)=2a, RBs to be excluded may be an RB corresponding to the first a RB indices and an RB corresponding to the last a RB indices.

TABLE 11 Number of UL RBs System bandwidth to be excluded N_(RB) ^(UL) (N_(RB) ^(UL, ex)) 6, 8, 11-54, 0 64-84, 91-100 7, 9, 55, 85, 101 1 10, 56, 86, 102 2 57, 87, 103 3 58, 88, 104 4 59, 89, 105 5 60, 90, 106 6 61, 107 7 62, 108 8 63, 109 9 110 10

Alt 3) Method Alt-3 indicates RBG or RB range applied to RA through RRC signaling

Method Alt-3 can indicate a UL RBG range (simply, RA-purposed UL RBG range, RBG_(RA) range) through RRC signaling. In this case, RBG indexing based on Table 5 can be applied only to corresponding RBGs (i.e., a plurality of RBG_(RA)s), and RA can be applied only to the corresponding RBG range. In order to indicate the RBG_(RA) range, the start RBG index and/or the last RBG index of the corresponding range, or the start RBG index and the number of contiguous RBGs can be indicated.

In another example, it is impossible to indicate the RA-purposed RB range (simply, RA-purposed RB range or RB_(RA) range) through RRC signaling. In this case, indexing based on Table 5 can be applied only to the corresponding RBs (i.e., a plurality of RB_(RA)s), and RA can be applied only to the corresponding RB range. In order to indicate the RB_(RA) range, the start RB index and/or the last RB index of the corresponding range, or the start RB index and the number of contiguous RBs can be indicated.

Alt 4) Method Alt-4 extends the RA field by borrowing/adding a specific bit contained in DCI format 0

A specific bit in DCI format 0 is borrowed so that the specific bit can be incorporated in the RA field in case of non-contiguous RA. For example, in case of non-contiguous RA, one bit of a CQI request field contained in DCI format 0 may be used/interpreted as a part of the RA field. The CQI request field is composed of 1 bit, and thus the CQI request function is disabled in case of non-contiguous RA. That is, in case of non-contiguous RA application, the base station cannot indicate the CQI request. In another example, in case of non-contiguous RA, one bit from among the 3-bit field indicating a DMRS CS (DeModulation Reference Signal Cyclic Shift) may be incorporated in the RA field. That is, in case of non-contiguous RA application, 2 bits from among 3 bits contained in the DMRS CS field may be used to indicate a DMRS CS in accordance with its original usage, and one bit from among the 3 bits may be used/interpreted as a part of the RA field.

Table 12 exemplarily shows the RBG size for each BW according to the present invention. Table 12 exemplarily shows that one bit is borrowed from another field so as to extend the size of RA field.

TABLE 12 System bandwidth UL RBG size N_(RB) ^(UL) (P) ≦9 1 10-26 2 27-63 3  64-110 4

In addition to periodic SRS (Sounding Reference Signal) in the legacy, the LTE-A considers dynamically or aperiodically transmitting SRS so as to perform UL MIMO transmission and burst traffic processing. For this end, the dynamic/aperiodic SRS transmission can be triggered through a PDCCH. In this case, one bit for SRS trigger may also be added to a DCI format. In this case, one bit for SRS trigger may be borrowed and merged into the RA field of the non-contiguous RA. Therefore, in case of non-contiguous RA application, the SRS trigger function is automatically disabled, and the BS and the UE can use/interpret the corresponding one bit as a part of the RA field (i.e., the eNB cannot indicate SRS trigger during the non-contiguous RA).

Meanwhile, in case of non-contiguous RA, it may be configured whether a specific bit (e.g., 1 bit of the CQI request field, 1 bit of the DMRS CS field, and 1 bit of the SRS trigger field) is to be used as the RA field or to be used as an original function through RRC signaling. In addition, the specific bit is not borrowed (i.e., the function of the corresponding bit is not disabled), and one bit may be added to a DCI format 0 so as to extend the RA field. In this case, in order to prevent additional blind decoding (BD) from increasing in the common search space, a method for adding one bit to the RA field of the DCI format 0 may be limited to a UE-specific search space.

More specifically, Method Alt-4 can be applied only to the shaded parts (BW of O_(cluster)>O_(DCI0)) (BWs: 7, 9˜10, 55˜63, 85˜90, 101˜110 RBs) shown in FIG. 18.

Alt 5) New RA field of DCI format 0 for LTE-A is defined.

The legacy RIV-based RA type 2 and Methods 1 and 2 can be applied on the basis of the RBG size for each BW defined in the legacy LTE without any other processing, such that a total number O_(DCI0) (except for 1-bit FH flag) of bits contained in the RA field for DCI format 0 for use in the LTE-A can be newly defined as shown in the following equation 9. O _(DCI0)=Max(┌ log₂(_(N+1) C ₄)┐−1,┌ log₂(N _(RB) ^(UL)(N _(RB) ^(UL)+1)/2)┐)N=┌N _(RB) ^(UL) /P┌  [Equation 9]

Here, O_(DCI0) is the number of bits of the RA field for RBG allocation. N is the number of UL RBGs. N_(RB) ^(UL) is the number of UL RBs. P is the size of UL RBG. The UL RBG size may be denoted by Table 5 according to a BW. ┌ ┐ is a ceiling function. Max(x, y) is the higher one of x and y. _(x)C_(y) is a number of cases for selecting y number of parts from among x number of parts, and is denoted by

${{}_{}^{}{}_{}^{}} = {\begin{pmatrix} x \\ y \end{pmatrix} = {\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.}}$

If N shown in Equation 9 is replaced with ┌N_(RB) ^(UL)/P┐, the replaced result can be represented by the following equation 10.

                                     [Equation  10] $\begin{matrix} {O_{{DCI}\; 0} = {{Max}\left( {{\left\lceil {\log_{2}\left( \begin{pmatrix} {\left\lceil {N_{RB}^{UL}/P} \right\rceil + 1} \\ 4 \end{pmatrix} \right)} \right\rceil - 1},\left\lceil {\log_{2}\left( {{N_{RB}^{UL}\left( {N_{RB}^{UL} + 1} \right)}/2} \right)} \right\rceil} \right)}} \\ {= {{Max}\left( {{\left\lceil {\log_{2}\left( \begin{pmatrix} {\left\lceil {N_{RB}^{UL}/P} \right\rceil + 1} \\ 4 \end{pmatrix} \right)} \right\rceil - 1},\left\lceil {\log_{2}\left( {{N_{RB}^{UL}\left( {N_{RB}^{UL} + 1} \right)}/2} \right)} \right\rceil} \right)}} \end{matrix}$

In this case, in order to prevent additional blind decoding (BD) from increasing in the common search space, a method for adding one bit to the RA field of DCI format 0 may be limited to a UE-specific search space. Therefore, in case of using the RA field for LTE-A DCI format 0 in a common search space, after the RA field is allocated in the same manner as in the RA field size of the legacy DCI format 0, Methods Alt-1 to Alt-4 may be used or a method for preventing non-contiguous RA from being supported to all BWs may be considered.

Preferably, in case of a BW composed of 10 RBs or less, the number of RBs is small in number, such that non-contiguous RA may not be used. As a result, Methods Alt-0 to Alt-5 may not be applied to the BW composed of 10 RBs or less.

A method for arranging RA information bits in the RA field of DCI format 0 will hereinafter be described in detail. For explanation, it is assumed that the number of bits contained in the RA field (including 1-bit FH flag) of DCI format 0 to which Methods Alt-0 to Alt-5 are applied is denoted by N₁, and the number of bits contained in non-contiguous RA is denoted by M₁. If M₁<N₁ is given under non-contiguous RA, the following methods can be used to arrange M₁ bits in the RA field. For convenience of description, the order of RA-field constructing bits starting from the 1-bit FH flag is denoted by b₁, b₂, . . . , b_(N) ₁ (i.e., b₁ is an FH flag).

1) M₁ bits (i.e., b₁, . . . , b_(M1)) are allocated to MSB part

2) M₁ bits (i.e., b₂, . . . , b_(M1+1)) are allocated to MSB part other than FH flag.

3) M₁ bits (i.e., b_(N) ₁ _(−M) ₁ ₊₁, . . . , b_(N) ₁ ) are allocated to LSB part.

In this case, the remaining (N₁−M₁) bits not corresponding to M₁ bits allocated through Methods 1), 2) and 3) are set to predetermined values (specifically, all bits are set to ‘0’), such that the virtual CRC for error detection can be used as necessary.

It is assumed that the number of bits constructing the RA field (excluding 1-bit FH flag) of DCI format 0 to which Methods Alt-0 to Alt-5 are applied is denoted by N₂, and the number of bits contained in the contiguous RA is denoted by M₂. If M₂<N₂ is given under contiguous RA application, the following methods can be used to arrange M₂ bits in the RA field composed of N₂ bits. For convenience of description, the order of RA field construction bits (excluding 1-bit FH flag) is denoted by b₁, b₂, . . . , b_(N) ₂ .

1) M₂ bits (i.e., b₁, . . . , b_(M) ₂ ) are allocated to MSB part

2) M₂ bits (i.e., b_(N) ₂ _(−M) ₂ ₊₁, . . . , b_(N) ₂ ) are allocated to LSB part.

In this case, the remaining (N₂−M₂) bits not corresponding to M₂ bits allocated through Methods 1) and 2) are set to predetermined values (specifically, all bits are set to ‘0’), such that the virtual CRC for error detection can be used as necessary.

UL Non-Contiguous RA Using DCI Format X

LTE-A can support uplink MIMO transmission differently from the legacy LTE, and a DCI format (i.e., DCI format X) for UL MIMO scheduling may be newly defined. In addition, non-contiguous RA can be supported in UL MIMO transmission, and the RA field can be defined in the DCI format X. For reference, frequency hopping is not supported in UL MIMO, such that 1-bit FH flag is not defined.

Therefore, when applying non-contiguous RA using the DCI format X, the RA field size of a DCI format X is allocated (O_(DCIX)=O_(DCI0)=┌ log₂(N_(RB) ^(UL)(N_(RB) ^(UL)+1)/2)┐+1) in the same manner as in the RA field size of the legacy DCI format 0 (including 1-bit FH flag), Methods Alt-0 to Alt-4 may be used.

In another method, RA of RA types 0 and 1 can be used on the basis of the per-BW RBG size defined in the legacy LTE without any other processing, such that a total number O_(DCIX) of bits contained in the RA field can be newly defined by the following equation 11 (Method Alt-5). O _(DCIX)=Max(┌ log₂(_(N+1) C ₄)┐,┌ log₂(N _(RB) ^(UL)(N _(RB) ^(UL)+1)/2┐)N=┌N _(RB) ^(UL) /P┐  [Equation 11]

In Equation 11, O_(DCIX) is the number of the RA field for RBG allocation. N is the number of UL RBGs. N_(RB) ^(UL) is the number of UL RBs. P is a UL RBG size. The UL RBG size may be represented by Table 5 according to UL BW. ┌ ┐ is a ceiling function. Max(x, y) is the higher one of x and y. _(x)C_(y) is a number of cases for selecting y number of parts from among x number of parts, and is denoted by

${{}_{}^{}{}_{}^{}} = {\begin{pmatrix} x \\ y \end{pmatrix} = {\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.}}$

If N shown in Equation 11 is replaced with ┐N_(RB) ^(UL)/P┐, the replaced result can be represented by the following equation 12.

                                     [Equation  12] $\begin{matrix} {O_{DCIX} = {{Max}\left( {\left\lceil {\log_{2}\left( \begin{pmatrix} {\left\lceil {N_{RB}^{UL}/P} \right\rceil + 1} \\ 4 \end{pmatrix} \right)} \right\rceil,\left\lceil {\log_{2}\left( {{N_{RB}^{UL}\left( {N_{RB}^{UL} + 1} \right)}/2} \right)} \right\rceil} \right)}} \\ {= {{Max}\left( {\left\lceil {\log_{2}\left( \begin{pmatrix} {\left\lceil {N_{RB}^{UL}/P} \right\rceil + 1} \\ 4 \end{pmatrix} \right)} \right\rceil,\left\lceil {\log_{2}\left( {{N_{RB}^{UL}\left( {N_{RB}^{UL} + 1} \right)}/2} \right)} \right\rceil} \right)}} \end{matrix}$

In case of DCI format X for UL MIMO, blind decoding (BD) can be performed independently from other DCI formats. Therefore, adding one bit to the RA field in Method Alt-4 and Equation 10 based on Method Alt-5 can be commonly used without distinction between the common search space and the UE-specific search space.

In the meantime, assuming that the number of bits constructing the RA field of DCI format X to which Methods Alt-0 to Alt-5 are applied is denoted by L, and the number of bits needed for the actual RA is denoted by K (irrespective of RA type), the following method may be used as a method for arranging K bits to the RA field in case of K<L. The size of RA field may be different from the size of RA information in the following cases. For better understanding of the present invention, the following description will focus upon Method Alt-5. In Method Alt-5, the size of RA field in the configured UL BW is determined to be a higher one of the size of RA information of RA type 0 and the information size of RA type 1. Therefore, if the RA field size is given on the basis of RA type 0 and the RA type bit indicates RA type 1, the size of RA information may be smaller than the size of RA field. On the other hand, assuming that the size of RA field is given on the basis of RA type 1 and the RA type bit indicates RA type 0, the RA information size may be smaller than the RA field size.

For convenience of description, the order of RA-field constructing bits is denoted by b₁, b₂, . . . , b_(L).

1) K bits (i.e., b₁, . . . , b_(K)) are allocated to MSB part.

2) K bits (i.e., b_(L-K+1), . . . , b_(L)) are allocated to LSB part.

In this case, the remaining (L−K) bits not corresponding to K bits allocated through Methods 1) and 2) are set to predetermined values (specifically, all bits are set to ‘0’), such that the virtual CRC for error detection can be used as necessary.

FIG. 16 is a flowchart illustrating an uplink transmission procedure according to an embodiment of the present invention. For convenience of description, it is assumed that Method Alt-5 is used.

Referring to FIG. 16, a base station (BS) broadcasts system information to a user equipment (UE) in step S1602. The system information may include BW information. System bandwidth information may include information of an uplink BW. UL BW may be given using the number N of UL RBs. Thereafter, the BS transmits a PDCCH signal for UL scheduling to the UE in step S1604. PDCCH signal includes a DCI format for UL scheduling. In a single antenna (port) transmission mode, the PDCCH signal includes a DCI format 0. In case of multiple antennas (multiple ports) transmission (also called a MIMO transmission) mode, the PDCCH signal includes DCI format X. DCI format 0/X may include a resource assignment (RA) type bit and a resource assignment (RA) field. The RA type bit may be used to indicate RA Type 0 or 1, and may be composed of 1 bit. The RA field may be used for UL RBG allocation. The RA field size may be denoted by Equations 9 to 12 (for example,

${{Max}\left( {\left\lceil {\log_{2}\left( \begin{pmatrix} \left\lceil {{N_{RB}^{UL}/P} + 1} \right\rceil \\ 4 \end{pmatrix} \right)} \right\rceil,\left\lceil {\log_{2}\left( {{N_{RB}^{UL}\left( {N_{RB}^{UL} + 1} \right)}/2} \right)} \right\rceil} \right)}.$ After the UE interprets the RA type bit and the RA field of the PDCCH signal, resources for PUSCH transmission are allocated in step S1604. In case of RA type 0, resources for PUSCH transmission may be composed of one or more contiguous RBs according to an RIV value of the RA field. In contrast, in case of RA type 1, a resource of PUSCH transmission may be composed of two non-contiguous clusters according to a combinatorial index of the RA field (See FIGS. 11 to 15). Each cluster is composed of one or more contiguous RBGs. Thereafter, the UE transmits a PUCCH signal to the base station (BS) using the allocated resources in step S1606.

FIG. 17 is a block diagram illustrating a base station (BS) and a user equipment (UE) applicable to embodiments of the present invention. A BS-UE block diagram shown in FIG. 17 may be replaced with a BS-RN block diagram or an RN-UE block diagram.

Referring to FIG. 17, the wireless communication system includes a base station (BS) 110 (also denoted by ‘ eNB’) and a UE 120. The BS 110 includes a processor 112, a memory 114, and a radio frequency (RF) unit 116. The processor 112 may be constructed to implement the procedures and/or methods disclosed in the embodiments of the present invention. The memory 114 may be connected to a processor 112, and store various information related to operations of the processor 112. The RF unit 116 is connected to the processor 112, and transmits and/or receives RF signals. The UE 120 includes a processor 122, a memory 124, and an RF unit 126. The processor 122 may be constructed to implement the procedures and/or methods disclosed in the embodiments of the present invention. The memory 124 may be connected to a processor 122, and store various information related to operations of the processor 122. The RF unit 126 is connected to the processor 122, and transmits and/or receives RF signals. The BS 110 and/or the UE 120 may include a single antenna or multiple antennas.

The aforementioned embodiments are achieved by combination of structural elements and features of the present invention in a predetermined fashion. Each of the structural elements or features should be considered selectively unless specified otherwise. Each of the structural elements or features may be carried out without being combined with other structural elements or features. Also, some structural elements and/or features may be combined with one another to constitute the embodiments of the present invention. The order of operations described in the embodiments of the present invention may be changed. Some structural elements or features of one embodiment may be included in another embodiment, or may be replaced with corresponding structural elements or features of another embodiment. Moreover, it will be apparent that some claims referring to specific claims may be combined with other claims referring to the other claims other than the specific claims to constitute the embodiment or add new claims by means of amendment after the application is filed.

The embodiments of the present invention have been described based on data transmission and reception between a BS (or eNB) and a UE. A specific operation which has been described as being performed by the eNB (or BS) may be performed by an upper node of the BS (or eNB) as the case may be. In other words, it will be apparent that various operations performed for communication with the UE in the network which includes a plurality of network nodes along with the BS (or eNB) can be performed by the BS or network nodes other than the BS (or eNB). The BS may be replaced with terms such as fixed station, Node B, eNode B (eNB), and access point. Also, the term UE may be replaced with terms such as mobile station (MS) and mobile subscriber station (MSS).

The embodiments according to the present invention can be implemented by various means, for example, hardware, firmware, software, or combinations thereof. If the embodiment according to the present invention is implemented by hardware, the embodiment of the present invention can be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, microcontrollers, microprocessors, etc.

If the embodiment according to the present invention is implemented by firmware or software, the embodiment of the present invention may be implemented by a module, a procedure, or a function, which performs functions or operations as described above. Software code may be stored in a memory unit and then may be driven by a processor. The memory unit may be located inside or outside the processor to transmit and receive data to and from the processor through various well known means.

It will be apparent to those skilled in the art that the present invention can be embodied in other specific forms without departing from the spirit and essential characteristics of the invention. Thus, the above embodiments are to be considered in all respects as illustrative and not restrictive. The scope of the invention should be determined by reasonable interpretation of the appended claims and all change which comes within the equivalent scope of the invention are included in the scope of the invention.

Exemplary embodiments of the present invention can be applied to wireless communication systems such as a UE, a relay node (RN), and a BS (or eNB). 

What is claimed is:
 1. A method for receiving an uplink signal by a device in a wireless communication system, the method comprising: transmitting a control channel signal including a resource allocation (RA) field so as to signal resource allocation for the uplink signal; and receiving the uplink signal according to the control channel signal, wherein a size of the RA field is represented by the following expression: MAX(RASizeA,RASizeB), wherein RASizeA is a first number of bits required for representing a resource indication value (RIV) corresponding to a starting resource block (RB) and a length of contiguously allocated RBs within a given uplink bandwidth, and determined using N_(RB) ^(UL) (N_(RB) ^(UL)+1)/2, wherein RASizeB is a second number of bits required for representing a combinatorial index r corresponding to 4 indexes, and the 4 indexes are used to indicate a start resource block group (RBG) index and an end RBG index of a first RB set and a start RBG index and an end RBG index of a second RB set within the given uplink bandwidth, and determined using $\begin{pmatrix} \left\lceil {{N_{RB}^{UL}/P} + 1} \right\rceil \\ 4 \end{pmatrix},$ and wherein N_(RB) ^(UL) is a number of uplink (UL) RBs, P is a size of UL RB Group (RBG), ┌ ┐ is a ceiling function, MAX(x,y) is a higher one of x and y, and $\begin{pmatrix} x \\ y \end{pmatrix}$ is $\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.$
 2. The method of claim 1, wherein RASizeA is ┌log₂(N_(RB) ^(UL)(N_(RB) ^(UL)+1)/2)┐, and RASizeB is $\left\lceil {\log_{2}\left( \begin{pmatrix} \left\lceil {{N_{RB}^{UL}/P} + 1} \right\rceil \\ 4 \end{pmatrix} \right)} \right\rceil.$
 3. The method of claim 2, wherein a value of P is given by the following table: Size of UL RBG N_(RB) ^(UL) (P) ≦10 1 11-26 2 27-63 3  64-110  4,

where the size of UL RBG is a number of contiguous RBs for a downlink (DL) RA according to a bandwidth (BW) size.
 4. The method of claim 1, wherein the combinatorial index r is given by the following expression: ${r = {\sum\limits_{i = 0}^{M^{\prime} - 1}\;\left\langle \begin{matrix} {N - s_{i}} \\ {M^{\prime} - i} \end{matrix} \right\rangle}},{\left\langle \begin{matrix} x \\ y \end{matrix} \right\rangle = \left\{ {\begin{matrix} \begin{pmatrix} x \\ y \end{pmatrix} & {{{if}\mspace{14mu} x} \geq y} \\ 0 & {{{if}\mspace{14mu} x} < y} \end{matrix},} \right.}$ where M′ is 4, N is (the number of UL RBGs+1), {s_(i)}_(i=0) ^(M′−1) satisfies 1≦s_(i)≦N and s_(i)<s_(i+1), s₀ and s₁−1 indicate the start RBG index and the end RBG index of the first RB set, and s₂ and s₃−1 indicate the start RBG index and the end RBG index of the second RB set.
 5. The method of claim 1, wherein if RASizeA>RASizeB, the combinatorial index r is included in a Least Significant Part (LSB) part of the RA field.
 6. The method of claim 1, wherein the control channel signal is a Physical Downlink Control Channel (PDCCH) signal, and the uplink signal is a Physical Uplink Shared Channel (PUSCH) signal.
 7. The method of claim 1, wherein each of the first and second RB sets include consecutive RBGs, and each of the RBGs has a size P.
 8. A device for use in a wireless communication system, the device comprising: a radio frequency (RF) unit; and a processor, wherein the processor is operatively coupled to the RE unit and configured to: transmit a control channel signal including a resource allocation (RA) field so as to signal resource allocation for the uplink signal, and receive the uplink signal according to the control channel signal, wherein a size of the RA field is represented by the following expression: Max(RASizeA,RASizeB), wherein RASizeA is a first number of bits required for representing a resource indication value (RIV) corresponding to a starting resource block (RB) and a length of contiguously allocated RBs within a given uplink bandwidth, and determined using N_(RB) ^(UL)(N_(RB) ^(UL)+1)/2, wherein RASizeB is a second number of bits required for representing a combinatorial index r corresponding to 4 indexes, and the 4 indexes are used to indicate a start resource block group (RBG) index and an end RBG index of a first RB set and a start RBG index and an end RBG index of a second RB set within the given uplink bandwidth and determined using $\begin{pmatrix} \left\lceil {{N_{RB}^{UL}/P} + 1} \right\rceil \\ 4 \end{pmatrix},$ and wherein N_(RB) ^(UL) is a number of uplink (UL) RBs, P is a size of UL RB Group (RBG), ┌ ┐ is a ceiling function, MAX(x,y) is a higher one of x and y, and $\begin{pmatrix} x \\ y \end{pmatrix}$ is $\frac{{x\left( {x - 1} \right)}\mspace{14mu}\ldots\mspace{14mu}\left( {x - y + 1} \right)}{{y\left( {y - 1} \right)}\mspace{14mu}\ldots\mspace{14mu} 1}.$
 9. The device of claim 8, wherein RASizeA is ┌log₂ (N_(RB) ^(UL) (N_(RB) ^(UL)+1)/2)┐, and RASizeB is $\left\lceil {\log_{2}\left( \begin{pmatrix} \left\lceil {{N_{RB}^{UL}/P} + 1} \right\rceil \\ 4 \end{pmatrix} \right)} \right\rceil.$
 10. The device of claim 9, wherein a value of P is given by the following table: Size of UL RBG N_(RB) ^(UL) (P) ≦10 1 11-26 2 27-63 3  64-110  4,

where the size of UL RBG is a number of contiguous RBs for a downlink (DL) RA according to a bandwidth (BW) size.
 11. The device of claim 8, wherein the combinatorial index r is given by the following expression: ${r = {\sum\limits_{i = 0}^{M^{\prime} - 1}\;\left\langle \begin{matrix} {N - s_{i}} \\ {M^{\prime} - i} \end{matrix} \right\rangle}},{\left\langle \begin{matrix} x \\ y \end{matrix} \right\rangle = \left\{ {\begin{matrix} \begin{pmatrix} x \\ y \end{pmatrix} & {{{if}\mspace{14mu} x} \geq y} \\ 0 & {{{if}\mspace{14mu} x} < y} \end{matrix},} \right.}$ where M′ is 4, N is (the number of UL RBGs+1), {s_(i)}_(i=0) ^(M′−1) satisfies 1≦s_(i)≦N and s_(i)<s_(i+1), s₀ and s₁−1 indicate the start RBG index and the end RBG index of the first RB set, and s₂ and s₃−1 indicate the start RBG index and the end RBG index of the second RB set.
 12. The device of claim 8, wherein if RASizeA>RASizeB, the combinatorial index r is included in a Least Significant Part (LSB) part of the RA field.
 13. The device of claim 8, wherein the control channel signal is a Physical Downlink Control Channel (PDCCH) signal, and the uplink signal is a Physical Uplink Shared Channel (PUSCH) signal.
 14. The device of claim 8, wherein each of the first and second RB sets include consecutive RBGs, and each of the RBGs has a size P. 