Methods for transmission to achieve robust control and feedback performance in a network

ABSTRACT

Aspects of the disclosure relate to methods for wireless communication. A transmitting device transmits a first portion of a control message to a receiving device. The first portion includes information for decoding a second portion of the control message and for decoding data. The transmitting device then transmits the second portion to the receiving device, the second portion including additional information for decoding the data. Thereafter, the first device transmits the data to the receiving device. The receiving device receives the first portion and the second portion, and decodes the received second portion based on the information included in the first portion. The receiving device then receives the data from the second device if the received second portion is able to be decoded. The receiving device decodes the received data based on the information included in the first portion and the additional information included in the second portion.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. Non-Provisional applicationSer. No. 16/671,117 entitled “METHODS FOR TRANSMISSION TO ACHIEVE ROBUSTCONTROL AND FEEDBACK PERFORMANCE IN A NETWORK” filed on Oct. 31, 2019,which claims priority to and the benefit of U.S. Provisional ApplicationSer. No. 62/754,396, entitled “METHODS FOR TRANSMISSION TO ACHIEVEROBUST CONTROL AND FEEDBACK PERFORMANCE IN A VEHICLE-TO-EVERYTHING (V2X)NETWORK” filed on Nov. 1, 2018 and U.S. Provisional Application Ser. No.62/754,491, entitled “CONTROL MESSAGE TO ENHANCE RESOURCE SELECTION”filed on Nov. 1, 2018, the entire contents of which are incorporatedherein by reference as if fully set forth below in their entireties andfor all applicable purposes.

INTRODUCTION

The technology discussed below relates generally to wirelesscommunication systems, and more particularly, to vehicle-to-everything(V2X) communication, vehicle-to-vehicle (V2V), or other device-to-device(D2D) communication.

Wireless communication systems are widely deployed to provide varioustelecommunication services such as telephony, video, data, messaging,and broadcasts. Typical wireless communication systems may employmultiple-access technologies capable of supporting communication withmultiple users by sharing available system resources. Examples of suchmultiple-access technologies include code division multiple access(CDMA) systems, time division multiple access (TDMA) systems, frequencydivision multiple access (FDMA) systems, orthogonal frequency divisionmultiple access (OFDMA) systems, single-carrier frequency divisionmultiple access (SC-FDMA) systems, and time division synchronous codedivision multiple access (TD-SCDMA) systems.

These multiple access technologies have been adopted in varioustelecommunication standards to provide a common protocol that enablesdifferent wireless devices to communicate on a municipal, national,regional, and even global level. An example telecommunication standardis 5G New Radio (NR). 5G NR is part of a continuous mobile broadbandevolution promulgated by Third Generation Partnership Project (3GPP) tomeet new requirements associated with latency, reliability, security,scalability (e.g., with Internet of Things (IoT)), and otherrequirements. 5G NR includes services associated with enhanced mobilebroadband (eMBB), massive machine type communications (mMTC), and ultrareliable low latency communications (URLLC). Some aspects of 5G NR maybe based on the 4G Long Term Evolution (LTE) standard.

Cellular vehicle-to-everything (V2X) is a vehicular communication systemenabling communications between a vehicle and any entity that may affectthe vehicle. V2X may incorporate other more specific types ofcommunication, e.g., vehicle-to-infrastructure (V2I), vehicle-to-vehicle(V2V), vehicle-to-pedestrian (V2P), vehicle-to-device (V2D), andvehicle-to-grid (V2G).

In 3GPP Release 14, LTE-based communication has been defined for adirect interface (e.g., PC5 interface) as well as for a networkinterface (e.g., Uu interface). Currently, V2V communication via the PC5interface is broadcast. However, for later 3GPP releases (e.g. Release16 and beyond), there is a need to establish unicast links betweenvehicles for advanced use cases. A use case for 1-to-1 or 1-to-many V2Vlink scenarios may involve the on-demand sharing of sensor data thatcannot be supported over broadcast. Another use case may involve asee-through camera feed, such as when a first vehicle wishes to see infront of a second vehicle ahead of the first vehicle using the secondvehicle's camera.

As the demand for mobile broadband access continues to increase,research and development continue to advance wireless communicationtechnologies not only to meet the growing demand for mobile broadbandaccess, but to advance and enhance the user experience with mobilecommunications.

BRIEF SUMMARY

The following presents a simplified summary of one or more aspects ofthe present disclosure, in order to provide a basic understanding ofsuch aspects. This summary is not an extensive overview of allcontemplated features of the disclosure, and is intended neither toidentify key or critical elements of all aspects of the disclosure norto delineate the scope of any or all aspects of the disclosure. Its solepurpose is to present some concepts of one or more aspects of thedisclosure in a simplified form as a prelude to the more detaileddescription that is presented later.

Aspects of the present disclosure relate to a transmission/receptionscheme for transmitting/receiving control information to increaserobustness of control/data transmissions and corresponding feedbacktransmissions.

In one example, a method of wireless communication at a first UE isdisclosed. The method includes transmitting a first portion of a controlmessage to a second UE, the first portion comprising information fordecoding a second portion of the control message and for decoding userdata, transmitting the second portion of the control message to thesecond UE, the second portion comprising additional information fordecoding the user data, and transmitting the user data to the second UE.

In another example, a first UE for wireless communication is disclosed.The first UE includes at least one processor and a memory coupled to theat least one processor. The at least one processor and the memory areconfigured to transmit a first portion of a control message to a secondUE, the first portion comprising information for decoding a secondportion of the control message and for decoding user data, transmit thesecond portion of the control message to the second UE, the secondportion comprising additional information for decoding the user data,and transmit the user data to the second UE.

In a further example, a first UE for wireless communication isdisclosed. The first UE includes means for transmitting a first portionof a control message to a second UE, the first portion comprisinginformation for decoding a second portion of the control message and fordecoding user data, means for transmitting the second portion of thecontrol message to the second UE, the second portion comprisingadditional information for decoding the user data, and means fortransmitting the user data to the second UE.

In yet another example, a non-transitory computer-readable mediumstoring computer-executable code at a first UE is disclosed. Thenon-transitory computer-readable medium includes code for causing acomputer to transmit a first portion of a control message to a secondUE, the first portion comprising information for decoding a secondportion of the control message and for decoding user data, transmit thesecond portion of the control message to the second UE, the secondportion comprising additional information for decoding the user data,and transmit the user data to the second UE.

In one example, a method of wireless communication at a UE is disclosed.The method includes transmitting a first portion of a control message,the first portion comprising a resource allocation for a second portionof the control message and information for decoding the second portionof the control message and for decoding user data, transmitting thesecond portion of the control message, the second portion comprisingadditional information for decoding the user data, and transmitting theuser data.

In another example, UE for wireless communication is disclosed. The UEincludes at least one processor and a memory coupled to the at least oneprocessor. The at least one processor and the memory are configured totransmit a first portion of a control message, the first portioncomprising a resource allocation for a second portion of the controlmessage and information for decoding the second portion of the controlmessage and for decoding user data, transmit the second portion of thecontrol message, the second portion comprising additional informationfor decoding the user data, and transmit the user data.

In a further example, a UE for wireless communication is disclosed. TheUE includes means for transmitting a first portion of a control message,the first portion comprising a resource allocation for a second portionof the control message and information for decoding the second portionof the control message and for decoding user data, means fortransmitting the second portion of the control message, the secondportion comprising additional information for decoding the user data,and means for transmitting the user data.

In yet another example, a non-transitory computer-readable mediumstoring computer-executable code at a UE is disclosed. Thenon-transitory computer-readable medium includes code for causing acomputer to transmit a first portion of a control message, the firstportion comprising a resource allocation for a second portion of thecontrol message and information for decoding the second portion of thecontrol message and for decoding user data, transmit the second portionof the control message, the second portion comprising additionalinformation for decoding the user data, and transmit the user data.

In one example, a method of wireless communication at a first UE isdisclosed. The method includes receiving a first portion of a controlmessage from a second UE, the first portion including information fordecoding a second portion of the control message and for decoding userdata, the second portion including additional information for decodingthe user data, receiving the second portion of the control message fromthe second UE, decoding the received second portion of the controlmessage based on the information included in the first portion of thecontrol message, receiving the user data from the second UE if thereceived second portion of the control message is able to be decoded,and decoding the received user data based on the information included inthe first portion of the control message and the additional informationincluded in the second portion of the control message.

In another example, a first UE for wireless communication is disclosed.The first UE includes at least one processor and a memory coupled to theat least one processor. The at least one processor and the memory areconfigured to receive a first portion of a control message from a secondUE, the first portion including information for decoding a secondportion of the control message and for decoding user data, the secondportion including additional information for decoding the user data,receive the second portion of the control message from the second UE,decode the received second portion of the control message based on theinformation included in the first portion of the control message,receive the user data from the second UE if the received second portionof the control message is able to be decoded, and decode the receiveduser data based on the information included in the first portion of thecontrol message and the additional information included in the secondportion of the control message.

In a further example, a first UE for wireless communication isdisclosed. The first UE includes means for receiving a first portion ofa control message from a second UE, the first portion includinginformation for decoding a second portion of the control message and fordecoding user data, the second portion including additional informationfor decoding the user data, means for receiving the second portion ofthe control message from the second UE, means for decoding the receivedsecond portion of the control message based on the information includedin the first portion of the control message, means for receiving theuser data from the second UE if the received second portion of thecontrol message is able to be decoded, and means for decoding thereceived user data based on the information included in the firstportion of the control message and the additional information includedin the second portion of the control message.

In yet another example, a non-transitory computer-readable mediumstoring computer-executable code at a first UE is disclosed. Thenon-transitory computer-readable medium includes code for causing acomputer to receive a first portion of a control message from a secondUE, the first portion including information for decoding a secondportion of the control message and for decoding user data, the secondportion including additional information for decoding the user data,receive the second portion of the control message from the second UE,decode the received second portion of the control message based on theinformation included in the first portion of the control message,receive the user data from the second UE if the received second portionof the control message is able to be decoded, and decode the receiveduser data based on the information included in the first portion of thecontrol message and the additional information included in the secondportion of the control message.

In one example, a method of wireless communication at UE is disclosed.The method includes receiving a first portion of a control message, thefirst portion including a resource allocation for a second portion ofthe control message and information for decoding the second portion ofthe control message and for decoding user data, the second portionincluding additional information for decoding the user data, receivingthe second portion of the control message based on the resourceallocation included in the first portion of the control message,decoding the received second portion of the control message based on theinformation included in the first portion of the control message,receiving the user data if the received second portion of the controlmessage is able to be decoded, and decoding the received user data basedon the information included in the first portion of the control messageand the additional information included in the second portion of thecontrol message.

In another example, a UE for wireless communication is disclosed. The UEincludes at least one processor and a memory coupled to the at least oneprocessor. The at least one processor and the memory are configured toreceive a first portion of a control message, the first portionincluding a resource allocation for a second portion of the controlmessage and information for decoding the second portion of the controlmessage and for decoding user data, the second portion includingadditional information for decoding the user data, receive the secondportion of the control message based on the resource allocation includedin the first portion of the control message, decode the received secondportion of the control message based on the information included in thefirst portion of the control message, receive the user data if thereceived second portion of the control message is able to be decoded,and decode the received user data based on the information included inthe first portion of the control message and the additional informationincluded in the second portion of the control message.

In a further example, a UE for wireless communication is disclosed. TheUE includes means for receiving a first portion of a control message,the first portion including a resource allocation for a second portionof the control message and information for decoding the second portionof the control message and for decoding user data, the second portionincluding additional information for decoding the user data, means forreceiving the second portion of the control message based on theresource allocation included in the first portion of the controlmessage, means for decoding the received second portion of the controlmessage based on the information included in the first portion of thecontrol message, means for receiving the user data if the receivedsecond portion of the control message is able to be decoded, and meansfor decoding the received user data based on the information included inthe first portion of the control message and the additional informationincluded in the second portion of the control message.

In yet another example, a non-transitory computer-readable mediumstoring computer-executable code at a UE is disclosed. Thenon-transitory computer-readable medium includes code for causing acomputer to receive a first portion of a control message, the firstportion including a resource allocation for a second portion of thecontrol message and information for decoding the second portion of thecontrol message and for decoding user data, the second portion includingadditional information for decoding the user data, receive the secondportion of the control message based on the resource allocation includedin the first portion of the control message, decode the received secondportion of the control message based on the information included in thefirst portion of the control message, receive the user data if thereceived second portion of the control message is able to be decoded,and decode the received user data based on the information included inthe first portion of the control message and the additional informationincluded in the second portion of the control message.

These and other aspects will become more fully understood upon a reviewof the detailed description, which follows. Other aspects and featureswill become apparent to those of ordinary skill in the art, uponreviewing the following description in conjunction with the accompanyingfigures. While features of the present disclosure may be discussedrelative to certain aspects and figures below, all aspects of thepresent disclosure can include one or more of the advantageous featuresdiscussed herein. In other words, while one or more aspects may bediscussed as having certain advantageous features, one or more of suchfeatures may also be used in accordance with the various aspects of thedisclosure discussed herein. In similar fashion, while exemplary aspectsmay be discussed below as device, system, or method aspects it should beunderstood that such exemplary aspects can be implemented in variousdevices, systems, and methods.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram illustrating an example of a wireless communicationssystem and an access network.

FIG. 2 illustrates an example of a frame structure for wirelesscommunication.

FIG. 3 is a diagram illustrating an example of a base station and userequipment (UE) in an access network.

FIG. 4 illustrates an example of communication between UEs according tosome aspects of the disclosure.

FIG. 5 illustrates an example communication flow between wirelessdevices according to some aspects of the disclosure.

FIG. 6 is a flowchart of a method of wireless communication according tosome aspects of the disclosure.

FIG. 7 is a conceptual data flow diagram illustrating the data flowbetween different means/components in an exemplary apparatus accordingto some aspects of the disclosure.

FIG. 8 is a diagram illustrating an example of a hardware implementationfor an apparatus employing a processing system according to some aspectsof the disclosure.

FIG. 9 is a flowchart of a method of wireless communication according tosome aspects of the disclosure.

FIG. 10 is a conceptual data flow diagram illustrating the data flowbetween different means/components in an exemplary apparatus accordingto some aspects of the disclosure.

FIG. 11 is a diagram illustrating an example of a hardwareimplementation for an apparatus employing a processing system accordingto some aspects of the disclosure.

FIG. 12 illustrates a V2X scenario where transmissions to a receiver arenot power controlled according to some aspects of the disclosure.

FIG. 13 illustrates an example transmission time interval (TTI)structure for a request (REQ)-response (RSP) based channel access designaccording to some aspects of the disclosure.

FIG. 14 illustrates an example resource structure for control symbolshaving reference symbols (RS) according to some aspects of thedisclosure.

FIG. 15 illustrates a transmission scheme for transmitting controlinformation using a multiple access (MA) signature to increaserobustness of a control transmission and a corresponding feedbacktransmission according to some aspects of the disclosure.

FIG. 16 is a block diagram conceptually illustrating an example of ahardware implementation for a user equipment according to some aspectsof the disclosure.

FIG. 17 is a flow chart illustrating an exemplary process for wirelesscommunication at a transmitting device according to some aspects of thedisclosure.

FIG. 18 is a flow chart illustrating an exemplary process for wirelesscommunication at a receiving device according to some aspects of thedisclosure.

FIG. 19 is a flow chart illustrating an exemplary process for wirelesscommunication at a transmitting UE according to some aspects of thedisclosure.

FIG. 20 is a flow chart illustrating an exemplary process for wirelesscommunication at a receiving UE according to some aspects of thedisclosure.

FIG. 21 is a flow chart illustrating another exemplary process forwireless communication at a transmitting UE according to some aspects ofthe disclosure.

FIG. 22 is a flow chart illustrating another exemplary process forwireless communication at a receiving UE according to some aspects ofthe disclosure.

DETAILED DESCRIPTION

The detailed description set forth below in connection with the appendeddrawings is intended as a description of various configurations and isnot intended to represent the only configurations in which the conceptsdescribed herein may be practiced. The detailed description includesspecific details for the purpose of providing a thorough understandingof various concepts. However, it will be apparent to those skilled inthe art that these concepts may be practiced without these specificdetails. In some instances, well known structures and components areshown in block diagram form in order to avoid obscuring such concepts.

Several aspects of telecommunication systems will now be presented withreference to various apparatus and methods. These apparatus and methodswill be described in the following detailed description and illustratedin the accompanying drawings by various blocks, components, circuits,processes, algorithms, etc. (collectively referred to as “elements”).These elements may be implemented using electronic hardware, computersoftware, or any combination thereof. Whether such elements areimplemented as hardware or software depends upon the particularapplication and design constraints imposed on the overall system.

By way of example, an element, or any portion of an element, or anycombination of elements may be implemented as a “processing system” thatincludes one or more processors. Examples of processors includemicroprocessors, microcontrollers, graphics processing units (GPUs),central processing units (CPUs), application processors, digital signalprocessors (DSPs), reduced instruction set computing (RISC) processors,systems on a chip (SoC), baseband processors, field programmable gatearrays (FPGAs), programmable logic devices (PLDs), state machines, gatedlogic, discrete hardware circuits, and other suitable hardwareconfigured to perform the various functionality described throughoutthis disclosure. One or more processors in the processing system mayexecute software. Software shall be construed broadly to meaninstructions, instruction sets, code, code segments, program code,programs, subprograms, software components, applications, softwareapplications, software packages, routines, subroutines, objects,executables, threads of execution, procedures, functions, etc., whetherreferred to as software, firmware, middleware, microcode, hardwaredescription language, or otherwise.

Accordingly, in one or more example aspects, the functions described maybe implemented in hardware, software, or any combination thereof. Ifimplemented in software, the functions may be stored on or encoded asone or more instructions or code on a computer-readable medium.Computer-readable media includes computer storage media. Storage mediamay be any available media that can be accessed by a computer. By way ofexample, and not limitation, such computer-readable media can comprise arandom-access memory (RAM), a read-only memory (ROM), an electricallyerasable programmable ROM (EEPROM), optical disk storage, magnetic diskstorage, other magnetic storage devices, combinations of theaforementioned types of computer-readable media, or any other mediumthat can be used to store computer executable code in the form ofinstructions or data structures that can be accessed by a computer.

While aspects are described in this application by illustration to someexamples, those skilled in the art will understand that additionalimplementations and use cases may come about in many differentarrangements and scenarios. Innovations described herein may beimplemented across many differing platform types, devices, systems,shapes, sizes, packaging arrangements. For example, aspects and/or usesmay come about via integrated chip aspects and othernon-module-component based devices (e.g., end-user devices, vehicles,communication devices, computing devices, industrial equipment,retail/purchasing devices, medical devices, AI-enabled devices, etc.).While some examples may or may not be specifically directed to use casesor applications, a wide assortment of applicability of describedinnovations may occur. Implementations may range a spectrum fromchip-level or modular components to non-modular, non-chip-levelimplementations and further to aggregate, distributed, or originalequipment manufacturer (OEM) devices or systems incorporating one ormore aspects of the described innovations. In some practical settings,devices incorporating described aspects and features may alsonecessarily include additional components and features forimplementation and practice of claimed and described aspects. Forexample, transmission and reception of wireless signals necessarilyincludes a number of components for analog and digital purposes (e.g.,hardware components including antenna, RF-chains, power amplifiers,modulators, buffer, processor(s), interleaver, adders/summers, etc.). Itis intended that innovations described herein may be practiced in a widevariety of devices, chip-level components, systems, distributedarrangements, end-user devices, etc. of varying sizes, shapes andconstitution.

Wireless communication may involve a control channel and a data channel.The control channel may include information that a receiving deviceneeds to know in order to decode the data channel. The control channelmay also include additional information that assist with networkoperation, e.g., measurement information, interference managementinformation, etc. When control information is lost or unable to bedecoded by receiving devices, e.g., due to interference, the informationis lost and network performance suffers. There is a need to protectcontrol information to help ensure that a control channel is receivedwith a high probability in order to maintain good network performance.The receipt of control information can be important, even for receivingdevices that do not need to decode associated data.

In NR V2X, for example, transmissions may occupy certain resource blocks(RBs) for a number of Transmission Time Intervals (TTIs). The number ofTTIs may vary based on the size of the data to be transmitted. Forexample, FIG. 2 illustrates a single slot, which may comprise a singleTTI. FIG. 2 also illustrates a two-slot aggregation, which may comprisean aggregation of two TTIs. In other examples, larger amounts of datamay be sent in three or more TTIs. The number of TTIs, as well as theRBs that will be occupied by the data transmission, may be indicated ina control message from the transmitting device. In order to avoidinterference, a device that decodes the control message may wait untilthe indicated data packet ends before starting an attempt to use theindicated RBs to transmit. However, if there is a collision with thecontrol transmission of a first device and a second device is not ableto decode the control transmission, the second device may proceed tobegin a transmission using resources overlapping with a datatransmission indicated in the control transmission from the firstdevice. Not only will the network performance deteriorate due to theoverlapping transmissions, but the control transmission from the seconddevice may also experience interference due to the overlap. Theinterference may cause other devices to perform transmissions thatoverlap the second device's data transmission. Thus, the problem canescalate causing the network performances to further deteriorate.

Aspects of the present disclosure provide a solution to the problem ofpotential interference due to colliding control transmissions that leada device to start transmitting during an ongoing data transmission. Asdescribed herein, a control message may be separated into two portions.A first portion of the control message may comprise information forinterference avoidance, while the second portion may comprise additionalinformation for decoding a data transmission, as well as other controlinformation. Transmitting the portion of the control message that isneeded for interference avoidance separately from the other controlinformation may help to ensure that the interference avoidanceinformation is received with a higher likelihood. The two portions ofthe control message may be separately encoded and may use differentcoding rates, e.g., with the first portion of the control message havinga lower coding rate than the second portion. A receiving device maydecode the first portion of the control message and may determinewhether to defer use of resources that will be occupied by a datatransmission indicated in the first portion of the control message.

Aspects of the present disclosure further relate to atransmission/reception scheme for transmitting/receiving controlinformation to increase robustness of control/data transmissions andcorresponding feedback transmissions. For example, a transmitting devicemay determine time-frequency resources to transmit control informationand data associated with the control information to a receiving device.Thereafter, the transmitting device may transmit a first subset of thecontrol information via a first subset of the time-frequency resources,transmit a second subset of the control information via a second subsetof the time-frequency resources, and transmit the data via a thirdsubset of the time-frequency resources. The transmitting device mayfurther receive a negative acknowledgement (NACK) from the receivingdevice if the receiving device fails to successfully decode the secondsubset of the control information or the data. The receiving device mayreceive the first subset of the control information via the first subsetof time-frequency resources based on a multiple access (MA) signatureused to transmit the first subset of the control information, receivethe second subset of the control information via the second subset ofthe time-frequency resources based on the first subset of the controlinformation, determine if the receiving device is an intended receiverbased on one or more of the first subset of the control information, theMA signature used to transmit the first subset of the controlinformation, or the second subset of the control information, anddetermine to receive the data via the third subset of the time-frequencyresources based on the second subset of the control information if thesecond subset of the control information is successfully received. Thereceiving device may transmit the NACK to the transmitting device if thereceiving device successfully decodes the second subset of the controlinformation but fails to decode the data. The receiving device may alsotransmit the NACK to the transmitting device if the receiving device isthe intended receiver and fails to successfully decode the second subsetof the control information.

In another example, a transmitting device transmits a first portion ofthe control message to a receiving device, wherein the first portionincludes information for decoding a second portion of the controlmessage and for decoding data. The transmitting device then transmitsthe second portion to the receiving device, the second portion includingadditional information for decoding the data. Thereafter, thetransmitting device transmits the data to the receiving device. Thereceiving device receives the first portion and the second portion, anddecodes the received second portion based on the information included inthe first portion. The receiving device then receives the data from thetransmitting device if the received second portion is able to bedecoded. The receiving device decodes the received data based on theinformation included in the first portion and the additional informationincluded in the second portion. The various concepts presentedthroughout this disclosure may be implemented across a broad variety oftelecommunication systems, network architectures, and communicationstandards.

FIG. 1 is a diagram illustrating an example of a wireless communicationssystem 100 including an access network. The wireless communicationssystem (also referred to as a wireless wide area network (WWAN))includes base stations 102, UEs 104, an Evolved Packet Core (EPC) 160,and another Core Network, e.g., a 5G Core (5GC), 190. The base stations102 may include macro cells (high power cellular base station) and/orsmall cells (low power cellular base station). The macro cells includemacro base stations. The small cells include femtocells, picocells, andmicrocells.

The base stations 102 configured for 4G LTE (collectively referred to asEvolved Universal Mobile Telecommunications System (UMTS) TerrestrialRadio Access Network (E-UTRAN)) may interface with the EPC 160 throughbackhaul links 132 (e.g., S1 interface). The base stations 102configured for 5G NR (collectively referred to as Next Generation RAN(NG-RAN)) may interface with Core Network 190 through backhaul links184. In addition to other functions, the base stations 102 may performone or more of the following functions: transfer of user data, radiochannel ciphering and deciphering, integrity protection, headercompression, mobility control functions (e.g., handover, dualconnectivity), inter-cell interference coordination, connection setupand release, load balancing, distribution for non-access stratum (NAS)messages, NAS node selection, synchronization, radio access network(RAN) sharing, multimedia broadcast multicast service (MBMS), subscriberand equipment trace, RAN information management (RIM), paging,positioning, and delivery of warning messages. The base stations 102 maycommunicate with each other directly over backhaul links 134 (e.g., X2interface) or indirectly (e.g., through the EPC 160 or Core Network190). The backhaul links 134 may be wired or wireless.

The base stations 102 may wirelessly communicate with the UEs 104. Eachof the base stations 102 may provide communication coverage for arespective geographic coverage area 110. There may be overlappinggeographic coverage areas 110. For example, the small cell 102′ may havea coverage area 110′ that overlaps the coverage area 110 of one or moremacro base stations 102. A network that includes both small cell andmacro cells may be known as a heterogeneous network. A heterogeneousnetwork may also include Home Evolved Node Bs (eNBs) (HeNBs), which mayprovide service to a restricted group known as a closed subscriber group(CSG). The communication links 120 between the base stations 102 and theUEs 104 may include uplink (UL) (also referred to as reverse link)transmissions from a UE 104 to a base station 102 and/or downlink (DL)(also referred to as forward link) transmissions from a base station 102to a UE 104. The communication links 120 may use multiple-input andmultiple-output (MIMO) antenna technology, including spatialmultiplexing, beamforming, and/or transmit diversity. The communicationlinks may be through one or more carriers. The base stations 102/UEs 104may use spectrum up to Y MHz (e.g., 5, 10, 15, 20, 100, 400, etc. MHz)bandwidth per carrier allocated in a carrier aggregation of up to atotal of Yx MHz (x component carriers) used for transmission in eachdirection. The carriers may or may not be adjacent to each other.Allocation of carriers may be asymmetric with respect to DL and UL(e.g., more or less carriers may be allocated for DL than for UL). Thecomponent carriers may include a primary component carrier and one ormore secondary component carriers. A primary component carrier may bereferred to as a primary cell (PCell) and a secondary component carriermay be referred to as a secondary cell (SCell).

Certain UEs 104 may communicate with each other using device-to-device(D2D) communication link 158. The D2D communication link 158 may use theDL/UL WWAN spectrum. The D2D communication link 158 may use one or moresidelink channels. Sidelink channels are channels that allow for onedevice to directly communicate with another device without utilizing (orgoing through) a base station. Examples of sidelink channels include aphysical sidelink broadcast channel (PSBCH), a physical sidelinkdiscovery channel (PSDCH), a physical sidelink shared channel (PSSCH),and a physical sidelink control channel (PSCCH). D2D communication maybe through a variety of wireless D2D communications systems, such as forexample, FlashLinQ, WiMedia, Bluetooth, ZigBee, Wi-Fi based on the IEEE802.11 standard, LTE, or NR.

The wireless communications system may further include a Wi-Fi accesspoint (AP) 150 in communication with Wi-Fi stations (STAs) 152 viacommunication links 154 in a 5 GHz unlicensed frequency spectrum. Whencommunicating in an unlicensed frequency spectrum, the STAs 152/AP 150may perform a clear channel assessment (CCA) prior to communicating inorder to determine whether the channel is available.

The small cell 102′ may operate in a licensed and/or an unlicensedfrequency spectrum. When operating in an unlicensed frequency spectrum,the small cell 102′ may employ NR and use the same 5 GHz unlicensedfrequency spectrum as used by the Wi-Fi AP 150. The small cell 102′,employing NR in an unlicensed frequency spectrum, may boost coverage toand/or increase capacity of the access network.

A base station 102, whether a small cell 102′ or a macro cell (e.g.,macro base station), may include an eNB, next generation NodeB (gNodeBor gNB), or other type of base station. Some base stations, such as gNB180 may operate in a traditional sub 6 GHz spectrum, in millimeter wave(mmW) frequencies, and/or near mmW frequencies in communication with theUE 104. When the gNB 180 operates in mmW or near mmW frequencies, thegNB 180 may be referred to as an mmW base station. Extremely highfrequency (EHF) is part of the radio frequency (RF) in theelectromagnetic spectrum. EHF has a range of 30 GHz to 300 GHz and awavelength between 1 millimeter and 10 millimeters. Radio waves in theband may be referred to as a millimeter wave. Near mmW may extend downto a frequency of 3 GHz with a wavelength of 100 millimeters. The superhigh frequency (SHF) band extends between 3 GHz and 30 GHz, alsoreferred to as centimeter wave. Communications using the mmW/near mmWradio frequency band has extremely high path loss and a short range. ThemmW base station 180 may utilize beamforming 182 with the UE 104 tocompensate for the extremely high path loss and short range.

The EPC 160 may include a Mobility Management Entity (MME) 162, otherMMEs 164, a Serving Gateway 166, a Multimedia Broadcast MulticastService (MBMS) Gateway 168, a Broadcast Multicast Service Center (BM-SC)170, and a Packet Data Network (PDN) Gateway 172. The MME 162 may be incommunication with a Home Subscriber Server (HSS) 174. The MME 162 isthe control node that processes the signaling between the UEs 104 andthe EPC 160. Generally, the MME 162 provides bearer and connectionmanagement. All user Internet protocol (IP) packets are transferredthrough the Serving Gateway 166, which itself is connected to the PDNGateway 172. The PDN Gateway 172 provides UE IP address allocation aswell as other functions. The PDN Gateway 172 and the BM-SC 170 areconnected to the IP Services 176. The IP Services 176 may includeservices provided by the Internet, an intranet, and an IP MultimediaSubsystem (IMS), a PS Streaming Service, and/or other IP services. TheBM-SC 170 may provide functions for MBMS user service provisioning anddelivery. The BM-SC 170 may serve as an entry point for content providerMBMS transmission, may be used to authorize and initiate MBMS BearerServices within a public land mobile network (PLMN), and may be used toschedule MBMS transmissions. The MBMS Gateway 168 may be used todistribute MBMS traffic to the base stations 102 belonging to aMulticast Broadcast Single Frequency Network (MBSFN) area broadcasting aparticular service, and may be responsible for session management(start/stop) and for collecting eMBMS related charging information.

The Core Network 190 may include an Access and Mobility ManagementFunction (AMF) 192, other AMFs 193, a Session Management Function (SMF)194, and a User Plane Function (UPF) 195. The AMF 192 may be incommunication with a Unified Data Management (UDM) 196. The AMF 192 isthe control node that processes the signaling between the UEs 104 andthe 5GC 190. Generally, the AMF 192 provides QoS flow and sessionmanagement. All user Internet protocol (IP) packets are transferredthrough the UPF 195. The UPF 195 provides UE IP address allocation aswell as other functions. The UPF 195 is connected to the IP Services197. The IP Services 197 may include services provided by the Internet,an intranet, and an IP Multimedia Subsystem (IMS), a PS StreamingService, and/or other IP services.

The base station may also be referred to as a gNB, Node B, evolved NodeB (eNB), an access point, a base transceiver station, a radio basestation, a radio transceiver, a transceiver function, a basic serviceset (BSS), an extended service set (ESS), a transmit reception point(TRP), or some other suitable terminology. The base station 102 providesan access point to the EPC 160 or Core Network 190 for a UE 104.Examples of UEs 104 include a cellular phone, a smart phone, a sessioninitiation protocol (SIP) phone, a laptop, a personal digital assistant(PDA), a satellite radio, a global positioning system, a multimediadevice, a video device, a digital audio player (e.g., MP3 player), acamera, a game console, a tablet, a smart device, a wearable device, avehicle, an electric meter, a gas pump, a large or small kitchenappliance, a healthcare device, an implant, a sensor/actuator, adisplay, or any other similar functioning device. Some of the UEs 104may be referred to as IoT devices (e.g., parking meter, gas pump,toaster, vehicles, heart monitor, etc.). The UE 104 may also be referredto as a station, a mobile station, a subscriber station, a mobile unit,a subscriber unit, a wireless unit, a remote unit, a mobile device, awireless device, a wireless communications device, a remote device, amobile subscriber station, an access terminal, a mobile terminal, awireless terminal, a remote terminal, a handset, a user agent, a mobileclient, a client, or some other suitable terminology.

Referring again to FIG. 1, in certain aspects, a transmitting device,e.g., a transmitting Vehicle User Equipment (VUE) or other UE 104 may beconfigured to transmit messages directly to another UE 104. A Road SideUnit (RSU) may be another transmitting device. The communication may bebased on V2V/V2X or other D2D communication, such as Proximity Services(ProSe). A Transmitting device may comprise a control/data processingcomponent 198 configured to transmit to another UE a first portion of acontrol message having information for decoding a second portion of thecontrol message and for decoding user data, transmit to the other UE thesecond portion of the control message comprising additional informationfor decoding the user data, and transmit to the other UE the user data.A receiving device, such another UE 104, RSU, etc., may comprise acontrol/data processing component 199 configured to receive the firstportion of the control message, receive the second portion of thecontrol message, decode the received second portion based on theinformation included in the first portion, receive the user data if thereceived second portion is able to be decoded, and decode the receiveduser data based on the information included in the first portion and theadditional information included in the second portion.

FIG. 2 is a diagram illustrating an example of a slot structure 200 thatmay be used within a 5G/NR frame structure, e.g., for sidelinkcommunication. This is merely one example, and other wirelesscommunication technologies may have a different frame structure and/ordifferent channels. A frame (10 ms) may be divided into 10 equally sizedsubframes (1 ms). Each subframe may include one or more time slots.Subframes may also include mini-slots, which may include 7, 4, or 2symbols. Each slot may include 7 or 14 symbols, depending on the slotconfiguration. For slot configuration 0, each slot may include 14symbols, and for slot configuration 1, each slot may include 7 symbols.As well, depending on a Cyclic Prefix (CP) and Sub-Carrier Spacing (SCS)(e.g., 15 kHz, 30 kHz, 60 kHz etc.), the number of symbols in a slot, aslot duration, etc. may be different.

A resource grid may be used to represent the frame structure. Each timeslot may include a resource block (RB) (also referred to as physical RBs(PRBs)) that extends 12 consecutive subcarriers. The resource grid isdivided into multiple resource elements (REs). The number of bitscarried by each RE depends on the modulation scheme. As illustrated inFIG. 2, some of the REs may comprise control information, e.g., alongwith demodulation RS (DM-RS). The control information may compriseSidelink Control Information (SCI). The control information may comprisea first portion of a control message comprising information forinterference avoidance for a data transmission and a second portion ofthe control message comprising additional information for decoding thedata transmission. Although FIG. 2 illustrates that the first portion ofthe control message comprises a single symbol and the second portion ofthe control message comprises two symbols, the sizes are merelyexamples. The first portion of the control message may comprise multiplesymbols, e.g., having the same number or even more symbols than thesecond portion of the control message. The particular example in FIG. 2is merely illustrative of the concept of transmitting two separateportions of a control message. At least one symbol at the beginning of aslot may be used by a transmitting device to perform a Listen BeforeTalk (LBT) operation prior to transmitting. At least one symbol may beused for feedback, as described herein. Another symbol, e.g., at the endof the slot may be used as a gap. The gap enables a device to switchfrom operating as a transmitting device to prepare to operate as areceiving device, e.g., in the following slot. Data may be transmittedin the remaining REs, as illustrated. The data may comprise the datamessage described herein. The position of any of the SCI, feedback, andLBT symbols may be different than the example illustrated in FIG. 2.Multiple slots may be aggregated together. FIG. 2 illustrates an exampleaggregation of two slots. The aggregated number of slots may also belarger than two. When slots are aggregated, the symbols used forfeedback and/or a gap symbol may be different than for a single slot.

FIG. 3 is a block diagram 300 of a first wireless communication device310 in communication with a second wireless communication device 350,e.g., via V2V/V2X/D2D communication. The device 310 may comprise atransmitting device communicating with a receiving device, e.g., device350, via V2V/V2X/D2D communication. The transmitting device 310 maycomprise a UE communicating with another UE, e.g., receiving device 350,via sidelink. In addition to those components illustrated in FIG. 3, thewireless communication devices 310, 350 may each comprise a Tx controlmessage component 398 and/or a Rx control message component 399. The Txcontrol message component 398 may be configured to transmit to anotherUE a first portion of a control message having a resource allocation fora second portion of the control message and/or information for decodingthe second portion of the control message and for decoding user data.The Tx control message component 398 may also be configured to transmitto another UE the second portion of the control message havingadditional information for decoding the user data. The Rx controlmessage component 399 may be configured to receive from another UE afirst portion of a control message having a resource allocation for asecond portion of the control message and/or information for decodingthe second portion of the control message and for decoding user data.The Rx control message component 399 may also be configured to receivefrom another UE the second portion of the control message havingadditional information for decoding the user data. Packets may beprovided to a controller/processor 375 that implements layer 3 and layer2 functionality. Layer 3 includes a radio resource control (RRC) layer,and layer 2 includes a packet data convergence protocol (PDCP) layer, aradio link control (RLC) layer, and a medium access control (MAC) layer.

The transmit (TX) processor 316 and the receive (RX) processor 370implement layer 1 functionality associated with various signalprocessing functions. Layer 1, which includes a physical (PHY) layer,may include error detection on the transport channels, forward errorcorrection (FEC) coding/decoding of the transport channels,interleaving, rate matching, mapping onto physical channels,modulation/demodulation of physical channels, and MIMO antennaprocessing. The TX processor 316 handles mapping to signalconstellations based on various modulation schemes (e.g., binaryphase-shift keying (BPSK), quadrature phase-shift keying (QPSK),M-phase-shift keying (M-PSK), M-quadrature amplitude modulation(M-QAM)). The coded and modulated symbols may then be split intoparallel streams. Each stream may then be mapped to an OFDM subcarrier,multiplexed with a reference signal (e.g., pilot) in the time and/orfrequency domain, and then combined together using an Inverse FastFourier Transform (IFFT) to produce a physical channel carrying a timedomain OFDM symbol stream. The OFDM stream is spatially precoded toproduce multiple spatial streams. Channel estimates from a channelestimator 374 may be used to determine the coding and modulation scheme,as well as for spatial processing. The channel estimate may be derivedfrom a reference signal and/or channel condition feedback transmitted bythe device 350. Each spatial stream may then be provided to a differentantenna 320 via a separate transmitter 318TX. Each transmitter 318TX maymodulate an RF carrier with a respective spatial stream fortransmission.

At the device 350, each receiver 354RX receives a signal through itsrespective antenna 352. Each receiver 354RX recovers informationmodulated onto an RF carrier and provides the information to the receive(RX) processor 356. The TX processor 368 and the RX processor 356implement layer 1 functionality associated with various signalprocessing functions. The RX processor 356 may perform spatialprocessing on the information to recover any spatial streams destinedfor the device 350. If multiple spatial streams are destined for thedevice 350, they may be combined by the RX processor 356 into a singleOFDM symbol stream. The RX processor 356 then converts the OFDM symbolstream from the time-domain to the frequency domain using a Fast FourierTransform (FFT). The frequency domain signal comprises a separate OFDMsymbol stream for each subcarrier of the OFDM signal. The symbols oneach subcarrier, and the reference signal, are recovered and demodulatedby determining the most likely signal constellation points transmittedby device 310. These soft decisions may be based on channel estimatescomputed by the channel estimator 358. The soft decisions are thendecoded and deinterleaved to recover the data and control signals thatwere originally transmitted by device 310 on the physical channel. Thedata and control signals are then provided to the controller/processor359, which implements layer 3 and layer 2 functionality.

The controller/processor 359 can be associated with a memory 360 thatstores program codes and data. The memory 360 may be referred to as acomputer-readable medium. The controller/processor 359 may providedemultiplexing between transport and logical channels, packetreassembly, deciphering, header decompression, and control signalprocessing. The controller/processor 359 is also responsible for errordetection using an ACK and/or NACK protocol to support HARQ operations.

Similar to the functionality described in connection with thetransmission by device 310, the controller/processor 359 may provide RRClayer functionality associated with system information (e.g., MIB, SIBs)acquisition, RRC connections, and measurement reporting; PDCP layerfunctionality associated with header compression/decompression, andsecurity (ciphering, deciphering, integrity protection, integrityverification); RLC layer functionality associated with the transfer ofupper layer PDUs, error correction through ARQ, concatenation,segmentation, and reassembly of RLC SDUs, re-segmentation of RLC dataPDUs, and reordering of RLC data PDUs; and MAC layer functionalityassociated with mapping between logical channels and transport channels,multiplexing of MAC SDUs onto TBs, demultiplexing of MAC SDUs from TBs,scheduling information reporting, error correction through HARQ,priority handling, and logical channel prioritization.

Channel estimates derived by a channel estimator 358 from a referencesignal or feedback transmitted by device 310 may be used by the TXprocessor 368 to select the appropriate coding and modulation schemes,and to facilitate spatial processing. The spatial streams generated bythe TX processor 368 may be provided to different antenna 352 viaseparate transmitters 354TX. Each transmitter 354TX may modulate an RFcarrier with a respective spatial stream for transmission.

The transmission is processed at the device 310 in a manner similar tothat described in connection with the receiver function at the device350. Each receiver 318RX receives a signal through its respectiveantenna 320. Each receiver 318RX recovers information modulated onto anRF carrier and provides the information to a RX processor 370.

The controller/processor 375 can be associated with a memory 376 thatstores program codes and data. The memory 376 may be referred to as acomputer-readable medium. The controller/processor 375 providesdemultiplexing between transport and logical channels, packetreassembly, deciphering, header decompression, control signalprocessing. The controller/processor 375 is also responsible for errordetection using an ACK and/or NACK protocol to support HARQ operations.

FIG. 4 illustrates an example 400 of wireless communication betweendevices based on V2X/V2V/D2D communication. A first device 402 transmitsa first transmission 414 comprising a control channel and acorresponding data channel that may be received by a second device 404and a third device 408. The devices 402, 404, 408 may each be capable ofoperating as a transmitting device in addition to operating as areceiving device. Thus, the third device 408 is illustrated astransmitting a second transmission 420. The first transmission 414 andthe second transmission 420 may be broadcast or multicast to nearbydevices.

A control channel may include information for decoding a data channeland may also be used by a receiving device to avoid interference byrefraining from transmitting on the occupied resources during a datatransmission. The number of TTIs, as well as the RBs that will beoccupied by the data transmission, may be indicated in a control messagefrom the transmitting device. In order to avoid interference, areceiving device that decodes the control message may wait until theindicated data packet ends before starting an attempt to use theindicated RBs to transmit. When control information is lost or unable tobe decoded by receiving devices, e.g., due to interference, the controlinformation is lost. As such, network performance suffers because thereceiving devices will not be aware that they should avoid using certainresources. Thus, the receiving devices may attempt to transmit usingoverlapping resources, e.g., in time and/or frequency.

Referring to FIG. 4, not only will the network performance deterioratedue to the overlapping transmissions, but a control transmission fromthe third device 408 may also experience interference due to theoverlap. The interference may cause other devices to performtransmissions that overlap a data transmission from the third device408. Thus, the problem can escalate causing the network performances tofurther deteriorate.

An aspect of the present disclosure provides a solution to the problemof potential interference due to colliding control transmissions thatcause a device to miss a control transmission and to start transmittingduring an ongoing data transmission. As described herein, a controlmessage may be separated into two portions. A first portion of thecontrol message may comprise information regarding the particularresources that will be occupied by a data transmission, e.g.,information for interference avoidance. A second portion of the controlmessage may comprise other information for decoding the datatransmission or other control information. For example, the firstportion of the control message may comprise an indication of a number ofTTIs (or slots) spanned by the data transmission, a number of RBsoccupied by the data transmission, and/or information related to alocation of the transmitting device. The second portion of the controlmessage may comprise an indication of whether a NACK is needed for thedata, information about MIMO layers, a device speed, a device position,a transmit power, whether the transmission is a new data transmission ora retransmission, MCS, other control information, etc.

FIG. 5 illustrates an example communication flow 500 between a firstdevice 502 and a second device 504. The communication may be based onV2X, V2V, or D2D communication directly from a transmitting device to areceiving device. The communication transmitted from device 502, may bebroadcast and subsequently received by multiple receiving devices 504within range of transmitting device 502, as described in connection withFIG. 4. As illustrated, first device 502 may transmit a first portion ofa first control message 503 that comprises information for interferenceavoidance and may transmit a second portion of the control message 505that comprises additional information for decoding a data transmission507, as well as other control information. Transmitting the firstportion of the first control message 503 that is needed for interferenceavoidance separately from the other control information may help toensure that the interference avoidance information is received with ahigher likelihood.

The two portions of the first control message 503, 505 may be separatelyencoded. In one example, the first portion of the first control message503 may be encoded using polar coding. In another example, the secondportion of the first control message 505 may also be encoded using polarcoding. However, the first and second portions may use different codingrates, e.g., with the first portion of the first control message 503having a lower coding rate than the second portion 505. The lower codingrate improves the reliability of the first portion of the first controlmessage 503. Thus, a receiving device will be more likely to receive thefirst portion of the first control message 503 even if there isinterference that causes problems in decoding the second portion of thefirst control message 505.

By including the information to enable interference avoidance in thefirst portion (e.g., an indication of a number of TTIs (or slots)spanned by a data transmission, a number of RBs occupied by the datatransmission, and/or information related to a location of a transmittingdevice), the second device 504 may be aware of the resources that willbe used by the data transmission 507. Even if the second device 504 doesnot decode the second portion of the first control message 505 andcannot decode the data transmission 507, the second device 504 can avoidcausing interference to the data transmission 507 by avoiding use of theresources used by the data transmission 507. Upon decoding the firstportion of the first control message 503, the second device 504 maydetermine, at 506, whether to defer use of resources that will beoccupied by the data transmission 507 indicated in the first portion ofthe first control message 503.

For example, the second device 504 may determine to wait until the TTIscomprising the data transmission 507 end before attempting to transmit adata transmission 513. Prior to sending the data transmission 513, thesecond device 504 may transmit a second control message with informationabout the data transmission 513. The control message may comprise afirst portion of a second control message 509 and a second portion ofthe second control message 511, similar to portions 503, 505. Thus, uponreceiving the first portion of the second control message 509, the firstdevice 502 may make a determination 508 regarding whether to defer useof the resources that will be occupied by the data transmission 513.

The first portion of the first control message 503 and the first portionof the second control message 509 may comprise an indication of theresources in time and/or frequency that will be occupied by acorresponding data transmission. For example, the first portion of acontrol message may indicate a number of TTIs that will be occupied by adata transmission. The number of TTIs may be mapped to a DemodulationReference Signal (DMRS) sequence that is transmitted along with thecontrol message. The first portion of the first control message 503 andthe first portion of the second control message 509 may also indicatethe RBs that are occupied by the corresponding data transmission.

The first portion of the first control message 503 and the first portionof the second control message 509 may also comprise information thatenables a receiving device to identify a location of the transmittingdevice and/or to infer a distance between the transmitting device andthe receiving device. As one example, the first portion of the firstcontrol message 503 may comprise a Layer 2 (L2) Identifier (ID) for thefirst device 502. The L2 ID may be linked to a basic safety message(BSM) in a manner that enables the second device 504 to obtain locationinformation, e.g., Global Navigation Satellite System (GNSS) coordinatesof the first device 502. The second device 504 may be aware of its ownlocation and may determine a distance between the two locations. Asanother example, the first portion of the first control message 503 maycomprise at least a portion of location coordinates for the first device502, e.g., such as a reduced number of GNSS x, y coordinate bits. Acoarseness of the partial GNSS coordinates may be based on aconfigurable resolution, e.g., within a resolution of 10 m, within aresolution of 50 m, within a resolution of 100 m, and so forth. Thesecond device 504 may also use a signal quality measurement, such as arelative received signal strength indication (RSSI) measurement, to helpthe second device 504 determine the distance to the first device 502.

In another example, the first portion of the first control message 503may comprise an indication of a zone, such as a zone ID, for the firstdevice 502. Using predefined zones or areas may reduce the amount ofoverhead required to encode the geographic area information in the firstportion of the first control message 503. For example, a zone ID or anarea ID for the first device 502 may be encoded in the first portion ofthe first control message 503. In one example, the zone/area intended toreliably receive the message may comprise a circular area centered onthe location of the transmitting device, e.g., first device 502, andextending to a radius indicated to the receiving devices. In anotherexample, predefined zones may have a non-circular shape, e.g., with aregion divided into a set of rectangular, hexagon, or other shapedzones, each having a corresponding zone ID. In yet another example, thepredefined zones may have a customized shape. For example, thepredefined zones may follow a contour of a road, a driving direction, ashape of a geographic feature, etc. In another example, hierarchicalzones may be organized in different layers. Each layer may correspond tozones of a different size. For example, a first layer may correspond tozones having a radius of 50 m, a width of 50 m, etc. A second layer maycorrespond to zones having a radius of 100 m, a width of 100 m, etc.

In another example, the first portion of the first control message 503may comprise a combination of any of the L2 ID, a portion of GNSScoordinates, and/or a zone ID for the first device 502. For example, acombination of a truncated L2 ID and truncated x, y coordinates may beused.

The second device 504 may use the information in the first portion ofthe first control message 503 to infer a distance to the first device502 and determine whether to defer its own transmission to avoidinterference with the data transmission 507 sent from the first device502. As the first portion of the first control message 503 may betransmitted in a way that enables the second device 504 to receive thefirst portion 503, whereas the second device 504 is unlikely to receivethe second portion 505 and/or the data transmission 507, the seconddevice may determine that it does not need to defer its owntransmissions 509, 511, 513. In the example in FIG. 4, the second device404 may receive a first portion of a control message in the firsttransmission 414 and may determine that the first device 402 is within athreshold distance 416 of the second device 404. The determination mayinvolve determining whether the devices 402, 404 are within a same zoneor area 401. If so, the second device 404 may determine to wait to begina transmission until after the occupied resources of the datatransmission from the first device 402 have passed. In contrast, thethird device 408 may receive the first portion of the control messageand may determine a distance from the first device 402 to the thirddevice 408. If the distance is large enough, the third device 408 mayproceed to transmit without regard to the data transmission from thefirst device 402.

The first portions of different control messages may be code divisionmultiplexed so that a receiving device can identify different controlmessages that may be received in an overlapping manner. As a firstexample, different control messages from different transmitting devicesmay use different DMRS sequences. The use of a different DMRS sequencemay help the receiving device identify the different first portions ofcontrol messages. As another example, a Multiple Access (MA) signaturemay be used, e.g., each first portion of the first control message 503and the second control message 509 being scrambled with a unique codesignature in addition to the different DMRS sequence. The MA signaturemay comprise a Non-Orthogonal Multiple Access (NOMA) signature. Inanother example, the first portion of the first control message 503 andthe first portion of the second control message 509 may be transmittedwithout being scrambled using an MA signature and may just rely on thedifferent DMRS sequence. The use of the MA signature may requireadditional complexity for the first portion of the control message, yetmay provide additional decoding quality.

FIG. 6 is a flowchart 600 of a method of wireless communication. Themethod may be performed by a transmitting device (e.g., UE 104, device310, 402, 408, 502, 504, apparatus 702/702′), RSU, etc. The transmittingdevice may transmit control and/or data directly to receiving devices,e.g., to UE(s) or RSU(s) based on V2V or V2X communication, or otherdirect D2D communication. The method improves network performance byhelping to ensure that transmitting devices do not cause interference toeach other based on trouble in decoding control transmissions.

At 602, the transmitting device transmits a first portion of a controlmessage having information for interference avoidance for a datatransmission. The first portion of the control message may indicate anumber of TTIs that will be occupied by the data transmission. Thenumber of TTIs may correspond to a DMRS sequence transmitted with thecontrol message. Thus, a receiving device may be able to infer thenumber of TTIs based on the DRMS sequence. The first portion of thecontrol message may indicate one or more resource blocks that will beoccupied by the data transmission. The first portion of the controlmessage may also comprise information that enables a receiving device todetermine a location of the transmitting device, e.g., a Layer 2 ID forthe transmitting device, a portion of geographic coordinates for thetransmitting device, and/or a zone ID for the transmitting device.

At 604, the transmitting device transmits a second portion of a controlmessage comprising additional information for decoding the datatransmission. The second portion of the control message may comprise,e.g., whether a NACK is needed for the data, information about MIMOlayers, a speed of the transmitting device, a position of thetransmitting device, a transmit power, whether the transmission is a newdata transmission or a retransmission, MCS, other control information,etc.

The first portion of the control message may be transmitted using afirst coding rate and the second portion of the control message may betransmitted using a second coding rate. For example, the first codingrate may be lower than the second coding rate. The first portion of thecontrol message may be encoded using polar coding, for example. Thus,the first portion of the control message may have a coding rate thathelps to ensure that it can be decoded.

The control message transmitted at 602 may comprise aspects of codedivision multiplexing. For example, different control messages may usedifferent DMRS sequences. The first portion of the control message maybe scrambled based on an MA sequence. In another example, the firstportion of the control message may be transmitted without scramblingbased on an MA sequence.

Finally, at 606, the transmitting device transmits the datatransmission. The data transmitted may be transmitted using theresources indicated, e.g., in the first portion of the control message.The data transmission may be further based on information comprised inthe second control portion of the message.

FIG. 7 is a conceptual data flow diagram 700 illustrating the data flowbetween different means/components in an exemplary apparatus 702. Theapparatus may be a transmitting device, e.g., UE 104, device 310, 350,402, 408, 502, 504, etc. The apparatus includes a reception component704 that receives communication from other transmitting devices and atransmitting component 706 that transmits communication to receivingdevices, e.g., UE 104, device 310, 350, 404, 408, 502, 504, etc. Thedevice may further comprise a first control component 708 configured totransmit a first portion of a control message having information forinterference avoidance for a data transmission, e.g., as described inconnection with 602. The device may further comprise a second controlcomponent 710 configured to transmit a second portion of the controlmessage comprising additional information for decoding the datatransmission, e.g., as described in connection with 604. The apparatusmay comprise a data component 712 configured to transmit the datatransmission, e.g., as described in connection with 606.

The apparatus may include additional components that perform each of theblocks of the algorithm in the aforementioned flowcharts of FIGS. 5 and6. As such, each block in the aforementioned flowcharts of FIGS. 5 and 6may be performed by a component and the apparatus may include one ormore of those components. The components may be one or more hardwarecomponents specifically configured to carry out the statedprocesses/algorithm, implemented by a processor configured to performthe stated processes/algorithm, stored within a computer-readable mediumfor implementation by a processor, or some combination thereof.

FIG. 8 is a diagram 800 illustrating an example of a hardwareimplementation for an apparatus 702′ employing a processing system 814.The processing system 814 may be implemented with a bus architecture,represented generally by the bus 824. The bus 824 may include any numberof interconnecting buses and bridges depending on the specificapplication of the processing system 814 and the overall designconstraints. The bus 824 links together various circuits including oneor more processors and/or hardware components, represented by theprocessor 804, the components 704, 706, 708, 710, 712, and thecomputer-readable medium/memory 806. The bus 824 may also link variousother circuits such as timing sources, peripherals, voltage regulators,and power management circuits, which are well known in the art, andtherefore, will not be described any further.

The processing system 814 may be coupled to a transceiver 810. Thetransceiver 810 is coupled to one or more antennas 820. The transceiver810 provides a means for communicating with various other apparatus overa transmission medium. The transceiver 810 receives a signal from theone or more antennas 820, extracts information from the received signal,and provides the extracted information to the processing system 814,specifically the reception component 704. In addition, the transceiver810 receives information from the processing system 814, specificallythe transmission component 706, and based on the received information,generates a signal to be applied to the one or more antennas 820. Theprocessing system 814 includes a processor 804 coupled to acomputer-readable medium/memory 806. The processor 804 is responsiblefor general processing, including the execution of software stored onthe computer-readable medium/memory 806. The software, when executed bythe processor 804, causes the processing system 814 to perform thevarious functions described supra for any particular apparatus. Thecomputer-readable medium/memory 806 may also be used for storing datathat is manipulated by the processor 804 when executing software. Theprocessing system 814 further includes at least one of the components704, 706, 708, 710, 712. The components may be software componentsrunning in the processor 804, resident/stored in the computer readablemedium/memory 806, one or more hardware components coupled to theprocessor 804, or some combination thereof. The processing system 814may be a component of the device 310 and may include the memory 376and/or at least one of the TX processor 316, the RX processor 370, andthe controller/processor 375.

In one configuration, the apparatus 702/702′ for wireless communicationincludes means for transmitting a first portion of a control messagehaving information for interference avoidance for a data transmission(e.g., at least first control component 708), means for transmitting asecond portion of the control message comprising additional informationfor decoding the data transmission (e.g., at least second controlcomponent 710), and means for transmitting the data transmission (e.g.,at least data component 712). The aforementioned means may be one ormore of the aforementioned components of the apparatus 702 and/or theprocessing system 814 of the apparatus 702′ configured to perform thefunctions recited by the aforementioned means. As described supra, theprocessing system 814 may include the TX Processor 316, the RX Processor370, and the controller/processor 375. As such, in one configuration,the aforementioned means may be the TX Processor 316, the RX Processor370, and the controller/processor 375 configured to perform thefunctions recited by the aforementioned means.

FIG. 9 is a flowchart 900 of a method of wireless communication. Themethod may be performed by a receiving device (e.g., the UE 104, device350, 404, 408, 502, 504, 750, the apparatus 1002/1002′). The receivingdevice may receive communication directly from transmitting devices,e.g., from UE(s) or other devices based on V2V or V2X communication, orother direct D2D communication. Optional aspects are illustrated with adashed line. The method improves network performance by helping toensure that transmitting devices do not cause interference to each otherbased on trouble in decoding control transmissions.

At 902, the receiving device receives at least a first portion of acontrol message having information for interference avoidance for a datatransmission sent from a transmitting device, wherein the first portionof the control message is transmitted using a different coding rate thana second portion of the control message. The first portion of thecontrol message may use a lower coding rate than the second portion ofthe control message. The first portion of the control message mayindicate a number of TTIs that will be occupied by the datatransmission. The number of TTIs may correspond to a DMRS sequencetransmitted with the control message. Thus, a receiving device may beable to infer the number of TTIs based on the DRMS sequence. The firstportion of the control message may indicate one or more resource blocksthat will be occupied by the data transmission.

The first portion of the control message received at 902 may compriseaspects of code division multiplexing. For example, different controlmessages may use different DMRS sequences. Thus, the receiving devicemay be able to distinguish different control messages based on a DMRSsequence used in connection with the control message. The first portionof the control message may be scrambled based on an MA sequence. Inanother example, the first portion of the control message may bereceived without scrambling based on an MA sequence.

At 906, the receiving device determines whether to defer a transmissionbased on information comprised in the first portion of the controlmessage. If the receiving device determines, at 906, to defer thetransmission, then the receiving device defers the transmission at 908.Otherwise, the receiving device may proceed to transmit control and/ordata at 910.

As illustrated at 904, the receiving device may determine a distancefrom the receiving device to the transmitting device based oninformation comprised in the first portion of the control message,wherein the receiving device determines whether to defer, at 906, thetransmission based on information comprised in the first portion of thecontrol message. The information in the first portion of the controlmessage that is used to determine the distance may comprise anycombination of a L2 ID for the transmitting device, at least a portionof geographic coordinates for the transmitting device and/or a zone IDfor the transmitting device. Accordingly, at 906, the receiving devicemay use the distance to determine whether to defer its own transmissionto avoid interference with the data transmission sent from thetransmitting device. In one example, the first portion of the controlmessage may be transmitted in a way that enables the receiving device toreceive the first portion, however, the receiving device may determinethat it will not receive (or is unlikely to receive) the second portionof the control message and/or the data transmission due to the distancefrom the transmitting device. As such, the receiving device maydetermine at 906 that deferral of its own transmission is unnecessaryand proceed to transmit its own control and/or data at 910. In anotherexample, the receiving device may receive the first portion of thecontrol message and determine that the transmitting device is within athreshold distance of the receiving device. The determination mayinvolve determining whether the transmitting device and the receivingdevice are within a same zone or area. If so, the receiving device maydetermine at 906 that it will receive (or is likely to receive) thesecond portion of the control message and/or the data transmission, andtherefore, wait at 910 to begin its own transmission until afterresources occupied by the data transmission from the transmitting devicehave passed.

FIG. 10 is a conceptual data flow diagram 1000 illustrating the dataflow between different means/components in an exemplary apparatus 1002.The apparatus may be a receiving device, e.g., UE 104, device 350, 404,408, 502, 504, 750. The apparatus includes a reception component 1004that receives transmissions from transmitting devices, e.g., UE(s) 1050and a transmission component that transmits to UE(s) 1050. The apparatusmay further comprise a first control component 1008 that is configuredto receive, at least a first portion of a control message havinginformation for interference avoidance for a data transmission, whereinthe first portion of the control message is transmitted using adifferent coding rate than a second portion of the control message. Theapparatus may comprise a determination component 1010 that is configuredto determine whether to defer a transmission based on informationcomprised in the first portion of the control message. The apparatus maycomprise a distance component 1012 that is configured to determine adistance from the receiving device to the transmitting device based oninformation comprised in the first portion of the control message,wherein the receiving device determines to defer the transmission basedon information comprised in the first portion of the control message.The apparatus may comprise a data component 1014 that is configured totransmit data or to receive data based on the determination from thedetermination component 1010.

The apparatus may include additional components that perform each of theblocks of the algorithm in the aforementioned flowcharts of FIGS. 5 and9. As such, each block in the aforementioned flowcharts of FIGS. 5 and 9may be performed by a component and the apparatus may include one ormore of those components. The components may be one or more hardwarecomponents specifically configured to carry out the statedprocesses/algorithm, implemented by a processor configured to performthe stated processes/algorithm, stored within a computer-readable mediumfor implementation by a processor, or some combination thereof.

FIG. 11 is a diagram 1100 illustrating an example of a hardwareimplementation for an apparatus 1002′ employing a processing system1114. The processing system 1114 may be implemented with a busarchitecture, represented generally by the bus 1124. The bus 1124 mayinclude any number of interconnecting buses and bridges depending on thespecific application of the processing system 1114 and the overalldesign constraints. The bus 1124 links together various circuitsincluding one or more processors and/or hardware components, representedby the processor 1104, the components 1004, 1006, 1008, 1010, 1012,1014, and the computer-readable medium/memory 1106. The bus 1124 mayalso link various other circuits such as timing sources, peripherals,voltage regulators, and power management circuits, which are well knownin the art, and therefore, will not be described any further.

The processing system 1114 may be coupled to a transceiver 1110. Thetransceiver 1110 is coupled to one or more antennas 1120. Thetransceiver 1110 provides a means for communicating with various otherapparatus over a transmission medium. The transceiver 1110 receives asignal from the one or more antennas 1120, extracts information from thereceived signal, and provides the extracted information to theprocessing system 1114, specifically the reception component 1004. Inaddition, the transceiver 1110 receives information from the processingsystem 1114, specifically the transmission component 1006, and based onthe received information, generates a signal to be applied to the one ormore antennas 1120. The processing system 1114 includes a processor 1104coupled to a computer-readable medium/memory 1106. The processor 1104 isresponsible for general processing, including the execution of softwarestored on the computer-readable medium/memory 1106. The software, whenexecuted by the processor 1104, causes the processing system 1114 toperform the various functions described supra for any particularapparatus. The computer-readable medium/memory 1106 may also be used forstoring data that is manipulated by the processor 1104 when executingsoftware. The processing system 1114 further includes at least one ofthe components 1004, 1006, 1008, 1010, 1012, 1014. The components may besoftware components running in the processor 1104, resident/stored inthe computer readable medium/memory 1106, one or more hardwarecomponents coupled to the processor 1104, or some combination thereof.The processing system 1114 may be a component of the device 350 and mayinclude the memory 360 and/or at least one of the TX processor 368, theRX processor 356, and the controller/processor 359.

In one configuration, the apparatus 1002/1002′ for wirelesscommunication includes means for receiving at least a first portion of acontrol message having information for interference avoidance for a datatransmission, wherein the first portion of the control message istransmitted using a different coding rate than a second portion of thecontrol message (e.g., at least first control component 1008), means fordetermining a distance from the apparatus 1002/1002′ to the transmittingdevice based on information comprised in the first portion of thecontrol message (e.g., at least distance component 1012), and means fordetermining whether to defer a transmission based on the determineddistance (e.g., at least determination component 1010), wherein theapparatus 1002/1002′ determines to defer the transmission based on thedetermined distance. The aforementioned means may be one or more of theaforementioned components of the apparatus 1002 and/or the processingsystem 1114 of the apparatus 1002′ configured to perform the functionsrecited by the aforementioned means. As described supra, the processingsystem 1114 may include the TX Processor 368, the RX Processor 356, andthe controller/processor 359. As such, in one configuration, theaforementioned means may be the TX Processor 368, the RX Processor 356,and the controller/processor 359 configured to perform the functionsrecited by the aforementioned means.

Other aspects of the disclosure relate to using multiple access (MA)signatures for non-orthogonal multiple access (NOMA). MA signatures areidentifiers for distinguishing UE-specific patterns of datatransmissions and may be used to multiplex UEs on a set of resources.NOMA uses non-orthogonal signatures. When an overloading factor ofgreater than 1 (>1) is present, NOMA access may support a large numberof UEs. For example, the overloading factor is greater than 1 when 6 UEsare spread over 4 resource elements (REs).

In 3GPP, NOMA in downlink communications may use superposition coding,such as multi-user superposition transmission (MUST). Moreover, areceiver may be configured for successive interference cancellation(SIC). NOMA in uplink communications may utilize grant-free uplinktransmissions that are power controlled. Schemes may include resourcespread multiple access (RSMA), sparse code multiple access (SCMA),interleave-division multiple access (IDMA), pattern division multipleaccess (PDMA), multi-user shared access (MUSA), etc.

For V2X, a transmission may not be power controlled to a certainreceiver. Hence, V2X (non-power-controlled uplink transmissions) andNOMA (power-controlled uplink transmissions) are different with respectto uplink communications in that different tradeoff and combinationschemes are possible. In V2X, successive interference cancellation (SIC)is needed to separate transmitting UEs with a power imbalance. Moreover,V2X needs MA signatures to separate transmitting UEs that cannot beseparated with SIC. Notably, power-domain MA schemes are not applicablefor V2X.

FIG. 12 illustrates a V2X scenario 1200 where transmissions to areceiver are not power controlled. In FIG. 12, a first transmitting UE1202, a second transmitting UE 1204, and a third transmitting UE 1206all transmit to a receiving UE 1208. In an example, a first transmission1210 from the first transmitting UE 1202 and a second transmission 1212from the second transmitting UE 1204 may potentially be separated withSIC at the receiving UE 1208. However, orthogonal/low correlationsignatures may be needed to separate the first transmission 1210 fromthe first UE 1202 and a third transmission 1214 from the third UE 1206if such transmissions cannot be separated with SIC at the receiving UE1208.

In an aspect of the disclosure, to improve transmission reliability withincreasing user densities, MA signatures may be used for controltransmissions to make a control transmission more reliable even whencollisions are detected. For example, a NACK-based reselection schememay be provided to reselect a resource in case a collision is detected.In an aspect, a request (REQ)-response (RSP) based design may beprovided that allows for a NOMA/MA signature spread REQ and RSP fordetecting collisions during the REQ phase.

FIG. 13 illustrates an example TTI structure 1300 for a REQ-RSP basedchannel access design according to an aspect of the present disclosure.

The TTI structure 1300 may include a first region 1302 for communicatingcontrol information over, e.g., 1 or 2 symbols. In an aspect, thecontrol information includes a transmission request (REQ). That is, thefirst region 1302 carries information related to the REQ instead of onlya sequence. The first region 1302 is followed by a second region 1304for communicating orthogonal multiple access (OMA) data over a number ofsymbols. A third region 1306 for communicating a response (RSP) to theREQ may follow the second region 1304. Notably, a Tx/Rx turnaroundregion (e.g., ½ symbol in length) may precede and follow the thirdregion 1306. In an aspect, the RSP may be in the form of ACK/NACK orinformation indicating that a transmitter should reselect a resource forthe transmission of data. In an aspect, the TTI structure 1300 for theREQ-RSP based transmission design, wherein the control information (REQ)is transmitted followed by the transmission of the OMA data and the RSP,reduces overhead in comparison to a transmission design that transmits aREQ followed by transmission of a RSP, control information, and data ina TTI.

In an aspect, the REQ-RSP based transmission design of FIG. 13 may beimplemented with or without LBT symbols. When implemented without LBTsymbols, control information may be transmitted in the first region 1302with MA signatures (e.g., RSMA or SCMA). A MA signature length (e.g.,repetition factor for RSMA) may be configured for a channelbandwidth/resource pool since the MA signature length depends on a QoSversus density needs. Moreover, the MA signature length can bedynamically modified based on UE measurements of congestion, etc.Notably, a baseline of OMA control information and data may still besupported based on configuration (with LBT symbols).

In an aspect, when the control information is transmitted with MAsignatures (e.g., RSMA), reference symbols (RS) for the controlinformation are orthogonal. The RS may be used to determine a start/stopof resource allocation. Notably, in a previous scheme, the start/stop ofresource allocation may have been determined based on different LBTsequences.

In an aspect, a number of orthogonal RS dimensions needed fortransmission may be determined as follows. For example, a number oforthogonal RS dimensions needed may be equal to N×4, where N is thenumber of UEs that can be multiplexed in the channel bandwidth/resourcepool. The number of UEs that can be multiplexed may determine acollision probability. Therefore, a higher value of N may be needed forhigher QoS and higher densities.

If N=1, then the number of orthogonal RS dimensions needed is equal toN×4=1×4=4. Thus, a transmitter transmitting OMA control information anddata may rely on random selection alone for reduced collisions. Notably,this is the same as a baseline design with a LBT-based mechanism.

If N=2, then the number of orthogonal RS dimensions needed is equal toN×4=2×4=8. If N=4, then the number of orthogonal RS dimensions needed isequal to N×4=4×4=16. If N=8, then the number of orthogonal RS dimensionsneeded is equal to N×8=8×4=32.

FIG. 14 illustrates an example resource structure 1400 for controlsymbols having reference symbols (RS) according to an aspect of thepresent disclosure. Referring to FIG. 14, methods for attaining a numberof orthogonal RS dimensions will be described.

The number of orthogonal RS dimensions may be attained using one or tworoot sequences. Moreover, the number of attainable RS dimensions may bea product of a maximum number of cyclic shifts, a number of a timedomain orthogonal cover code (TD-OCC), a number of a frequency domainorthogonal cover code (FD-OCC), and the number of roots sequences. Inone example, if the maximum number of cyclic shifts is 4, the number ofTD-OCC is 2, the number of FD-OCC is 2, and the number of root sequencesis 1, then the number of attainable RS dimensions=4×2×2×1=16. In anotherexample, if the maximum number of cyclic shifts is 4, the number ofTD-OCC is 2, the number of FD-OCC is 2, and the number of root sequencesis 2, then the number of attainable RS dimensions=4×2×2×2=32.

In an aspect, a MA sequence may be applied to have subchannel-basedspreading/interleaving. This is appropriate since two UEs may overlaponly in a subset of subchannels.

In an aspect, a MA sequence may be configured for a channelbandwidth/resource pool according to a MA signature length, a number ofcontrol symbols, a number of cyclic shifts, a number of TD-OCC, a numberof FD-OCC, and a number of root sequences. In an example, the MAsignature length is 4, the number of control symbols is 2, the number ofcyclic shifts is 4, the number of TD-OCC is 2, the number of FD-OCC is2, and the number of root sequences is 1. This results in a multiplexingfactor of 4 with 16 orthogonal RS for control decoding and allocationsize detection.

In an aspect, distributed channel access mechanisms may result incollision among transmissions. Particularly, in networks (e.g., V2Xnetworks) with a distributed channel access mechanism, collisions amongtransmitters may be unavoidable. Example channel access mechanismsinclude random resource selection, LBT-based resource selection,REQ-RESP-based resource selection (with Tx/Rx yielding), long-termsensing-based resource selection, etc. Resource overhead for the purposeof channel contention may be a function of the channel access mechanism.Moreover, a collision probability (spatial reuse of resources) maydepend on the channel access mechanism.

For example, in a random resource selection channel access mechanism,UEs select a set of time-frequency resources in a distributed manner.This may result in a highest collision probability compared to the otherchannel access mechanisms described above. However, the resourceoverhead for channel contention is not increased.

In another example, in a LBT-based resource selection channel accessmechanism, guard zones will be created around the transmitters. For atypical receiver, a collision probability is smaller (on average) thanrandom selection.

In an aspect, a transmission may encompass a transmission of controlinformation and data. A UE may select a set of time-frequency resourcesto transmit the control information and the data. The controlinformation may include information required to decode the data, such asa starting resource block (start RB), a length of a time-frequencyresource allocation, a number of slots in which the data is transmitted,a modulation and coding scheme, etc. The control information may alsoinclude a link identifier (link ID) and/or a destination identifier(destination ID) (complete or in-part) of the receiving UE for which thedata is being sent. An entire destination ID, as well as a sourceidentifier (source ID) of the sending UE sending the data, may be sentin a medium access control (MAC) header of the data. Moreover, a subsetof the destination ID (destination ID bits) may be sent in the controlinformation to enable a feedback transmission from the receiving UE whenthe receiving UE fails to decode the data.

Notably, resource collisions may be unavoidable with distributed channelaccess mechanisms. A collision probability may depend on a channelaccess mechanism and a density of transmitters/UEs in a given area. Acollision pertains to both control information and data. Thus, if acontrol information transmission is lost due to a collision, feedbackinformation from the receiving UE may not be sent (e.g., discontinuoustransmission (DTX)).

In unicast communication, a transmitting UE may assume DTX at areceiving UE to be a negative acknowledgement (NACK). Thus, when thefeedback information from the receiving UE is lost due to a collision,the transmitting UE can proceed as if the NACK is received from thereceiving UE.

In groupcast communication, NACK-based feedback is relied upon sinceNACKs from receiving UEs are part of a synchronous frequency network(SFN). As such, for groupcast communication, a transmitting UE mayassume DTX at a receiving UE to be a positive acknowledgement (ACK), andtherefore, resource collisions will result in packet loss if the NACK isunable to be communicated to the transmitting UE.

Accordingly, what is needed is a transmission method for transmittingcontrol information (e.g., destination ID) from a transmitting UE andfeedback information (e.g., NACK) from a receiving UE that is robust toresource collisions. In some transmission schemes, control informationmay be transmitted using multiple access (MA) signatures, which isrobust to collisions (from UEs using different MA signatures), andfeedback information may be sent using the same MA signatures astransmitting UEs. In such a transmission scheme, the feedbackinformation may be used to determine whether to continue transmission orreselect a transmission resource.

According to aspects of the present disclosure, a transmission scheme isprovided that facilitates the transmission of control information fromthe transmitting UE and feedback information from the receiving UEindependent of a channel access mechanism. The transmission scheme alsoallows for the splitting of the control information based on a minimuminformation required (e.g., destination ID) to determine the feedbackinformation.

In an aspect of the disclosure, the control information may be dividedinto two subsets of control information. A first subset of the controlinformation (or first control information subset) may includeinformation needed to determine whether or not to send feedback (e.g.,destination ID indicating the intended receiving UE(s)). A second subsetof the control information (or second control information subset) mayinclude information for decoding corresponding data, such as atime-frequency resource location allocation (e.g., resource block(RB)/time) for the data, a modulation and coding scheme (MCS) of thedata, a transmission mode, etc. Notably, to increase the likelihood ofreceiving feedback information from a receiving UE, it is advantageousto increase the robustness of the first control information subsetagainst collisions. Accordingly, robustness may be increased bytransmitting a smaller portion (less bits) of the control information,i.e., the first control information subset, to the receiving UE ascompared to transmitting an entirety of the control information, i.e.,the first and second control information subsets, which is less robust.

In an aspect, a transmitting UE may transmit the first controlinformation subset to the receiving UE using multiple access (MA)signatures. The transmitting UE's use of a MA signature to transmit thefirst control information subset will increase the robustness of thetransmission as long as different UEs select different MA signatures tosend their own transmission of a first control information subset. In anaspect, use of the MA signature to transmit the first controlinformation subset may be equivalent to transmitting the first controlinformation subset on orthogonal resources. In operation, thetransmitting UE may select a MA signature and transmit the first controlinformation subset using the selected MA signature. A reference symbol(RS) for decoding the first control information subset is orthogonal anda sequence/time-frequency chosen to send the RS may depend on the MAsignature selected. In an aspect, a set of MA signatures from which a MAsignature is selected may depend on the priority of the transmission,such that if the priority of the transmission is high, the selected MAsignature allows the high-priority transmission to have a lowerprobability of colliding with other transmissions using other MAsignatures.

In an aspect, the transmitting UE may transmit the second controlinformation subset and the data to the receiving UE according to anormal procedure without using any MA signatures. In a further aspect,the receiving UE may detect active MA signatures and decode the firstcontrol information subset transmitted (by the transmitting UE) based onone or more active MA signatures. The receiving UE may further determineif a corresponding transmission of the second control information subsetand the data is intended for the receiving UE based on the first controlinformation subset (e.g., destination ID). If the receiving UE learnsthat the transmission of the second control information subset and thedata is intended for the receiving UE, the receiving UE then attempts todecode the second control information subset and the data. If thereceiving UE fails to decode the second control information subsetand/or the data, the receiving UE may transmit feedback information(e.g., NACK) to the transmitting UE.

FIG. 15 illustrates a transmission scheme 1500 for transmitting controlinformation using a multiple access (MA) signature to increaserobustness of a control transmission and a corresponding feedbacktransmission in accordance with aspects of the disclosure.

In an aspect of the disclosure, from a transmitting UE's perspective,the transmitting UE may select a set of time-frequency resources withina transmission time interval (TTI) for transmitting control information(1502, 1504) and data 1506 corresponding to the control information to areceiving UE. The transmitting UE may further select a first subset ofthe time-frequency resources (first time-frequency resource subset) totransmit a first subset of the control information (first controlinformation subset) 1502.

The first control information subset 1502 may include a link identifier(link ID) and/or a destination identifier (destination ID) of thereceiving UE for which the data 1506 is being sent. The inclusion of thelink ID and/or destination ID in the first control information subset1502 allows the receiving UE to determine that the data 1506 is intendedfor the receiving UE and further enables the receiving UE to send afeedback transmission (e.g., NACK) 1508 to the transmitting UE if thereceiving UE fails to decode the data 1506. The first controlinformation subset 1502 may further include one or more transmissionpriorities of the control information and/or the data to enablepriority-based backoff. The first control information subset 1502 mayalso include a time-frequency resource allocation of the controlinformation and/or the data to enable resource exclusion by othertransmitting UEs.

In an aspect, the transmitting UE may determine a multiple access (MA)signature (e.g., codebook, sequence, or scrambling/interleaving) thatcan be used as an identifier to distinguish the transmitting UE'stransmission from other transmitting UEs' transmissions on the sametime-frequency resources. In an aspect, the codebook includes sparsecodewords that do not overlap for any element. That is, the transmittingUE selects orthogonal time-frequency resources within the firsttime-frequency resource subset available for transmission of the firstcontrol information subset 1502. Thereafter, the transmitting UEtransmits the first control information subset 1502 using the MAsignature.

The transmitting UE also selects a second subset of the time-frequencyresources (second time-frequency resource subset) to transmit aremainder of the control information, i.e., a second subset of thecontrol information (second control information subset) 1504, needed bythe receiving UE to decode the data 1506. The transmitting UE furtherselects a third subset of the time-frequency resources (thirdtime-frequency resource subset) to transmit the data 1506. Notably, theselected first, second, and third time-frequency resource subsets may beseparated in time or frequency.

In an aspect, when transmitting the first control information subset1502, the transmitting UE may determine a reference symbol (RS) sequenceand a subsubset of time-frequency resources within the firsttime-frequency resource subset to use for transmitting the RS sequencebased on the selected MA signature. The RS sequence may be used todemodulate the first control information subset 1502 at the receivingUE. The transmitting UE transmits the RS sequence via orthogonaltime-frequency resources of the subsubset along with the first controlinformation subset 1502 using the MA signature. In a further aspect, thetransmitting UE determines a sequence identifier, a time domainorthogonal cover code (TD-OCC), a frequency domain orthogonal cover code(FD-OCC), and/or a cyclic shift to use for transmitting the firstcontrol information subset 1502. The sequence identifier, the timeTD-OCC, the FD-OCC, or the cyclic shift to use for transmitting thefirst control information subset 1502 may be preconfigured at thetransmitting UE via a radio resource control (RRC) configuration.

In an aspect, a length of the MA signature and a number of symbols touse for transmitting the first control information subset 1502 ispreconfigured at the transmitting UE via a radio resource control (RRC)configuration. In another aspect, the MA signature used to transmit thefirst control information subset 1502 is indicated in the second controlinformation subset 1504 or a medium access control (MAC) header of thedata 1506. This helps the receiving UE determine a correspondencebetween multiple decoded control information subsets and the data (ifdecoded), and send feedback 1508 appropriately.

In an aspect of the disclosure, from a receiving UE's perspective, thereceiving UE detects a set of active MA signatures (e.g., based on RSsequence). The receiving UE then receives the first control informationsubset 1502 sent on each active MA signature and determines whether adestination identifier (destination ID) or a link identifier (link ID)included in the first control information subset 1502 corresponds to anassociated link ID for which the receiving device is interested inreceiving data. If the destination ID or the link ID corresponds to theassociated link ID, the receiving UE attempts to receive the secondcontrol information subset 1504 based on the first control informationsubset 1502. If the second control information subset 1504 issuccessfully received, the receiving UE attempts to receive the data1506 associated with the control information (1502, 1504) based on thesecond control information subset 1504.

If the receiving UE fails to successfully receive (decode) the secondcontrol information subset 1504 or the data 1506, the receiving UEtransmits feedback information (e.g., NACK) 1508 to the transmitting UE.In an aspect, the feedback information 1508 is transmitted using thesame MA signature used to transmit the first control information subset1502 from the transmitting UE.

In an aspect, when transmitting the feedback information 1508, thereceiving UE may determine a reference symbol (RS) sequence based on theMA signature and determine orthogonal time-frequency resources fortransmitting the RS sequence based on the MA signature. The receiving UEmay then transmit, with the feedback information (e.g., NACK) 1508, theRS sequence via the orthogonal time-frequency resources using the MAsignature.

FIG. 16 is a block diagram illustrating an example of a hardwareimplementation for a UE 1600 employing a processing system 1614. Forexample, the UE 1600 may be a user equipment (UE) as illustrated in anyone or more of FIGS. 1, 3, 4, 5, and/or 12.

The UE 1600 may be implemented with a processing system 1614 thatincludes one or more processors 1604. Examples of processors 1604include microprocessors, microcontrollers, digital signal processors(DSPs), field programmable gate arrays (FPGAs), programmable logicdevices (PLDs), state machines, gated logic, discrete hardware circuits,and other suitable hardware configured to perform the variousfunctionality described throughout this disclosure. In various examples,the UE 1600 may be configured to perform any one or more of thefunctions described herein. That is, the processor 1604, as utilized inthe UE 1600, may be used to implement any one or more of the processesand procedures described below and illustrated in FIGS. 17 and 18.

In this example, the processing system 1614 may be implemented with abus architecture, represented generally by the bus 1602. The bus 1602may include any number of interconnecting buses and bridges depending onthe specific application of the processing system 1614 and the overalldesign constraints. The bus 1602 communicatively couples togethervarious circuits including one or more processors (represented generallyby the processor 1604), a memory 1605, and computer-readable media(represented generally by the computer-readable medium 1606). The bus1602 may also link various other circuits such as timing sources,peripherals, voltage regulators, and power management circuits, whichare well known in the art, and therefore, will not be described anyfurther. A bus interface 1608 provides an interface between the bus 1602and a transceiver 1610. The transceiver 1610 provides a communicationinterface or means for communicating with various other apparatus over atransmission medium. Depending upon the nature of the apparatus, a userinterface 1612 (e.g., keypad, display, speaker, microphone, joystick)may also be provided. Of course, such a user interface 1612 is optional,and may be omitted in some examples.

In some aspects of the disclosure, the processor 1604 may includetime-frequency resource managing circuitry 1640 configured for variousfunctions, including, for example, determining time-frequency resourcesto transmit control information (e.g., first and second subsets/portionsof a control message) and data (e.g., user data) associated with thecontrol information to a receiving device, selecting a first subset ofthe time-frequency resources to transmit a first subset of the controlinformation, selecting a second subset of the time-frequency resourcesto transmit a second subset of the control information, and selecting athird subset of the time-frequency resources to transmit the data. Forexample, the time-frequency resource managing circuitry 1640 may beconfigured to implement one or more of the functions described below inrelation to FIG. 17, including, e.g., blocks 1702, 1704, 1706, and 1708,FIG. 19, including, e.g., block 1906, and FIG. 21, including, e.g.,block 2106.

The processor 1604 may also include control processing circuitry 1642configured for various functions, including, for example, transmittingthe first subset of the control information via the first subset of thetime-frequency resources and transmitting the second subset of thecontrol information via the second subset of the time-frequencyresources. For example, the control processing circuitry 1642 may beconfigured to implement one or more of the functions described below inrelation to FIG. 17, including, e.g., blocks 1704 and 1706. The controlprocessing circuitry 1642 may also be configured for receiving, from atransmitting device, the first subset of control information via thefirst subset of time-frequency resources based on a multiple access (MA)signature used to transmit the first subset of the control information,determining if a destination identifier (destination ID) or a linkidentifier (link ID) included in the first subset of the controlinformation corresponds to an associated link ID, and determining toreceive the second subset of the control information via the secondsubset of the time-frequency resources based on the first subset of thecontrol information if the destination ID or the link ID corresponds tothe associated link ID. For example, the control processing circuitry1642 may be configured to implement one or more of the functionsdescribed below in relation to FIG. 18, including, e.g., blocks 1802,1804, and 1806.

The control processing circuitry 1642 may also be configured forgenerating a first portion of a control message, the first portionincluding a resource allocation for a second portion of the controlmessage and/or information for decoding the second portion of thecontrol message and for decoding user data, generating the secondportion of the control message, the second portion including additionalinformation for decoding the user data, transmitting the first portionof the control message (e.g., to a second UE), and transmitting thesecond portion of the control message (e.g., to the second UE). Forexample, the control processing circuitry 1642 may be configured toimplement one or more of the functions described below in relation toFIG. 19, including, e.g., blocks 1902, 1904, 1908, and 1910 and FIG. 21,including, e.g., blocks 2102, 2104, 2108, and 2110.

The control processing circuitry 1642 may also be configured forreceiving a first portion of a control message from a second UE, thefirst portion including a resource allocation for a second portion ofthe control message and/or information for decoding the second portionof the control message and for decoding user data, determining whetherthe second portion of the control message or the user data is intendedto be received by the first UE based on the information included in thefirst portion of the control message, receiving the second portion ofthe control message from the second UE (e.g., based on the resourceallocation included in the first portion of the control message), thesecond portion including additional information for decoding the userdata, decoding the received second portion of the control message basedon the information included in the first portion of the control message,and determining whether the user data is intended to be received by thefirst UE based on the additional information included in the secondportion of the control message. For example, the control processingcircuitry 1642 may be configured to implement one or more of thefunctions described below in relation to FIG. 20, including, e.g.,blocks 2002, 2004, 2006, and 2008 and FIG. 22, including, e.g., blocks2202, 2204, 2206, and 2208.

The processor 1604 may also include data processing circuitry 1644configured for various functions, including, for example, transmittingthe data via the third subset of the time-frequency resources anddetermining to receive the data associated with the control informationvia the third subset of the time-frequency resources based on the secondsubset of the control information if the second subset of the controlinformation is successfully received. For example, the data processingcircuitry 1644 may be configured to implement one or more of thefunctions described below in relation to FIG. 17, including, e.g., block1708 and FIG. 18, including, e.g., block 1808.

The data processing circuitry 1644 may also be configured fortransmitting user data (e.g., to the second UE), receiving the user data(e.g., from the second UE) if the received second portion of the controlmessage is able to be decoded, and decoding the received user data basedon the information included in the first portion of the control messageand the additional information included in the second portion of thecontrol message. For example, the data processing circuitry 1644 may beconfigured to implement one or more of the functions described below inrelation to FIG. 19, including, e.g., block 1912, FIG. 20, including,e.g., blocks 2010 and 2012, FIG. 21, including, e.g., block 2112, andFIG. 22, including, e.g., blocks 2210 and 2212.

The processor 1604 may also include feedback processing circuitry 1646configured for various functions, including, for example, receiving anegative acknowledgement (NACK) from the receiving device if thereceiving device fails to successfully decode the second subset/portionof the control information or the data (e.g., user data) andtransmitting a negative acknowledgement (NACK) to the transmittingdevice if the receiving device fails to successfully receive/decode thesecond subset/portion of the control information or the data (e.g., userdata). For example, the feedback processing circuitry 1646 may beconfigured to implement one or more of the functions described below inrelation to FIG. 17, including, e.g., block 1710 FIG. 18, including,e.g., block 1810, FIG. 19, including, e.g., block 1914, FIG. 20,including, e.g., block 2014, FIG. 21, including, e.g., block 2114, andFIG. 22, including, e.g., block 2214.

The processor 1604 is responsible for managing the bus 1602 and generalprocessing, including the execution of software stored on thecomputer-readable medium 1606. The software, when executed by theprocessor 1604, causes the processing system 1614 to perform the variousfunctions described below for any particular apparatus. Thecomputer-readable medium 1606 and the memory 1605 may also be used forstoring data that is manipulated by the processor 1604 when executingsoftware.

One or more processors 1604 in the processing system may executesoftware. Software shall be construed broadly to mean instructions,instruction sets, code, code segments, program code, programs,subprograms, software modules, applications, software applications,software packages, routines, subroutines, objects, executables, threadsof execution, procedures, functions, etc., whether referred to assoftware, firmware, middleware, microcode, hardware descriptionlanguage, or otherwise. The software may reside on a computer-readablemedium 1606. The computer-readable medium 1606 may be a non-transitorycomputer-readable medium. A non-transitory computer-readable mediumincludes, by way of example, a magnetic storage device (e.g., hard disk,floppy disk, magnetic strip), an optical disk (e.g., a compact disc (CD)or a digital versatile disc (DVD)), a smart card, a flash memory device(e.g., a card, a stick, or a key drive), a random access memory (RAM), aread only memory (ROM), a programmable ROM (PROM), an erasable PROM(EPROM), an electrically erasable PROM (EEPROM), a register, a removabledisk, and any other suitable medium for storing software and/orinstructions that may be accessed and read by a computer. Thecomputer-readable medium 1606 may reside in the processing system 1614,external to the processing system 1614, or distributed across multipleentities including the processing system 1614. The computer-readablemedium 1606 may be embodied in a computer program product. By way ofexample, a computer program product may include a computer-readablemedium in packaging materials. Those skilled in the art will recognizehow best to implement the described functionality presented throughoutthis disclosure depending on the particular application and the overalldesign constraints imposed on the overall system.

In one or more examples, the computer-readable storage medium 1606 mayinclude time-frequency resource managing instructions 1650 configuredfor various functions, including, for example, determiningtime-frequency resources to transmit control information (e.g., firstand second subsets/portions of a control message) and data (e.g., userdata) associated with the control information to a receiving device,selecting a first subset of the time-frequency resources to transmit afirst subset of the control information, selecting a second subset ofthe time-frequency resources to transmit a second subset of the controlinformation, and selecting a third subset of the time-frequencyresources to transmit the data. For example, the time-frequency resourcemanaging instructions 1650 may be configured to implement one or more ofthe functions described below in relation to FIG. 17, including, e.g.,blocks 1702, 1704, 1706, and 1708, FIG. 19, including, e.g., block 1906,and FIG. 21, including, e.g., block 2106.

The computer-readable storage medium 1606 may also include controlprocessing instructions 1652 configured for various functions,including, for example, transmitting the first subset of the controlinformation via the first subset of the time-frequency resources andtransmitting the second subset of the control information via the secondsubset of the time-frequency resources. For example, the controlprocessing instructions 1652 may be configured to implement one or moreof the functions described below in relation to FIG. 17, including,e.g., blocks 1704 and 1706. The control processing instructions 1652 mayalso be configured for receiving, from a transmitting device, the firstsubset of control information via the first subset of time-frequencyresources based on a multiple access (MA) signature used to transmit thefirst subset of the control information, determining if a destinationidentifier (destination ID) or a link identifier (link ID) included inthe first subset of the control information corresponds to an associatedlink ID, and determining to receive the second subset of the controlinformation via the second subset of the time-frequency resources basedon the first subset of the control information if the destination ID orthe link ID corresponds to the associated link ID. For example, thecontrol processing instructions 1652 may be configured to implement oneor more of the functions described below in relation to FIG. 18,including, e.g., blocks 1802, 1804, and 1806.

The control processing instructions 1652 may also be configured forgenerating a first portion of a control message, the first portionincluding a resource allocation for a second portion of the controlmessage and/or information for decoding the second portion of thecontrol message and for decoding user data, generating the secondportion of the control message, the second portion including additionalinformation for decoding the user data, transmitting the first portionof the control message (e.g., to a second UE), and transmitting thesecond portion of the control message (e.g., to the second UE). Forexample, the control processing instructions 1652 may be configured toimplement one or more of the functions described below in relation toFIG. 19, including, e.g., blocks 1902, 1904, 1908, and 1910 and FIG. 21,including, e.g., blocks 2102, 2104, 2108, and 2110.

The control processing instructions 1652 may also be configured forreceiving a first portion of a control message from a second UE, thefirst portion including a resource allocation for a second portion ofthe control message and/or information for decoding the second portionof the control message and for decoding user data, determining whetherthe second portion of the control message or the user data is intendedto be received by the first UE based on the information included in thefirst portion of the control message, receiving the second portion ofthe control message from the second UE (e.g., based on the resourceallocation included in the first portion of the control message), thesecond portion including additional information for decoding the userdata, decoding the received second portion of the control message basedon the information included in the first portion of the control message,and determining whether the user data is intended to be received by thefirst UE based on the additional information included in the secondportion of the control message. For example, the control processinginstructions 1652 may be configured to implement one or more of thefunctions described below in relation to FIG. 20, including, e.g.,blocks 2002, 2004, 2006, and 2008 and FIG. 22, including, e.g., blocks2202, 2204, 2206, and 2208.

The computer-readable storage medium 1606 may also include dataprocessing instructions 1654 configured for various functions,including, for example, transmitting the data via the third subset ofthe time-frequency resources and determining to receive the dataassociated with the control information via the third subset of thetime-frequency resources based on the second subset of the controlinformation if the second subset of the control information issuccessfully received. For example, the data processing instructions1654 may be configured to implement one or more of the functionsdescribed below in relation to FIG. 17, including, e.g., block 1708 andFIG. 18, including, e.g., block 1808.

The data processing instructions 1654 may also be configured fortransmitting user data (e.g., to the second UE), receiving the user data(e.g., from the second UE) if the received second portion of the controlmessage is able to be decoded, and decoding the received user data basedon the information included in the first portion of the control messageand the additional information included in the second portion of thecontrol message. For example, the data processing instructions 1654 maybe configured to implement one or more of the functions described belowin relation to FIG. 19, including, e.g., block 1912, FIG. 20, including,e.g., blocks 2010 and 2012, FIG. 21, including, e.g., block 2112, andFIG. 22, including, e.g., blocks 2210 and 2212.

The computer-readable storage medium 1606 may also include feedbackprocessing instructions 1656 configured for various functions,including, for example, receiving a negative acknowledgement (NACK) fromthe receiving device if the receiving device fails to successfullydecode the second subset/portion of the control information or the data(e.g., user data) and transmitting a negative acknowledgement (NACK) tothe transmitting device if the receiving device fails to successfullyreceive/decode the second subset/portion of the control information orthe data (e.g., user data). For example, the feedback processinginstructions 1656 may be configured to implement one or more of thefunctions described below in relation to FIG. 17, including, e.g., block1710 and FIG. 18, including, e.g., block 1810, FIG. 19, including, e.g.,block 1914, FIG. 20, including, e.g., block 2014, FIG. 21, including,e.g., block 2114, and FIG. 22, including, e.g., block 2214.

FIG. 17 is a flow chart illustrating an exemplary process 1700 forwireless communication at a transmitting device in accordance with someaspects of the present disclosure. As described below, some or allillustrated features may be omitted in a particular implementationwithin the scope of the present disclosure, and some illustratedfeatures may not be required for implementation of all aspects. In someexamples, the process 1700 may be carried out by the UE 1600 illustratedin FIG. 16. In some examples, the process 1700 may be carried out by anysuitable apparatus or means for carrying out the functions or algorithmdescribed below.

At block 1702, the transmitting device determines time-frequencyresources to transmit control information and data associated with thecontrol information to a receiving device.

At block 1704, the transmitting device selects a first subset of thetime-frequency resources and transmits a first subset of the controlinformation via the first subset of the time-frequency resources. In anaspect, the first subset of the control information includes adestination identifier (destination ID) of a service for which a datatransmission is being performed. In another aspect, the first subset ofthe control information includes a link identifier (link ID) determinedbased on at least one of a link layer identifier associated with thetransmitting device or a link layer identifier associated with thereceiving device. The first subset of the control information mayfurther include a transmission priority of the second subset of thecontrol information, a transmission priority of the data, atime-frequency resource allocation of the second subset of the controlinformation, a time-frequency resource allocation of the data, or anycombination thereof.

At block 1706, the transmitting device selects a second subset of thetime-frequency resources and transmits a second subset of the controlinformation via the second subset of the time-frequency resources. In anaspect, the second subset of the control information includesinformation for decoding the data. For example, the information fordecoding the data includes a time-frequency resource location allocatedfor the data, a modulation and coding scheme (MCS), a transmission mode,or any combination thereof.

At block 1708, the transmitting device selects a third subset of thetime-frequency resources and transmits the data via the third subset ofthe time-frequency resources.

At block 1710, the transmitting device receives a negativeacknowledgement (NACK) from the receiving device if the receiving devicefails to successfully decode the second subset of the controlinformation or the data.

In an aspect of the disclosure, the transmitting device transmits thefirst subset of the control information by determining a multiple access(MA) signature. The MA signature distinguishes a transmission of thetransmitting device from another transmission of another transmittingdevice on a same time-frequency resource. Thereafter, the transmittingdevice transmits the first subset of the control information via thefirst subset of the time-frequency resources using the MA signature.

In a further aspect, the transmitting device transmits the first subsetof the control information by determining a reference symbol (RS)sequence based on the MA signature and determining a subsubset of thefirst subset of the time-frequency resources to use for transmitting theRS sequence based on the MA signature. Thereafter, the transmittingdevice transmits, with the first subset of the control information, theRS sequence via orthogonal time-frequency resources of the subsubset ofthe first subset of the time-frequency resources using the MA signature.The first subset of the control information is demodulated using the RSsequence.

The transmitting device may further determine a sequence identifier, atime domain orthogonal cover code (TD-OCC), a frequency domainorthogonal cover code (FD-OCC), a cyclic shift, or any combinationthereof to use for transmitting the first subset of the controlinformation. The sequence identifier, the time TD-OCC, the FD-OCC,and/or the cyclic shift to use for transmitting the first subset of thecontrol information may be preconfigured at the transmitting device viaa radio resource control (RRC) configuration.

In an aspect, a length of the MA signature and a number of symbols touse for transmitting the first subset of the control information ispreconfigured at the transmitting device via a radio resource control(RRC) configuration. In another aspect, the MA signature used totransmit the first subset of the control information is indicated in thesecond subset of the control information or a medium access control(MAC) header of the data, or a combination thereof.

In one configuration, the UE 1600 for wireless communication includesmeans for determining time-frequency resources to transmit controlinformation and data associated with the control information to areceiving device, means for selecting a first subset of thetime-frequency resources and transmitting a first subset of the controlinformation via the first subset of the time-frequency resources, meansfor selecting a second subset of the time-frequency resources andtransmitting a second subset of the control information via the secondsubset of the time-frequency resources, means for selecting a thirdsubset of the time-frequency resources and transmitting the data via thethird subset of the time-frequency resources, and means for receiving anegative acknowledgement (NACK) from the receiving device if thereceiving device fails to successfully decode the second subset of thecontrol information or the data.

In one aspect, the aforementioned means may be the processor 1604 shownin FIG. 16 configured to perform the functions recited by theaforementioned means. In another aspect, the aforementioned means may bea circuit or any apparatus configured to perform the functions recitedby the aforementioned means.

Of course, in the above examples, the circuitry included in theprocessor 1604 is merely provided as an example, and other means forcarrying out the described functions may be included within variousaspects of the present disclosure, including but not limited to theinstructions stored in the computer-readable storage medium 1606, or anyother suitable apparatus or means described in any one of the FIGS. 1,3, 4, 5, and/or 12 and utilizing, for example, the processes and/oralgorithms described herein in relation to FIG. 17.

FIG. 18 is a flow chart illustrating an exemplary process 1800 forwireless communication at a receiving device in accordance with someaspects of the present disclosure. As described below, some or allillustrated features may be omitted in a particular implementationwithin the scope of the present disclosure, and some illustratedfeatures may not be required for implementation of all aspects. In someexamples, the process 1800 may be carried out by the UE 1600 illustratedin FIG. 16. In some examples, the process 1800 may be carried out by anysuitable apparatus or means for carrying out the functions or algorithmdescribed below.

At block 1802, the receiving device receives, from a transmittingdevice, a first subset of control information via a first subset oftime-frequency resources. The first subset of the control information isreceived based on a multiple access (MA) signature used to transmit thefirst subset of the control information. In an aspect, the MA signaturedistinguishes a transmission of the transmitting device from anothertransmission of another transmitting device on a same time-frequencyresource. In a further aspect, the receiving device receives the firstsubset of the control information by determining a reference symbol (RS)sequence used to transmit the first subset of the control informationbased on the MA signature and demodulating the first subset of thecontrol information using the RS sequence.

At block 1804, the receiving device determines if a destinationidentifier (destination ID) or a link identifier (link ID) included inthe first subset of the control information corresponds to an associatedlink ID.

At block 1806, the receiving device determines to receive a secondsubset of the control information via a second subset of thetime-frequency resources based on the first subset of the controlinformation if the destination ID or the link ID corresponds to theassociated link ID.

At block 1808, the receiving device determines to receive dataassociated with the control information via a third subset of thetime-frequency resources based on the second subset of the controlinformation if the second subset of the control information issuccessfully received.

At block 1810, the receiving device transmits a negative acknowledgement(NACK) to the transmitting device if the receiving device fails tosuccessfully receive the second subset of the control information or thedata. The NACK may be transmitted using the same MA signature used totransmit the first subset of the control information from thetransmitting device.

In an aspect, the receiving device transmits the NACK by determining areference symbol (RS) sequence based on the MA signature and determiningorthogonal time-frequency resources for transmitting the RS sequencebased on the MA signature. Thereafter, the receiving device transmits,with the NACK, the RS sequence via the orthogonal time-frequencyresources using the MA signature.

In an aspect, the first subset of the control information includes atransmission priority of the second subset of the control information, atransmission priority of the data, a time-frequency resource allocationof the second subset of the control information, a time-frequencyresource allocation of the data, or a combination thereof.

In an aspect, the second subset of the control information includesinformation for decoding the data. For example, the information fordecoding the data includes a time-frequency resource location allocatedfor the data, a modulation and coding scheme (MCS), a transmission mode,or a combination thereof.

In one configuration, the UE 1600 for wireless communication includesmeans for receiving, from a transmitting device, a first subset ofcontrol information via a first subset of time-frequency resources basedon a multiple access (MA) signature used to transmit the first subset ofthe control information, means for determining if a destinationidentifier (destination ID) or a link identifier (link ID) included inthe first subset of the control information corresponds to an associatedlink ID, means for determining to receive a second subset of the controlinformation via a second subset of the time-frequency resources based onthe first subset of the control information if the destination ID or thelink ID corresponds to the associated link ID, means for determining toreceive data associated with the control information via a third subsetof the time-frequency resources based on the second subset of thecontrol information if the second subset of the control information issuccessfully received, and means for transmitting a negativeacknowledgement (NACK) to the transmitting device if the receivingdevice fails to successfully receive the second subset of the controlinformation or the data

In one aspect, the aforementioned means may be the processor 1604 shownin FIG. 16 configured to perform the functions recited by theaforementioned means. In another aspect, the aforementioned means may bea circuit or any apparatus configured to perform the functions recitedby the aforementioned means.

Of course, in the above examples, the circuitry included in theprocessor 1604 is merely provided as an example, and other means forcarrying out the described functions may be included within variousaspects of the present disclosure, including but not limited to theinstructions stored in the computer-readable storage medium 1606, or anyother suitable apparatus or means described in any one of the FIGS. 1,3, 4, 5, and/or 12 and utilizing, for example, the processes and/oralgorithms described herein in relation to FIG. 18.

FIG. 19 is a flow chart illustrating an exemplary process 1900 forwireless communication at a first UE (e.g., transmitting device) inaccordance with some aspects of the present disclosure. As describedbelow, some or all illustrated features may be omitted in a particularimplementation within the scope of the present disclosure, and someillustrated features may not be required for implementation of allaspects. In some examples, the process 1900 may be carried out by the UE1600 illustrated in FIG. 16. In some examples, the process 1900 may becarried out by any suitable apparatus or means for carrying out thefunctions or algorithm described below.

At block 1902, the first UE generates a first portion (e.g., firstsubset) of a control message. The first portion of the control messageincludes information for decoding a second portion of the controlmessage and for decoding user data. For example, the first portion mayinclude a resource allocation for the second portion of the controlmessage, a resource allocation for a current transmission of the userdata, and/or a transmission priority of the user data. The first portionmay also include a destination identifier associated with a service forwhich the user data is being transmitted, a source identifier associatedwith the service for which the user data is being transmitted, and/or alink identifier determined based on at least one of a link layeridentifier associated with the first UE or a link layer identifierassociated with a second UE. The first portion may further include aresource allocation for a future transmission or retransmission of theuser data, and/or information indicating whether acknowledgmentinformation is to be transmitted by the second UE. In an aspect, theresource allocation for the second portion of the control message mayinclude a transmission priority of the second portion of the controlmessage, a format type of the second portion of the control message,time-frequency resources of the second portion of the control message,and/or an orthogonal frequency division multiplexing (OFDM) symbollocation of the second portion of the control message.

At block 1904, the first UE generates a second portion (e.g., secondsubset) of the control message. The second portion of the controlmessage includes additional information for decoding the user data. Forexample, the second portion may include a resource allocation for theuser data. In an aspect, the resource allocation for the user dataindicates a number of slots (e.g., transmission time intervals) thatwill be occupied by the user data. In another aspect, the resourceallocation for the user data indicates one or more resource blocks(e.g., subchannels) that will be occupied by the user data. The secondportion may also include a transmission mode, multiple input multipleoutput (MIMO) layer information, a speed of the first UE, a position ofthe first UE, a transmit power, information indicating whether thetransmission of the user data is a new data transmission or aretransmission, a modulation and coding scheme (MCS), and/or informationindicating whether acknowledgment information is to be transmitted bythe second UE. The second portion may further include a destinationidentifier associated with a service for which the user data is beingtransmitted, a source identifier associated with the service for whichthe user data is being transmitted, and/or information for determiningone or more feedback transmissions by the second UE.

At block 1906, the first UE determines time-frequency resources totransmit the first portion of the control message, the second portion ofthe control message, and the user data.

At block 1908, the first UE transmits the first portion of the controlmessage to the second UE. At block 1910, the first UE transmits thesecond portion of the control message to the second UE. At block 1912,the first UE transmits the user data to the second UE.

In an aspect, the second UE is an intended receiver UE of the user data.In another aspect, the second UE is any UE.

In an aspect, the first portion of the control message is transmittedvia a first subset of the time-frequency resources, the second portionof the control message is transmitted via a second subset of thetime-frequency resources, and the user data is transmitted via a thirdsubset of the time-frequency resources.

In an aspect, the first UE transmits the first portion of the controlmessage by first determining a multiple access (MA) signature. The MAsignature distinguishes a transmission of the first UE from anothertransmission of another UE on a same time-frequency resource.Thereafter, the first UE transmits the first portion of the controlmessage via the first subset of the time-frequency resources using theMA signature.

In an aspect, a format type of the first portion of the control messageis independent of a transmission type (e.g., unicast, multicast, orbroadcast) of the second portion of the control message. Moreover, aformat type of the second portion of the control message varies withrespect to a transmission type (e.g., unicast, multicast, or broadcast)of the second portion of the control message. Also, a modulation andcoding scheme (MCS) of the first portion of the control message may bedifferent from, or the same as, an MCS of the second portion of thecontrol message.

At block 1914, the first UE receives a negative acknowledgement (NACK)from the second UE if the second UE fails to successfully decode thesecond portion of the control message or the user data.

In one configuration, the UE 1600 for wireless communication includesmeans for generating a first portion of a control message, the firstportion including information for decoding a second portion of thecontrol message and for decoding user data, means for generating thesecond portion of the control message, the second portion includingadditional information for decoding the user data, means for determiningtime-frequency resources to transmit the first portion of the controlmessage, the second portion of the control message, and the user data,means for transmitting the first portion of the control message to asecond UE, means for transmitting the second portion of the controlmessage to the second UE, means for transmitting the user data to thesecond UE, and means for receiving a negative acknowledgement (NACK)from the second UE if the second UE fails to successfully decode thesecond portion of the control message or the user data.

In one aspect, the aforementioned means may be the processor 1604 shownin FIG. 16 configured to perform the functions recited by theaforementioned means. In another aspect, the aforementioned means may bea circuit or any apparatus configured to perform the functions recitedby the aforementioned means.

Of course, in the above examples, the circuitry included in theprocessor 1604 is merely provided as an example, and other means forcarrying out the described functions may be included within variousaspects of the present disclosure, including but not limited to theinstructions stored in the computer-readable storage medium 1606, or anyother suitable apparatus or means described in any one of the FIGS. 1,3, 4, 5, and/or 12 and utilizing, for example, the processes and/oralgorithms described herein in relation to FIG. 19.

FIG. 20 is a flow chart illustrating an exemplary process 2000 forwireless communication at a first UE (e.g., receiving device) inaccordance with some aspects of the present disclosure. As describedbelow, some or all illustrated features may be omitted in a particularimplementation within the scope of the present disclosure, and someillustrated features may not be required for implementation of allaspects. In some examples, the process 2000 may be carried out by the UE1600 illustrated in FIG. 16. In some examples, the process 2000 may becarried out by any suitable apparatus or means for carrying out thefunctions or algorithm described below.

At block 2002, the first UE receives a first portion (e.g., firstsubset) of a control message from a second UE. The first portionincludes information for decoding a second portion (e.g., second subset)of the control message and for decoding user data. For example, thefirst portion may include a resource allocation for the second portionof the control message, a resource allocation for a current transmissionof the user data, and/or a transmission priority of the user data. Thefirst portion may also include a destination identifier associated witha service for which the user data is being received, a source identifierassociated with the service for which the user data is being received,and/or a link identifier determined based on at least one of a linklayer identifier associated with the first UE or a link layer identifierassociated with the second UE. The first portion may further include aresource allocation for a future transmission or retransmission of theuser data and/or information indicating whether acknowledgmentinformation is to be transmitted by the first UE. In an aspect, theresource allocation for the second portion of the control message mayinclude a transmission priority of the second portion of the controlmessage, a format type of the second portion of the control message,time-frequency resources of the second portion of the control message,and/or an orthogonal frequency division multiplexing (OFDM) symbollocation of the second portion of the control message.

At block 2004, the first UE determines whether the second portion of thecontrol message or the user data is intended to be received by the firstUE based on the information included in the first portion of the controlmessage. As such, the second portion of the control message is receivedif the second portion or the user data is intended to be received by thefirst UE.

At block 2006, the first UE receives the second portion of the controlmessage from the second UE. The second portion includes additionalinformation for decoding the user data. For example, the second portionmay include a resource allocation for the user data. In an aspect, theresource allocation for the user data indicates a number of slots (e.g.,transmission time intervals) that will be occupied by the user data. Inanother aspect, the resource allocation for the user data indicates oneor more resource blocks (e.g., subchannels) that will be occupied by theuser data. The second portion may further include a transmission mode,multiple input multiple output (MIMO) layer information, a speed of thesecond UE, a position of the second UE, a transmit power, informationindicating whether a transmission of the user data is a new datatransmission or a retransmission, a modulation and coding scheme (MCS),and/or information indicating whether acknowledgment information is tobe transmitted by the first UE. The second portion may further include adestination identifier associated with a service for which the user datais being received, a source identifier associated with the service forwhich the user data is being received, and/or information fordetermining one or more feedback transmissions by the first UE.

At block 2008, the first UE decodes the received second portion of thecontrol message based on the information included in the first portionof the control message and may determine whether the user data isintended to be received by the first UE based on the additionalinformation included in the second portion of the control message. Atblock 2010, the first UE receives the user data from the second UE ifthe received second portion of the control message is able to bedecoded. At block 2012, the first UE decodes the received user databased on the information included in the first portion of the controlmessage and the additional information included in the second portion ofthe control message. In an aspect, when decoding the received user data,the first UE discards the user data if the first UE is an unintendedreceiver of the user data.

In an aspect, the first portion of the control message is received via afirst subset of time-frequency resources, the second portion of thecontrol message is received via a second subset of the time-frequencyresources, and the user data is received via a third subset of thetime-frequency resources. In an aspect, the first UE receives the firstportion of the control message by first determining a multiple access(MA) signature used to transmit the first portion of the controlmessage. The MA signature distinguishes a transmission of the second UEfrom another transmission of another UE on a same time-frequencyresource. Thereafter, the first UE receives the first portion of thecontrol message via the first subset of the time-frequency resourcesbased on the MA signature.

In an aspect, a format type of the first portion of the control messageis independent of a transmission type (e.g., unicast, multicast, orbroadcast) of the second portion of the control message. Also, a formattype of the second portion of the control message varies with respect toa transmission type (e.g., unicast, multicast, or broadcast) of thesecond portion of the control message. Moreover, a modulation and codingscheme (MCS) of the first portion of the control message may bedifferent from, or the same as, an MCS of the second portion of thecontrol message.

At block 2014, the first UE transmits a negative acknowledgement (NACK)to the second UE if the received second portion of the control messageor the received user data is unable to be decoded.

In one configuration, the UE 1600 for wireless communication includesmeans for receiving a first portion of a control message from a secondUE, the first portion including information for decoding a secondportion of the control message and for decoding user data, means fordetermining whether the second portion of the control message or theuser data is intended to be received by the first UE based on theinformation included in the first portion of the control message, meansfor receiving the second portion of the control message from the secondUE, the second portion including additional information for decoding theuser data, means for decoding the received second portion of the controlmessage based on the information included in the first portion of thecontrol message, means for determining whether the user data is intendedto be received by the first UE based on the additional informationincluded in the second portion of the control message, means forreceiving the user data from the second UE if the received secondportion of the control message is able to be decoded, means for decodingthe received user data based on the information included in the firstportion of the control message and the additional information includedin the second portion of the control message, and means for transmittinga negative acknowledgement (NACK) to the second UE if the receivedsecond portion of the control message or the received user data isunable to be decoded.

In one aspect, the aforementioned means may be the processor 1604 shownin FIG. 16 configured to perform the functions recited by theaforementioned means. In another aspect, the aforementioned means may bea circuit or any apparatus configured to perform the functions recitedby the aforementioned means.

Of course, in the above examples, the circuitry included in theprocessor 1604 is merely provided as an example, and other means forcarrying out the described functions may be included within variousaspects of the present disclosure, including but not limited to theinstructions stored in the computer-readable storage medium 1606, or anyother suitable apparatus or means described in any one of the FIGS. 1,3, 4, 5, and/or 12 and utilizing, for example, the processes and/oralgorithms described herein in relation to FIG. 20.

FIG. 21 is a flow chart illustrating an exemplary process 2100 forwireless communication at a UE (e.g., transmitting device) in accordancewith some aspects of the present disclosure. As described below, some orall illustrated features may be omitted in a particular implementationwithin the scope of the present disclosure, and some illustratedfeatures may not be required for implementation of all aspects. In someexamples, the process 2100 may be carried out by the UE 1600 illustratedin FIG. 16. In some examples, the process 2100 may be carried out by anysuitable apparatus or means for carrying out the functions or algorithmdescribed below.

At block 2102, the UE generates a first portion (e.g., first subset) ofa control message. The first portion of the control message includes aresource allocation for a second portion of the control message andinformation for decoding the second portion of the control message andfor decoding user data. The first portion may also include a resourceallocation for a current transmission of the user data and/or atransmission priority of the user data. The first portion may alsoinclude a destination identifier associated with a service for which theuser data is being transmitted, a source identifier associated with theservice for which the user data is being transmitted, and/or a linkidentifier determined based on at least one of a link layer identifierassociated with the UE or a link layer identifier associated with areceiving device (e.g. second UE, base station, etc.). The first portionmay further include a resource allocation for a future transmission orretransmission of the user data and/or information indicating whetheracknowledgment information is to be transmitted by the receiving device.In an aspect, the resource allocation for the second portion of thecontrol message may include a transmission priority of the secondportion of the control message, a format type of the second portion ofthe control message, time-frequency resources of the second portion ofthe control message, and/or an orthogonal frequency divisionmultiplexing (OFDM) symbol location of the second portion of the controlmessage.

At block 2104, the UE generates a second portion (e.g., second subset)of the control message. The second portion of the control messageincludes additional information for decoding the user data. For example,the second portion may include a resource allocation for the user data.In an aspect, the resource allocation for the user data indicates anumber of slots (e.g., transmission time intervals) that will beoccupied by the user data. In another aspect, the resource allocationfor the user data indicates one or more resource blocks (e.g.,subchannels) that will be occupied by the user data. The second portionmay also include a transmission mode, multiple input multiple output(MIMO) layer information, a speed of the UE, a position of the UE, atransmit power, information indicating whether the transmission of theuser data is a new data transmission or a retransmission, a modulationand coding scheme (MCS), and/or information indicating whetheracknowledgment information is to be transmitted by the receiving device.The second portion may further include a destination identifierassociated with a service for which the user data is being transmitted,a source identifier associated with the service for which the user datais being transmitted, and/or information for determining one or morefeedback transmissions by the receiving device.

At block 2106, the UE determines time-frequency resources to transmitthe first portion of the control message, the second portion of thecontrol message, and the user data.

At block 2108, the UE transmits the first portion of the controlmessage. At block 2110, the UE transmits the second portion of thecontrol message. At block 2112, the UE transmits the user data. In anaspect, the first portion of the control message is transmitted via afirst subset of the time-frequency resources, the second portion of thecontrol message is transmitted via a second subset of the time-frequencyresources, and the user data is transmitted via a third subset of thetime-frequency resources.

In an aspect, the UE transmits the first portion of the control messageby first determining a multiple access (MA) signature. The MA signaturedistinguishes a transmission of the UE from another transmission ofanother UE on a same time-frequency resource. Thereafter, the UEtransmits the first portion of the control message via the first subsetof the time-frequency resources using the MA signature.

In an aspect, a format type of the first portion of the control messageis independent of a transmission type (e.g., unicast, multicast, orbroadcast) of the second portion of the control message. Moreover, aformat type of the second portion of the control message varies withrespect to a transmission type (e.g., unicast, multicast, or broadcast)of the second portion of the control message. Also, a modulation andcoding scheme (MCS) of the first portion of the control message may bedifferent from, or the same as, an MCS of the second portion of thecontrol message.

At block 2114, the UE receives a negative acknowledgement (NACK) from areceiving device if the receiving device fails to successfully decodethe second portion of the control message or the user data.

In one configuration, the UE 1600 for wireless communication includesmeans for generating a first portion of a control message, the firstportion including a resource allocation for a second portion of thecontrol message and information for decoding the second portion of thecontrol message and for decoding user data, means for generating thesecond portion of the control message, the second portion includingadditional information for decoding the user data, means for determiningtime-frequency resources to transmit the first portion of the controlmessage, the second portion of the control message, and the user data,means for transmitting the first portion of the control message, meansfor transmitting the second portion of the control message, means fortransmitting the user data, and means for receiving a negativeacknowledgement (NACK) from a receiving device if the receiving devicefails to successfully decode the second portion of the control messageor the user data.

In one aspect, the aforementioned means may be the processor 1604 shownin FIG. 16 configured to perform the functions recited by theaforementioned means. In another aspect, the aforementioned means may bea circuit or any apparatus configured to perform the functions recitedby the aforementioned means.

Of course, in the above examples, the circuitry included in theprocessor 1604 is merely provided as an example, and other means forcarrying out the described functions may be included within variousaspects of the present disclosure, including but not limited to theinstructions stored in the computer-readable storage medium 1606, or anyother suitable apparatus or means described in any one of the FIGS. 1,3, 4, 5, and/or 12 and utilizing, for example, the processes and/oralgorithms described herein in relation to FIG. 21.

FIG. 22 is a flow chart illustrating an exemplary process 2200 forwireless communication at a UE (e.g., receiving device) in accordancewith some aspects of the present disclosure. As described below, some orall illustrated features may be omitted in a particular implementationwithin the scope of the present disclosure, and some illustratedfeatures may not be required for implementation of all aspects. In someexamples, the process 2200 may be carried out by the UE 1600 illustratedin FIG. 16. In some examples, the process 2200 may be carried out by anysuitable apparatus or means for carrying out the functions or algorithmdescribed below.

At block 2202, the UE receives a first portion (e.g. first subset) of acontrol message. The first portion includes a resource allocation for asecond portion (e.g., second subset) of the control message andinformation for decoding the second portion of the control message andfor decoding user data. For example, the first portion may include aresource allocation for a current transmission of the user data and/or atransmission priority of the user data. The first portion may alsoinclude a destination identifier associated with a service for which theuser data is being received, a source identifier associated with theservice for which the user data is being received, and/or a linkidentifier determined based on at least one of a link layer identifierassociated with the UE or a link layer identifier associated with atransmitting device (e.g., second UE, base station, etc.). The firstportion may further include a resource allocation for a futuretransmission or retransmission of the user data and/or informationindicating whether acknowledgment information is to be transmitted bythe UE. In an aspect, the resource allocation for the second portion ofthe control message may include a transmission priority of the secondportion of the control message, a format type of the second portion ofthe control message, time-frequency resources of the second portion ofthe control message, and/or an orthogonal frequency divisionmultiplexing (OFDM) symbol location of the second portion of the controlmessage.

At block 2204, the UE determines whether the second portion of thecontrol message or the user data is intended to be received by the UEbased on the information included in the first portion of the controlmessage. As such, the second portion of the control message is receivedif the second portion or the user data is intended to be received by theUE.

At block 2206, the UE receives the second portion of the control messagebased on the resource allocation included in the first portion of thecontrol message. The second portion includes additional information fordecoding the user data. For example, the second portion may include aresource allocation for the user data. In an aspect, the resourceallocation for the user data indicates a number of slots (e.g.,transmission time intervals) that will be occupied by the user data. Inanother aspect, the resource allocation for the user data indicates oneor more resource blocks (e.g. subchannels) that will be occupied by theuser data. The second portion may further include a transmission mode,multiple input multiple output (MIMO) layer information, a speed of atransmitting device, a position of the transmitting device, a transmitpower, information indicating whether a transmission of the user data isa new data transmission or a retransmission, a modulation and codingscheme (MCS), and/or information indicating whether acknowledgmentinformation is to be transmitted by the UE. The second portion mayfurther include a destination identifier associated with a service forwhich the user data is being received, a source identifier associatedwith the service for which the user data is being received, and/orinformation for determining one or more feedback transmissions by theUE.

At block 2208, the UE decodes the received second portion of the controlmessage based on the information included in the first portion of thecontrol message and may determine whether the user data is intended tobe received by the UE based on the additional information included inthe second portion of the control message. At block 2210, the UEreceives the user data if the received second portion of the controlmessage is able to be decoded. At block 2012, the UE decodes thereceived user data based on the information included in the firstportion of the control message and the additional information includedin the second portion of the control message. In an aspect, whendecoding the received user data, the UE discards the user data if the UEis an unintended receiver of the user data.

In an aspect, the first portion of the control message is received via afirst subset of time-frequency resources, the second portion of thecontrol message is received via a second subset of the time-frequencyresources, and the user data is received via a third subset of thetime-frequency resources. In an aspect, the UE receives the firstportion of the control message by first determining a multiple access(MA) signature used to transmit the first portion of the controlmessage. The MA signature distinguishes a transmission of a transmittingdevice from another transmission of another transmitting device on asame time-frequency resource. Thereafter, the UE receives the firstportion of the control message via the first subset of thetime-frequency resources based on the MA signature.

In an aspect, a format type of the first portion of the control messageis independent of a transmission type (e.g., unicast, multicast, orbroadcast) of the second portion of the control message. Also, a formattype of the second portion of the control message varies with respect toa transmission type (e.g., unicast, multicast, or broadcast) of thesecond portion of the control message. Moreover, a modulation and codingscheme (MCS) of the first portion of the control message may bedifferent from, or the same as, an MCS of the second portion of thecontrol message.

At block 2214, the UE transmits a negative acknowledgement (NACK) if thereceived second portion of the control message or the received user datais unable to be decoded.

In one configuration, the UE 1600 for wireless communication includesmeans for receiving a first portion of a control message, the firstportion including a resource allocation for a second portion of thecontrol message and information for decoding the second portion of thecontrol message and for decoding user data, means for determiningwhether the second portion of the control message or the user data isintended to be received by the UE based on the information included inthe first portion of the control message, means for receiving the secondportion of the control message based on the resource allocation includedin the first portion of the control message, the second portionincluding additional information for decoding the user data, means fordecoding the received second portion of the control message based on theinformation included in the first portion of the control message, meansfor determining whether the user data is intended to be received by theUE based on the additional information included in the second portion ofthe control message, means for receiving the user data if the receivedsecond portion of the control message is able to be decoded, means fordecoding the received user data based on the information included in thefirst portion of the control message and the additional informationincluded in the second portion of the control message, and means fortransmitting a negative acknowledgement (NACK) if the received secondportion of the control message or the received user data is unable to bedecoded.

In one aspect, the aforementioned means may be the processor 1604 shownin FIG. 16 configured to perform the functions recited by theaforementioned means. In another aspect, the aforementioned means may bea circuit or any apparatus configured to perform the functions recitedby the aforementioned means.

Of course, in the above examples, the circuitry included in theprocessor 1604 is merely provided as an example, and other means forcarrying out the described functions may be included within variousaspects of the present disclosure, including but not limited to theinstructions stored in the computer-readable storage medium 1606, or anyother suitable apparatus or means described in any one of the FIGS. 1,3, 4, 5, and/or 12 and utilizing, for example, the processes and/oralgorithms described herein in relation to FIG. 22.

It should be noted that the methods described above describe possibleimplementations, and that the operations and the steps may be rearrangedor otherwise modified and that other implementations are possible.Further, aspects from two or more of the methods may be combined.

Example 1: A method of wireless communication at a first user equipment(UE), comprising transmitting a first portion of a control message to asecond UE, the first portion comprising information for decoding asecond portion of the control message and for decoding user data;transmitting the second portion of the control message to the second UE,the second portion comprising additional information for decoding theuser data; and transmitting the user data to the second UE.

Example 2: The method of example 1, further comprising generating thefirst portion of the control message; and generating the second portionof the control message.

Example 3: The method of any of examples 1 or 2, wherein the firstportion of the control message further comprises a resource allocationfor the second portion of the control message; a resource allocation fora current transmission of the user data; a transmission priority of theuser data; a destination identifier associated with a service for whichthe user data is being transmitted; a source identifier associated withthe service for which the user data is being transmitted; a linkidentifier determined based on at least one of a link layer identifierassociated with the first UE or a link layer identifier associated withthe second UE; a resource allocation for a future transmission orretransmission of the user data; or information indicating whetheracknowledgment information is to be transmitted by the second UE.

Example 4: The method of any of examples 1 to 3, wherein the resourceallocation for the second portion of the control message comprises oneor more of time-frequency resources of the second portion of the controlmessage; an orthogonal frequency division multiplexing (OFDM) symbollocation of the second portion of the control message; a format type ofthe second portion of the control message; or a transmission priority ofthe second portion of the control message.

Example 5: The method of any of examples 1 to 4, wherein the second UEis one of an intended receiver UE of the user data; or any UE.

Example 6: The method of any of examples 1 to 5, further comprisingreceiving a negative acknowledgement (NACK) from the second UE if thesecond UE fails to successfully decode the user data. The method of anyof examples 1 to 5, further comprising receiving a negativeacknowledgement (NACK) from the second UE if the second UE fails tosuccessfully decode the second portion of the control message.

Example 7: The method of any of examples 1 to 6, wherein the secondportion of the control message comprises one or more of a resourceallocation for the user data; a transmission mode; multiple inputmultiple output (MIMO) layer information; a speed of the first UE; aposition of the first UE; a transmit power; information indicatingwhether the transmission of the user data is a new data transmission ora retransmission; a modulation and coding scheme (MCS); informationindicating whether acknowledgment information is to be transmitted bythe second UE; a destination identifier associated with a service forwhich the user data is being transmitted; a source identifier associatedwith the service for which the user data is being transmitted; orinformation for determining one or more feedback transmissions by thesecond UE.

Example 8: The method of any of examples 1 to 7, wherein the resourceallocation for the user data indicates a number of slots that will beoccupied by the user data.

Example 9: The method of any examples 1 to 8, wherein the resourceallocation for the user data indicates one or more subchannels that willbe occupied by the user data.

Example 10: The method of any of examples 1 to 9, wherein a format typeof the first portion of the control message is independent of atransmission type of the second portion of the control message; and aformat type of the second portion of the control message varies withrespect to a transmission type of the second portion of the controlmessage.

Example 11: The method of any of examples 1 to 10, wherein a modulationand coding scheme (MCS) of the first portion of the control message isdifferent from an MCS of the second portion of the control message. Themethod of any of examples 1 to 10, wherein a modulation and codingscheme (MCS) of the first portion of the control message is the same asan MCS of the second portion of the control message.

Example 12: The method of any of examples 1 to 11, further comprisingdetermining time-frequency resources to transmit the first portion ofthe control message, the second portion of the control message, and theuser data, wherein the first portion of the control message istransmitted via a first subset of the time-frequency resources, whereinthe second portion of the control message is transmitted via a secondsubset of the time-frequency resources, and wherein the user data istransmitted via a third subset of the time-frequency resources.

Example 13: The method of any of examples 1 to 12, wherein thetransmitting the first portion of the control message comprisesdetermining a multiple access (MA) signature for distinguishing atransmission of the first UE from another transmission of another UE ona same time-frequency resource; and transmitting the first portion ofthe control message via the first subset of the time-frequency resourcesusing the MA signature.

Example 14: A first user equipment (UE) for wireless communicationcomprising at least one processor and a memory coupled to the at leastone processor, the at least one processor and the memory configured toperform a method of any of examples 1 to 13.

Example 15: A first user equipment (UE) for wireless communicationcomprising at least one means for performing a method of any of examples1 to 13.

Example 16: A non-transitory computer-readable medium storingcomputer-executable code at a first user equipment (UE), comprising codefor causing a computer to perform a method of any of examples 1 to 13.

Example 17: A method of wireless communication at a user equipment (UE),comprising transmitting a first portion of a control message, the firstportion comprising a resource allocation for a second portion of thecontrol message and information for decoding the second portion of thecontrol message and for decoding user data; transmitting the secondportion of the control message, the second portion comprising additionalinformation for decoding the user data; and transmitting the user data.

Example 18: The method of example 17, further comprising generating thefirst portion of the control message; and generating the second portionof the control message.

Example 19: The method of any of examples 17 or 18, wherein the firstportion of the control message further comprises one or more of aresource allocation for a current transmission of the user data; atransmission priority of the user data; a destination identifierassociated with a service for which the user data is being transmitted;a source identifier associated with the service for which the user datais being transmitted; a link identifier determined based on at least oneof a link layer identifier associated with the UE or a link layeridentifier associated with a receiving device; a resource allocation fora future transmission or retransmission of the user data; or informationindicating whether acknowledgment information is to be transmitted bythe receiving device.

Example 20: The method of any of examples 17 to 19, further comprisingreceiving a negative acknowledgement (NACK) from a receiving device ifthe receiving device fails to successfully decode the user data. Themethod of any of examples 17 to 19, further comprising receiving anegative acknowledgement (NACK) from a receiving device if the receivingdevice fails to successfully decode the second portion of the controlmessage.

Example 21: The method of any of examples 17 to 20, wherein the resourceallocation for the second portion of the control message comprises oneor more of time-frequency resources of the second portion of the controlmessage; an orthogonal frequency division multiplexing (OFDM) symbollocation of the second portion of the control message; a format type ofthe second portion of the control message; or a transmission priority ofthe second portion of the control message.

Example 22: The method of any of examples 17 to 21, wherein the secondportion of the control message comprises one or more of a resourceallocation for the user data; a transmission mode; multiple inputmultiple output (MIMO) layer information; a speed of the UE; a positionof the UE; a transmit power; information indicating whether thetransmission of the user data is a new data transmission or aretransmission; a modulation and coding scheme (MCS); informationindicating whether acknowledgment information is to be transmitted by areceiving device; a destination identifier associated with a service forwhich the user data is being transmitted; a source identifier associatedwith the service for which the user data is being transmitted; orinformation for determining one or more feedback transmissions by thereceiving device.

Example 23: The method of any of examples 17 to 22, wherein the resourceallocation for the user data indicates a number of slots that will beoccupied by the user data.

Example 24: The method of any of examples 17 to 23, wherein the resourceallocation for the user data indicates one or more subchannels that willbe occupied by the user data.

Example 25: The method of any of examples 17 to 24, wherein a formattype of the first portion of the control message is independent of atransmission type of the second portion of the control message; and aformat type of the second portion of the control message varies withrespect to a transmission type of the second portion of the controlmessage.

Example 26: The method of any of examples 17 to 25, wherein a modulationand coding scheme (MCS) of the first portion of the control message isdifferent from an MCS of the second portion of the control message. Themethod of any of examples 17 to 25, wherein a modulation and codingscheme (MCS) of the first portion of the control message is the same asan MCS of the second portion of the control message.

Example 27: The method of any of examples 17 to 26, further comprisingdetermining time-frequency resources to transmit the first portion ofthe control message, the second portion of the control message, and theuser data, wherein the first portion of the control message istransmitted via a first subset of the time-frequency resources, whereinthe second portion of the control message is transmitted via a secondsubset of the time-frequency resources, and wherein the user data istransmitted via a third subset of the time-frequency resources.

Example 28: The method of any of examples 17 to 27, wherein thetransmitting the first portion of the control message comprisesdetermining a multiple access (MA) signature for distinguishing atransmission of the UE from another transmission of another UE on a sametime-frequency resource; and transmitting the first portion of thecontrol message via the first subset of the time-frequency resourcesusing the MA signature.

Example 29: A user equipment (UE) for wireless communication comprisingat least one processor and a memory coupled to the at least oneprocessor, the at least one processor and the memory configured toperform a method of any of examples 17 to 28.

Example 30: A user equipment (UE) for wireless communication comprisingat least one means for performing a method of any of examples 17 to 28.

Example 31: A non-transitory computer-readable medium storingcomputer-executable code at a user equipment (UE), comprising code forcausing a computer to perform a method of any of examples 17 to 28.

Example 32: A method of wireless communication at a first user equipment(UE), comprising receiving a first portion of a control message from asecond UE, the first portion including information for decoding a secondportion of the control message and for decoding user data; receiving thesecond portion of the control message from the second UE, the secondportion including additional information for decoding the user data;decoding the received second portion of the control message based on theinformation included in the first portion of the control message;receiving the user data from the second UE if the received secondportion of the control message is able to be decoded; and decoding thereceived user data based on the information included in the firstportion of the control message and the additional information includedin the second portion of the control message.

Example 33: The method of example 32, further comprising determiningwhether the second portion of the control message or the user data isintended to be received by the first UE based on the informationincluded in the first portion of the control message. The method ofexample 32, further comprising determining whether the user data isintended to be received by the first UE based on the additionalinformation included in the second portion of the control message.

Example 34: The method of any of examples 32 or 33, wherein the secondportion of the control message is received if the second portion or theuser data is intended to be received by the first UE.

Example 35: The method of any of examples 32 to 34, wherein the decodingthe received user data includes discarding the user data if the first UEis an unintended receiver of the user data.

Example 36: The method of any of examples 32 to 35, further comprisingtransmitting a negative acknowledgement (NACK) to the second UE if thereceived user data is unable to be decoded. The method of any ofexamples 32 to 35, further comprising transmitting a negativeacknowledgement (NACK) to the second UE if the received second portionof the control message is unable to be decoded.

Example 37: The method of any of examples 32 to 36, wherein the firstportion of the control message includes a resource allocation for thesecond portion of the control message; a resource allocation for acurrent transmission of the user data; a transmission priority of theuser data; a destination identifier associated with a service for whichthe user data is being received; a source identifier associated with theservice for which the user data is being received; a link identifierdetermined based on at least one of a link layer identifier associatedwith the first UE or a link layer identifier associated with the secondUE; a resource allocation for a future transmission or retransmission ofthe user data; or information indicating whether acknowledgmentinformation is to be transmitted by the first UE.

Example 38: The method of any of examples 32 to 37, wherein the resourceallocation for the second portion of the control message includes one ormore of time-frequency resources of the second portion of the controlmessage; an orthogonal frequency division multiplexing (OFDM) symbollocation of the second portion of the control message; a format type ofthe second portion of the control message; or a transmission priority ofthe second portion of the control message.

Example 39: The method of any of examples 32 to 38, wherein the secondportion of the control message includes one or more of a resourceallocation for the user data; a transmission mode; multiple inputmultiple output (MIMO) layer information; a speed of the second UE; aposition of the second UE; a transmit power; information indicatingwhether a transmission of the user data is a new data transmission or aretransmission; a modulation and coding scheme (MCS); informationindicating whether acknowledgment information is to be transmitted bythe first UE; a destination identifier associated with a service forwhich the user data is being received; a source identifier associatedwith the service for which the user data is being received; orinformation for determining one or more feedback transmissions by thefirst UE.

Example 40: The method of any of examples 32 to 39, wherein the resourceallocation for the user data indicates a number of slots that will beoccupied by the user data.

Example 41: The method of any of examples 32 to 40, wherein the resourceallocation for the user data indicates one or more subchannels that willbe occupied by the user data.

Example 42: The method of any of examples 32 to 41, wherein a formattype of the first portion of the control message is independent of atransmission type of the second portion of the control message; and aformat type of the second portion of the control message varies withrespect to a transmission type of the second portion of the controlmessage.

Example 43: The method of any of examples 32 to 42, wherein a modulationand coding scheme (MCS) of the first portion of the control message isdifferent from an MCS of the second portion of the control message. Themethod of any of examples 32 to 42, wherein a modulation and codingscheme (MCS) of the first portion of the control message is the same asan MCS of the second portion of the control message.

Example 44: The method of any of examples 32 to 43, wherein the firstportion of the control message is received via a first subset oftime-frequency resources, the second portion of the control message isreceived via a second subset of the time-frequency resources, and theuser data is received via a third subset of the time-frequencyresources.

Example 45: The method of any of examples 32 to 44, wherein thereceiving the first portion of the control message comprises determininga multiple access (MA) signature used to transmit the first portion ofthe control message, the MA signature distinguishing a transmission ofthe second UE from another transmission of another UE on a sametime-frequency resource; and receiving the first portion of the controlmessage via the first subset of the time-frequency resources based onthe MA signature.

Example 46: A first user equipment (UE) for wireless communicationcomprising at least one processor and a memory coupled to the at leastone processor, the at least one processor and the memory configured toperform a method of any of examples 32 to 45.

Example 47: A first user equipment (UE) for wireless communicationcomprising at least one means for performing a method of any of examples32 to 45.

Example 48: A non-transitory computer-readable medium storingcomputer-executable code at a first user equipment (UE), comprising codefor causing a computer to perform a method of any of examples 32 to 45.

Example 49: A method of wireless communication at a user equipment (UE),comprising receiving a first portion of a control message, the firstportion including a resource allocation for a second portion of thecontrol message and information for decoding the second portion of thecontrol message and for decoding user data; receiving the second portionof the control message based on the resource allocation included in thefirst portion of the control message, the second portion includingadditional information for decoding the user data; decoding the receivedsecond portion of the control message based on the information includedin the first portion of the control message; receiving the user data ifthe received second portion of the control message is able to bedecoded; and decoding the received user data based on the informationincluded in the first portion of the control message and the additionalinformation included in the second portion of the control message.

Example 50: The method of example 49, further comprising determiningwhether the second portion of the control message or the user data isintended to be received by the UE based on the information included inthe first portion of the control message. The method of example 49,further comprising determining whether the user data is intended to bereceived by the UE based on the additional information included in thesecond portion of the control message.

Example 51: The method of any of examples 49 or 50, wherein the secondportion of the control message is received if the second portion or theuser data is intended to be received by the UE.

Example 52: The method of any of examples 49 to 51, wherein the decodingthe received user data includes discarding the user data if the UE is anunintended receiver of the user data.

Example 53: The method of any of examples 49 to 52, further comprisingtransmitting a negative acknowledgement (NACK) if the received user datais unable to be decoded. The method of any of examples 49 to 52, furthercomprising transmitting a negative acknowledgement (NACK) if thereceived second portion of the control message is unable to be decoded.

Example 54: The method of any of examples 49 to 53, wherein the firstportion of the control message further includes one or more of aresource allocation for a current transmission of the user data; atransmission priority of the user data; a destination identifierassociated with a service for which the user data is being received; asource identifier associated with the service for which the user data isbeing received; a link identifier determined based on at least one of alink layer identifier associated with the UE or a link layer identifierassociated with a transmitting device; a resource allocation for afuture transmission or retransmission of the user data; or informationindicating whether acknowledgment information is to be transmitted bythe UE.

Example 55: The method of any of examples 49 to 54, wherein the resourceallocation for the second portion of the control message includes one ormore of time-frequency resources of the second portion of the controlmessage; an orthogonal frequency division multiplexing (OFDM) symbollocation of the second portion of the control message; a format type ofthe second portion of the control message; or a transmission priority ofthe second portion of the control message.

Example 56: The method of any of examples 49 to 55, wherein the secondportion of the control message comprises one or more of a resourceallocation for the user data; a transmission mode; multiple inputmultiple output (MIMO) layer information; a speed of a transmittingdevice; a position of the transmitting device; a transmit power;information indicating whether a transmission of the user data is a newdata transmission or a retransmission; a modulation and coding scheme(MCS); information indicating whether acknowledgment information is tobe transmitted by the UE; a destination identifier associated with aservice for which the user data is being received; a source identifierassociated with the service for which the user data is being received;or information for determining one or more feedback transmissions by theUE.

Example 57: The method of any of examples 49 to 56, wherein the resourceallocation for the user data indicates a number of slots that will beoccupied by the user data.

Example 58: The method of any of examples 49 to 57, wherein the resourceallocation for the user data indicates one or more subchannels that willbe occupied by the user data.

Example 59: The method of any of examples 49 to 58, wherein a formattype of the first portion of the control message is independent of atransmission type of the second portion of the control message; and aformat type of the second portion of the control message varies withrespect to a transmission type of the second portion of the controlmessage.

Example 60: The method of any of examples 49 to 59, wherein a modulationand coding scheme (MCS) of the first portion of the control message isdifferent from an MCS of the second portion of the control message. Themethod of any of examples 49 to 59, wherein a modulation and codingscheme (MCS) of the first portion of the control message is the same asan MCS of the second portion of the control message.

Example 61: The method of any of examples 49 to 60, wherein the firstportion of the control message is received via a first subset oftime-frequency resources, the second portion of the control message isreceived via a second subset of the time-frequency resources, and theuser data is received via a third subset of the time-frequencyresources.

Example 62: The method of any of examples 49 to 61, wherein thereceiving the first portion of the control message comprises determininga multiple access (MA) signature used to transmit the first portion ofthe control message, the MA signature distinguishing a transmission of atransmitting device from another transmission of another transmittingdevice on a same time-frequency resource; and receiving the firstportion of the control message via the first subset of thetime-frequency resources based on the MA signature.

Example 63: A user equipment (UE) for wireless communication comprisingat least one processor and a memory coupled to the at least oneprocessor, the at least one processor and the memory configured toperform a method of any of examples 49 to 62.

Example 64: A user equipment (UE) for wireless communication comprisingat least one means for performing a method of any of examples 49 to 62.

Example 65: A non-transitory computer-readable medium storingcomputer-executable code at a user equipment (UE), comprising code forcausing a computer to perform a method of any of examples 49 to 62.

Several aspects of a wireless communication network have been presentedwith reference to an exemplary implementation. As those skilled in theart will readily appreciate, various aspects described throughout thisdisclosure may be extended to other telecommunication systems, networkarchitectures and communication standards.

By way of example, various aspects may be implemented within othersystems defined by 3GPP, such as Long-Term Evolution (LTE), the EvolvedPacket System (EPS), the Universal Mobile Telecommunication System(UMTS), and/or the Global System for Mobile (GSM). Various aspects mayalso be extended to systems defined by the 3rd Generation PartnershipProject 2 (3GPP2), such as CDMA2000 and/or Evolution-Data Optimized(EV-DO). Other examples may be implemented within systems employing IEEE802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Ultra-Wideband (UWB),Bluetooth, and/or other suitable systems. The actual telecommunicationstandard, network architecture, and/or communication standard employedwill depend on the specific application and the overall designconstraints imposed on the system.

Within the present disclosure, the word “exemplary” is used to mean“serving as an example, instance, or illustration.” Any implementationor aspect described herein as “exemplary” is not necessarily to beconstrued as preferred or advantageous over other aspects of thedisclosure. Likewise, the term “aspects” does not require that allaspects of the disclosure include the discussed feature, advantage ormode of operation. The term “coupled” is used herein to refer to thedirect or indirect coupling between two objects. For example, if objectA physically touches object B, and object B touches object C, thenobjects A and C may still be considered coupled to one another—even ifthey do not directly physically touch each other. For instance, a firstobject may be coupled to a second object even though the first object isnever directly physically in contact with the second object. The terms“circuit” and “circuitry” are used broadly, and intended to include bothhardware implementations of electrical devices and conductors that, whenconnected and configured, enable the performance of the functionsdescribed in the present disclosure, without limitation as to the typeof electronic circuits, as well as software implementations ofinformation and instructions that, when executed by a processor, enablethe performance of the functions described in the present disclosure.

One or more of the components, steps, features and/or functionsillustrated in FIGS. 1-22 may be rearranged and/or combined into asingle component, step, feature or function or embodied in severalcomponents, steps, or functions. Additional elements, components, steps,and/or functions may also be added without departing from novel featuresdisclosed herein. The apparatus, devices, and/or components illustratedin FIGS. 1-22 may be configured to perform one or more of the methods,features, or steps described herein. The novel algorithms describedherein may also be efficiently implemented in software and/or embeddedin hardware.

It is to be understood that the specific order or hierarchy of steps inthe methods disclosed is an illustration of exemplary processes. Basedupon design preferences, it is understood that the specific order orhierarchy of steps in the methods may be rearranged. The accompanyingmethod claims present elements of the various steps in a sample order,and are not meant to be limited to the specific order or hierarchypresented unless specifically recited therein.

The previous description is provided to enable any person skilled in theart to practice the various aspects described herein. Variousmodifications to these aspects will be readily apparent to those skilledin the art, and the generic principles defined herein may be applied toother aspects. Thus, the claims are not intended to be limited to theaspects shown herein, but are to be accorded the full scope consistentwith the language of the claims, wherein reference to an element in thesingular is not intended to mean “one and only one” unless specificallyso stated, but rather “one or more.” Unless specifically statedotherwise, the term “some” refers to one or more. A phrase referring to“at least one of” a list of items refers to any combination of thoseitems, including single members. As an example, “at least one of: a, b,or c” is intended to cover: a; b; c; a and b; a and c; b and c; and a, band c. All structural and functional equivalents to the elements of thevarious aspects described throughout this disclosure that are known orlater come to be known to those of ordinary skill in the art areexpressly incorporated herein by reference and are intended to beencompassed by the claims. Moreover, nothing disclosed herein isintended to be dedicated to the public regardless of whether suchdisclosure is explicitly recited in the claims. No claim element is tobe construed under the provisions of 35 U.S.C. § 112(f) unless theelement is expressly recited using the phrase “means for” or, in thecase of a method claim, the element is recited using the phrase “stepfor.”

What is claimed is:
 1. A method of wireless communication at atransmitting device, comprising: determining time-frequency resources totransmit control information and data associated with the controlinformation to a receiving device; selecting a first subset of thetime-frequency resources and transmitting a first subset of the controlinformation via the first subset of the time-frequency resources;selecting a second subset of the time-frequency resources andtransmitting a second subset of the control information via the secondsubset of the time-frequency resources; and selecting a third subset ofthe time-frequency resources and transmitting the data via the thirdsubset of the time-frequency resources.