Title of Invention

METHOD AND APPARATUS FOR ADAPTING DATA TO A TRANSPORT UNIT OF A PREDEFINED SIZE PRIOR TO TRANSMISSION

Abstract The invention consists of an apparatus and a method for adapting data in a communications system to be transmitted from a sender to a receiver, to a transport unit of a predefined size comprising the steps of : - representing said data as a combination of bits over a finite field, wherein said data comprises of an information part and a control part; - adapting said represented data to fit said predefined size of said transport unit, by expressing both said information and control parts with bits, wherein said bits are less in number that said represented combination of bits and a number of removed bits is known to said receiver, said removed bits comprise of bits from both said information and control parts .
Full Text Title of the invention
Method and Apparatus for adapting data to a transport unit of
a predefined size prior to transmission
Field of the invention
The invention relates to the fields of data transmission and
data decoding and in particular to the area of error
detection and correction.
Summary of the invention
The detection and correction of errors that occur to
transmitted data is a major issue in communications systems,
both for wireless and fixed wire systems. In order to
overcome the loss of data or the corruption of data due to
errors that occur during the transmission, different types of
error detection codes have been introduced that allow for the
data to be encoded before transmission and once received for
any detected errors to be corrected and the correct data
recovered. Such error detection codes are convolutional
codes, cyclic codes, block codes to name but a few.
Not all of the different types of these codes have the same
error detecting and error correcting capabilities. Some have
weaker error detection capabilities than others, which means
that a careful choice has to be done before using a
particular code.
In A. J. McAuley's "Weighted Sum Codes for Error Detection
and their Comparison with Existing Codes", IEEE/ACM
Transactions on Networking, vol. 2, No. 1, Feb. 1994, pp 16 -
22, a new family of error detection codes, Weighted Sum
Codes, is described which has very strong error detection
capabilities over existing codes.

2
In P. Farkas "Comments on Weighted Sum Codes for error
detection and their comparison with existing codes", IEEE/ACM
Transactions on Networking, vol. 3, no. 2, 1995, pp 222-223
and in P. Farkas et al., "Modified Generalised Weighted Sum
Codes for error control" chapter in the textbook "Coding
Communications and Broadcasting", pp. 62 - 72, Research
Studies Press Ltd., England, Feb. 2000, further research and
analysis of the advantages of this family of codes in
detecting and correcting errors was performed.
Furthermore, problems also occur due to corruption when data
is be.i.ng transmitted over an air-interface, in the case of a
wireless communications system, or e.g. in a fibre optic
cable, in the case of a terrestrial communications system.
The encoded data that is generated by the different error
control codes does not easily match the fixed structure of
the transporting units, like for example an ATM (Asynchronous
Transfer Mode) cell or an IP (Internet Protocol) packet or a
frame, and as the generated encoded data has to be shortened,
this can cause further difficulties in detecting and
correcting the data when errors occur. When errors occur
systems have to waste bandwidth resources in retransmitting
the erroneous data.
One of the ways that this problem was solved, was by
selecting a code whose parameters directly fulfil the
predefined constraints of the transport block.
Another approach, was to select a code with a longer codeword
(n) and a higher number of information symbols (k) in a
codeword and then shortening that code. Shortening is
performed by not using a selected number of information
symbols.
However both have the drawback that the selected codes do not
always have an optimal error detection/correction capability.

3
A need therefore exists for a technique to implement a
solution that can provide both a detection/correction
capability that can detect and correct multiple errors
present in the received encoded data, as well as matching the
encoded data to a predefined transport unit size prior to
transmission.
The present invention resolves the above mentioned problems.
The proposed method and device are responsive both to
multiple error detection/correction requirements as well as
to match.i.ng the encoded data to a predefined transport unit
s i 7, e .
The .invention .is achieved by the teachings contained in the
independent claims.
Said method adapts data in a communications system to be
transmitted from a sender to a receiver, to a transport unit
of a predefined size comprising the steps of:
- representing said data as a combination of bits over a
finite field, wherein said data comprises of an information
part and a control part;
- adapting said represented data to fit said predefined size
of said transport unit, by expressing both said information
and control parts with bits, wherein said bits are less in
number that said represented combination of bits and a number
of removed bits is known to said receiver, said removed bits
comprise of bits from both said information and control
parts.
Said apparatus located in a communications system, comprises
means for employing the method according to claim 1.
Further advantages can be seen in the dependent claims,
whereby the incomplete symbols that are received comprise of
both incomplete control symbols and incomplete information
symbols. The transport unit can be a cell, a packet or a

4
frame, and the data can be encoded using an error control
code, which can be a Weighted Sum code, a Modified
Generalised Weighted Sum code, a Reed Solomon code, a Hamming
code, or a Turbo Block code.
Short description of the drawings
The present invention will become more fully understood from
the detailed description given herein below and the
accompanying drawings which are given by way of illustration
only and thus are not limitative of the present invention.
F.ig.l, shows a flow chart displaying the encoding algorithm
used in the proposed invention.
Fig.2, shows a flow chart displaying the decoding algorithm
used in a decoder.
Fig. 3a, 3b, show an apparatus where the proposed .invention
is implemented.
Fig. 4, 5 show an illustrative implementation of an decoder
and symbol generator respectively.
Detailed description of the invention
In practical applications of error control codes the
parameters of such codes as codeword length, the number of
information symbols contained have to be adapted to a
predefined transport unit size, as in the case where the
transport protocol has a fixed size block for payload and
redundancy, as in the case of an ATM cell or IP packet, or
frame. Such adaptation can influence the error control
capability of the code. Techniques currently in use, only
adapt the number of information symbols in order to fit the
codeword into the transport unit. Usually, a code with a

5
longer codeword as needed for the given transport unit is
chosen with the appropriate error control capability and then
the number of information symbols is reduced. The control
symbols are not modified. This adaptation, is termed in the
literature "shortening". Using it, the amount of information
symbols that are to be transmitted is reduced, thus not all
information symbols are transmitted. Such adaptations,
sometimes, do not allow the use of a code with higher error
control capabilities. The terms "symbol/symbols" are
equivalent and have the same meaning as the terms "bit/bits"
and are used interchangeably.
In order to overcome this, the code parameters are adapted to
the available space of the transport unit for the information
part (information symbols) and control part (control symbols)
of the error control codeword that is to be transmitted.
Within the application, the terms "information part" and
"information symbol" are equivalent, have the same meaning
and arc used interchangeably. The same applies for the terms
"control part" and "control symbols". Therefore, in the
proposed technique not only the information part but also the
control part is shortened and in turn also incompletely
transmitted, contrary to current use, where only whole
information parts are shortened and then transmitted.
In a finite field (also known as a Galois Field or GF(p)),
consists of a set of values plus some defined arithmetic
operations such that when these operations are carried out
the result yields values only within the defined set. A GF(p)
is called the prime field of order p, where p elements are
denoted 0, 1,... p-1. The properties of a finite field are:
a) There are two defined operations, addition and
multiplication.
b) The result of adding or multiplying two elements from the
field is always an element of the field.
c) One element of the field is the element zero, such that
cH-0 = α, for any element α in the field.

6
d) One clement of the field is unity, such that α x 1 = α,
for any element a in the field.
c) For every element a in the field, there is an additive
inverse element -α, such that α+(-α) = 0. This allows the
operation of subtraction to be defined as addition of the
inverse.
f) For every nonzero element α in the field there is a
multiplicative inverse element α-1, such that α x α-1 = 1.
This allows the operation of division to be defined as a
multiplication by the inverse.
g) The associative [α + (b + c) = (or + b) + c, α x (b + c) =
(α x b) x c] , commutative [α + b = b + α, α x b = b x α], and
distributative [α x (b + c) = α x b + αxc] laws apply.
Where α, b, c are elements of the field.
In a GF(16) (Galois Field or Finite Field), for example, each
individual piece of data can be expressed as a 4-bit
combination. Instead of using all 4 bits when encoding the
data, 1, 2, or 3 bits can be used depending on the predefined
transport unit size and the application to be encoded. It can
be seen that this technique provides a user with a lot more
freedom to adapt the process to the requirements at hand and
it also improves the overall error control capabilities of
the scheme because the original code can be selected from
bigger sets of codes with better error control capabilities.
By assigning a fixed value to the parts (number of bits from
the information part and control part) that are not used in
the transmission, which is agreed upon by a sender and a
receiver, the receiver can use known methods for decoding the
received data, as it can fill in the missing parts. Thus
avoiding any significant modification to the mechanism of a
decoder. The agreement can be performed at any moment prior
to the commencement of the step of representing the data over
a finite field as a combination of bits, for example when the
sender and the receiver initiate a call set up procedure.

7
Furthermore, the number of bits that are not used is
distributed between the two parts depending on the type of
data service required. For example if the service is voice or
multimedia (i.e. voice and image) or data, the number of bits
not used can be distributed between the two parts equally, or
more to one part than the other, so that a better protection
can be achieved and the data then can be more easily
recovered. In this way the proposed technique provides added
flexibility to the way that encoded data can be fitted into a
transport unit.
There follows an exemplary embodiment, that further
illustrates the technique of the invention. In this example
an ATM cell is used as the predefined transport unit, however
it is obvious to any skilled person in the art that other
predefined transport unit such as an IP packet or a frame can
be substituted to the same effect. Additionally, a GF(8) is
used whereby 3 bits are used to express each piece of data.
The bit correspondence of a GF(8) is shown in the following
table:

000 0
001 α0
010 α1
100 α2
011 α3
110 α4
111 α5
101 α6
In a first example, it is required to protect the ATM cell
header with increased error correcting capability. The
standard solutions in the prior art, allow for all single bit
errors in the 5 byte cell header to be corrected using one of
the coll bytes for error control redundancy, abbreviated as
the HFC-byte (Header Error Control - byte) . An ATM cell has a.

8
predefined size of 53 bytes, comprising a 48 byte payload and
a 5 byte cell header.
Within the cell header, there exist 4 bytes for information
that translates to 32 bits and 1 byte for redundancy equal to
8 bits.
The error control code used to implement the technique, is
defined over a GF(8) and has the following H matrix (1):

The above matrix (1) has a special structure, which can be
bettor seen if it is expressed as follows (2):

The code used in this illustrative example, has an original
form of an [17, 14, 3] code over a GF(8). Where 17 denotes
the codeword length, 14 denotes the number of information
symbols and 3 denotes the code distance. Therefore the
codeword can be expressed using a vector (6):

9

The encoding of this systematic code can be described using a
G matrix for which
GHT = 0 (7) (where HT is the transposed matrix of H)
as follows:

where is an information vector with 14
coordinates over GF(8), which can contain 42 bits of
information.
The resulting codeword therefore contains 51 bits, 42 of
which can transport information symbols (the information
part) and the other 9 bits are formed by 3 control symbols
(the control part). This corresponds to step 2 of the
encoding algorithm shown in fig. 1. This codeword can correct
any single bit error and any double bit error which appears
in a GF(8) symbol and any triple bit error which appears in
one symbol over GF(8).
As stated before, the problem is that the parameters of the
code (codeword length and information symbols) are not
adapted to the available space of the cell header of an ATM
cell, i.e. 32 bits for information and 8 bits for redundancy.
Using the proposed technique, values can be assigned to parts
of a particular symbol or whole symbols thus reducing its
size. This corresponds to steps 3 and 4 of the encoding
algorithm shown in fig. 1. For example, zero values can be
assigned to the two lsb (least significant bit) positions of
the information symbol i1, i12 and zero values to all the bits
of i13, i14 in the information vector i . During encoding, the
complete set of 14 symbols over GF(8) is used, including the
predefined positions in the first symbol and all other bit

10
positions are filled with information bits according to the
following matrix (9):

Because the above matrices define a systematic code only
multiplication with the last three columns of G is necessary.
Once the multiplication is performed, only the msb (most
significant bit) positions of symbols en = ii (which contains
bi) and C6 = ii? (which contains b3?) are transmitted.
Altogether, it is necessary to have 32 binary positions to
transmit Ci7, c16, cX5f c14r Ci3, c12l Cn, ci0, c9, c8, c7, c6.
From the remaining 8 binary positions 6 can be filled with
symbol s c2, c3 and the last two binary positions with 2 msb
of symbol Ci. The control symbol Ci can be calculated during
encoding by multiplying the information vector with the third
row of the H matrix.
On the receiver side, in order to decode the above encoded
information, after receiving and filling out the information
of the incompletely transmitted symbols, step 1 of the
decoding algorithmshown in fig. 2. It has to be noted here as
stated above that the receiver is aware of the bits that were
not transmitted, the receive vector v will have the form
(10) :
V =[Vi7, V16, V15, V14, V13, V12, Vn, Vio, Vg, V8, V7, V6, V5, V4, V3,
V?, VT]
It is further shown, that one of the coordinates can be
corrected. An error in position i can be expressed as
follows:


11
where Y denotes the error value. Let X denote the error
locator within block A. In other words it determines which of
the positions from a set corresponding to block A is in
error. In our example two such sets exist:

Therefore, if the value of X is known, the position of the
error is known within a block A, but not within which block.
If X = a3 the position v6 or V13 is in error.
In order to decode and locate which positions are in error,
the following syndromes are defined. (This corresponds to
step 2., in fig. 2):

Where Y is called the value of the error, X is called the
error locator and Z is called the error block locator.
The syndromes can be calculated by multiplication

Where and HT is the transposed matrix H.
After performing the syndrome calculation, in step 3 of fig.
2, based on equation (17), the decoding process will continue
as follows:

12
If S = (0, 0, 0), in step 3a of fig. 2, then the decoding is
finished and it is estimated that no errors occurred during
transmission and all the received bits in the corresponding
positions of the received vector (10) are a correct estimate
of the transmitted information.
If S - (So, 0, 0) , .in step 3b of fig. 2, then an error has
occurred in symbol C3 and its value is recalculated through
encoding similarly to the encoding process, using received
information bits, step 3d of fig. 2.
If S = (0, Si, 0) , in step 3b of fig. 2, then an error has
occurred in symbol c? and its value is recalculated through
encoding similarly to the encoding process, using received
information bits, step 3d of fig. 2.
If S ~ (0, 0, S2), in step 3b of fig. 2, then an error has
occurred in symbol ci and its value is recalculated through
encoding similarly to the encoding process, using received
information bits, step 3d of fig. 2.
In the case of all other combinations in S, in step 3c of
fig. 2, an error has occurred in other positions and the
decoding will proceed as follows by calculating the values of
Y, X, Z using the already calculated syndromes, in step 4 of
fig. 2:
Y - S0 (18)
X = Si/Y (19)
Z = S/Y (20)
At this point, one symbol error in GF(8) can be corrected, as
the value of the error is known as it is given by Y, the
position within block A is given by X and the information in
which one of sets Ai or A2 the error is located, is given by
Z, step 6 of fig. 2.

13
Specifically if Z belongs to the set {a4, a5} then the error
is .in set Ai . If Z belongs to the set {a2, a6} then the error
is in set A2. In these two cases, step 6 of fig. 2, the
errors having been detected will be in turn corrected.
In the case that Z does not belong to the set {a4, a5 , a2,
a6}, step 7 of fig. 2, or the error is located in positions
that were not transmitted, then the decoding process has
detected an uncorrectable error and a retransmission of the
data can be requested, step 8 of fig. 2.
As it can therefore be seen, the proposed technique of using
incomplete symbols, provides for a very strong error
correction capability, as all single bit errors as well as
many double and triple bit errors can be corrected with the
same redundancy of one byte. The term "incomplete symbols" is
equivalent and has the same meaning as the term "incomplete
bit". Specifically, the double and triple errors can be
corrected if they are contained in one GF(8) symbol. In other
words these errors, do not damage two distinct symbols from
GF(8). In contrast, existing techniques can correct all
single bit errors but only detect some additional error
combinations.
In a second illustrative example, the same encoding as in the
first example is kept, with two small modifications. The
first one is that only the first msb is transmitted from the
symbol ci. The second one is that the one position that
becomes available due to the first modification is filled
with the overall parity check bit.
The decoding process is similar to the decoding process in
the first example with two alterations.
1. The decision regarding the A block in which the symbol
error is located is done using the following decision
parameters:

14
If Z belongs to the set {a4, a5 , a2, a6}, then the error is
located in the set Ai .
If Z belongs to the set {0, a0 , a1, a3}, then the error is
located in the set A2.
2. After decoding, the overall parity check is done using
decoded bits of information bits and parity bits. Using this
parity check some uncorrectable errors can be detected as
well as correcting the errors detected in the above first
example, and appropriate action can be taken by the receiver,
like requesting a retransmission of the data.
Furthermore, it can be seen that in a more general adaptation
of the parameters found in P. Farkas et al., "Modified
Generalised Weighted Sum Codes for error control" chapter in
the textbook "Coding Communications and Broadcasting", pp. 62
- 72, Research Studies Press Ltd., England, Feb. 2000, other
alternatives exist for adapting codes when constructed over a
GF{8).
When transmitting only the msb from symbol Ci the length of
the code can be adapted from 8 bits to 43 bits. When
transmitting the two msb from symbol ci the codeword length
can be adapted from 8 bits to 72 bits and if the complete
symbol ci is transmitted then the codeword length can be
adapted from 9 bits to 103 bits. If 4 control (parity)
symbols are used in the code over the same GF(8), then the
length can be adapted in similar steps up to 650 bits.
Furthermore, the proposed technique can be applied to other
types of codes used in error control, like Reed Solomon
codes, Hamming codes, convolutional codes, or block codes, as
the technique is partially independent of the type of code
used. The technique provides a designer with the freedom of
choosing the type of code that is best suited for the data

15
that needs to be transmitted and at the same time it provided
an increased level of error protection.
Fig. 3a, provides a diagrammatic view of an apparatus that is
arranged to execute the proposed method.
An apparatus 100 in a communications system 10, comprises of
control processor means 200 adapted to control the
functioning of the apparatus, receive/transmit means 300
adapted to receive and transmit data to and from at least one
user 110 located in the communications system 1.0. These means
300 are further adapted to transmit and receive data in
transport units of a predefined size like a cell or packet or
frame. The means 300 then pass on the received data to a
buffer means 500 and to Forming/Filling means 400. These
means 400 adapted to insert the bits of the incomplete
symbols of the data received. Forming means 400 adapted to
form a receive vector over a finite field that has a
characteristic of 2. Naturally, the forming means 400 can be
arranged to form a receive vector over a finite field that
has a different characteristic, for example 3, 4 etc.
Calculating means 600 adapted to perform a syndrome
calculation based upon a series of defined syndromes and on
the formed receive vector. Decoding means 700 are adapted to
use the resultant syndromes for calculation and the decoding
algorithm (decoding logic) to decode the received data, with
the aid of the control processor means 200. The decoding
means 700 are adapted to recognise and decode data that has
been encoded using a Weighted Sum code, a Modified
Generalised Weighted Sum code, a Reed Solomon code, a Hamming
code, a Turbo Block code or similar types of error control
codes. Detecting means 800 adapted to detect using the
resulting decoding, a location of an occurrence of an error
in the decoded data. Correcting means 500 adapted upon
detection of said error to correct the error. The received
data once corrected is outputted via adapted output means
1000. All the means in the apparatus are coupled to the
control means 200.

16
In fig. 4, an illustrative implementation of the structure of
the calculating means 600 is shown. The calculating means 600
comprises of delay elements, for example delay registers
which can handle 3 bits of data at a time, adding and
multiplication elements that add and multiply the incoming
bits, with bits that have been stored during a previous
input. The addition and multiplication is performed using the
defined operations of the particular set of elements within
the finite field, in this instance GF(8), however this can be
modified depending on the type of finite field used. It is
obvious to a person skilled in the art, that upon
initialisation of the calculating means 600, there are no
bits stored and that the delay elements are empty. The
outputs generated are then, under the control of the control
processor 200 and the decoding means 700 processed and passed
on to the correcting means 900, which also receives the data
buffered by the buffer means 500. With the aid of the
detecting means 800 which detect the location of any errors
the correcting means 900 will generate the correction of the
data to be passed on to the output means 1000. Naturally,
depending on the type of finite field used, the delay
elements are adapted to handle the appropriate number of
bits .
The switches are controlled in accordance to the H matrix
(sub-matrices A). The first branch from the top corresponds.
to the first row in the H matrix, therefore there is no
switch necessary because there are only Is in this row. In
the second branch which corresponds to the second row in the
H matrix from the beginning to the end of the left A sub-
matrix, the upper sub-branch will multiply the symbol with a0
,it will switch to the lower sub-branch and will stay in this
position for the next 7 symbols. The third branch corresponds
to the third row in the H matrix, and it functions similarly
with the second branch. The same applies for the switches in
fig. 5 which follows.

17
In tho event of no error or errors being detected, the
received data is directly outputted by the output means 1000.
In the event that an error has occurred but can not be
corrected after detection, the control means 200 will request
the user 110 to retransmit that particular part of the data
again, by transmitting a request via the receive/transmit
means 300.
Additionally, the apparatus 100 can be used to encode data
that .is to be transmitted on the network. Fig. 3b, provides a
diagrammatic view of the apparatus, when it is used in this
way. The apparatus 100 comprises of control processor means
200 adapted to control the functioning of the apparatus,
receive/transmit means 300 adapted to receive and transmit
data to and from a user 110 also located in said
communications system 10, data input means 410 for receiving
data to be encoded, buffer means 500 for buffering a copy of
the data to be transmitted, generating means 505 for
generating the symbols of the received data, generating means
510 for generating redundant symbols corresponding to the
data that is being encoded, matching means 610 and removal
means 650 adapted to match the encoded symbols to a
predefined size of a transport unit that the control means
200 stipulates, by removing bits from the encoded symbols and
generating in turn incomplete symbols that are then
transmitted to the user 110 via the receive/transmit means
300.
In fig.5, an illustrative implementation of the structure of
the symbol generator 510 is shown. The symbol generator 510
comprises of delay elements, for example delay registers
which can handle 3 bits of data at a time, adding and
multiplication elements that add and multiply the incoming
bits, with bits that have been stored during a previous
input. The addition and multiplication is performed using the
defined operations of the particular set of elements within
the finite field, in this instance GF(8), however this can be

18
modified depending on the type of finite field used. It is
obvious to a person skilled in the art, that upon
initialisation of the symbol generator 510, there are no bits
stored and that the delay elements are empty. The outputs
generated are then, under the control of the control
processor 200, transmitted to the matching means 610, as well
as the data from the buffer means 500, where the generated
data is fitted to the appropriate size of the transportation
unit.
Naturally, depending on the type of finite field used, the
delay elements are adapted to handle the appropriate number
of bits.
The apparatus is arranged to transmit data to a receiver and
also to receive data from a sender in a communications
system. Such an apparatus can be located in a communications
system that is a wireless communication system, a landbase
communications system such as a fibre-optic system or a
copper-wire system, or a mixture of both. An example of such
an apparatus is a base station or a mobile phone located in a
mobile communications system.
Although the invention has been described in terms of a
preferred embodiment described herein, those skilled in the
art will appreciate other embodiments, modifications and
applications which can be made without departing from the
scope of the teachings of the invention. All such
modifications are intended to be included within the scope of
the claims appended hereto.

19
Claims
1. Method for adapting data in a communications system (10)
to bo transmitted from a sender (100) to a receiver (110), to
a transport unit of a predefined size comprising the steps
of:
- representing said data as a combination of bits over a
finite field, wherein said data comprises of an information
part and a control part;
- adapting said represented data to fit said predefined size
of said transport unit, by expressing both said information
and control parts with bits, wherein said bits are less in
number than said represented combination of bits and a number
of removed bits is known to said receiver, said removed bits
comprise of bits from both said information and control
parts.

2. Method according to claim 1, wherein said removed bits are
assigned a fixed value, said fixed value being agreed upon
between said sender and said receiver prior to said step of
representing said data.
3. Method according to any one of the previous claims,
wherein a distribution of said number of removed bits between
both said information and control parts, is dependant on a
type of data service required.
4. Method according to any one of the previous claims,
wherein said transport unit is at least one of the following:
a cell, a packet, a frame.
5. Method according to any one of the previous claims,
wherein said sender generates said data using an error
control code.
6. Method according to claim 5, wherein said error control
code is at least one of the following:

20
a Weighted Sum code, a Modified Generalised Weighted Sum
code, a Reed Solomon code, a Hamming code, a Turbo Block
code.
7. Apparatus (100) located in a communications system (10),
arranged to act as a sender and comprising means for
employing the method according to claim 1 to 6 and additional
means (300) arranged to transmit said transport unit.
8. Apparatus (100) according to claim 7 further adapted to
act as a receiver, comprising means (300) arranged to receive
said transport unit and decode said data contained in said
transport unit.

The invention consists of an apparatus and a method for adapting data in a communications system to be transmitted
from a sender to a receiver, to a transport unit of a predefined size comprising the steps of: - representing said data as a combination
of bits over a finite field, wherein said data comprises of an information part and a control part; - adapting said represented data to
fit said predefined size of said transport unit, by expressing both said information and control parts with bits, wherein said bits are
less in number that said represented combination of bits and a number of removed bits is known to said receiver, said removed bits
comprise of bits from both said information and control parts .

Documents:

05051-kolnp-2007-abstract.pdf

05051-kolnp-2007-claims.pdf

05051-kolnp-2007-correspondence others.pdf

05051-kolnp-2007-description complete.pdf

05051-kolnp-2007-drawings.pdf

05051-kolnp-2007-form 1.pdf

05051-kolnp-2007-form 2.pdf

05051-kolnp-2007-form 3.pdf

05051-kolnp-2007-form 5.pdf

05051-kolnp-2007-gpa.pdf

05051-kolnp-2007-international publication.pdf

05051-kolnp-2007-international search report.pdf

05051-kolnp-2007-pct priority document notification.pdf

05051-kolnp-2007-pct request form.pdf

5051-KOLNP-2007-(21-12-2012)-ABSTRACT.pdf

5051-KOLNP-2007-(21-12-2012)-CLAIMS.pdf

5051-KOLNP-2007-(21-12-2012)-CORRESPONDENCE.pdf

5051-KOLNP-2007-(21-12-2012)-DESCRIPTION (COMPLETE).pdf

5051-KOLNP-2007-(21-12-2012)-DRAWINGS.pdf

5051-KOLNP-2007-(21-12-2012)-FORM 1.pdf

5051-KOLNP-2007-(21-12-2012)-FORM 2.pdf

5051-KOLNP-2007-(21-12-2012)-FORM 3.pdf

5051-KOLNP-2007-(21-12-2012)-OTHERS.pdf

5051-KOLNP-2007-(21-12-2012)-PETITION UNDER RULE 137.pdf

5051-KOLNP-2007-CANCELLED PAGES.pdf

5051-KOLNP-2007-CORRESPONDENCE.pdf

5051-KOLNP-2007-EXAMINATION REPORT.pdf

5051-KOLNP-2007-FORM 18.pdf

5051-KOLNP-2007-GPA.pdf

5051-KOLNP-2007-GRANTED-ABSTRACT.pdf

5051-KOLNP-2007-GRANTED-CLAIMS.pdf

5051-KOLNP-2007-GRANTED-DESCRIPTION (COMPLETE).pdf

5051-KOLNP-2007-GRANTED-DRAWINGS.pdf

5051-KOLNP-2007-GRANTED-FORM 1.pdf

5051-KOLNP-2007-GRANTED-FORM 2.pdf

5051-KOLNP-2007-GRANTED-FORM 3.pdf

5051-KOLNP-2007-GRANTED-FORM 5.pdf

5051-KOLNP-2007-GRANTED-SPECIFICATION-COMPLETE.pdf

5051-KOLNP-2007-INTERNATIONAL PUBLICATION.pdf

5051-KOLNP-2007-INTERNATIONAL SEARCH REPORT & OTHERS.pdf

5051-KOLNP-2007-PETITION UNDER RULE 137.pdf

5051-KOLNP-2007-REPLY TO EXAMINATION REPORT.pdf

abstract-05051-kolnp-2007.jpg


Patent Number 258698
Indian Patent Application Number 5051/KOLNP/2007
PG Journal Number 06/2014
Publication Date 07-Feb-2014
Grant Date 31-Jan-2014
Date of Filing 27-Dec-2007
Name of Patentee NOKIA SIEMENS NETWORKS GMBH & CO. KG
Applicant Address ST. MARTIN STR. 76, 81541 MUNCHEN
Inventors:
# Inventor's Name Inventor's Address
1 PETER FARKAS LERMONTOVOVA 19 81105 BRATISLAVA, SK
PCT International Classification Number H04L 1/00
PCT International Application Number PCT/EP2006/063305
PCT International Filing date 2006-06-19
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 EP05014465 2005-07-04 EUROPEAN UNION