CA2318658C - Interference suppression in cdma systems - Google Patents
Interference suppression in cdma systems Download PDFInfo
- Publication number
- CA2318658C CA2318658C CA2318658A CA2318658A CA2318658C CA 2318658 C CA2318658 C CA 2318658C CA 2318658 A CA2318658 A CA 2318658A CA 2318658 A CA2318658 A CA 2318658A CA 2318658 C CA2318658 C CA 2318658C
- Authority
- CA
- Canada
- Prior art keywords
- user
- receiver
- isr
- channel
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/707—Spread spectrum techniques using direct sequence modulation
- H04B1/7097—Interference-related aspects
- H04B1/7103—Interference-related aspects the interference being multiple access interference
- H04B1/7105—Joint detection techniques, e.g. linear detectors
- H04B1/71052—Joint detection techniques, e.g. linear detectors using decorrelation matrix
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/08—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
- H04B7/0837—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
- H04B7/0842—Weighted combining
- H04B7/086—Weighted combining using weights depending on external parameters, e.g. direction of arrival [DOA], predetermined weights or beamforming
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Transmission System (AREA)
Abstract
A receiver of the present invention addresses the need for improved interference suppression rates without the number of transmissions by the power control system being increased, and, to this end, provides a receiver for a CDMA communications system which employs interference subspace rejection to obtain a substantially unity response for a propagation channel via which a corresponding user's signal was received and a substantially null response to interference components from selected signals of other user stations. The receiver may be used in a base station or in a user/mobile station.
Description
INTERFERENCE SUPPRESSION IN CDMA SYSTEMS
DESCRIPTION
TECHNICAL FIELD:
The invention relates to Code-Division Multiple Access (CDMA) communications systems, which may be terrestrial or satellite systems, and in particular to interference suppression in CDMA communications systems.
BACKGROUND ART:
Code-Division Multiple Access communications systems are well known. For a general discussion of such systems, the reader is directed to a paper entitled "Multiuser Detection for CDMA Systems" by Duel-Hallen, Holtzman and Zvonar, IEEE Personal Communications, pp. 46-58, April 1995.
In CDMA systems, the signals from different users all use the same bandwidth, so each user's signal constitutes noise or interference for the other users.
On the uplink (transmissions from the mobiles) the interference is mainly that from other transmitting mobiles. Power control attempts to maintain the received powers at values that balance the interference observed by the various mobiles, but, in many cases, cannot deal satisfactorily with excessive interference. Where mobiles with different transmission rates are supported within the same cells, the high-rate mobiles manifest strong interference to the low-rate mobiles. On the downlink (transmission towards the mobiles) transmissions from base-stations of other cells as well as strong interference from the same base-station to other mobiles may result in strong interference to the intended signal. Downlink power control may be imprecise or absent altogether.
In all these so called near-far problem cases, the transmission quality can be improved, or the transmitted power reduced, by reducing the interference. In turn, for the same transmission quality, the number of calls supported within the cell may be increased, resulting in improved spectrum utilization.
Power control is presently used to minimize the near-far problem, but with limited success. It requires a large number of power control updates, typically 800 times per second, to reduce the power mismatch between the lower-rate and higher-rate users.
It is desirable to reduce the number of communications involved in such power control systems, since they constitute overhead and reduce overall transmission efficiencies.
Nevertheless, it is expected that future CDMA applications will require even tighter power control with twice the number of updates, yet the near-far problem will not be completely eliminated. It is preferable to improve the interference suppression without increasing the number of transmissions by the power control system.
Multiuser detectors achieve interference suppression to provide potential benefits to CDMA systems such as improvement in capacity and reduced precision requirements for power control. However, none of these detectors is cost-effective to build with significant enough performance advantage over present day systems. For example, the complexity of the optimal maximum likelihood sequence detector (MLSD) is exponential in the number of interfering signals to be cancelled, which makes its implementation excessively complex. Alternative suboptimal detectors fall into two groups:
linear and subtractive. The linear detectors include decorrelators, as disclosed by K.S.
Schneider, "Optimum detection of code division multiplexed signals", IEEE Trans. on Aerospace and Electronic Systems, vol. 15, pp. 181-185, January 1979 and R. Kohno, M.
Hatori, and H. Imai, "Cancellation techniques of co-channel interference in asynchronous spread spectrum multiple access systems", Electronics and Communications in Japan, vol.
66-A, no. 5, pp. 20-29, 1983. A disadvantage of such decorrelators is that they cause noise enhancement.
Z. Xie, R.T. Short, and C.K. Rushforth, "A family of suboptimum detectors for coherent multiuser communications", IEEE Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 683-690, May 1990, disclosed the minimum mean square error linear (MMSE) detector, but such detectors are sensitive to channel and power estimation errors. In both cases, the processing burden still appears to present implementation difficulties.
Subtractive interference cancellation detectors take the form of successive interference cancellers (SIC), as disclosed by R. Kohno et al.,"Combination of an adaptive array antenna and a canceller of interference for direct-sequence spread-spectrum multiple-access system", IEEE Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 675-682, May 1990, and parallel interference cancellers (PIC) as disclosed by M.K. Varanasi and B. Aazhang, "Multistage detection in asynchronous code-division multiple-access communications", IEEE Trans. on Communications, vol. 38, no. 4, pp. 509-519, April 1990, and R. Kohno et al., "Combination of an adaptive array antenna and a canceller of interference for direct-sequence spread-spectrum multiple-access system", IEEE Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 675-682, May 1990. Both SIC
detectors and PIC detectors require multi-stage processing and the interference cancellation achieved is limited by the amount of delay or complexity tolerated. These detectors are also very sensitive to channel, power and data estimation errors.
One particular subtractive technique was disclosed by Shimon Moshavi in a paper entitled "Multi-User Detection for DS-CDMA Communications", IEEE
Communications Magazine, pp. 124-136, October 1996. Figure 5 of Moshavi's paper shows a subtractive interference cancellation (SIC) scheme in which the signal for a particular user is extracted in the usual way using a matched filter and then spread again using the same spreading code for that particular user, i. e. , the spreading code used to encode the signal at the remote transmitter. The spread-again signal then is subtracted from the signal received from the antenna and the resulting signal is applied to the next user's despreader. This process is repeated for each successive despreader. Moshavi discloses a parallel version that uses similar principles.
A disadvantage of this approach is its sensitivity to the data and power estimates, i. e., their accuracy and the sign of the data. A wrong decision will result in the interference component being added rather than subtracted, which will have totally the wrong effect.
For more information about these techniques, the reader is directed to a paper by P. Patel and J. Holtzman entitled "Analysis of a Simple Successive Interference Cancellation Scheme in a DS/CDMA System", IEEE Journal on Selected Areas in Communications, Vol. 12, No. 5, pp. 796-807, June 1994.
In a paper entitled "A New Receiver Structure for Asynchronous CDMA: STAR -The Spatio-Temporal Array-Receiver", IEEE Transaction on Selected Areas in Communications, Vol. 16, No. 8, October 1998, S. Affes and P. Mermelstein (two of the present inventors), disclosed a technique for improving reception despite near/far effects and multi-user interference. In contrast to known systems in which the spread-again signal is supplied to the input of the despreader of the channel to be corrected, Affes' and Mermelstein's proposed system treated all of the users' signals together and processed them as a combined noise signal. If the components of the received signal from the different users were uncorrelated and all had equal power, or substantially equal power, this process would be optimal. In practice, however, there will be significant differences between the power levels at which the different users' signals are received at the base station antenna. The same applies to the downlink. For example, a data user may generate much more power than a voice user simply because of the more dense information content of the data signal. Also, imperfect power control will result in power differences, i. e. , channel variations may result in received powers different from their intended values, despite the best effort of the power-control process to equalize them.
DISCLOSURE OF INVENTION:
The present invention addresses the need for improved interference suppression without the number of transmissions by the power control system being increased, and, to this end, provides a receiver for a CDMA communications system which employs interference subspace rejection to obtain a substantially unity response for a propagation channel via which a corresponding user's signal was received and a substantially null response to interference components from selected signals of other user stations.
According to one aspect of the invention, there is provided a receiver suitable for either a base station or a user station of a CDMA communications system comprising at least one base station (11) and a plurality of user stations (10'...10') each communicating with said at least one base station via a corresponding one of a plurality of channels, said base station and each user station having a transmitter and a said receiver, the receiver receiving a signal comprising components corresponding to signals from the different transmitters of the base station and/or user stations. The receiver comprises processing means (18) for deriving an observation matrix from the received signal, the receiver comprising a plurality of receiver modules (21) each comprising means (19) for deriving from the observation matrix one or both of a corresponding observation vector and post-correlation observation vector and a beamformer for processing one or other of the observation vector and the post-correlation observation vector to provide estimates of symbols transmitted by a corresponding user station, and means (42,43) for providing at least one constraint matrix representing interference subspace of components of the received signal corresponding to selected ones of the user signals of the plurality of receiver modules, at least one (2l``) of said plurality of receiver modules having means (28d) responsive to at least the post-correlation observation vector for deriving an estimate of the channel parameters for the channel between the receiver and the corresponding transmitter, and a beamformer (47a) for processing one or other of the observation vector and the post-correlation observation vector to produce estimates of the symbols transmitted by said transmitter, the beamformer having means for adjusting coefficients of the beamformer in dependence upon the constraint matrix and the channel estimate so as to tune the beamformer to provide a substantially unity response for that 5 portion of the received signal from the corresponding transmitter and a substantially null response to that portion of the received signal corresponding to predetermined ones of other user signals and/or base station signals also received by the receiver.
According to the present invention, there is provided a receiver for either a base station (or a mobile station) of a CDMA communications system in which a plurality of user stations (10'...10 ) each having an antenna array comprising one or more antennas communicate with a base station (11) having an antenna array (12) comprising one or more reception antennas (12'...12M), each of the user stations having spreading means (13'...13") for using a spreading code (c'(t)...c"(t)) unique to that station to spread a corresponding one of a plurality of user signals (bin...b R) and means for transmitting the spread user signals to the base station antenna array (12) via a propagation channel (14'...14") unique to that user station, the receiver comprising preprocessing means (18) and a plurality of receiver modules (21'. ..21 U) having their respective inputs connected in common to an output of the preprocessing means (18) and each corresponding to a respective one of the user stations, the preprocessing means (18) being arranged to receive from the antenna array an antenna array signal vector (X(t)) comprising a plurality of spread data vectors (X1(t) ... X U(t)) corresponding to the signals from the different user stations received by the reception antenna array and having means for filtering, sampling and buffering the antenna array signal vector (X(t)) to produce a succession of observation matrices (Yõ), and supplying the observation matrices (Yd to each of the receiver modules (21'...21");
...21 ) comprising a despreader (19 ), a channel each of the receiver modules (211 identification means (28 ), a beamformer (27 ) and output means (29 ,30 ), the despreader (19 ) being arranged to despread each observation matrix using the spreading code of the corresponding user to form a post-correlation observation vector (Zu) and the channel identification means (28 ) being arranged to derive from the n post-correlation observation vector a set of estimated channel parameters (H") for the n channel whereby the signal from the corresponding user station reached the antenna array, the beamformer (27 ) having means (51) for weighting each of the elements of each observation vector in turn using weighting coefficients (Wn), tuning means (50) n for adjusting the weighting coefficients (yyu) in dependence upon at least said estimated n channel parameters, and means (52) for combining the weighted elements to produce a respective symbol of a corresponding one of a plurality of output signals (bn .., bn ) corresponding to the plurality of user signals (bn .., bn ), respectively, the receiver further comprising constraints-set generation means (42) responsive to a set of channel parameter estimates and either or both of an actual value of the symbol from at least one of the beamformers and at least one hypothetical symbol value for deriving a constraints-set, and constraint matrix generation means (43) responsive to said constraints-set for forming at least one constraint matrix and corresponding inverse matrix;
the respective tuning means of at least some of the beamformers being responsive to said at least one constraint matrix to adjust the weighting coefficients (Wd) of their n respective beamformers such that, in successive symbol periods, the coefficients of each of said at least some of the beamformers are adjusted so as to tune a substantially unity response for that portion of the antenna array signal vector corresponding to the user signal from the corresponding user station and a substantially null response to that portion of the antenna array signal vector corresponding to the user signals received from those user stations corresponding to the receiver modules which contribute a constraint waveform to the constraint matrix generation means;
the output means of each receiver module being responsive to the output of the corresponding beamformer for providing estimates of the symbols of the corresponding user signal.
Embodiments of the invention may employ one of several alternative modes of implementing interference subspace rejection (ISR), i.e. characterizing the interference and building the constraint matrix. In a first embodiment, using a first mode conveniently designated ISR-TR, each receiver module in the first group generates its re-spread signal taking into account the amplitude and sign of the symbol and the channel characteristics. The re-spread signals from all of the receiver modules of the first group are summed to produce a total realization which is supplied to all of the receiver modules in the second group.
Where each receiver module of the second set uses decision feedback, it further comprises delay means for delaying each frame/block of the observation vector before its application to the beamformer.
Whereas, in ISR-TR embodiments, just one null constraint is dedicated to the sum, in a second embodiment, which uses a second mode conveniently designated ISR-R, estimated realisations of all the interferers are used, and a null constraint is dedicated to each interference vector. In this second embodiment, in each receiver module of the first set, the symbols spread by the spreader comprise estimated realisations of the symbols of the output signal. Also, the constraint waveforms are not summed before forming the constraint matrix. Thus, the receiver module estimates separately the contribution to the interference from each unwanted (interfering) user and cancels it by a dedicated null-constraint in the multi-source spatio-temporal beamformer.
In most cases, estimation of the interference requires estimates of the past, present and future data symbols transmitted from the interferers, in which case the receiver requires a maximum delay of one symbol and one processing cycle for the lower-rate or low-power users and, at most a single null constraint per interferer.
In a third embodiment of the invention which uses a third mode conveniently designated ISR-D, i.e. the observation vector/matrix is decomposed over sub-channels/fingers of propagation path and the beamformer nulls interference in each of the sub-channels, one at a time. In most cases, the maximum number of constraints per interferer is equal to the number of sub-channels, i.e. the number of antenna elements M multipled by the number of paths P.
In a fourth embodiment using a fourth mode conveniently designated ISR-H
because it implements null-responses in beamforming over all possible realisations of the interference, without any delay, each receiver module of the first group further comprises means for supplying to the spreader possible values of the instant symbols of the output signal and the spreader supplies a corresponding plurality of re-spread signals to each of the receiver modules of the second group. In each receiver module of the second group, the despreader despreads the plurality of re-spread signals and supplies corresponding despread vectors to the beamformer. This embodiment suppresses any sensitivity to data estimation errors and, in most cases, requires a maximum of 3 null constraints per interferer.
In a fifth embodiment using a fifth mode conveniently designated ISR-RH
because it uses the past and present interference symbol estimates, in each receiver module of the first group, the spreader spreads the symbols of the output signal itself and, in each receiver module of the second group, the beamformer then implements null-responses over reduced possibilities/hypotheses of the interference realization.
Conveniently, application of the output of the first despreader to the beamformer will take into account the time required for estimation of the interferer's symbol. In most cases, the beamformer will provide a maximum of 2 null constraints per interferer.
In any of the foregoing embodiments of the invention, the channel identification unit may generate the set of channel parameter estimates in dependence upon the extracted despread data vectors and the user signal component estimate.
For each of the above-identified modes, the receiver modules may employ either of two procedures. On the one hand, the receiver module may apply the post-correlation observation vector to the channel identification unit but supply the observation matrix itself directly to the beamformer, i.e. without despreading it. The constraint matrix then would be supplied to the beamformer without despreading.
Alternatively, each receiver module could supply the post-correlation observation vector to both the channel identification unit and the beamformer. In this case, the receiver module would also despread the constraint matrix before applying it to the beamformer.
Where the reception antenna comprises a plurality of antenna elements, the beamformer unit may comprise a spatio-temporal processor, such as a filter which has coefficients tuned by the estimated interference signals.
The receiver modules may comprise a first set that are capable of contributing a constraint waveform to the constraint matrix and a second set that have a beamformer capable of using the constraint matrix to tune the specified null response and unity response. In preferred embodiments, at least some of the plurality of receiver modules are members of both the first set and the second set, i.e. they each have means for contributing a constraint waveform and a beamformer capable of using the constraint matrix.
DESCRIPTION
TECHNICAL FIELD:
The invention relates to Code-Division Multiple Access (CDMA) communications systems, which may be terrestrial or satellite systems, and in particular to interference suppression in CDMA communications systems.
BACKGROUND ART:
Code-Division Multiple Access communications systems are well known. For a general discussion of such systems, the reader is directed to a paper entitled "Multiuser Detection for CDMA Systems" by Duel-Hallen, Holtzman and Zvonar, IEEE Personal Communications, pp. 46-58, April 1995.
In CDMA systems, the signals from different users all use the same bandwidth, so each user's signal constitutes noise or interference for the other users.
On the uplink (transmissions from the mobiles) the interference is mainly that from other transmitting mobiles. Power control attempts to maintain the received powers at values that balance the interference observed by the various mobiles, but, in many cases, cannot deal satisfactorily with excessive interference. Where mobiles with different transmission rates are supported within the same cells, the high-rate mobiles manifest strong interference to the low-rate mobiles. On the downlink (transmission towards the mobiles) transmissions from base-stations of other cells as well as strong interference from the same base-station to other mobiles may result in strong interference to the intended signal. Downlink power control may be imprecise or absent altogether.
In all these so called near-far problem cases, the transmission quality can be improved, or the transmitted power reduced, by reducing the interference. In turn, for the same transmission quality, the number of calls supported within the cell may be increased, resulting in improved spectrum utilization.
Power control is presently used to minimize the near-far problem, but with limited success. It requires a large number of power control updates, typically 800 times per second, to reduce the power mismatch between the lower-rate and higher-rate users.
It is desirable to reduce the number of communications involved in such power control systems, since they constitute overhead and reduce overall transmission efficiencies.
Nevertheless, it is expected that future CDMA applications will require even tighter power control with twice the number of updates, yet the near-far problem will not be completely eliminated. It is preferable to improve the interference suppression without increasing the number of transmissions by the power control system.
Multiuser detectors achieve interference suppression to provide potential benefits to CDMA systems such as improvement in capacity and reduced precision requirements for power control. However, none of these detectors is cost-effective to build with significant enough performance advantage over present day systems. For example, the complexity of the optimal maximum likelihood sequence detector (MLSD) is exponential in the number of interfering signals to be cancelled, which makes its implementation excessively complex. Alternative suboptimal detectors fall into two groups:
linear and subtractive. The linear detectors include decorrelators, as disclosed by K.S.
Schneider, "Optimum detection of code division multiplexed signals", IEEE Trans. on Aerospace and Electronic Systems, vol. 15, pp. 181-185, January 1979 and R. Kohno, M.
Hatori, and H. Imai, "Cancellation techniques of co-channel interference in asynchronous spread spectrum multiple access systems", Electronics and Communications in Japan, vol.
66-A, no. 5, pp. 20-29, 1983. A disadvantage of such decorrelators is that they cause noise enhancement.
Z. Xie, R.T. Short, and C.K. Rushforth, "A family of suboptimum detectors for coherent multiuser communications", IEEE Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 683-690, May 1990, disclosed the minimum mean square error linear (MMSE) detector, but such detectors are sensitive to channel and power estimation errors. In both cases, the processing burden still appears to present implementation difficulties.
Subtractive interference cancellation detectors take the form of successive interference cancellers (SIC), as disclosed by R. Kohno et al.,"Combination of an adaptive array antenna and a canceller of interference for direct-sequence spread-spectrum multiple-access system", IEEE Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 675-682, May 1990, and parallel interference cancellers (PIC) as disclosed by M.K. Varanasi and B. Aazhang, "Multistage detection in asynchronous code-division multiple-access communications", IEEE Trans. on Communications, vol. 38, no. 4, pp. 509-519, April 1990, and R. Kohno et al., "Combination of an adaptive array antenna and a canceller of interference for direct-sequence spread-spectrum multiple-access system", IEEE Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 675-682, May 1990. Both SIC
detectors and PIC detectors require multi-stage processing and the interference cancellation achieved is limited by the amount of delay or complexity tolerated. These detectors are also very sensitive to channel, power and data estimation errors.
One particular subtractive technique was disclosed by Shimon Moshavi in a paper entitled "Multi-User Detection for DS-CDMA Communications", IEEE
Communications Magazine, pp. 124-136, October 1996. Figure 5 of Moshavi's paper shows a subtractive interference cancellation (SIC) scheme in which the signal for a particular user is extracted in the usual way using a matched filter and then spread again using the same spreading code for that particular user, i. e. , the spreading code used to encode the signal at the remote transmitter. The spread-again signal then is subtracted from the signal received from the antenna and the resulting signal is applied to the next user's despreader. This process is repeated for each successive despreader. Moshavi discloses a parallel version that uses similar principles.
A disadvantage of this approach is its sensitivity to the data and power estimates, i. e., their accuracy and the sign of the data. A wrong decision will result in the interference component being added rather than subtracted, which will have totally the wrong effect.
For more information about these techniques, the reader is directed to a paper by P. Patel and J. Holtzman entitled "Analysis of a Simple Successive Interference Cancellation Scheme in a DS/CDMA System", IEEE Journal on Selected Areas in Communications, Vol. 12, No. 5, pp. 796-807, June 1994.
In a paper entitled "A New Receiver Structure for Asynchronous CDMA: STAR -The Spatio-Temporal Array-Receiver", IEEE Transaction on Selected Areas in Communications, Vol. 16, No. 8, October 1998, S. Affes and P. Mermelstein (two of the present inventors), disclosed a technique for improving reception despite near/far effects and multi-user interference. In contrast to known systems in which the spread-again signal is supplied to the input of the despreader of the channel to be corrected, Affes' and Mermelstein's proposed system treated all of the users' signals together and processed them as a combined noise signal. If the components of the received signal from the different users were uncorrelated and all had equal power, or substantially equal power, this process would be optimal. In practice, however, there will be significant differences between the power levels at which the different users' signals are received at the base station antenna. The same applies to the downlink. For example, a data user may generate much more power than a voice user simply because of the more dense information content of the data signal. Also, imperfect power control will result in power differences, i. e. , channel variations may result in received powers different from their intended values, despite the best effort of the power-control process to equalize them.
DISCLOSURE OF INVENTION:
The present invention addresses the need for improved interference suppression without the number of transmissions by the power control system being increased, and, to this end, provides a receiver for a CDMA communications system which employs interference subspace rejection to obtain a substantially unity response for a propagation channel via which a corresponding user's signal was received and a substantially null response to interference components from selected signals of other user stations.
According to one aspect of the invention, there is provided a receiver suitable for either a base station or a user station of a CDMA communications system comprising at least one base station (11) and a plurality of user stations (10'...10') each communicating with said at least one base station via a corresponding one of a plurality of channels, said base station and each user station having a transmitter and a said receiver, the receiver receiving a signal comprising components corresponding to signals from the different transmitters of the base station and/or user stations. The receiver comprises processing means (18) for deriving an observation matrix from the received signal, the receiver comprising a plurality of receiver modules (21) each comprising means (19) for deriving from the observation matrix one or both of a corresponding observation vector and post-correlation observation vector and a beamformer for processing one or other of the observation vector and the post-correlation observation vector to provide estimates of symbols transmitted by a corresponding user station, and means (42,43) for providing at least one constraint matrix representing interference subspace of components of the received signal corresponding to selected ones of the user signals of the plurality of receiver modules, at least one (2l``) of said plurality of receiver modules having means (28d) responsive to at least the post-correlation observation vector for deriving an estimate of the channel parameters for the channel between the receiver and the corresponding transmitter, and a beamformer (47a) for processing one or other of the observation vector and the post-correlation observation vector to produce estimates of the symbols transmitted by said transmitter, the beamformer having means for adjusting coefficients of the beamformer in dependence upon the constraint matrix and the channel estimate so as to tune the beamformer to provide a substantially unity response for that 5 portion of the received signal from the corresponding transmitter and a substantially null response to that portion of the received signal corresponding to predetermined ones of other user signals and/or base station signals also received by the receiver.
According to the present invention, there is provided a receiver for either a base station (or a mobile station) of a CDMA communications system in which a plurality of user stations (10'...10 ) each having an antenna array comprising one or more antennas communicate with a base station (11) having an antenna array (12) comprising one or more reception antennas (12'...12M), each of the user stations having spreading means (13'...13") for using a spreading code (c'(t)...c"(t)) unique to that station to spread a corresponding one of a plurality of user signals (bin...b R) and means for transmitting the spread user signals to the base station antenna array (12) via a propagation channel (14'...14") unique to that user station, the receiver comprising preprocessing means (18) and a plurality of receiver modules (21'. ..21 U) having their respective inputs connected in common to an output of the preprocessing means (18) and each corresponding to a respective one of the user stations, the preprocessing means (18) being arranged to receive from the antenna array an antenna array signal vector (X(t)) comprising a plurality of spread data vectors (X1(t) ... X U(t)) corresponding to the signals from the different user stations received by the reception antenna array and having means for filtering, sampling and buffering the antenna array signal vector (X(t)) to produce a succession of observation matrices (Yõ), and supplying the observation matrices (Yd to each of the receiver modules (21'...21");
...21 ) comprising a despreader (19 ), a channel each of the receiver modules (211 identification means (28 ), a beamformer (27 ) and output means (29 ,30 ), the despreader (19 ) being arranged to despread each observation matrix using the spreading code of the corresponding user to form a post-correlation observation vector (Zu) and the channel identification means (28 ) being arranged to derive from the n post-correlation observation vector a set of estimated channel parameters (H") for the n channel whereby the signal from the corresponding user station reached the antenna array, the beamformer (27 ) having means (51) for weighting each of the elements of each observation vector in turn using weighting coefficients (Wn), tuning means (50) n for adjusting the weighting coefficients (yyu) in dependence upon at least said estimated n channel parameters, and means (52) for combining the weighted elements to produce a respective symbol of a corresponding one of a plurality of output signals (bn .., bn ) corresponding to the plurality of user signals (bn .., bn ), respectively, the receiver further comprising constraints-set generation means (42) responsive to a set of channel parameter estimates and either or both of an actual value of the symbol from at least one of the beamformers and at least one hypothetical symbol value for deriving a constraints-set, and constraint matrix generation means (43) responsive to said constraints-set for forming at least one constraint matrix and corresponding inverse matrix;
the respective tuning means of at least some of the beamformers being responsive to said at least one constraint matrix to adjust the weighting coefficients (Wd) of their n respective beamformers such that, in successive symbol periods, the coefficients of each of said at least some of the beamformers are adjusted so as to tune a substantially unity response for that portion of the antenna array signal vector corresponding to the user signal from the corresponding user station and a substantially null response to that portion of the antenna array signal vector corresponding to the user signals received from those user stations corresponding to the receiver modules which contribute a constraint waveform to the constraint matrix generation means;
the output means of each receiver module being responsive to the output of the corresponding beamformer for providing estimates of the symbols of the corresponding user signal.
Embodiments of the invention may employ one of several alternative modes of implementing interference subspace rejection (ISR), i.e. characterizing the interference and building the constraint matrix. In a first embodiment, using a first mode conveniently designated ISR-TR, each receiver module in the first group generates its re-spread signal taking into account the amplitude and sign of the symbol and the channel characteristics. The re-spread signals from all of the receiver modules of the first group are summed to produce a total realization which is supplied to all of the receiver modules in the second group.
Where each receiver module of the second set uses decision feedback, it further comprises delay means for delaying each frame/block of the observation vector before its application to the beamformer.
Whereas, in ISR-TR embodiments, just one null constraint is dedicated to the sum, in a second embodiment, which uses a second mode conveniently designated ISR-R, estimated realisations of all the interferers are used, and a null constraint is dedicated to each interference vector. In this second embodiment, in each receiver module of the first set, the symbols spread by the spreader comprise estimated realisations of the symbols of the output signal. Also, the constraint waveforms are not summed before forming the constraint matrix. Thus, the receiver module estimates separately the contribution to the interference from each unwanted (interfering) user and cancels it by a dedicated null-constraint in the multi-source spatio-temporal beamformer.
In most cases, estimation of the interference requires estimates of the past, present and future data symbols transmitted from the interferers, in which case the receiver requires a maximum delay of one symbol and one processing cycle for the lower-rate or low-power users and, at most a single null constraint per interferer.
In a third embodiment of the invention which uses a third mode conveniently designated ISR-D, i.e. the observation vector/matrix is decomposed over sub-channels/fingers of propagation path and the beamformer nulls interference in each of the sub-channels, one at a time. In most cases, the maximum number of constraints per interferer is equal to the number of sub-channels, i.e. the number of antenna elements M multipled by the number of paths P.
In a fourth embodiment using a fourth mode conveniently designated ISR-H
because it implements null-responses in beamforming over all possible realisations of the interference, without any delay, each receiver module of the first group further comprises means for supplying to the spreader possible values of the instant symbols of the output signal and the spreader supplies a corresponding plurality of re-spread signals to each of the receiver modules of the second group. In each receiver module of the second group, the despreader despreads the plurality of re-spread signals and supplies corresponding despread vectors to the beamformer. This embodiment suppresses any sensitivity to data estimation errors and, in most cases, requires a maximum of 3 null constraints per interferer.
In a fifth embodiment using a fifth mode conveniently designated ISR-RH
because it uses the past and present interference symbol estimates, in each receiver module of the first group, the spreader spreads the symbols of the output signal itself and, in each receiver module of the second group, the beamformer then implements null-responses over reduced possibilities/hypotheses of the interference realization.
Conveniently, application of the output of the first despreader to the beamformer will take into account the time required for estimation of the interferer's symbol. In most cases, the beamformer will provide a maximum of 2 null constraints per interferer.
In any of the foregoing embodiments of the invention, the channel identification unit may generate the set of channel parameter estimates in dependence upon the extracted despread data vectors and the user signal component estimate.
For each of the above-identified modes, the receiver modules may employ either of two procedures. On the one hand, the receiver module may apply the post-correlation observation vector to the channel identification unit but supply the observation matrix itself directly to the beamformer, i.e. without despreading it. The constraint matrix then would be supplied to the beamformer without despreading.
Alternatively, each receiver module could supply the post-correlation observation vector to both the channel identification unit and the beamformer. In this case, the receiver module would also despread the constraint matrix before applying it to the beamformer.
Where the reception antenna comprises a plurality of antenna elements, the beamformer unit may comprise a spatio-temporal processor, such as a filter which has coefficients tuned by the estimated interference signals.
The receiver modules may comprise a first set that are capable of contributing a constraint waveform to the constraint matrix and a second set that have a beamformer capable of using the constraint matrix to tune the specified null response and unity response. In preferred embodiments, at least some of the plurality of receiver modules are members of both the first set and the second set, i.e. they each have means for contributing a constraint waveform and a beamformer capable of using the constraint matrix.
In practice, the receiver modules assigned to the stronger user signals will usually contribute a constraint waveform and the beamformer units of the receiver modules assigned to other user signals will be capable of using it.
The receiver module may comprise an MRC beamformer and an ISR beamformer and be adapted to operate in multi-stage, i.e., for each symbol period of frame, it will carry out a plurality of iterations. In the first iteration, the constraints set generator will receive the "past" and "future" estimates from the MRC beamformer and the "past"
symbol estimate, i.e., from the previous frame, and process them to produce a new symbol estimate for the first iteration. In subsequent iterations of the current symbol period or frame, the constraints-set generator will use the "future" estimate from the MRC beamformer, the previous estimate from the ISR beamformer and the symbol estimate generated in the previous iteration. The cycle will repeat until the total number of iterations have been performed, whereupon the output from the receiver module is the desired estimated symbol for the current frame which then is used in the similar iterations of the next frame.
The ISR receiver module comprising both an MRC beamformer and an ISR
beamformer may comprise means {lO1Qd} for extracting from the ISR beamformer (47Qd) an interference-reduced observation vector and reshaping the latter to produce an interference-reduced observation matrix for despreading by the despreader. The channel identification unit then uses the despread interference-reduced observation vector to form interference-reduced channel estimates and supplies them to the residual MRC
beamformer for use in adapting the coefficients thereof.
The ISR beamformer may process blocks or frames of the observation vector that are extended by concatenating a current set of data with one or more previous frames or blocks of data.
The different receiver modules may use different sizes of frame.
In order to receive signals from a user transmitting multicode signals, the ISR
receiver module may comprise a plurality of ISR beamformers and despreaders, each for operating upon a corresponding one of the multiple codes. The channel identification unit then will produce a channel parameter estimate common to all of the multicodes, spread that channel estimate with each of the different multicodes and supply the resulting plurality of spread channel estimates to respective ones of the plurality of ISR
beamformers.
The multicode ISR receiver module may have a despreader (19d a) which uses a compound code comprising each of the multicodes weighted by the corresponding symbol estimate from a respective one of a corresponding plurality of decision-rule units. The despreader will uses the compound code to despread the observation matrix and supply 5 the corresponding compound post-correlation observation vector to the channel identification unit. The channel identification unit will use that vector to produce the channel estimate and spread it using the different ones of the multicodes to produce the spread channel estimates.
The ISR receiver module may comprise a despreader 19Sd,', ..., I9Sd F using 10 a plurality of codes which comprise segments of a main code specified for that user.
Each segment corresponds to a symbol, and to a symbol duration in a large block of data, the number of segments being determined by the data rate, i.e., number of symbols within a block, of that user. Each receiver module may have a different number of segments assigned thereto according to the data rate of the corresponding user.
Embodiments of the invention may be adapted for use in a user/mobile station capable of receiving user-bound signals transmitted by a plurality of base stations each to a corresponding plurality of users, the receiver then comprising a selection of receiver modules each corresponding to a different base station and configured to extract a preselected number of said user-bound signals. Where the particular user/mobile station is included in the preselected number, the receiver module may comprise a similar structure to the above-mentioned multicode receiver, the plurality of despreaders being adapted to despread the observation matrix using respective ones of a set of codes determined as follows: (1) a pre-selected number NB of base stations from which the mobile receives signals and which have been selected for cancellation -represented by index v' which ranges from 1 to NB; (2) a preselected number (1 to NI) of interferers per base station preselected for cancellation; (3) the data rates of the selected interferers.
Where the signal destined for the particular user/mobile station is not one of the preselected number of signals from the corresponding base station, the receiver may further comprise an ISR receiver module which has means for updating the ISR
beamformer coefficients using the channel estimates from at least some of the receiver modules that have generated such channel estimates for the preselected signals for the same base station.
The receiver module may comprise an MRC beamformer and an ISR beamformer and be adapted to operate in multi-stage, i.e., for each symbol period of frame, it will carry out a plurality of iterations. In the first iteration, the constraints set generator will receive the "past" and "future" estimates from the MRC beamformer and the "past"
symbol estimate, i.e., from the previous frame, and process them to produce a new symbol estimate for the first iteration. In subsequent iterations of the current symbol period or frame, the constraints-set generator will use the "future" estimate from the MRC beamformer, the previous estimate from the ISR beamformer and the symbol estimate generated in the previous iteration. The cycle will repeat until the total number of iterations have been performed, whereupon the output from the receiver module is the desired estimated symbol for the current frame which then is used in the similar iterations of the next frame.
The ISR receiver module comprising both an MRC beamformer and an ISR
beamformer may comprise means {lO1Qd} for extracting from the ISR beamformer (47Qd) an interference-reduced observation vector and reshaping the latter to produce an interference-reduced observation matrix for despreading by the despreader. The channel identification unit then uses the despread interference-reduced observation vector to form interference-reduced channel estimates and supplies them to the residual MRC
beamformer for use in adapting the coefficients thereof.
The ISR beamformer may process blocks or frames of the observation vector that are extended by concatenating a current set of data with one or more previous frames or blocks of data.
The different receiver modules may use different sizes of frame.
In order to receive signals from a user transmitting multicode signals, the ISR
receiver module may comprise a plurality of ISR beamformers and despreaders, each for operating upon a corresponding one of the multiple codes. The channel identification unit then will produce a channel parameter estimate common to all of the multicodes, spread that channel estimate with each of the different multicodes and supply the resulting plurality of spread channel estimates to respective ones of the plurality of ISR
beamformers.
The multicode ISR receiver module may have a despreader (19d a) which uses a compound code comprising each of the multicodes weighted by the corresponding symbol estimate from a respective one of a corresponding plurality of decision-rule units. The despreader will uses the compound code to despread the observation matrix and supply 5 the corresponding compound post-correlation observation vector to the channel identification unit. The channel identification unit will use that vector to produce the channel estimate and spread it using the different ones of the multicodes to produce the spread channel estimates.
The ISR receiver module may comprise a despreader 19Sd,', ..., I9Sd F using 10 a plurality of codes which comprise segments of a main code specified for that user.
Each segment corresponds to a symbol, and to a symbol duration in a large block of data, the number of segments being determined by the data rate, i.e., number of symbols within a block, of that user. Each receiver module may have a different number of segments assigned thereto according to the data rate of the corresponding user.
Embodiments of the invention may be adapted for use in a user/mobile station capable of receiving user-bound signals transmitted by a plurality of base stations each to a corresponding plurality of users, the receiver then comprising a selection of receiver modules each corresponding to a different base station and configured to extract a preselected number of said user-bound signals. Where the particular user/mobile station is included in the preselected number, the receiver module may comprise a similar structure to the above-mentioned multicode receiver, the plurality of despreaders being adapted to despread the observation matrix using respective ones of a set of codes determined as follows: (1) a pre-selected number NB of base stations from which the mobile receives signals and which have been selected for cancellation -represented by index v' which ranges from 1 to NB; (2) a preselected number (1 to NI) of interferers per base station preselected for cancellation; (3) the data rates of the selected interferers.
Where the signal destined for the particular user/mobile station is not one of the preselected number of signals from the corresponding base station, the receiver may further comprise an ISR receiver module which has means for updating the ISR
beamformer coefficients using the channel estimates from at least some of the receiver modules that have generated such channel estimates for the preselected signals for the same base station.
Where the rates of the different users are not known to the instant mobile station, the codes may comprise a fixed number of segments Nm which is predetermined as a maximum data rate to be received. Any slower rates will effectively be oversampled for processing at the higher rate.
The complexity of the multicode embodiments may be reduced by reducing the number of codes that are used by the despreaders. In particular, the bank of despreaders may use a set of codes that represent summation of the codes of the different NI
interferers, to form a compound code which reduces the total number of codes being used in the despreaders.
According to another aspect of the invention, there is provided a STAR
receiver comprising an MRC beamformer which operates upon an observation vector which has not been despread.
Of course, that does not preclude having all channels feed their interference components to all other channels.
The foregoing and other objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description, in conjunction with the accompanying drawings, of preferred embodiments of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS:
Figure 1 is a schematic diagram illustrating a portion of a CDMA
communications system comprising a plurality of user stations, typically mobile, and a base station having a reception antenna comprising an array of antenna elements, and illustrating multipath communication between one of the user stations and the array of antennas;
Figure 2 is a simplified schematic diagram representing a model of the part of the system illustrated in Figure 1;
Figure 3 is a detail block diagram of a spreader portion of one of the user stations;
Figures 4(a) and 4(b) illustrate the relationship between channel characteristics, power control and signal power;
Figure 5 is a simplified block schematic diagram of a base station receiver according to the prior art;
Figure 6 is a detail block diagram of a preprocessing unit of the receiver;
The complexity of the multicode embodiments may be reduced by reducing the number of codes that are used by the despreaders. In particular, the bank of despreaders may use a set of codes that represent summation of the codes of the different NI
interferers, to form a compound code which reduces the total number of codes being used in the despreaders.
According to another aspect of the invention, there is provided a STAR
receiver comprising an MRC beamformer which operates upon an observation vector which has not been despread.
Of course, that does not preclude having all channels feed their interference components to all other channels.
The foregoing and other objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description, in conjunction with the accompanying drawings, of preferred embodiments of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS:
Figure 1 is a schematic diagram illustrating a portion of a CDMA
communications system comprising a plurality of user stations, typically mobile, and a base station having a reception antenna comprising an array of antenna elements, and illustrating multipath communication between one of the user stations and the array of antennas;
Figure 2 is a simplified schematic diagram representing a model of the part of the system illustrated in Figure 1;
Figure 3 is a detail block diagram of a spreader portion of one of the user stations;
Figures 4(a) and 4(b) illustrate the relationship between channel characteristics, power control and signal power;
Figure 5 is a simplified block schematic diagram of a base station receiver according to the prior art;
Figure 6 is a detail block diagram of a preprocessing unit of the receiver;
Figure 7 is a detail block diagram of a despreader of the receiver;
Figure 8 illustrates several sets of users in a CDMA system ranked according to data rate;
Figure 9 is a detail block diagram showing several modules of a receiver embodying the present invention, including one having a beamformer operating on data that has not been despread;
Figure 10 is a detail schematic diagram showing a common matrix generator and one of a plurality of beamformers coupled in common thereto;
Figure 11 is a block diagram corresponding to Figure 9 but including a module having a beamformer operating upon data which has first been despread;
Figure 12 is a schematic diagram of a user-specific matrix generator and an associated beamformer of one of the receiver modules of Figure 11;
Figure 13 is a detail block schematic diagram of a receiver using total realisation of the interference to be cancelled (ISR-TR) and without despreading of the data processed by the beamformer;
Figure 14 illustrates a respreader of one of the receiver modules of Figure 13;
Figure 15 is a detail block schematic diagram of a receiver using individual realisations of the interference (ISR-R) and without despreading of the data processed by the beamformer;
Figure 16 is a simplified block diagram of a receiver which decomposes each realisation of the interference over diversity paths (ISR-D) and without despreading of the data processed by the beamformer;
Figure 17 is a simplified schematic block diagram of a receiver employing interference subspace rejection based upon hypothetical values of the symbols (ISR-H) and without despreading of the data processed by the beamformer;
Figure 18 illustrates all possible triplets for the hypothetical values;
Figure 19 illustrates bit sequences for generating the hypothetical values;
Figure 20 is a simplified schematic block diagram of a receiver employing interference subspace rejection based upon both hypothetical values of the symbols and realisations (ISR-RH) and without despreading of the data processed by the beamformer;
Figure 21 is a simplified schematic block diagram of a receiver similar to the ISR-TR receiver shown in Figure 13 but in which the beamformer operates upon the data that has first been despread;
Figure 22 is a simplified schematic block diagram of a receiver similar to the ISR-R receiver shown in Figure 15 but in which the beamformer operates upon data that has first been despread;
Figure 23 is a simplified schematic block diagram of a receiver similar to the ISR-D receiver shown in Figure 16 but in which the beamformer operates upon data that has first been despread;
Figure 24 is a simplified schematic block diagram of a receiver similar to the ISR-H receiver shown in Figure 18 but in which the beamformer operates upon data that has first been despread;
Figure 25 illustrates bit sequences generated in the receiver of Figure 24;
Figure 26 is a simplified schematic block diagram of a receiver similar to the ISR-RH receiver shown in Figure 20 but in which the beamformer operates upon data that has first been despread;
Figure 27 illustrates an alternative STAR module which may be used in the receiver of Figure 5 or in place of some of the receiver modules in the receivers of Figures 13-17, 20-24 and 26;
Figure 28 illustrates a receiver module which both contributes to the constraint matrix and uses the constraint matrix to cancel interference (JOINT-ISR);
Figure 29 illustrates a mulit-stage ISR receiver module;
Figure 30 illustrates successive implementaton of ISR;
Figure 31 illustrates a receiver module which uses ISR to enhance channel identification;
Figure 32 illustrates extension of the frame size to reduce noise enhancement and facilitate asynchronous operation and processing of high data rates;
Figure 33 illustrates implementation of ISR with mixed spreading factors;
Figure 34 illustrates an uplink ISR receiver module for a user employing multicode signals;
Figure 35 illustrates a modification of the receiver module of Figure 34;
Figure 36 illustrates how multirate can be modelled as multicode;
Figure 37 illustrates frame size determination for multirate signals;
Figure 38 illustrates grouping of multirate signals to correspond to a specific user's symbol rate;
Figure 39 illustrates an "uplink" multirate ISR receiver module for a base station;
Figure 8 illustrates several sets of users in a CDMA system ranked according to data rate;
Figure 9 is a detail block diagram showing several modules of a receiver embodying the present invention, including one having a beamformer operating on data that has not been despread;
Figure 10 is a detail schematic diagram showing a common matrix generator and one of a plurality of beamformers coupled in common thereto;
Figure 11 is a block diagram corresponding to Figure 9 but including a module having a beamformer operating upon data which has first been despread;
Figure 12 is a schematic diagram of a user-specific matrix generator and an associated beamformer of one of the receiver modules of Figure 11;
Figure 13 is a detail block schematic diagram of a receiver using total realisation of the interference to be cancelled (ISR-TR) and without despreading of the data processed by the beamformer;
Figure 14 illustrates a respreader of one of the receiver modules of Figure 13;
Figure 15 is a detail block schematic diagram of a receiver using individual realisations of the interference (ISR-R) and without despreading of the data processed by the beamformer;
Figure 16 is a simplified block diagram of a receiver which decomposes each realisation of the interference over diversity paths (ISR-D) and without despreading of the data processed by the beamformer;
Figure 17 is a simplified schematic block diagram of a receiver employing interference subspace rejection based upon hypothetical values of the symbols (ISR-H) and without despreading of the data processed by the beamformer;
Figure 18 illustrates all possible triplets for the hypothetical values;
Figure 19 illustrates bit sequences for generating the hypothetical values;
Figure 20 is a simplified schematic block diagram of a receiver employing interference subspace rejection based upon both hypothetical values of the symbols and realisations (ISR-RH) and without despreading of the data processed by the beamformer;
Figure 21 is a simplified schematic block diagram of a receiver similar to the ISR-TR receiver shown in Figure 13 but in which the beamformer operates upon the data that has first been despread;
Figure 22 is a simplified schematic block diagram of a receiver similar to the ISR-R receiver shown in Figure 15 but in which the beamformer operates upon data that has first been despread;
Figure 23 is a simplified schematic block diagram of a receiver similar to the ISR-D receiver shown in Figure 16 but in which the beamformer operates upon data that has first been despread;
Figure 24 is a simplified schematic block diagram of a receiver similar to the ISR-H receiver shown in Figure 18 but in which the beamformer operates upon data that has first been despread;
Figure 25 illustrates bit sequences generated in the receiver of Figure 24;
Figure 26 is a simplified schematic block diagram of a receiver similar to the ISR-RH receiver shown in Figure 20 but in which the beamformer operates upon data that has first been despread;
Figure 27 illustrates an alternative STAR module which may be used in the receiver of Figure 5 or in place of some of the receiver modules in the receivers of Figures 13-17, 20-24 and 26;
Figure 28 illustrates a receiver module which both contributes to the constraint matrix and uses the constraint matrix to cancel interference (JOINT-ISR);
Figure 29 illustrates a mulit-stage ISR receiver module;
Figure 30 illustrates successive implementaton of ISR;
Figure 31 illustrates a receiver module which uses ISR to enhance channel identification;
Figure 32 illustrates extension of the frame size to reduce noise enhancement and facilitate asynchronous operation and processing of high data rates;
Figure 33 illustrates implementation of ISR with mixed spreading factors;
Figure 34 illustrates an uplink ISR receiver module for a user employing multicode signals;
Figure 35 illustrates a modification of the receiver module of Figure 34;
Figure 36 illustrates how multirate can be modelled as multicode;
Figure 37 illustrates frame size determination for multirate signals;
Figure 38 illustrates grouping of multirate signals to correspond to a specific user's symbol rate;
Figure 39 illustrates an "uplink" multirate ISR receiver module for a base station;
Figure 40 illustrates one of a plurality of "downlink" multirate receiver modules for a user station operating as a "virtual base station";
Figure 41 illustrates a "downlink" multirate receiver module of the user station of Figure 41 for extracting signals for that user station;
Figure 42 illustrates a multicode alternative to the receiver module of Figure 40;
and Figure 43 illustrates a second alternative to the receiver module of figure 40.
BEST MODE(S) FOR CARRYING OUT THE INVENTION:
In the following description, identical or similar items in the different Figures have the same reference numerals, in some cases with a suffix.
The description refers to several published articles. For convenience, the articles are cited in full in a numbered list at the end of the description and cited by that number in the description itself. The contents of these articles are incorporated herein by reference and the reader is directed to them for reference.
Figures 1 and 2 illustrate the uplink of a typical asynchronous cellular CDMA
system wherein a plurality of mobile stations 10'...10U communicate with a base-station 11 equipped with a receiving antenna comprising an array of several antenna elements 12'...12'". For clarity of depiction, and to facilitate the following detailed description, Figures 1 and 2 illustrate only five of a large number (U) of mobile stations and corresponding propagation channels of the typical CDMA system, one for each of a corresponding plurality of users. It will be appreciated that the mobile stations 10'...10"
will each comprise other circuitry for processing the user input signals, but, for clarity of depiction, only the spreaders are shown in Figure 2. The other circuitry will be known to those skilled in the art and need not be described here. Referring to Figure 2, the mobile stations 10'...10" comprise spreaders 13'...13", respectively, which spread a plurality of digital signals gn ,,, bn of a corresponding plurality of users, respectively, all to the same bandwidth, using spreading codes cl (t). .. c"(t), respectively. The mobile stations 10'...10" transmit the resulting user signals to the base station I1 via channels 14'...14", respectively, using a suitable modulation scheme, such as differential binary phase shift keying (DBPSK). Each of the mobile stations 10'...10" receives commands from the base station 11 which monitors the total received power, i.e. the product of transmitted power and that user's code and attenuation for the associated channel and uses the information to apply power control to the corresponding signals to compensate for the attenuation of the channel. This is represented in Figure 2 by multipliers 5 15'...15" which multiply the spread signals by adjustment factors ~` (t)...
0 "(t), respectively. The array of M omni-directional antenna elements 12'...12M at the base station 11 each receive all of the spread signals in common. The channels 14'...14" have different response characteristics H`(t)...Ht'(t), respectively, as illustrated in more detail in Figure 1, for only one of the channels, designated channel 14 . Hence, channel 14 10 represents communication via as many as P paths between the single antenna of the associated mobile station l0i' and each of the base station antenna elements 12' ...12'".
The other channels are similarly multipath.
As before, it is presumed that the base station knows the spreading codes of all of the mobile stations with which it communicates. The mobile stations will have 15 similar configurations so only one will be described. Thus, the mobile station 10 first differentially encodes its user's binary phase shift keyed (BPSK) bit sequence at the rate 1/T, where T is the bit duration, using circuitry (not shown) that is well-known to persons skilled in this art. As illustrated in Figure 3, its spreader 13 then spreads the resulting differential binary phase shift keyed (DBPSK) sequence bn (or b"(t) in the continuous time domain as represented in Figure 3) by a periodic personal code sequence cl" (or c"(t) in the continuous time domain) at a rate 1/T,, where Tc is the chip pulse duration. The processing gain is given by L=T/T,. For convenience, it is assumed that short codes are used, with the period of c"(t) equal to the bit duration T, though the system could employ long codes, as will be discussed later, with other applications and assumptions. Over one period T, the spreading code can be written as:
c"(t) = E c1"O(t-lT,), (1) 1=0 where c," 1 for Z= 0, ..., L - 1, is a random sequence of length L and 0(t) is the chip pulse as illustrated in Figure 3. Also, with a multipath fading environment with P
resolvable paths, the delay spread aT is small compared to the bit duration (i.e. nT <<
T).
As illustrated in Figures 4(a) and 4(b), following signal weighting by the poer control factor ~pI(t)2, the spread signal is transmitted to the base station 11 via channel 14 . Figure 4(a) shows the "real" situation where the channel characteristics comprise a normalized value H"(T) and a normalization factor ~ch"(T) which relates to the "amplitude" or attenuation of the channel, i.e. its square would be proportional to the power divided by the transmitted power. In Figure 4(a), power control is represented by a multiplier 17 , and the subscript "pc ". Figure 4(b) shows that, for convenience, the channel characteristics can be represented (theoretically) by the normalized value H(t) and the normalization factor ~,h"(t) included in a single power factor V(t) which is equal to ~p,"(Wh"(t). >GP,"(t) is the factor by which the transmitted signal is amplified or attenuated to compensate for channel power gain in ~,hu(t) and to maintain the received power q"(t))2 at the required level.
In such a CDMA system, the signal of each of the mobile stations 10'...10"
constitutes interference for the signals of the other mobile stations. For various reasons, some of the mobile stations will generate more interference than others. The components of one of these "strongly interfering" user stations and its associated channel are identified in Figures 1 and 2 by the index "i" . The components of one of the other "low-power" user stations and its associated channel also are illustrated, and identified by the index "d". The significance of this grouping of "interfering" and "low-power"
user stations will be explained later.
At the base station 11, the spread data vector signals X' (t). .. X"(t) from the base station antenna elements 12'...12'M, respectively, are received simultaneously, as indicated by the adder 16 (Figure 2), and the resulting observation vector X(t) is supplied to the receiver (see Figure 5). The sum of the spread data vectors (signals) XI (t)...X"(t) will be subject to thermal noise. This is illustrated by the addition of a noise signal component Nt,1(t) by adder 16. The noise signal N,,,(t) comprises a vector, elements of which correspond to the noise received by the different antenna elements.
Figure 5 illustrates a spatio-temporal array receiver (STAR) for receiving the signal X(t) at the base station 11. Such a receiver was described generally by two of the present inventors in reference [13]. The receiver comprises a preprocessing unit 18, a plurality of despreaders 19'... 19", and a plurality of spatio-temporal receiver (STAR) units 20'...20", each having its input connected to the output of a respective one of the despreaders 19'... 19 . Each of the STAR units 20'...20" and the associated one of the despreaders 19'... 19" form part of a respective one of a plurality of receiver modules 21'...21U. As shown in Figure 6, the preprocessing unit 18 comprises a matched filter 22, a sampler 23 and a buffer 24. Matched filter 22 convolves the antenna array signal vector X(t), which is an M x 1 vector, with a matched pulse 4)(T, - t) to produce the matched filtered signal vector Y(t) which then is sampled by sampler 23 at the chip rate 1/T,, element by element. The sampler 23 supplies the resulting M x 1 vectors Yn,1, at the chip rate, to buffer 24 which buffers them to produce an observation matrix Yn of dimension M x (2L-1). It should be noted that, although the present inventors' Canadian patent application No. 2,293,097 and United States Provisional application No.
60/ 171, 604 had a duplicate of this preprocessing unit 18 in each of the despreaders 19' ...19", it is preferable to avoid such duplication and use a single preprocessor 18 to preprocess the received antenna array signal vector X(t).
The despreaders 19'...19" each have the same structure, so only one will be described in detail with reference to Figure 7 which illustrates despreader 19 . Thus, despreader 19 comprises a filter 25 and a vector reshaper 26". The observation matrix Yõ is filtered by filter 21 using the pseudo-random number sequence cL , corresponding to that used in the spreader 13 of the transmitter, i.e. cl", to produce the postcorrelation observation matrix Zu for user u. Vector reshaper 26 concatenates the M x L
matrix Zu to form a post-correlation observation vector Zn of dimension ML x 1. It n -n should be noted that the vector reshaper 26 need not be a distinct physical element but is depicted as such to represent a mathematical function. In practice, the function will likely be determined merely by allocation of resources, such as memory.
Referring again to Figure 5, the post-correlation observation vectors Z1,..ZU
from n n despreaders 19' ...19 are processed by the STAR units 20' ... 20", respectively, to produce symbol estimates 6n...b corresponding to the transmitted symbols bn ,.. gnU (see Figure 2) and power estimates (~a2,..n )z which are supplied to subsequent stages (not shown) of the receiver for processing in known manner.
The STAR units 20'...20" each comprise the same elements, so the construction and operation of only one of them, STAR unit 20", will now be described.
The STAR unit 20 comprises a beamformer 27 , a channel identification unit 28 , a decision rule unit 29 and a power estimation unit 30 . The channel identification unit 28 is connected to the input and output, respectively, of the beamformer 27 to receive the post-correlation observation vector Zu and the signal component n estimate sn", respectively. The channel identification unit 28 replicates, for each frame M x L the characteristics H"(t), in space and time, of the associated user's transmission channel 14 . More specifically, it uses the signals Zu and Sn to derive a set of n parameter estimates H", which it uses to update the weighting coefficients yyu of the rt n beamformer 27 in succeeding symbol periods. The symbol period corresponds to the data fraine of M X L elements.
The beamformer 27 comprises a spatio-temporal maximum ratio combining (MRC) filter which filters the space-time vector Zu to produce the despread signal n component estimate sn , which it supplies to both the decision rule unit 29 and the power estimation unit 30u. The decision-rule unit 29 outputs a binary symbol bn" according to the sign of the signal component estimate sn . The binary output signal constitutes the output of the decision rule unit 30 and is an estimate of the corresponding user signal bn spread by spreader 13 of the corresponding user station 10' (Figures 1 and 2).
The signal component estimate sn is processed in subsequent parts of the receiver. For example, it may be differentially decoded and, possibly, deinterleaved and the data decoded--if the corresponding inverse operations were done before transmission.
The power estimation unit 30 uses the raw signal component estimate Sn to derive an estimate (ed2 of the power in that user's signal component sn of the antenna array signal vector X(t) and supplies the power estimate (ed2 to the subsequent stages (not shown) of the receiver for derivation of power level adjustment signals in known manner.
The receiver shown in Figure 5 will perform satisfactorily if there are no strong interferers, i.e., if it can be assumed that all users transmit with the same modulation and at the same rate, and that the base-station knows all the spreading codes of the terminals with which it is communicating. On that basis, operation of the receiver will be described with reference to the user channel identified by index u.
At time t, the antenna array signal vector X(t) received by the elements 12'...121 of the antenna array of the one particular cell shown in Figures 1 and 2 can be written as follows:
U
X(t) _ E X "(t) + N`h(t) (2) u-1 where U is the total number of mobile stations whose signals are received at the base-station 11 from inside or outside the cell, Xu(t) is the received signal vector from the mobile station 10 , i. e. , of index u, and Nh(t) is the thermal noise received at the M
Figure 41 illustrates a "downlink" multirate receiver module of the user station of Figure 41 for extracting signals for that user station;
Figure 42 illustrates a multicode alternative to the receiver module of Figure 40;
and Figure 43 illustrates a second alternative to the receiver module of figure 40.
BEST MODE(S) FOR CARRYING OUT THE INVENTION:
In the following description, identical or similar items in the different Figures have the same reference numerals, in some cases with a suffix.
The description refers to several published articles. For convenience, the articles are cited in full in a numbered list at the end of the description and cited by that number in the description itself. The contents of these articles are incorporated herein by reference and the reader is directed to them for reference.
Figures 1 and 2 illustrate the uplink of a typical asynchronous cellular CDMA
system wherein a plurality of mobile stations 10'...10U communicate with a base-station 11 equipped with a receiving antenna comprising an array of several antenna elements 12'...12'". For clarity of depiction, and to facilitate the following detailed description, Figures 1 and 2 illustrate only five of a large number (U) of mobile stations and corresponding propagation channels of the typical CDMA system, one for each of a corresponding plurality of users. It will be appreciated that the mobile stations 10'...10"
will each comprise other circuitry for processing the user input signals, but, for clarity of depiction, only the spreaders are shown in Figure 2. The other circuitry will be known to those skilled in the art and need not be described here. Referring to Figure 2, the mobile stations 10'...10" comprise spreaders 13'...13", respectively, which spread a plurality of digital signals gn ,,, bn of a corresponding plurality of users, respectively, all to the same bandwidth, using spreading codes cl (t). .. c"(t), respectively. The mobile stations 10'...10" transmit the resulting user signals to the base station I1 via channels 14'...14", respectively, using a suitable modulation scheme, such as differential binary phase shift keying (DBPSK). Each of the mobile stations 10'...10" receives commands from the base station 11 which monitors the total received power, i.e. the product of transmitted power and that user's code and attenuation for the associated channel and uses the information to apply power control to the corresponding signals to compensate for the attenuation of the channel. This is represented in Figure 2 by multipliers 5 15'...15" which multiply the spread signals by adjustment factors ~` (t)...
0 "(t), respectively. The array of M omni-directional antenna elements 12'...12M at the base station 11 each receive all of the spread signals in common. The channels 14'...14" have different response characteristics H`(t)...Ht'(t), respectively, as illustrated in more detail in Figure 1, for only one of the channels, designated channel 14 . Hence, channel 14 10 represents communication via as many as P paths between the single antenna of the associated mobile station l0i' and each of the base station antenna elements 12' ...12'".
The other channels are similarly multipath.
As before, it is presumed that the base station knows the spreading codes of all of the mobile stations with which it communicates. The mobile stations will have 15 similar configurations so only one will be described. Thus, the mobile station 10 first differentially encodes its user's binary phase shift keyed (BPSK) bit sequence at the rate 1/T, where T is the bit duration, using circuitry (not shown) that is well-known to persons skilled in this art. As illustrated in Figure 3, its spreader 13 then spreads the resulting differential binary phase shift keyed (DBPSK) sequence bn (or b"(t) in the continuous time domain as represented in Figure 3) by a periodic personal code sequence cl" (or c"(t) in the continuous time domain) at a rate 1/T,, where Tc is the chip pulse duration. The processing gain is given by L=T/T,. For convenience, it is assumed that short codes are used, with the period of c"(t) equal to the bit duration T, though the system could employ long codes, as will be discussed later, with other applications and assumptions. Over one period T, the spreading code can be written as:
c"(t) = E c1"O(t-lT,), (1) 1=0 where c," 1 for Z= 0, ..., L - 1, is a random sequence of length L and 0(t) is the chip pulse as illustrated in Figure 3. Also, with a multipath fading environment with P
resolvable paths, the delay spread aT is small compared to the bit duration (i.e. nT <<
T).
As illustrated in Figures 4(a) and 4(b), following signal weighting by the poer control factor ~pI(t)2, the spread signal is transmitted to the base station 11 via channel 14 . Figure 4(a) shows the "real" situation where the channel characteristics comprise a normalized value H"(T) and a normalization factor ~ch"(T) which relates to the "amplitude" or attenuation of the channel, i.e. its square would be proportional to the power divided by the transmitted power. In Figure 4(a), power control is represented by a multiplier 17 , and the subscript "pc ". Figure 4(b) shows that, for convenience, the channel characteristics can be represented (theoretically) by the normalized value H(t) and the normalization factor ~,h"(t) included in a single power factor V(t) which is equal to ~p,"(Wh"(t). >GP,"(t) is the factor by which the transmitted signal is amplified or attenuated to compensate for channel power gain in ~,hu(t) and to maintain the received power q"(t))2 at the required level.
In such a CDMA system, the signal of each of the mobile stations 10'...10"
constitutes interference for the signals of the other mobile stations. For various reasons, some of the mobile stations will generate more interference than others. The components of one of these "strongly interfering" user stations and its associated channel are identified in Figures 1 and 2 by the index "i" . The components of one of the other "low-power" user stations and its associated channel also are illustrated, and identified by the index "d". The significance of this grouping of "interfering" and "low-power"
user stations will be explained later.
At the base station 11, the spread data vector signals X' (t). .. X"(t) from the base station antenna elements 12'...12'M, respectively, are received simultaneously, as indicated by the adder 16 (Figure 2), and the resulting observation vector X(t) is supplied to the receiver (see Figure 5). The sum of the spread data vectors (signals) XI (t)...X"(t) will be subject to thermal noise. This is illustrated by the addition of a noise signal component Nt,1(t) by adder 16. The noise signal N,,,(t) comprises a vector, elements of which correspond to the noise received by the different antenna elements.
Figure 5 illustrates a spatio-temporal array receiver (STAR) for receiving the signal X(t) at the base station 11. Such a receiver was described generally by two of the present inventors in reference [13]. The receiver comprises a preprocessing unit 18, a plurality of despreaders 19'... 19", and a plurality of spatio-temporal receiver (STAR) units 20'...20", each having its input connected to the output of a respective one of the despreaders 19'... 19 . Each of the STAR units 20'...20" and the associated one of the despreaders 19'... 19" form part of a respective one of a plurality of receiver modules 21'...21U. As shown in Figure 6, the preprocessing unit 18 comprises a matched filter 22, a sampler 23 and a buffer 24. Matched filter 22 convolves the antenna array signal vector X(t), which is an M x 1 vector, with a matched pulse 4)(T, - t) to produce the matched filtered signal vector Y(t) which then is sampled by sampler 23 at the chip rate 1/T,, element by element. The sampler 23 supplies the resulting M x 1 vectors Yn,1, at the chip rate, to buffer 24 which buffers them to produce an observation matrix Yn of dimension M x (2L-1). It should be noted that, although the present inventors' Canadian patent application No. 2,293,097 and United States Provisional application No.
60/ 171, 604 had a duplicate of this preprocessing unit 18 in each of the despreaders 19' ...19", it is preferable to avoid such duplication and use a single preprocessor 18 to preprocess the received antenna array signal vector X(t).
The despreaders 19'...19" each have the same structure, so only one will be described in detail with reference to Figure 7 which illustrates despreader 19 . Thus, despreader 19 comprises a filter 25 and a vector reshaper 26". The observation matrix Yõ is filtered by filter 21 using the pseudo-random number sequence cL , corresponding to that used in the spreader 13 of the transmitter, i.e. cl", to produce the postcorrelation observation matrix Zu for user u. Vector reshaper 26 concatenates the M x L
matrix Zu to form a post-correlation observation vector Zn of dimension ML x 1. It n -n should be noted that the vector reshaper 26 need not be a distinct physical element but is depicted as such to represent a mathematical function. In practice, the function will likely be determined merely by allocation of resources, such as memory.
Referring again to Figure 5, the post-correlation observation vectors Z1,..ZU
from n n despreaders 19' ...19 are processed by the STAR units 20' ... 20", respectively, to produce symbol estimates 6n...b corresponding to the transmitted symbols bn ,.. gnU (see Figure 2) and power estimates (~a2,..n )z which are supplied to subsequent stages (not shown) of the receiver for processing in known manner.
The STAR units 20'...20" each comprise the same elements, so the construction and operation of only one of them, STAR unit 20", will now be described.
The STAR unit 20 comprises a beamformer 27 , a channel identification unit 28 , a decision rule unit 29 and a power estimation unit 30 . The channel identification unit 28 is connected to the input and output, respectively, of the beamformer 27 to receive the post-correlation observation vector Zu and the signal component n estimate sn", respectively. The channel identification unit 28 replicates, for each frame M x L the characteristics H"(t), in space and time, of the associated user's transmission channel 14 . More specifically, it uses the signals Zu and Sn to derive a set of n parameter estimates H", which it uses to update the weighting coefficients yyu of the rt n beamformer 27 in succeeding symbol periods. The symbol period corresponds to the data fraine of M X L elements.
The beamformer 27 comprises a spatio-temporal maximum ratio combining (MRC) filter which filters the space-time vector Zu to produce the despread signal n component estimate sn , which it supplies to both the decision rule unit 29 and the power estimation unit 30u. The decision-rule unit 29 outputs a binary symbol bn" according to the sign of the signal component estimate sn . The binary output signal constitutes the output of the decision rule unit 30 and is an estimate of the corresponding user signal bn spread by spreader 13 of the corresponding user station 10' (Figures 1 and 2).
The signal component estimate sn is processed in subsequent parts of the receiver. For example, it may be differentially decoded and, possibly, deinterleaved and the data decoded--if the corresponding inverse operations were done before transmission.
The power estimation unit 30 uses the raw signal component estimate Sn to derive an estimate (ed2 of the power in that user's signal component sn of the antenna array signal vector X(t) and supplies the power estimate (ed2 to the subsequent stages (not shown) of the receiver for derivation of power level adjustment signals in known manner.
The receiver shown in Figure 5 will perform satisfactorily if there are no strong interferers, i.e., if it can be assumed that all users transmit with the same modulation and at the same rate, and that the base-station knows all the spreading codes of the terminals with which it is communicating. On that basis, operation of the receiver will be described with reference to the user channel identified by index u.
At time t, the antenna array signal vector X(t) received by the elements 12'...121 of the antenna array of the one particular cell shown in Figures 1 and 2 can be written as follows:
U
X(t) _ E X "(t) + N`h(t) (2) u-1 where U is the total number of mobile stations whose signals are received at the base-station 11 from inside or outside the cell, Xu(t) is the received signal vector from the mobile station 10 , i. e. , of index u, and Nh(t) is the thermal noise received at the M
antenna elements. The contribution X"(t) of the u-th mobile station 10 to the observation vector X(t) is given by:
X "(t) = q/"(t)H "(t) c u(t)b "(t) ! P / / ! (2a) -~ult) E Gp lt) E plt) c u(t - T p(t)) b u(t -[ plt)) p=1 where H"(t) is the channel response vector of the channel 14 between the u-th mobile station 10 and the array of antenna elements and denotes time-convolution.
In the right-hand term of the above equation, the propagation time-delays ,=P(t) E[0,T] along the P paths, p 1,==, P, (see Figure 1), are chip-asynchronous, Gp(t) are the propagation vectors and Ep(t)2 are the fractions along each path (i.e., Ep(t)Z = 1) of the total power ~i"(t)2 received from the u-th mobile station EPP-, 10 . The received power is affected by path-loss, Rayleigh fading and shadowing. It is assumed that GP (t) , EP(t)2 and ~u(t)2 vary slowly and are constant over the bit duration T.
In the preprocessing unit 18 (see Figure 6), the antenna array signal vector X(t) is filtered with the matched pulse to provide the matched-filtering signal vector Yn(t) for frame n as follows:
Yn(t) = 1 f X (aT/2 + nT + t + t ~) ~ (t ~) dt ' (3) T, d where D. denotes the temporal support of 0(t) and a E{ 0,1 } stands for a possible time-shift by T/2 to avoid, if necessary, the frame edges lying in the middle of the delay spread (see reference [13]). For the sake of simplicity, it is assumed in the following that a = 0. Note that for a rectangular pulse D. is [0, Tj. In practice, it is the temporal support of a truncated square-root raised- cosine.
It should be noted that the above description is baseband, without loss of generality. Both the carrier frequency modulation and demodulation steps can be embedded in the chip pulse-shaping and matched-filtering operations of Equations (1) and (3), respectively.
Thus, after sampling at the chip rate 1/T, and framing over 2L - 1 chip samples at the bit rate to form a frame, the preprocessing unit 18 derives the M x (2L
-1) matched-filtering observation matrix: 4)[Y 0 Y i..., Y,2c,-2]1 where Y ~ = Y (lT ).
In the despreader 19 (see Figure 7), the post-correlation vector for frame number n for user number u is obtained as:
5 Zn,l - 1E Yn j+k Ck . (5) L k=0 Framing this vector over L chip samples at the bit rate forms the post-correlation observation matrix:
Zn = IZno,,ZRJ,...,ZnL-11. (6) 10 The post-correlation data model (PCM) (see reference [13]) details the structure of this matrix as follows:
Zn = H,n,sn + NPCM,n, (7) where Zn is the spatio-temporal observation matrix, Hn is the spatio-temporal propagation matrix, SR = bn ~n is the signal component and NPCM,n is the spatio-15 temporal noise matrix. Equation 7 provides an instantaneous mixture model at the bit rate where the signal subspace is one-dimensional in the M x L matrix space.
For convenience, the vector reshaper 26 of despreader 19" transforms the matrices Zn, Hn and NPCM,n into (M x L)-dimensional vectors Zu Hu and Zu respectively, by concatenating their columns into one n' -n -PCM,n 20 spatio-temporal column vector to yield the following narrowband form of the PCM
model (see reference 13):
Z" = Hus u + )V" (8) n n n PCM,n To avoid the ambiguity due to a multiplicative factor between Hn and Sn , the norm n , of Hn is fixed to VFM
n The PCM model significantly reduces inter-symbol interference. It represents an instantaneous mixture model of a narrowband source in a one-dimensional signal subspace and enables exploitation of low complexity narrowband processing methods after despreading. Processing after despreading exploits the processing gain to reduce the interference and to ease its cancellation in subsequent steps by facilitating estimation of channel parameters.
As discussed in reference 13, the spatio-temporal array-receiver (STAR) can be used to detect each user separately at the base-station 11. In addition to exploiting the processing gain to reduce interference, the STAR allows accurate synchronization and tracking of the multipath delays and components and shows inherent robustness to interference. The STAR also allows coherent combining of the data. This receiver is found to provide fast and accurate time-varying multipath acquisition and tracking.
Moreover, it significantly improves call capacity by spatio-temporal maximum ratio combining (MRC) in a coherent detection scheme implemented without a pilot signal.
For the sake of clarity, the steps of STAR that are relevant to the implementation of the present invention will be reviewed briefly below, with reference to receiver module 21 of Figure 5.
As shown in Figure 5, the despreader 19 supplies the post-correlation observation vector Zu to both the channel identification unit 28 and the MRC beamformer 27 of n STAR unit 20 . Using spatio-temporal matched filtering (yW = ly"/M) (i.e.
n spatio-temporal maximum ratio combining, Wu"H" the STAR unit 20 provides n -n estimates of signal component Sn`, its DBPSK bit sequence bn and its total received power (,n)Z as follows:
b u s," = Real {~"HZ" l = Real ~~" (9) n n 6n = Sign {sn } , (10) (~n)2 = (1 - a)(~r.U-i)2 + a iSn 12 ~ (11) where a is a smoothing factor. It should be noted that with ad hoc modifications, differential modulation and quasi-coherent differential decoding still apply with DMPSK.
Orthogonal modulation can even be detected coherently by STAR without a pilot (references [17] and [18]). Using the post-correlation observation vector Zu and the new n signal component estimate sn from the beainformer 27 , the channel identification unit 28 provides an estimate Hu of the channel 14 for user station 10 . The channel n identification unit 28 updates the channel parameter estimate H" by means of a decision n feedback identification (DFI) scheme whereby the signal component estimate SR
is fed back as a reference signal in the following eigen-subspace tracking procedure:
Hn+l = Hn + (Zn -HnSn ~ri , (12) where is an adaptation step-size. Alternatively, the product ~n gn could be fed back instead of the symbol component estimate sn, This DFI scheme allows a 3 dB
coherent detection gain in noise reduction by recovering the channel phase offsets within a sign ambiguity without a pilot. Note that a reduced-power pilot can be used to avoid differential coding and decoding (reference [21]). The procedure that further enhances the channel estimate H" to obtain H" from the knowledge of its spatio-temporal n+1 -n+l structure (i.e. manifold) allows a fast and accurate estimation of the multipath time-delays l,n ~ ~TP,n in both the acquisition and the tracking modes (both versions of this procedure can be found in reference [13]). This improved estimation accuracy achieves robustness to channel estimation errors, and reduces sensitivity to timing errors, when STAR is used in multiuser operation.
For further information about STAR, the reader is directed to the articles by Affes and Mermelstein identified as references [13] and [17] to [21].
If, as was assumed in reference 13, the spatio-temporal noise vector Nu is PCM,n spatially uncorrelated, power control on the uplink is generally able to equalize the received signal powers. However, the assumption that noise is uncorrelated becomes untenable on the downlink due to path-loss and shadowing and when the power of particular users (e.g.,"priority links", acquisition, higher-order modulations or higher data-rates in mixed-rate traffic) is increased intentionally. Within a particular cell, there may be users having many different "strengths", perhaps because of different data rates.
Figure 8 illustrates, as an example, a cell in which there are four different sets of users arranged hierarchically according to data rate. The first set I comprises users which have relatively high data rates, the second set M1 and third set M2 both comprise users which have intermediate data rates, and the fourth set D comprises users which have relatively low data rates. In practice, the receivers of the high data rate users of set I
will not need to cancel any "outset" interference from the users in sets M I, M2 and D, but their transmissions will contribute to interference for the receiver modules in those sets. Intermediate data rate users in sets M1 and M2 will need to cancel "outset"
interference from the high data rate users of the set I but not from the users in set D.
They will themselves be contributors of "outset" interference to the users in set D. The receivers of users in set D must cancel "outset" interference from sets I, MI
and M2.
It is also possible for a receiver of a user within a particular set to cancel "inset"
interference from one or more users within the same set; and itself be a contributor to such "inset" interference. Embodiments of the invention applicable to these "outset" and "inset" situations will be described hereinafter. In the description, where a particular user's signal is treated as interference and cancelled, it will be deemed to be a "contributor" and, where a particular user's receiver module receives information to enable it to cancel another user's interference, it will be deemed to be a "recipient". To simplify the description of the preferred embodiments described herein, it will be assumed that all users employ the same modulation at the same rate. For the purpose of developing the theory of operation, initially it will be assumed that, among the mobile stations in the cell, there will be a first set I of "strong" contributor users, one of which is identified in Figures 1 and 2 by index "i", whose received signal powers are relatively high and hence likely to cause more interference, and a second set D of "low-power"
recipient users, one of which is identified in Figures 1 and 2 by index "d", whose received signal powers are relatively low and whose reception may be degraded by interference from the signals from the strong users. In order to receive the low-power users adequately, it usually is desirable to substantially eliminate the interference produced by the high-power users. For simplicity, most of the preferred embodiments of the invention will be described on the basis that the high-power users can be received adequately without interference suppression. It should be appreciated, however, that the "strong user stations could interfere with each other, in which case one could also apply to any interfering mobile the coloured noise model below and the near-far resistant solution proposed for the low-power user, as will be described later.
Assuming the presence of Ni interfering users assigned the indices i = I to NI, then the spatio-temporal observation vector of any interfering user (u = i E(1,...,N1)) is given from Equation 8 by:
Z' - H's' + N' (13) n n n PCM,n where Ni can still be assumed to be an uncorrelated white noise vector if the PCM,n processing gain of this user is not very low. On the other hand, from the point of view of any low-power user (u=d 1,...,N1}), the spatio-temporal observation vector is:
NI
Zd = HdsR + Id + Nd = Hds,d + ~ 1~=i + Nd , (14) n n PCM,n -PCM,n -n -PCM,n -PCM,n i=1 where, in addition to the uncorrelated white noise vector Nd there is included a total PCM,n I
interference vector ld which sums a random coloured spatio-temporal interference -PCM,n vector from each interfering mobile denoted by p1J for i = 1, ..., NI. At frame PCM,n number n, the realization of the vector 10 results from matched-pulse filtering, ship-PCM,n rate sampling, bit-rate framing, despreading with ctd, and matrix/vector reshaping of the received signal vector k(t) from the i-th interfering mobile using Equations (3) to (6).
The receiver shown in Figure 5 would receive the signals from all of the user stations independently of each other. It should be noted that there is no cross-connection between the receiver modules 2l...21", specifically between their STAR units ...20 ...20", for suppression of interference from the signals of mobile stations which constitute strong interferers. While the matched beamformer of Equation (9) is optimal in uncorrelated white noise, it is suboptimal when receiving the low-power users due to spatial correlation of the interference terms. To allow the accommodation of additional users in the presence of much stronger interfering mobiles in the target cell, in embodiments of the present invention the receiver of Figure 5 is upgraded to obtain much stronger near-far resistance, specifically by adapting the beamformer of Equation 9 to reject the interference contributions from the interfering strong users.
In the general case, the total interference Id experienced by a user d in set 'PCM,n D is an unknown random vector which lies at any moment in an interference subspace spanned by a matrix, say CpcM,n (1=e= , Id E Vec { CPcM,n }) with dimension -PCM,n depending on the number of interference parameters (i.e., power, data, multipath components and delays) assumed unknown or estimated a priori. As will become apparent from the following descriptions of preferred embodiments, in practice, the matrix CPCM,n, which will be referred to as the "constraint matrix", can be derived and estimated in different ways. To achieve near-far resistance, the beamformer must conform to the following theoretical constraints:
WdHHd 1, WdNHd 1, l-n n ~ -n n (15) d" d d" d CPCM,n = 0, yVn IPC'M,n = 0 The first constraint provides a substantially distortionless response to the low-power user while the second instantaneously rejects the interference subspace and thereby substantially cancels the total interference. This modification of the beamforming step of STAR will be referred to as interference subspace rejection (ISR).
With an estimate of the constraint matrix CPCM,n available (as described later), the ISR combiner (i. e. , the constrained spatio-temporal beamformer) Wd after 5 despreading is obtained by:
"
d QPCM,n - ~CPCM,nCPCM,n) ~ (16) _ d d d" ~PCM,n IM L CPCM,nQPCm,nCpCM,n ~ (17) ]gd Hd Wd PCMn -n , (1 g) ~,d f n L7 n IlPCM,n Hn where IM*L denotes a M * L x M L identity matrix. First, the projector IIPCM,n orthogonal to the constraint matrix CPCM,n is formed. It should be noted from Equations (16) and (17) that the inverse matrix QpCM,n is not the direct inverse of constraint matrix CpCM,n but part of the pseudo-inverse of CPCMn, For convenience, however, it will be referred to as the inverse matrix hereafter. Second, the estimate of the low-power response vector yd is projected and normalized.
n Whereas, using the above constraints, the ISR beamformer may process the low-power user's data vector after it has been despread, it is possible, and preferable, to process the data vector without first despreading it. In either case, however, the data vector will still be despread for use by the channel identification unit.
Although it is computationally more advantageous to do so without despreading, embodiments of both alternatives will be described. First, however, the spread data model of Equation (2) will be reformulated and developed and then used to derive various modes that implement ISR combining of the data, without despreading, suitable for different complementary situations.
Data Model Without Despreading The observation matrix Yn of Equation (4) which provides the post-correlation matrix Zõ of Equation (7) by despreading and framing at the bit rate, can be expressed as:
t, Yn = E Yn + Nnth , (19) n=1 where each user u contributes its user-observation matrix yn, obtained by Equations (3) and (4) with X(t) replaced by Xu(t) in Equation (3), and where the preprocessed thermal noise contributes:
N~th = [NPI1Z(nl),NPhhz(nT + T ),...,Nprn(nT + (2L - 2)T )J. (20) Using the fact that any bit-triplet [b:1, bn , bn;,, contributing to channel convolution (see Equation (2a) in yn can be composed as:
[b,1,b:,b,+1] = bn 1[1, 0, 0] + bn [0,1, 0] + bn:l [0,0,1] , (21) the sequence bu(t) can be locally approximated over the n-th block by means of the canonic generating sequences gl(t), g2 (t) and g3(t) in Figure 22 as:
b"(t) = bn glor(t) + bn 1&`-(t) + bn lg`.,r(t), (22) where the indices lo n, l_, n, l+, n E { 1, 2, 3} are permuted at each block so that the corresponding canonic generating sequences locally coincide with /0, 1, 0], [1, 0, 0] and [0, 0, 1], respectively. Assuming slow time-variations of ~(t) and H(t) compared to the symbol duration:
~~u ~~u y~ u I n = SnuIO,n + Snu-1 `-l,n + Snu+l yl,n , (3) where the canonic user-observation matrices yk n are obtained by Equations (3) and (4) with X(t) in Equation (3) replaced, respectively for k = -1, 0, +1, by:
Xk (t) = H n(t) (D gl`,.(t) c i'(t) . (24) Good approximations of y_1 n and y+l,n can be actually obtained at each iteration by L simple backward/forward shifts of the columns of yo n with zero column inputs.
It should be noted that the canonic generating sequences allow more accurate reconstruction (e.g., overlap-add) of time-varying channels. Also,the resulting decomposition in Equation (23) holds for long PN codes.
It should be noted that this decomposition also holds for any complex-valued symbol-triplet [bu1, bR , bna~. With ad hoc modifications, therefore, the ISR
approach according to this invention applies to any complex modulation (e.g., MPSK, MQAM, even analog). This new signal decomposition is used to derive the different implementations of ISR which will be described later.
With respect to the low-power user assigned the index d and the NI strong interfering mobiles assigned the indices i= 1, ..., NI, the observation vector obtained by reshaping the observation matrix, before despreading, can now be rewritten as:
y= Yd Sn + Id + 1 + N, (25) n -O,n ISI.n n -n.
where the first canonic observation vector yd appears as the "channel" vector of the O,n low-power user d. The total interference vector before despreading:
NI NI NI
1 {si + S~ + - ~ {sZ + (2v) -O,n l,n +l,n X. I SI,n i=1 i=1 i=1 is the sum of the interfering signal vectors yi and:
n jn n ~+ n u (27) Sln - Sn 1 Nln Sn+l ~+ln' l 10 is the intersymbol interference (ISI) vector of user u. In large processing gain situations, the self ISI vector ld can be combined with the uncorrelated spatio-temporal noise -ISI,n vector N~ leading to the following data vector model before despreading: d yn = dnsn + In + Nn. (28) Despreading the observation vector in the above equation with the spreading sequence of the low-power user d provides the data vector model after despreading in Equaiton (14). It is possible to derive a finer decomposition of the date model to allow implementation of one or more of the ISR modes over diversities.
Finer Decomnositionof the Data Model Over Diversities Thus, Equation (2a) can be further decomposed over the Nf = MP diversity branches or fingers in such a way that the observation signal contribution Xn~f(t) received by the m-th antenna along the p-th path for f = (p - 1)M + m = 1,..., Nf can be separated as follows:
Nj Xn(t) = EXnf(t). (29) f~' The observation signal contribution from the f-th finger is defined as:
Xnf(t) = ~n(t)Hn~f(t) c n(t)b u(t) (30) = 'Yn(t)Gp f(t)-Cp(t)b u(t - Tp(t))C n(t - 7p(t))e where the propagation vector from thef-th finger is:
Gpf(t) = yf(t)Rm. (31) In the above equation, the scalar .yf(t) is the channel coefficient over the f-th finger and R= [0,..., 0,1, 0,..., 0f is a M x I vector with null components except for the m-th one. With the above definitions, one can easily check the following decompositions of the channel and the propagation vectors:
Nj Hn(t) _ L H"'t(t), (32) f=1 M
Gp (t) _ 1: Gp,~V -1)M+m(t). (33) m=1 Accordingly, after preprocessing, the matched-filtering observation matrix can be decomposed as follows:
U U Nj yn - L~ I n + trnh -E y ~nJf,nl nl +`vth, (34) u=1 u=1 f=1 l where each user u contributes its user-observation matrices y,"~f from fingers f 1,...,Nf, obtained by Equations (3) and (4) with X(t) replaced by Xnf(t) in Equation (3).
Note that the complex channel coefficient y f(nT) _f(nT)Ep(nT) is separated from the matrix' y'nf which contains a purely-delayed replica of the spread-data without attenuation or phase offset from finger f. This matrix, which is obtained by Equations (3) and (4) with X(t) in Equation (3) replaced by:
X"~f(t) = RmS(t - rP(t)) b "(t)c "(t), (35) can be further decomposed over the canonic generating sequences as follows:
rn f = bn ro n+ bri y" i + bn+l Y+i n, (36) where the canonic user-observation matrices yk n from finger f are obtained by Equations (3) and (4) with X(t) in Equation (3) replaced, respectively for k =
-1, 0, +1, by:
'This matrix is real-valued in the case of a binary modulation.
Xk At) = Rmb(t - TP(t)) gl'-(t)c "(t), (37) where b(t) denotes the Dirac impulse. Therefore one obtains:
U Nf +1 Yn = L: L~ E 'Sn+kJf,nYk n+ ~Ylh (38) u=1 f=1 k=-1 A coarser decomposition over fingers of the total interference vector before despreading defined in Equation (26) gives:
NI NI Nf In = L~ Yt =E !~ VnSf,n~n = (39) 1=1 i=1 f=1 After despreading with the spreading sequence of the low-power user d, it gives:
NI NI Nf Id = Id' - _ ~ >G"~" larJ
(40) PCM,n -PCM,n ^ f=1 n f n-PCM,n Embodiments of the invention which use the above decompositions of interference, denoted as ISR-D implementations before and after despreading, will be described later with reference to Figures 16 and 23.
ISR Combining Before Despreading As described hereinbefore, the combining step of STAR is implemented without despreading by replacing Equation (9) for the low-power user with:
sn = RealfE~ "Yn}, (41) where the spatio-temporal beamformer Wd now implements ISR without despreading n to reject 1 by complying with the following constraints (see Equation (15)):
d d" d K'd"Y
4V Y.n = 1, ~ -n -o,n = 1, (42) WdHC - 0, YYdHl ~ 0, n n n n and Cn is the constraint matrix without despreading that spans the interference subspace of the total interference vector In (i.e., In E Vec { Cn}).
The constraint matrix without despreading, Cn, is common to all low-power users.
Thus, it characterizes the interference subspace regardless of the low-power user. In contrast, each constraint matrix after despreading CPCM,n in Equaiton (15) is obtained by despreading Cn with the spreading sequence of the corresponding low-power user.
Therefore ISR combining before despreading, although equivalent to beamforming after despreading, is computationally much more advantageous.
In contrast to the "after despreading" case described earlier, when the data vector 5 is not despread before processing by the ISR combiner (i. e. , the constrained spatio-temporal beamformer) Wd the estimate of the constraint matrix is obtained by:
n Qn - CCn Cn)-1 , (43) Un - IM * (2L-1) - ~nQn~n ~ (44) 10 Wd = n O,n (45) n ~,d ]_O,n n Y_O,n where IM.(2L_l) denotes a M * (2L - 1) x M*(2L - 1) identity matrix. As before, it can be seen from Equations (43) and (44) that the inverse matrix Qn is not the direct inverse of constraint matrix Cn but part of the pseudo-inverse of Cn . It should also be noted 15 that the above operations are actually implemented in a much simpler way that exploits redundant or straightforward computations in the data projection and the normalization.
As before, the projector IIn orthogonal to the constraint matrix Cn is formed once for all low-power users. This would have not been possible with ISR after despreading.
Second, the estimate of the low-power response vector yd is projected and normalized.
-0,n 20 The estimate pdn is reconstructed by reshaping the following matrix:
Yo n= Hn g`~- c,d (46) n the fast convolution with the channel being implemented row-wise with the spread sequence. The channel estimates fid i,c. H`` is provided by STAR as explained earlier and includes the total contribution of the shaping pulse 0(t) matched with itself [13}. If 25 the channel time-variations are slow, the channel coefficients can be assumed constant over several symbol durations [20], thereby reducing the number of computationally expensive despreading operations required (see Figure 9).
It should be noted that, although these ISR modes have formulations that are analogous whether ISR is implemented with or without first despreading the data vector, 30 ISR combining of the data without it first being despread reduces complexity significantly.
Receivers which implement these different ISR modes will now be described, using the same reference numerals for components which are identical or closely similar to those of the receiver of Figure 5, with a suffix indicating a difference. A
generic ISR
receiver which does so without despreading of the data will be described first, followed by one which does so after despreading of the data. Thereafter, specific implementations of different ISR modes will be described.
Thus, Figure 9 illustrates a receiver according to a first embodiment of the invention which comprises a first set I of "strong user" receiver modules 21'..,21NI
which are similar to those in the receiver of Figure 5, and, separated by a broken line 34, a second set D of "low-power" user receiver modules which differ from the receiver modules of set I but are identical to each other so, for convenience, only one, receiver module 2 1 A d comprising a STAR module 20A' having a modified beamformer 47A1, is shown. The outputs of the decision rule units 29...... 29NI and of the channel identification units 28', ,28N` from the set I modules are shown coupled to a constraints-set generator 42A which processes the corresponding symbol estimates and channel parameter estimates to produce a set of N, constraints (C-The constraints-set generator 42A may, however, use hypothetical symbol values instead, or a combination of symbol estimates and hypothetical values, as will be described later.
Each individual constraint lies in the same observation space as the observation matrix Y,, from preprocessor 18. The constraints-set generator 42A supplies the set of constraints Cn to a constraint matrix generator 43A which uses them to form a constraint matrix Cn and an inverse matrix Q, which supplies it to the beamformer 47d and each of the corresponding beamformers in the other receiver modules of set D. The actual content of set of constraints cCn and the constraint matrix C n will depend upon the particular ISR mode being impleinented, as will be described later.
The receiver of Figure 9 also comprises a vector reshaper 44 which reshapes the observation matrix Yn from the preprocessing unit 18 to form an observation vector Y
having dimension M(2L-1) and supplies it to the beamformer 47A' and to each of the other beamformers in the other receiver modules in set D.
The STAR unit 40Aa of receiver module 41 A' comprises a channel identification unit 28Ad, a decision rule unit 27Ad and a power estimation unit 30A' which are similar to those of the STAR units 20'...20" described hereinbefore. In addition to the STAR
unit 40A', the receiver module 41Ad comprises a despreader 19d. The despreader 19d despreads the observation matrix Yn using the spreading code for user d and supplies the resulting post-correlation observation vector Z to the channel identification unit 28Ad only. The decision rule unit 27Ad and power estimation unit 30Aa produce output symbol estimates f d and power estimates ( ~y~2, respectively. The ISR
beamformer n 47Ad of STAR unit 40Ad produces corresponding signal component estimates Sn but differs from the MRC beamformers 271...27" because it operates upon the observation vector Y, which has not been despread. In a manner similar to that described with respect to Figure 5, the channel identification unit 28A' receives the post-correlation observation vector Zd and the signal component estimate sri and uses them to derive n the spread channel estimates yd which it uses to update the weighting o,n' coefficients ypn of the beamformer 47Ad in succeeding symbol periods. The symbol period corresponds to the spread data frame of M(2L-1) elements. The coefficients of the ISR beamformer 47Ad also are updated in response to the constraint matrix Cn and its inverse Qn, as will be described later. As shown in Figure 9, the same matrices Cn and a are supplied to all of the receiver modules in set D, specifically to their beamformers.
As shown in Figure 10, the constraint matrix generator means 43A comprises a bank of vector reshapers 48A1 , ..., 48A N~ and a matrix inverter 49A. Each of the vector reshapers 48A 1, ..., 48A N reshapes the corresponding one of the set of constraints-set matrices Cn,...,e` to form one column of the constraint matrix Cn, which is processed by matrix inverter 49A to form inverse matrix Qn,. For simplicity of description, it is implicitly assumed that each of the columns of C is n normalized to unity when collecting it from the set of constraints ~'n.
As also illustrated in Figure 10, beamformer 47A' can be considered to comprise a coefficient tuning unit 50A' and a set of M(2L-1) multipliers 51; ...51M(u,-,). The coefficient tuning unit 50Ad uses the constraint matrix Cn, the inverse matrix Qn and the channel parameter estimates yd to adjust weighting coefficients Wd' ~d' -O,n 1,n M(2L-1),n according to Equation 45 supra. The multipliers 51; ...51~,(2L-,) use the coefficients to weight the individual elements y.,, y respectively, of the observation 1,n -M(2L-1),n' vector y The weighted elements are summed by an adder 52d to form the raw filtered symbol estimate sn for output from the beamformer 47Ad.
An alternative configuration of receiver in which the low-power STAR units of set D implement ISR beamforming qfter despreading of the observation matrix Yn from preprocessor 18 will now be described with reference to Figures 11 and 12, which correspond to Figures 9 and 10. The receiver shown in Figure 11 is similar to that shown in Figure 9 in that it comprises a preprocessing unit 18 which supplies the observation matrix Yn to the set I receiver modules 21'...21NI, a constraints-set generator 42B and a constraint matrix generator means 43B. It does not, however, include the vector reshaper 44 of Figure 9 and each of the low-power user STAR modules in set D
has a modified beamformer. Thus, modified beamformer 47Bd operates upon the post-correlation observation vector Zd from the output of the despreader 19d which is n supplied to both the channel identification unit 28Bd and the beamformer 47Ba.
The channel identification unit 28Bd generates channel estimates ftd and supplies them to the n beamformer 47Bd which updates its coefficients in dependence upon both them and a user-specific constraint matrix CPCM,n and user-specific inverse matrix QPCM,n-It should be noted that the constraint matrix generator means 43B supplies user-specific constraint and inverse matrices to the other receiver modules in set D.
Referring now to Figure 12, the common constraint matrix generator means 43B
comprises a bank of user-specific constraint matrix generators, one for each of the receiver modules of set D, and each using a respective one of the spreading codes of the users of set D. Since the only difference between the user-specific constraint matrix generators is that they use different spreading codes, only user-specific constraint matrix 43Bd is shown in Figure 12, with the associated beamformer 47Ad. Thus, user-specific constraint matrix generator 43Bd comprises a bank of despreaders 55Bd ', ..., 55Bd'r", and a matrix inverter 46Bd. The despreaders 55Bd ', ..., 55Bd'N` despread respective ones of the N, matrices in the set of constraints C,, to form one column of the individual constraint matrix CPCM,n implicitly normalized to unity. The matrix inverter 46Bd processes individual constraint matrix CPCM,n to form inverse matrix QPCM,n, The user-specific constraint matrix generator 4313d supplies the constraint matrix C cM,. and inverse matrix QP Mn to the coefficient tuning unit 50Bd of beamformer 47Bd. As shown in Figure 12, the beamformer 47Bd has ML multipliers 51 i... 51ML which multiply weighting coefficients yyd `. ., yyd' by elements Zd ,,, Zd of the post-correlation -1,n -ML n -t,n -ML,n observation vector Zd. As before, adder 52d sums the weighted elements to form the -n signal component estimate sri - The beamformer coefficeints are timed according to Equation (18).
Either of these alternative approaches, i. e. with and without despreading of the data vector supplied to the beamformer, may be used with each of several different ways of implementing the ISR beamforming, i.e. ISR modes. It should be noted that all cases use a constraint matrix which tunes the ISR beamformer to unity response to the desired channel and null response to the interference sub-space. In each case, however, the actual composition of the constraint matrix will differ.
Specific embodiments of the invention implementing the different ISR modes without despreading of the data will now be described with reference to Figure 13 to 20, following which embodiments implementing the same ISR modes after despreading will be described with reference to Figures 21 to 26.
Interference Subspace Rejection over Total Realisation (ISR-TR) The receiver unit shown in Figure 13 is similar to that shown in Figure 9 in that it comprises a set I of receiver modules 21'...21" for processing signals of NI strongly interfering mobile stations and a set D of receiver modules for signals of other, "low-power", users. The receiver modules of set D are identical so only receiver module 21Cd, for channel d, is shown in Figure 13. As in the receiver of Figure 9, the observation matrix Yn from preprocessor 18 is supplied directly to each of the despreaders 19'...19'" of the set 1 receiver modules. Before application to each of the receiver modules of set D, however, it is delayed by one symbol period by a delay element 45 and reshaped by vector reshaper 44. The resulting observation vector y n -I
is supplied to the beamformer 46C`' and to each of the other beamformers in the set D
receiver modules (not shown). In addition to beamformer 47Cd, receiver module 21Cd comprises despreader 19' and a STAR receiver unit 20Cd comprising channel identification unit 28Cd, decision rule unit 27Cd and power estimation unit 30Cd which are siniilar to those shown in Figure 9. The set of channel parameter estimates nn, which are supplied to the constraints-set generator 42C comprise the channel estimates H',,,,,and the power estimates n~ n n n The constraints-set generator 42C comprises a bank of respreaders 57C'...57CNI
each having its output connected to the input of a respective one of a corresponding bank of channel replication units 59C'...59CNI by a corresponding one of a bank of multipliers 58C'...58CN'. The respreaders 57C1 ...57CNI are similar so only one, respreader 57C , is illustrated in Figure 14. Respreader 57C is similar to the corresponding spreader 13 (Figure 3) in that it spreads the symbol bn from the corresponding decision rule unit 29C using a periodic personal code sequence c," at a rate 1/T, where Tc is the chip pulse duration. It differs, however, in that it does not include a shaping-pulse filter.
The effects of filtering both at transmission with the shaping-pulse (see Figures 2 and 3) and at reception with the matched shaping-pulse (see Figures 5 and 6) are included baseband in the channel estimate or Hn~ as disclosed in reference [13].
n 5 Referring again to Figure 13 and, as an example, receiver module 21C', replication of the propagation characteristics of channel 14' is accomplished by digital filtering in the discrete time domain, i.e. by convolution at the chip rate of the channel estimate Hl with the respread data bn cf . This filtering operation immediately provides n decomposed estimates of the signal contribution of user station 10' to the observation 10 matrix Y. Thus, respreader 57C' respreads the symbol Ln' from decision rule unit 29C', multiplier 58C1 scales it by the total amplitude estimate ,,n and channel replication filter 59C' filters the resulting respread symbol using the channel estimate Hl from channel identification unit 28C'. The symbol estimates from the other n STAR units in set I are processed in a similar manner.
15 It should be noted that the respreaders 57C'...57CN', multipliers 58C'...58CN' and channel filters 59C'...50CN' correspond to the elements 13', 15' and 14' in the interfering user channel of Figure 2. The coefficients of the channel replication filter units 59C'...59CN' are updated in successive symbol periods by the channel identification units 28C'...28CN' using the same coefficients gn... Hn 1, corresponding to the transmission 20 channels 14'...14N', respectively, used to update their respective MRC
beamformers 27C'...27CN'. It will be appreciated that the re-spread signals Yri 1 yn 1 from the channel replication filter units 59C...59CN', respectively, include information derived from both the sign and the amplitude of each symbol, and channel characteristics information, and so are the equivalents of the set I strong interferer's spread signals as 25 received by the base station antenna elements 12'...12M.
The constraint-set generator 42C also comprises an adder 60 coupled to the outputs of the channel replication units 59C'...59CN'. The adder 60 sums the estimates yn 1 y'1 of the individual contributions from the different interferers to form the estiinate In-1 of the total interference from the NI interferers in the received 30 observation matrix Y,,. The sum can be called total realization (TR) of the interference.
In this embodiment, the constraint matrix generator simply comprises a vector reshaper 43CB which reshapes the total realization matrix In-1 to form the vector I
which, n-1 in this embodiment, constitutes the constraint matrix C. It should be noted that, because the constraint matrix really is a vector, the inverse matrix Q, reduces to a scalar and, assuming implicit normalization, is equal to 1. Hence, no matrix inverter is needed.
The reshaped vector I is supplied to the ISR beamformer 47Cd of receiver n-1 module 21 C' and to the beamformers of the other receiver modules in set D.
The beamformer 47Cd uses the reshaped vector I and the channel estimates yd to -n-1 -o,n-1 update its coefficients, according to Equation (45), for weighting of the elements of observation vector y n-1 The beamformer 47Cd adjusts its coefficients so that, over a period of time, it will nullify the corresponding interference components in the observation vector y from n-1 the vector reshaper 44 and, at the same time, tune for a unity response to the spread channel. vector estimate so as to extract the raw signal component estimate sR , substantially without distortion.
ISR-TR constitutes the simplest way to characterize the interference subspace, yet the most difficult to achieve accurately; namely by a complete estimation of the instantaneous realization of the total interference vector I in a deterministic-like approach. The constraint matrix is therefore defined by a single null-constraint (i.e., N, =1) as:
NI
C = I n = ` ' (47) IIInII I~TrI ~II
i=1 n where each estimate y` is reconstructed by reshaping the following matrix:
n f;, = ~n Ha bhcl` . (48) For each interfering user assigned the index i = 1, ..., NI, this mode uses estimates of its received power (~,R)2 and its channel H` , both assumed constant over -n the adjacent symbols and made available by STAR. This mode also requires a bit-triplet estimate {h, bR, b;,,,, of each interfering user (see Equation (23)). To obtain estimates of the signs of the interferer bits for both the current and next iterations (i.e., bn and bn,,), the ISR-TR inode requires that the processing of all the low-power users be further delayed by one bit duration and one processing cycle (pc), respectively. The one-bit delay is provided by the delay 45 in Figure 13.
In the ISR-TR mode and in the alternative ISR modes to be described hereafter, the interference (due to the strongest users) is first estimated, then eliminated. It should be noted that, although this scheme bears some similarity to prior interference cancellation methods which estimate then subtract the interference, the subtraction makes these prior techniques sensitive to estimation errors. ISR on the other hand rejects interference by beamforming which is robust to estimation errors over the power of the interferers. As one example, ISR-TR would still implement a perfect null-constraint if the power estimates were all biased by an identical multiplicative factor while interference cancellers would subtract the wrong amount of interference. The next mode renders ISR even more robust to power estimation errors.
The receiver illustrated in Figure 13 may be modified to reduce the information used to generate the interfering signal estimates y' ... yNj specifically by omitting the n-1 n-11 amplitude of the user signal estimates, and adapting the ISR beamformer 47Cd to provide more (NI) null constraints. Such a modified receiver will now be described with reference to Figure 15.
Interference Subspace Rejection over Realisations (ISR-R) In the receiver of Figure 15, the receiver modules in set I are identical to those of Figure 13. Receiver module 21Dd has the same set of components as that shown in Figure 13 but its beamformer 47Dd differs because the constraint matrix differs. The constraints-set generator 42D differs from that shown in Figure 13 in that it omits the multipliers 58C'...58CN' and the adder 60. The outputs from the power estimation units 30'...30N` are not used to scale the re-spread signals from the respreaders 57C'...57CN1, respectively. Hence, in the receiver of Figure 15, the signals 6n... bnl from the STAR
units 20'...20N', respectively, are re-spread and then filtered by channel replication filter units 59C'...59CN1, respectively, to produce user specific observation matrices yn 1 ynll, respectively, as the constraints-set C. In contrast to the receiver of Figure 13, however, these respread matrices are not summed but rather are processed individually by the constraint matrix generator 43D, which comprises a bank of vector reshapers 48D' ... 48DN' and a matrix inverter 49D (not shown but similar to those in Figure 10). The resulting constraint matrix C0 comprising the column vectors yl .., yNr is supplied, together with the corresponding inverse matrix Q~, to n-1' '-n-1 each of the receiver modules in set D. Again, only receiver module 21Dd is shown, and corresponds to that in the embodiment of Figure 13. Each of the vectors P ... ~I represents an estimate of the interference caused by the n-1 n-1' corresponding one of the strong interference signals from set I and has the same dimension as the reshaped observation vector y n-i In this ISR-R mode, the interference subspace is characterized by normalized estimates of the interference vectors y` , Consequently, it spans their individual n realizations with all possible values of the total received powers (0n)2. The constraint matrix is defined by NI null-constraints (i.e., N,=NI) as:
~ n~ Cn = ~ ,..., ~l , (49) ~~-n ~~ ~~ n ~~
where each estimate y` is reconstructed by reshaping the following matrix:
n Yn = Hn bn C,` (50) It should be noted that, in the reconstruction of y` , the total amplitude of the n i-th interferer ~n (see Figure 15) has been omitted intentionally; hence the higher robustness expected to near-far situations as well as the enlarged margin for power control relaxation.
Interference Subspace Rejection over Diversity (ISR-D) The ISR-D receiver shown in Figure 16 is predicated upon the fact that the signal from a particular user will be received by each antenna element via a plurality of sub-paths. Applying the concepts and terminology of so-called RAKE receivers, each sub-path is termed a "finger". In the embodiments of Figures 9, 11, 13 and 15, the channel identification units estimate the parameters for each finger as an intermediate step to estimating the parameters of the whole channel. In the ISR-D receiver shown in Figure 16, the channel identification units 28E'...28E" supply the whole channel estimates Hl HNI respectively, to the beamformers 27'...27N', respectively, as before.
In R n addition, they supply the sets of channel parameter estimates Y{n NI of each individual sub-channel or finger to the constraints-set generator 42E. The set of channel parameter estimates y{' comprises the sub-channel estimates g' H''Nj, The n n~"' ~ n constraints-set generator 42E is similar to that shown in Figure 15 in that it comprises a bank of respreaders 571 ...57" but differs in that the channel replication units 59D'...59DN' are replaced by sub-channel replication units 59E1 ...59EN', respectively.
The sub-channel replication units 59E'...59EN' convolve the respread symbols with the sub-channel estimates H1 1 H1'N; ;H^'I,1 ,gNr'D1f respectively, to produce n n n , n normalized estimates yl,l y1n'; ;y'''rl, of the sub-channel-specific n-i n-1 n-1 n-1 observation matrices decomposed over fingers. Hence, the matrices span the space of their realizations with all possible values of the total received powers (~n)2 and complex channel coefficients ~'fn, The estimates are supplied to a constraint matrix generator 43E which generally is as shown in Figure 10 and produces the constraint matrix accordingly.
The constraint matrix Cn is simply defined by NflVl null-constraints (i.e., N, _ NfxNI=MxPxN1)as:
~,l,l 1 ~,],Nf .~VI,1 ~iV/Nf C' -~n -n I-~ -n ]-= -n (51) I
n FIVII 71r, ~~ ~'1 IrFl, Eac h estimate yf is reconstructed by reshaping the following matrix:
n Ynf = Cl n bn Cl~. (52) It should be noted that, in the reconstruction of the total amplitude of the i-th interferer ~a as well as the channel coefficients f~ (see Figure 1) are intentionally omitted; hence the relative robustness of ISR-D to power mismatch, like ISR-R. Unlike other modes, it additionally gains robustness to channel identification errors and remains sensitive only to the estimated channel parameters remaining, namely the multipath time-delays, and to symbol estimation errors.
It should be noted that, in the receivers of Figures 13, 15 and 16, estimation errors of the interference bit signs may introduce differences between the estimated constraints and the theoretical ones. Hence, although ISR-D, ISR-R and ISR-TR
modes are satisfactory in most situations, it is possible that the realisation could be erroneous, which would affect the validity of the interference cancellation.
Additionally, estimation of the signs of the interference bits for reconstruction in the ISR-D mode, as in the ISR-R and ISR-TR modes, requires that the processing of all of the low-power users be further delayed by one bit duration, i.e., by delay 45, and one processing cycle (pc).
To avoid these drawbacks, alternative ISR approaches to implementation of the constraints of Equation (42) are envisaged and will now be described, beginning with ISR-H which avoids processing delays and is completely robust to data estimation errors.
Interference Subspace Rejection over HYpotheses (ISR-H) It is possible to use a set of signals which represent all possible or hypothetical values for the data of the interfering signal. Each of the interfering signals constitutes a vector in a particular domain. It is possible to predict all possible occurrences for the 5 vectors and process all of them in the ISR beamformer and, therefore, virtually guarantee that the real or actual vector will have been nullified. As mentioned, the strong interferers are relatively few, so it is possible, in a practical system, to determine all of the likely positions of the interference vector and compensate or nullify all of them.
Such an alternative embodiment, termed Interference Subspace Rejection over 10 Hypotheses (ISR-H) because it uses all possibilities for the realisations, is illustrated in Figure 17.
The components of the "interferer" receiver modules of set I, namely the despreaders 19'...19" and STAR units 20'...20N', are basically the same as those in the receiver of Figure 15 and so have the same reference numbers. In the embodiment of 15 Figure 17, however, the constraints-set generator 42F differs because the symbol estimates b' .,, b` from the outputs of the decision rule units 29'. ..29N' are not supplied n n to the respreaders 57F...57FN', respectively, but are merely outputted to other circuitry in the receiver (not shown).
Instead, bit sequence generators 63F...63FN' each generate the three 20 possibilities g~, g2 n, g3 which cover all possible estimated values of the previous, current and next bits of the estimated data sequences n..,bn including the realisation itself (as explained later), and supply them to the respreaders 57F'...57FN', respectively, which each spread each set of three values again by the corresponding one of the spreading codes. The resulting re-spread estimates are filtered by the channel replication filters 25 59F...59FN', respectively, to produce, as the constraint set, the matrix estimates ^1 " "1 Y ~,NI YNI YNI The bit sequence generators could, of course, be on, Y._1~, Y+1~; ... 10n _1,n, +1,n*
replaced by storage units.
The constraint matrix generator 43F is generally as shown in Figure 10 and processes the set of estimate matrices to form the column vectors 30 yl , y , yl ;... ;~`'r, krvl , yN' of constraint matrix Cn, which it supplies with -O,n --1,n -+1,n -O,n 1,n -+1,rt corresponding inverse matrix Q,,, in common to the beamformer 47Fd and the beamformers of the other set D receiver modules.
Receiver module 21Fd comprises similar components to those of the receiver module 21E`' shown in Figure 16. It should be noted, however, that, because the "next"
bit is being hypothesized, it need not be known, so the delay 45 is omitted.
As mentioned above, the two bits adjacent to the processed bit of the i-th interferer contribute in each bit frame to the corresponding interference vector (symbol) to be rejected. As shown in Figure 18, enumeration of all possible sequences of the processed and adjacent bits gives 23 = 8 triplets, each of three bits. Only one of these triplets could occur at any one time at each bit iteration as one possible realization that generates the user-specific observation matrix yn, These eight triplets can be identified within a sign ambiguity with one of the four triplets identified as (a)... (d) in the left-hand part of Figure 18, since the four triplets (e)... (h) are their opposites.
It should be appreciated that the bit sequence generators 63'...63N1 (Figure 17) each supply only three values, gl , g2, g3 because the dimension of the generated signal n n n subspace is 3. It should be noted that frames of duration 3T, taken from these sequences at any bit rate instant, reproduce the eight possible realisations of the bit triplets of Figure 18. Therefore, at any bit iteration, the bit sequence bn of the interfering mobile station can be locally identified as the summation of the generating sequences g~, k = 1,..., 3 weighted by the bit signs bn-1, bõ and b,;,l. Replacing the estimate in Equation (50) by gn, k 1,..., 3, , yields canonic observation matrices that span all possible realisations of the received signal vector from the i-th interfering mobile within a sign ambiguity.
In the ISR-H embodiment of Figure 17, the interference subspace is characterized by normalized estimates of the canonic interference vectors y` . Accordingly, it spans k,n their individual realizations with all possible values of the total received powers (0n)2 and bit triplets [b1, bn ,bn+lThe constraint matrix is defined by null-constraints (i.e., N,. = 3NI) as:
2 l" I" l" ~ 2" 1 1" 1 C = O'n --l,n -+l.n -p,n --l,n -+l,n (53) n > > >..., ~ , ~ ' M ~,n (lIl~l,nll II~nII Il~l.nll 30 where each estimate is reconstructed, respectively, for k = -1, 0, + 1 by reshaping k,n the following matrix:
(54) Yk n= Fln gn'- c,`.
It should also be noted that, in the reconstruction above, only the channel estimates (assumed stationary over the adjacent symbols) are needed for complete interference rejection regardless of any 2D modulation employed (see Figure 19); hence the extreme robustness expected to power control and bit/symbol errors of interferers.
The ISR-H combiner coefficients are symbol-independent and can be computed less frequently when the channel time-variations are slow.
Merging of the D mode with the H mode along the decomposition of Equation (38) yields ISR-HD (hypothesized diversities) with a very close form to the decorrelator.
This ISR-HD mode requires a relatively huge number of constraints (i. e. , 3Nf NI).
Consequently, the ISR-HD mode is not considered to be practical at this time.
In fact, it wotild be desirable to reduce the number of constraints required by the ISR-H receiver described above. This can be done using an intermediate mode which is illustrated in Figure 20 and in which the receiver modules of both sets I
and D are similar to those of Figure 15; most of their components are identical and have the same reference numbers. In essence, the constraint-set generator 42G of the receiver in Figure combines the constraint-set generators of Figures 15 and 17 in that it uses estimated symbols and hypothetical values. Thus, it comprises a bank of respreaders 57G'...57G", a corresponding bank of channel replication units 59G'...59GN` and a bank of bit symbol generators 63G'...63G". In this case, however, each of the bit symbol generators 20 63G'...6GEN' supplies only one bit symbol to the corresponding one of the respreaders 57G'...57GN', which receive actual bit symbol estimates bn ... b n', respectively, from the decision rule units 29...... 29', respectively. It should be appreciated that, although the bit symbol generators 63G...... 63GN' each supply only one bit symbol for every actual symbol or realization from the corresponding one of the decision rule units 29',...,29"', that is sufficient to generate two hypothetical values of "future" symbols gri+l ,===, bn i for every one of the symbol estimates gn+l bn'1 since only two hypothetical values of the symbols, namely 1 and -1, are required. The respreaders 57G...... 57GN' supply the spread triplets to the channel replication units 59G'...59GNI
which filter them, using the channel parameter estimates Hl =.. g"", respectively, to n rt produce pairs of matrices yr,n, y+l n, .., yNn', yN ~ and supply them to the constraint matrix generator 43G which is configured generally as shown in Figure 9. The constraint matrix generator 43G reshapes the matrices y1 y+l n; yNn, yN,n to form vectors y' yl y~" y"'' which then are used as the column vectors of the constraint r n~ -+1n~ rn~ -+1n matrix Cn. The constraint matrix generator 43G supplies the constraint matrix Cn and the corresponding inverse matrix Q,t in common to the beamformer 47Ga and the beamformers of other receiver modules in set D.
Hence, the beamformer 47Gd uses the past symbol estimate bn_1 of the interference data as well as the present one bn (delayed by one processing cycle, i. e.
the time taken to derive the interference estimates), and the unknown sign of bn+l reduces the number of possible bit triplets and the corresponding realisations for each interference vector to 2.
The receiver of Figure 20, using what is conveniently referred to as ISR-RH
mode for reduced hypotheses over the next interference bits, rejects reduced possibilities of the interference vector realisations. Compared to the receiver of Figure 17 which uses the ISR-H mode, it is more sensitive to data estimation errors over bn-1 and brs and requires only 2 constraints per interferer instead of 3.
Using the previous and current bit estimates of interferers, uncertainty over the interference subspace can be reduced and it can be characterized by the following matrix of 2NI null-constraints (i.e., N, = 2NI):
I I I" 1 r!
C, = r,n -+1,n r,n -+1,n (55) where: n Il~,nll' Il~l,nll' ' II r,nll' II-+1,nll ' b` Y` + b` ~ (56) r,n n-On n 1--1,n' and where each estimate is reconstructed by reshaping the matrices in Equation k,n (38), respectively for k=-1,0,+1. It should be noted that this mode requires a delay of one processing cycle for the estimation of the current interference bits.
The ISR-RH mode has the advantage of reducing the number of null-constraints as compared to the ISR-H mode. A larger number of null -constraints indeed increases complexity, particularly when performing the matrix inversion in Equation (43), and may also result in severe noise enhancement, especially when the processing gain L
is low.
As the number of strong interferes NI increases in a heavily loaded system, the number of null-constraints (2N1 and 3NI) approaches the observation dimension M x(2L -1) and the constraint-matrix may become degenerate. To reduce complexity, guarantee stability in the matrix inversion of Equation (43), and minimize noise enhancement, the constraint matrix Cn in Equations. (43) and (44) is replaced by the orthonormal interference subspace of rank K that spans its column vectors as follows:
Vn = VeC{Cn} _{V i,...,V k,...,V K} (57) In practice, V n can hardly reflect the real rank of C n . It corresponds to the subspace of reduced rank k with the highest interference energy to cancel. To further minimize noise enhancement, one can also increase the observation dimension M
x(2L -1), as will be described later as "X option", and so on.
It should be noted that each of the receivers of Figures 13, 15, 16, 17 and 20 could be modified to perform ISR "after despreading" of the observation vector Yn, in effect in much the same way that the generic "after despreading" receiver of Figure 11 differs from the generic "without despreading" receiver of Figure 9. Such modified receivers will now be described with reference to Figures 21 to 26.
Thus, in the ISR-TR receiver shown in Figure 21, which corresponds to that shown in Figure 13, the delay 45 delays the observation matrix Yn from the preprocessing unit 18 by 1 bit period and supplies the resulting delayed observation matrix Yn_,, in common, to each of the low-power user receiver modules in set D. Only one of these receiver modules, 21 H', is shown in Figure 21, since all are identical. The observation matrix Yn_, is despread by despreader 19a and the resulting post-correlation observation vector Zd is supplied to both the channel identification unit 28Hd and the n-1 beamformer 47H . The receiver modules of set I and the constraints-set generator 42C
are identical to those in the receiver shown in Figure 13, and supply the matrices Yl YNI to an adder 60 which adds them to form the total interference n-1 "' n-1 matrix I_1 which it supplies to each of the receiver modules in set D.
Receiver module 21Hd is similar to that shown in Figure 13 but has a second despreader 43Hd which uses the spreading code for user d to despread the total interference matrix In 1 to form the user-specific constraint matrix as a single column vector id This despreader 43Hd, in effect, constitutes a user-specific constraint PCM,n-1 matrix generator because the constraint matrix is a vector and an inverse matrix is not needed. Also, in this case, the channel identification unit 28Hd supplies the channel estimate Hd to the beamformer 47Hd.
-n-1 It should be noted that the despread data vector Zd is equal n-1 to Hd Sri + Id + Nd, where Hd is the channel response for user station 10d, Sri is n PCM,n n n the signal transmitted by the mobile station 10d of user d, and Id is the interference -PCM,n component present in the signal Zd as a result of interference from the signals from the n other user stations 10' in set I, where Id is as defined in Equation (14). The -PCM,n value s d is additional noise which might comprise, for example, the summation of PCM,n the interference from all of the other users on the system at that time, as well as thermal 5 noise. "Other users" means other than those covered by the channels in set I.
As before, the coefficients of the beamformer 47Hd are tuned according to Equations (16) to (18) and the constraint matrix is defined by a single null-constraint (i.e., N,=1) as:
NI
d F Id,i I -PCM,n ) 10 .d _ PCM,n _ i=1 (58) 1~PCM,n ~~ N' P,i -PCM,n where the estimate Id is obtained by despreading the matrix I(See Equations (47) -PCM,n n and (48)) with the spreading sequence of the desired low-power user.
15 Figure 22 shows a similar modification to the low-power (set D) receiver modules of the "without despreading" ISR-R receiver of Figure 15. In this case, the output of the constraint-set generator 42D, as before, comprises the matrices yn 1 yn'1 As before, only receiver module 21Jd is shown in Figure 22 and is identical to that shown in Figure 21 except that the second despreader 43Hd is replaced by a user-specific 20 constraint matrix generator 43Jd of the kind shown in Figure 12. The channel identification unit 28Jd again supplies the vector Ad to the beamformer 47Jd.
The n-1 bank of despreaders in the user-specific constraint matrix generator 43Ja despread the respective ones of the matrices Y. 1 yn'1 to form the vectors PJ which constitute the columns of the user-specific constraint PCM,n-1' -PCM,n-1 25 matrix C' cM,_1 and the matrix generator 46Gd produces the corresponding inverse matrix QpCM,n-1, Both of these matrices are supplied to the associated beamformer 47Jd which uses them and the channel estimate ftd 1 to adjust its coefficients that are used to weight the elements of the post-correlation observation vector Zd . As before, the -n-1 coefficients are adjusted according to Equations (16) to (18) and the constraint matrix is 30 defined by NI null-constraints (i.e., N,=N1) as:
;d,l id,Nl ~+d _ [PCM,n PCM,n (59) PCM,n ~t ,d ~~-PCM,n11 ~ ' ~~-PCM,n~~
where each estimate Id ` is obtained by despreading the matrix y` of Equation (50) -PCM,n n with the spreading sequence of the desired low-power user.
Figure 23 illustrates the modification applied to the low-power user receiver module of the ISR-D receiver of Figure 16. Hence, there is no common matrix inverter.
Instead, in the receiver of Figure 23, each of the receiver modules of set D
has a user-specific constraint matrix generator 43K which recevies the constraints from the constraints-set generator 42E. As illustrated, user-specific constraint matrix generator 43Kd processes the sets of matrices yn 1,,, yn'"1f , .., ; y,~-il ,~Ii'f to form the set of vectors j1 l wf = ~t~`'r,l PN 'f which constitute the columns of user--PCM,n-1 -PCM,n-1' -PCM,n-1' '-PCM,n-1' specific constraint matrix CPCM,n-1~ and the corresponding inverse matrix QPCM,n-1 which it supplies to the beamformer 47Kd. As before, the beamformer 47Kd tunes its coefficients according to equations (16) and (18). The constraint matrix is defined by N,,NI null-constraints (i. e. , N, = Nf X NI = M x P x NI) as:
d,1,1 id,1,Nl id,N1,1 l~d,M,NJ
j,d /-PCM,n -PCM,n -PCM,n -PCM,n (60) l. -PCM,n ^d 1 l I,1 PCM,I
I PCM n II III PCM,n II II I PCM,n where each estimate Id,'J is obtained by despreading Pf of Equation (52) with the PCM,n -n spreading sequence of the desired low-power user.
Figure 24 illustrates application of the modification to the ISR-H receiver of Figure 17. Again, the common constraint matrix generator (43F) is replaced by a user-specific constraint matrix generator 43L' in receiver module 21Ld and similarly in the other receiver modules of set D. The constraints-set generator 42L' differs from constraints-set generator 42F of Figure 17 because its bit sequence generators 63L...... 63LNI use different generating sequences. The sets of matrices y, n, y>,nl y3,n; =. ; yl ,,, y2 ~, ys ~ from the constraints-set generator 42F' are processed by the user-specific constraint matrix generator 43Ld to form the vectors P 1 ~,1 ~r,l= =~,~vr ~.^'r ~,n'' which constitute the columns of the user-specific l~, -2~ -3~> >_ln ~ 2,n ' 3,n constraint matrix CpCMn, and the matrix inverter (not shown) produces the corresponding inverse matrix QPCM,n. The constraint matrix CPCM,n and the inverse matrix QpCM,n are used by the beamformer 470, together with the channel estimate #d, to adjust its coefficients that are used to weight the elements of the post-n correlation observation vector Zd received from despreader 19a. As before, the n coefficients are adjusted according to Equations (16) and (18) and the constraint matrix is defined by 3N1 null-constraints (i. e. , N, = 3N1) as:
l,l ^ ,1,2 ^ ,I,3 ,Nl,l [;d,N1,2 ;d,N1,3 \
Cd _ PCM,n -PCM,n -PCM,n !-PCM,n -PCM,n !-PCM,n (61) PCM, n d 1 1 I 2 ' I 3 II' ' N1,1 ~I ' I) ^d N1,2 II ' II ^d N1,3 II ' 5 ~~~PCM,n~~ CM,nJJ~~tCM,n ~~CM,n ~PCM,n I ~PCM,n where each estimate Id,`,k is obtained by despreading the matrix y" `k n with the -PCM,n spreading sequence of the desired low-power user.
In this case, each of the bit sequence generators 63L...... 63LN' uses four generating bit sequences 9 1 (t), g 2(t), 9 3(t) and g 4(t) as shown in Figure 25.
It should be noted that, in any frame of duration 3T in Figure 25, a bit triplet of any of the four generating sequences is a linear combination of the others.
Therefore, any one of the four possible realisations of each interference vector is a linear combination of the others and the corresponding null-constraint is implicitly implemented by the three remaining null-constraints. The four null-constraints are restricted arbitrarily to the first three possible realisations.
Figure 26 illustrates application of the modification to the ISR-RH receiver of Figure 20. Again, the common constraint matrix generator 43G of Figure 20 is replaced by a set of user-specific constraint matrix generators, 43M' in receiver module 21Md and similarly in the other receiver modules of set D. The constraints-set generator 42M
shown in Figure 26 differs slightly from that (42G) shown in Figure 20 because each of the bit sequence generators 63M',...63M" in the receiver of Figure 26 generate the bit sequence g t.l^, n The user-specific constraint generator 43Md processes the pairs of constraint-set matrices ykl~, y~~; ...; yk ~, y"~ n from the channel identification units 59M...... 59MN', respectively, by to produce the corresponding set of vectors P, 1AI P l~ ..= f~1~`l f~1,"2 which constitute the columns of the user-specific PCM,n' PCM,n' ' PCM,n' -PCM,n constraint matrix CpCM,n.? and to produce the corresponding inverse matrix QPCM,n=
are used by the The constraint matrix Cd and the inverse matrix QP~Mn PCM,n beamformer 47Md, together with the channel estimate Hd, to adjust its coefficients that n are used to weight the elements of the post-correlation observation vector Zd received n from despreader 19 . As before, the coefficients are adjusted according to Equations (16) to (18) and the constraint matrix is defined by 2NI null-constraints (i.e., N, = 2NI) as follows:
id,l,k, l ;d,l,kz jd,Nl,k, ;d,Nl,ki d -PCM,n -PCM,n -PCM,n /-PCM,n (62) > >,d > ,.d l !
1~, CM ,n II `I PCM,n I` II -PCM n II II -PCM n II
where each pair of estimates Id ` k, and Id `,k2 is obtained by despreading the -PCM,n -PCM,n matrices yk n and yk n, respectively, with the spreading squence of the desired low-~
power user.
Inter-Symbol Interference (ISI) Rejection In any of the above-described embodiments of the invention it may be desirable to reduce inter-symbol interference in the receiver modules in set D, especially when low processing rates are involved. As noted in the PCM model where despreading reduces ISI to a negligible amount, for a large processing gain, yd" yd = 0 and yd _yd 0, Hence, the before despreading spatio-temporal -O,n--1,n -O,n +1,it beamformer yyd approximately implements the following additional constraints:
n Wd"~ - 0, n --l,n (63) Wd"Yd - 0.
-n -+l,n Accordingly, it rejects interference and significantly reduces ISI. Complete ISI
rejection can be effected by modifying the receiver to make the set of the channel parameter estimators available to the constraints-sets generator 42 for processing in parallel with those of the set I receiver modules. The resulting additional constraint matrix and inverse matrix would also be supplied to the beamformer 47d and taken into account when processing the data.
In such a case, the following matrix can be formed:
II Y II ~' d _ n l,n n -+l,n CISI,n ~ ~ ~ ~ ~ ~
II n- l,nll II n+l,nll (64) and the following 2 x 2 matrix /] (~' H 1 ( 7~ISI,n ~ Shn CSl,n 65) inverted to obtain the constrained spatio-temporal beamformer yyd before despreading n by:
iiSl,n - IM = (ZL-u - CS1,n Li I,n ~' Sl,n 1 AdH (66) (67) d d ~n - ~ISI,n ~n ' nd ,d Wd = n I-o,n (68) -n 1. ~,dH Hd kd -O,n n-O,n The projector IIn is produced in the manner described earlier according to Equations (43) and (44). The projector nn orthogonal to both C, In and C'n, is formed and then the low-power response vector yd projected and normalized to form the O,n beamformer which fully rejects ISI from the processed user d and interference from the NI users in set I.
It should be noted that, if the suppression of strong interferers is not needed, ISI
can still be rejected by the following beamformer:
d Wd _ H1SI,n--O n (V7Ln) -n [Xd x ~'nHISI,n-O,n where projector II n in equations 47 - 49 would be set to identity and hence would have no effect. This is the same as setting the matrix Cn to null matrix. If the projector ii~lSjn in the above equation is replaced by an identity matrix, (equivalent to setting matrix Csln to null matrix) then a simple MRC beamformer is implemented before despreading. A receiver module using such an MRC beamformer is illustrated in Figure 27 and could be used to replace any of the "contributor" only receiver modules, such as receiver modules 21', ..., 211' in Figure 9 et seq. The receiver module shown in Figure 27 is similar to receiver module 21Ad of Figure 9 except that the ISR beamformer 47A' is replaced by an MRC beamformer 27Nd which implements the equation yyd - ~ (70) n 11 i`` 112 o,n It is also envisaged that the receiver module of Figure 27 using the MRC
beamformer denoted Wd in the following, could be incorporated into a STAR
which MRC,n did not use ISR, for example the STAR described in reference [13].
5 Joint ISR Detection In the foregoing embodiments of the invention, ISR was applied to a selected set D of users, typically users with a low data-rate, who would implement ISR in respect of a selected set I of high-rate users. Although this approach is appropriate in most cases, particularly when the number of high-rate users is very low, there may be cases 10 where the mutual interference caused by other high-rate users is significant, in which case mutual ISR among high-rate users may be desired as well. Such a situation is represented by user sets M 1 and M2 of Figure 8. Hence, whereas in the foregoing embodiments of the invention, the receiver modules of set I do not perform ISR
but merely supply constraints sets for use by the receiver modules of set D, it is envisaged 15 that some or all of the receiver modules in set Ml and M2 also could have beamformers employing ISR. Such a Joint ISR (J-ISR) embodiment will now be described with reference to Figure 28, which shows only one receiver module, 21', as an example. In any symbol period, each such receiver module 21' (i) receives a constraint matrix Cn 1 and an inverse matrix Qn_I and uses them in suppressing interference, 20 including its own interference component, and (ii) contributes constraints to the constraint matrix n and inverse matrix Qn which will be used in the next symbol period. In the case of ISR-H mode receivers, which use hypothetical symbols, it is merely a matter of replacing the receiver modules in set I with receiver modules 21d having ISR beamformers, since the constraints sets are generated by the hypothetical 25 symbols from the bit sequence generators 63...... 63N'. Contrary to other ISR modes which require decision-feedback, in the ISR-H mode receiver module, no processing delay is required for one user to cancel another. Hence, ISR-H can be implemented to cancel strong interferers without successive interference cancellation or multi-stage processing, which will be described later.
30 Using Cn and Qn already computed, the ISR combiner for each interferer can be obtained readily by:
~
Wn = CnQn R3 . (i_,) +, 9 71 where Rk =[0, ..., 0, 1, 0, ..., 0]T is a(3NI)-dimensional vector with null components except for the k-th one. This implementation has the advantage of implicitly rejecting ISI among strong interferers with a single 3N1 x 3NI-matrix inversion.
For the ISR-TR, ISR-R and ISR-D modes, each receiver module, in effect, combines a receiver module of set I with a receiver module of set D, some components being omitted as redundant. Referring again to Figure 28, which shows such a combined receiver module, the preprocessor 18 supplies the observation matrix Y,, to a 1-bit delay 45 and a first vector reshaper 44/1, which reshapes the observation matrix Y,, to form the observation vector L. A second vector reshaper 44/2 reshapes the delayed observation matrix Yõ_, to form delayed observation vector Y_,. These matrices and vectors are supplied to the receiver module 21 P' and to others of the receiver modules, together with the constraint matrix Cn_1 and the inverse matrix Q,_I from a common constraint matrix generator 43P, which generates the constraint matrix Cõ_, and the inverse matrix Q,_, from the constraints-set Cn_I produced by constraint set generator 42P.
The receiver module 21 P' comprises a despreader 19', a channel identification unit 28P', a power estimation unit 30P', and a decision rule unit 29P', all similar to those of the above-described receiver modules. In this case, however, the receiver module 21P' comprises two beamformers, one an ISR beamformer 47P' and the other an MRC
beamformer 27P', and an additional decision rule unit 29P/2' which is connected to the output of MRC beamformer 27P'. The ISR beamformer 47P' processes the delayed observation vector Y to form the estimated signal component estimate sn_1 and supplies it to the first decision rule unit 29P', the power estimation unit 30P', and the channel identification unit 28P', in the usual way. The decision rule unit 29P' and the power estimation unit 30P' operate upon the signal component estimate sn to derive the corresponding symbol estimate gn_1 and the power estimate and supply them to other parts of the receiver in the usual way.
The despreader 19' despreads the delayed observation matrix Yn_, to form the post-correlation observation vector Zn 1 and supplies it to only the channel identification unit 28P', which uses the post-correlation observation vector Zi and the signal component n-i estimate to produce both a spread channel estimate and a set of channel parameter o,n-1 estimates At the beginning of the processing cycle, the channel identification unit 28P' supplies the spread channel estimate y` to both the ISR beamformer 47P' and O,n-1 ~....a..m.w......,.W.~..w..~.,,~..._...._ _.......m~,,..~.~~..,.~~..~.____...___ _ the MRC beamformer 27P' for use in updating their coefficients, and supplies the set of channel parameter estimates to the constraints-set generator 42P.
The MRC beamformer 27P' processes the current observation vector Y to produce a"future" signal component estimate sMRC,n for use by the second decision rule unit 29P/2' to produce the "future" symbol estimate MRC,W which it supplies to the constraints-set generator 42P at the beginning of the processing cycle. The constraints-set generator 42P also receives the symbol estimate bn 1 from the decision rule unit 29', but at the end of the processing cycle. The constraints-set generator 42P
buffers the symbol BMRd,n from the decision rule unit 29P/2' and the symbol estimate f ~ 1 from the decision rule unit 29P' at the end of the processing cycle. Consequently, in a particular symbol period n-1, when the constraints-set generator 42P is computing the constraints-set Cn-1 it has available the set of channel parameter estimates J<_,, the "future" symbol estimate b` the "present" symbol estimate b` and the "past"
MRC,W MRC,n-1 symbol estimate bn 2, the latter two from its buffer.
Each of the other receiver modules in the "joint ISR" set supplies its equivalents of these signals to the constraints-set generator 42P. The constraints-set generator 42P
processes them all to form the constraints set ccrt-1 and supplies the same to the constraint matrix generator 42P, which generates the constraint matrix C n and the inverse matrix a and supplies them to the various receiver modules.
The constraints-set generator 42P and the constraint matrix generator 43P will be constructed and operate generally in the same manner as the constraints-set generator 43 and constraint matrix generator 42 of the embodiments of the invention described hereinbefore with reference to Figures 9 to 27. Hence, they will differ according to the ISR mode being implemented.
When the constraints-set generator 42P of the receiver of Figure 28 is configured for the ISR-D mode, i.e. like the constraints-set generator shown in Figure 16, the constraint matrix Cn supplied to the ISR beamformer 47P' contains enough information for the beamformer 47P' to estimate the channel parameters itself. Hence, it forwards these estimates to the channel identification unit 28P' for use in improving the channel parameter estimation and the set of channel estimates produced thereby.
An ISR-RH receiver module will use a similar structure, except that the one-bit delay 45 will be omitted and the constraints-set generator 42P will use the previous symbol, estimate bn_,, the current MRC symbol estimate bMRC.n and the two hypothetical values for "future" symbol b~+l to produce current symbol estimate bn, Modification of the receiver module shown in Figure 28 to implement such a "ISR-RH
mode" will be straightforward for a skilled person and so will not be described hereafter.
In order to implement J-ISR, a more general formulation of the constraint matrix is required. The general ISR constraint matrix counting N, constraints, is as follows:
' N` (72) C= C'1 c C
n II Cn l I~ ,..., II C~ II '..., II Cn N II
where thej-th constraint C is given by:
-n,~
(73) n j k,n (u fk)E5.
where S; defines a subset of diversities which form the j-th constraint when summed.
As shown in Table 2, the sets Sj, j = 1, ===, N, are assumed to satisfy the following restrictions:
S = S1US2U...USN={(u,f,k)I uNl;f=1,=-=,N~ k=-1,0,+1}, and S1nS2n...nSN = 0 0 being the empty set. Table 1 defines the sets S;, j=1, ===, N, for all presented ISR
modes of operation.
The objective signal belongs to the total interference subspace as defined by the span of the common constraint matrix C n . Therefore, to avoid signal cancellation of the desired user d by the projection:
nd d H n - IM * (2L-1) - ~nQnCn , (74) the desired-signal blocking matrix Cd is introduced, as given by:
n ~'d = "''1 ni n'~` !75) n nj ~i A
where:
s ~ Yn , (76) nj k,n (a,f,k)ES.AS
with Sd ={(u,f,k) I u = d; f = 1, ..., N; k = 0}. Normally Sd is a small subset of S
and Cd is very close to C, n n Joint multi-user data estimation and channel gain estimation in ISR-D
Neglecting the signal contributions from the weak-power low-rate users, and limiting to the signals of the NI interferers, yi can be formulated as:
n NI n'i y = E WnJf,nn + Npth (77) i=1 f=1 1j-~ ~/~ NIj~ I =,' Nj~ T A
p = ~'n I~nJl.n~ ~ ~nJNfn~... `Yn Jl,n~ ...'Yn JNn, + ~ (78) = C r + (79) n-n. n where r is a NfNI x 1 vector which aligns channel coefficients from all fingers over n all users. Estimation of r' may be regarded as a multi-source problem:
n Pn = QnCn y . (80) This constitutes one step of ISR-D operations and allows joint multi-user channel identification.
Multi-stage processing may be used in combination with those of the above-described embodiments which use the above-described joint ISR, i.e. all except the receivers implementing ISR-H mode. It should be appreciated that, in each of the receivers which use decision-feedback modes of ISR (TR,R,D,RH), coarse MRC
symbol estimates are used in order to reconstruct signals for the ISR operation.
Because they are based upon signals which include the interference to be suppressed, the MRC
estimates are less reliable than ISR estimates, causing worse reconstruction errors.
Better results can be obtained by using multi-stage processing and, in successive stages other than the first, using improved ISR estimates to reconstruct and perform the ISR
operation again.
Operation of a multi-stage processing receiver module which would perform several iterations to generate a particular symbol estimate is illustrated in Figure 29, which depicts the same components, namely constraint-sets generator 42P, constraint matrix generator 43P, ISR beamformer 47P' and decision rule unit 29P/1', MRC
5 beamformer 27P' and decision rule unit 29P/2', in several successive symbol periods, representing iterations 1, 2,...,NS of frame n which targets the symbol estimate 6 n _1 for user station 10'. Iteration 1, if alone, would represent the operation of the receiver module 21' of Figure 28 in which the constraints-set generator 42P uses the coarse symbol estimates g`RCn-1 previously received from the second decision rule unit 29P/2' M
10 (and others as applicable) and buffered. In each iteration within the frame, the other variables used by the constraints-set generator 42P remain the same. These variables comprise, from at least each "contributor" receiver module in the same joint processing set, the previous symbol estimate 6 n_2, the set of channel parameters and the current MRC symbol estimate LMRCn, Likewise, the spread channel estimate and o,n-1 15 the delayed observation vector Y_, used by the ISR beamformer 47P' will remain the same.
In iteration 1, the constraint matrix generator 42P generates constraint matrix C_1(1) and the inverse matrix Qõ_,(1) and supplies them to the beamformer 47P' which uses them, and the spread channel estimate y' to tune its coefficients for o,n-1 20 weighting each element of the delayed observation vector Y_,, as previously described, to produce a signal component estimate which the decision rule unit 29P/ 1' processes to produce the symbol estimate 6 n_1(1) at iteration 1, which would be the same as that generated by the receiver of Figure 28. This symbol estimate bn_1(j) is more accurate than the initial coarse MRC estimate bMRC,n i(0) so it is used in iteration 2 as the input 25 to the constraints-set generator 42P', i.e., instead of the estimate coarse MRC
beamformer 27P' estimate. As a result, in iteration 2, the constraint matrix generator 42P produces a more accurate constraint matrix Cn_1(2) and inverse matrix a_I
(2).
Using these improved matrices, the ISR beamformer 47P' is tuned more accurately, and so produces a more accurate symbol estimate gn_1(2) in iteration 2. This improved symbol estimate is used in iteration 3, and this iterative process is repeated for a total of NS iterations. Iteration NS will use the symbol estimate b;~_1(N -1) produced by the preceding iteration and will itself produce a symbol estimate bn 1(NS) which is the target symbol estimate of frame n and hence is outputted as symbol estimate fn 1 This symbol estimate bn 1 will be buffered and used by the constraints-set generator 42P in every iteration of the next frame (n+1) instead of symbol estimate 6 n_2. Other variables will be incremented appropriately and, in iteration 1 of frame n+], a new coarse MRC beamformer 27P' symbol estimate bMRC,n+I will be used by the constraints-set generator 42P. The iterative process will then be repeated, upgrading the symbol estimate in each interation, as before.
It should be noted that, in Figure 29, the inputs to the channel identification unit 28P' use subscripts which reflect the fact that they are produced by a previous iteration.
These subscripts were not used in Figure 28 because it was not appropriate to show the transition between two cycles. The transition was clear, however, from the theoretical discussion.
One stage ISR operation can be generalized as follows:
Sn(l) = SMRC,n WMRC,n~n(I)yn(1)' Un(1) = Qn(1)6n(1)H~' (81) where Sn(1) is the ISR estimate from first ISR stage, SMRCn is the MRC signal estimate, and the constraint matrices 6n(1), 6n(1), and Qn(l) are formed from MRC
estimates at the first stage. Generalizing notation, the signal estimate at stage NS may be derived after the following iterations:
Sn(2) = SMRC,n - WMRC,n~n(2)Un(2), Un(2) - Qn(2)Cn(2)HY ~
(82) Sn(N) = SMRC,n - Wdx C n(N)U lNs~. U(N) - Qn(N9l..nlN)y~ , MRC,n n n n The multistage approach has a complexity cost; however, complexity can be reduced because many computations from one stage to the next are redundant.
For instance, the costly computation õo) could instead be tracked because u(j) -õ(j-1) if the number of symbol estimation errors does not change much from stage to stage, which can be expected in most situations.
In practice, the receiver of Figure 28 could be combined with one of the earlier embodiments to create a receiver for a "hierarchical" situation, i. e. , as described hereinbefore with reference to Figure 8, in which a first group of receiver modules, for the weakest signals, like those in set D of Figure 8, for example, are "recipients" only, i. e. , they do not contribute to the constraint matrix at all; a second group of receiver modules, for the strongest signals, like the receiver modules of set I in Figure 8, do not need to cancel interference and so are "contributors" only, i. e. , they only contribute constraints-sets to the constraint matrix used by other receiver modules; and a third set of receiver modules, for intermediate strength signals, like the receiver modules of sets M2 of Figure 8, are both "recipients" and "contributors", i.e. they both use the constraint matrix from the set I receiver modules to cancel interference from the strongest signals and contribute to the constraint matrix that is used by the set D receiver modules. Generally, this approach is referred to as "Group ISR" (G-ISR) and the equations for the constraint matrices and inverse matrices comprising the set K C C used by the ISR beamformers in the different n { AOutset,n ~ QOutset,n ~ Inset,O Qlnset,n receivers are as follows:
(83) " ' QOutset,n ~COuset,n~Outset,n~ 9 H HOutset,n IM * (2L-1) - COutset,nQOulset,nCOutset,n~ (84) Clnset,n 11Outset,ncInset,n, (85) d" 1 86 (?Inset,n ~CInset,Slnset,n) ( ) d = /rd H 87 HInset,n - IM * (2L-1) - ~"lnset,nQlnset,nelnset,n1 ( ) d d n (88) ~n ~Inset,nOutset,n d^
Wd = ~~'n = Ild X -o,n . (89) ~,d n ~ ,d -n ~,d x, d2 2 jld:,d I"_O,n n'_o,n n n 1"-O,n It should be noted that normalization of the columns of Clnset,n and Couuet,n is implicit.
A receiver module for set D will set IIInset in Equation (88) to identity which means that only "outset" interference will be cancelled. Otherwise, the processing will be as described for other receivers of set D.
A receiver in set M1 does not need to cancel "outset" interference, but does need to cancel "inset" interference. Consequently, it will set IIouUet in Equation (88) to identity so that only inset interference will be cancelled. This corresponds to the joint ISR embodiment described with reference to Figure 28.
Finally, a receiver in set I does not need to cancel any interference.
Consequently, it will set both IIrnset and IIouftet to identity, which means that nothing will be cancelled. This corresponds to the group I receiver modules 21'...21"I
described with reference to Figures 9, 11, 13, 15-17, 20-24 and 26.
Successive versus Parallel Detection Although the embodiments of ISR receivers described hereinbefore use a parallel implementation, ISR may also be implemented in a successive manner, denoted S-ISR, as illustrated in Figure 30. Assuming implementation of successive ISR among NI
interferers, U users, and assuming without loss of generality that are sorted in order of decreasing strength such that user 1 is the strongest and user NI is the weakest user, when processing user i in S-ISR, the ISR estimate can be computed as:
Sn = SMRCn - WMRC,n~>nUn(Z) Un(Z) = Qn Cin ~~ (90) where Ci n spans only the subspace of users 1, -==, i-1 Z, Qn is the corresponding inverse and where C` is the user specific constraint matrix. Clearly, C` is no longer yn t,n common for all users, which entails expensive matrix inversion for each user.
However, with ISR-TR this inversion is avoided, since C"ff CI is a scalar, and S-ISR-TR
is a good alternative to its parallel counterpart, ISR-TR. Other ISR modes may take advantage of the conimon elements of Cd . n from one processing cycle to the next using matrix inversion by partitioning.
It should also be appreciated that the different ISR modes may be mixed, conveniently chosen according to the characteristics of their signals or transmission channels, or data rates, resulting hybrid ISR implementations (H-ISR). For example, referring to Figure 8, the sets I, M 1 and M2 might use the different modes ISR-H, ISR-D and ISR-TR, respectively, and the receiver modules in set D would use the different modes to cancel the "outset" interference from those three sets. Of course, alternatively or additionally, different modes might be used within any one of the sets.
In all of the above-described embodiments of the invention, the channel identification units 28d in the ISR receiver modules use the post-correlation observation vector Zn to generate the spread channel estimate ~ -n (by spreading H ).
Unfortunately, the interference present in the observation matrix Yn is still present in the Z And also user i if ISR rejection is desired.
post-correlation observation vector Zi (see Equation (14)) and, even though it is n reduced in power by despreading, it detracts from the accuracy of the spread channel estimate yd , As has been discussed hereinbefore, specifically with reference to -o,n Equations (83) to (89), the ISR beamformer 47d effectively constitutes a 5 projector ~ lid and a tuning and combining portion '-0n I`HW- I`
,d 10 which, in effect, comprises a residual MRC beamformer Ed = o,n n IIf' IIZ
,n Figure 31 illustrates a modification, applicable to all embodiments of the invention described herein including those described hereafter, which exploits this relationship to improve the spread channel estimate yd (or unspread channel estimate Hd) by using ~,n -n 15 the projector IIn to suppress the interference component from the observation vector Y.
In the receiver module of Figure 31, the ISR beamformer 47Qd is shown as comprising a projector 100d and a residual MRC beamformer portion 27Qd. The projector 100d multiplies the projection ~ jid by the observation vector , to produce the "cleaned"
observation vector yIId and supplies it to the residual MRC beamformer 27Qd, which n 20 effectively comprises a tuner and combiner to process the "cleaned"
observation vector yn,d and produce the signal component estimate sn from which decision rule n unit 29Qa derives the symbol estimate bn d in the usual way.
The "cleaned" observation vector ylLd is reshaped by matrix reshaper 102Qd to n form "cleaned" observation matrix yII d which despreader 19d despreads to form the "cleaned" post-correlation observation vector ZII,d for application to the channel n identification unit 28Qd for use in deriving the spread channel estimate yd , The new "cleaned" vector resulting from the projection of the observation vector y by nn is defined as follows:
n Y",d = Ildy = IId y" + N (IId yd )S d +(IIdN ) = Y ,dS d + Nn,d. (91) _n '~n n _n -n n~n n n-n _O,n -n uE (1,...,N/)U{d}
The new observation vector is free from the interferers and ISI and contains a projected version of the channel vector yn,d. Without being a condition, it is reasonable -O,n to assume that the projector nn is almost orthogonal to the channel vector, especially in high processing gain situations and/or in the presence of few interferers, and therefore consider that yn,d _ yd , When despreader 19a despreads yr-,d with the spreading -O,n -O,n n sequence of the desired user d, it produces an interference-free projected post-correlation observation vector zfl,n which the channel identification unit 28Qd uses to create the n channel estimate n ` to use in updating the coefficients of the residual MRC
beamformer portion 27Qd.
With respect to the new observation vectors yn,d and _7fl,n, before and after -n -n despreading, respectively, the ISR and DFI steps in STAR are modified as follows:
FT1,d i,d Wd = 2~" O,n c I-"0'n (92) -n II `~Idll2 I +~dl 10,n -O,n n-O,n sn = Real{Wd" -Yn R=d}, (93) n tY = Hd + (~T'd - l7 gIs~. (94) -n+ n n n The equivalence between the two expressions of the beamformer coefficients in Equation (92) due to the nilpotent property of projections should be noted. In more adverse near-far situations, the modification illustrated in Figure 31 allows more reliable channel identification than simple DFI and hence increases near-far resistance. If necessary, this new DFI version will be termed II-DFI. It is expected to be suitable for situations where the interferers are moderately strong and when the null constraints cover them all. For simplicity of discussion, projection of the observation will become implicit without reference to yd n~ Znn or to the corresponding modifications in STAR-ISR
operations.
Expanding Dimensionality (X-option) When the number of users becomes high compared to the processing gain, the dimension of the interference subspace becomes comparable to the total dimension (M(2L
-1)). The penalty paid is an often devastating enhancement of the white noise.
Unlike ISR-TR, which always requires a single constraint, other DF modes, namely ISR-R and ISR-D, may suffer a large degradation because the number of constraints these modes require easily becomes comparable to the total dimension available. However, the dimension may be increased by using additional data in the observation. This option also allows for complete asynchronous transmission and for the application of ISR
to Mixed Spreading Factor (MSF) systems.
The matched-filtering observation vector Y is generated to include additional past spread data which has already been processed. If the model is expanded to include past processed NX symbols and arrive at a total temporal dimension N,. =(NX+1)L-1, the observation becomes:
y N )u f Apth N
-n NX+1 U -n NY+1 n-NX+1 U f Y + Y"f + 1rh (95) n =n =n Y u_1 f_1 mth u_1 f1 _n _n _n where double underlining stresses the extended model. It should be noted that yuf is -i overlapping temporally ynJ and only the first ML samples of the past frames n-1, n-2, Jf1 etc. are used; however the same syntax is used for simplicity of notation.
As an example, application of the X option to ISR-D, referred to as ISR-DX, requires the following constraint matrix:
- 2cn cn 2=n _n Cn (96) - `,~
II l 1 II ~...~ II I,Nfll ~...~ II 1 11 1 1 NjII
-n -n -n -n The extended vectors in Equation (96) have been treated in the same way as those in Equation (95), i.e., by concatenating reconstructed vectors from consecutive symbols in the extended frame and by implicitly discarding overlapping dimensions in the concatenated vectors. Clearly, extension of the observation space leaves additional degrees of freedom and results in less white noise enhancement. However, it may exact a penalty in the presence of reconstruction errors.
Although the X-option was illustrated in the case of ISR-D, its application to the remaining DF modes is straightforward. It should also be noted that the X-option allows for processing of more than one symbol at each frame while still requiring one matrix inversion only. The duration of the frame, however, should be small compared to the variations of the channel.
In the above-described embodiments, ISR was applied to a quasi-synchronous system where all temporal delays were limited to 0 < T< L. Although this model reflects well the large processing gain situation, where the limit (L - oo), allows for placing a frame of duration 2L - I chips which fully cover one bit of all users, including delay spreads. With realistic processing gains, and in particular in the low processing gain situation, this model tends to approach a synchronous scenario. Using the X-option serves as a method supporting complete asynchronous transmission.
Referring to Figure 32, assuming that the users of the system have processing gain L as usual, the transmitted signal of any user is cyclo-stationary and a possible time-delay of the primary path Tl is therefore 0 < T, < L where possible time delays of remaining paths are T, < r2 < ... < L + OT where OT is the largest possible delay spread considered. To ensure that the frame covers at least one bit of all users, the frame must at least span L + OT in the despread domain and therefore 2L + OT
in the spread domain. The observation should be extended slightly beyond that to ease interpolation near the edges of the frame.
Multi-Modulation (MM), Multi-Code (MC), and Mixed Spreading Factor (MSF) are technologies that potentially can offer mixed-rate traffic in wideband CDMA. MSF, which has become very timely, was shown to outperform MC in terms of performance and complexity and is also proposed by UMTS 3 third generation mobile system as the mixed-rate scenario. Application of ISR to MSF as the mixed rate scenario considered herein will now be discussed.
In MSF, mixed rate traffic is obtained by assigning different processing gains while using the same carrier and chip-rate. In a system counting two groups of users, a low-rate (LR) and a high rate (HR) group, this means that every time a LR
rate user transmits 1 symbol, a HR user transmits 2r + 1 HR symbols, r = Li/L,, being the ratio of the LR processing gain to HR processing gain. This is illustrated in Figure 33 with r = 2.
Therefore, fitting the ISR frame subject to LR users or in general the lowest-rate users ensures that also at least r HR symbols are covered when HR and LR have the same delay spread. The ISR generalizes readily to this scenario regarding every HR user ._.. . . __~ ~ _~.....~~..~,~.,,~ M. Y .. . . .._ ....,~n~.....,..~.__.~..-..._.. _ _ as r LR users. In Figure 33, the grey shaded HR/LR bits symbolize the current bits to be estimated; whereas, former bits have already been estimated (ISR-bits) and future bits are unexplored. It should be noted that current HR bits should be chosen to lie at the end of the frame.
Multicode It is envisaged that a user station could use multiple codes, N,,, in number, each to transmit a different stream of symbols. Figure 34 illustrates this modification as applied to a"without despreading" receiver module 2 1 R d for receiving such a multicode 10 signal and using ISR cancellation to cancel interference from other users.
The receiver module shown in Figure 34 is similar to that shown in Figure 9 except that, instead of a single ISR beamformer 47d; the receiver module of Figure 34 has a bank of ISR
beamformers 47Rdj ... d " for extracting si nal com onent estimates s a,l dr''"
,47R g P n ,...,sn respectively, and supplying them to a bank of decision rule units 29Rd,',...,29Ra'NT, 15 respectively which produce a corresponding plurality of symbol estimates bn'1nN^'.
Likewise, the receiver module 21 Rd has a bank of despreaders 19d,1 '_õ '19d>^
m each of which uses a respective one of the multiple spreading codes of the corresponding user d to despread the observation matrix Yõ from the preprocessing unit 18 to produce a corresponding one of a multiplicity of post-correlation observation 20 vectors which are supplied to a common channel identification unit 28Rd.
n n It should be appreciated that the post-correlation observation vectors share the same channel characteristics, i. e. , of the channel 14d between user station 10d and the base station antenna array. Consequently, only one channel identification unit 28Rd is required, which essentially processes the plural signal component 25 estimates sn ~' ,,..,gn'N"' and the post-correlation observation vectors and, in essence, averages the results to produce a single channel estimate I~-'d representing the physical n channel 14d. The channel identification unit 28Rd has a bank of spreaders (not shown) which spread the channel estimate #d using the multiple spreading codes to create a set n of spread channel estimates yd=1 .,. ~~'^" which it supplies to the ISR
o~, ,---On , beamformers 47Rd ',...,47Rd,' T, respectively. Likewise, the power estimation unit 30Rd is adapted to receive plural signal component estimates sd,l d'^'. and essentially n ,...,Sn average their powers to produce the power estimate ,T, nd, While using all of the multiple codes advantageously gives a more accurate channel estimate, it requires many expensive despreading operations. In order to reduce the cost and complexity, the receiver module 21 Md may use only a subset of the spreading codes.
It can be demonstrated that the multiple spreading codes can be replaced by a single spreading code formed by multiplying each of the multiple spreading codes by the corresponding one of the symbol estimates 6n 1,...,6nN'^ and combining the results.
Figure 35 illustrates a receiver module which implements this variation. Thus, the receiver module 21R' shown in Figure 35 differs from that shown in Figure 34 in that the bank of despreaders 19d.1,.,.,19d,N are replaced by a single despreader 19d 1 which receives the symbol estimates f n ',,..,6n N'" and multiplies them by the multiple spreading codes to form a compound spreading code, which it then uses to despread the observation matrix Yõ and form a single post-correlation observation vector Zd,a, The n channel identification unit 28Rd does not receive the signal component estimates but instead receives the total amplitude ,n from the power estimation unit 30Rd.
This serves as a compound signal component estimate because the use of the compound code is equivalent to modulating a constant " 1" or a constant "-1 " with that code, as will be formulated by equation later. The channel identification unit 28Rd processes the single post-correlation observation vector Zd>a to produce a single channel estimate Hd and n n spreads it, as before, using the multiple spreading codes to form the multiple spread channel estimates ? 1 ... ~~'^~ for use by the beamformers 47Rd '...,47Rd N as before.
O,n' '-o,rz The theory of such multicode operation will now be developed. Assuming for simplicity that each user assigned the index u transmits Nstreams of DBPSK
data b",1(t), ,,,, b" N~(t), using Nn, spreading codes c" '(t), ..., c"'N-(t), each spread stream can be seen as a separate user among a total of U x Naccess channels, assigned the couple-index (u,l). The data model can then be written as follows:
u N +1 U N Nf +1 n n+k k,n n n n+k rt k,n n~
Yn ~~ub u'1 I'1 + NP~ ~ub u'1 '/~ ~lf + Np~ (97) u=1 1=1 k=-1 u=1 1=1 f=1 k=-1 where the canonic u-th user l-th code observation matrices yk,n,f from finger f are obtained by Equations (3) and (4) of with X(t) in Equaiton (3) replaced, respectively for k = -1,0, +1, by:
Xk'1 At) = Rm8(t -7p(t)) g1Rr(t)c " l(t). (98) In the equation above, R=[0, ...., 0, 1, 0, ..., 0J' is an M-dimensional vector with null components except for the m-th one and b(t) denotes the Dirac impulse.
Reshaping matrices into vectors yields:
U N +1 U N Nf +1 Y = E E E ~"b "'l + NPth = E E E E ~"b ",l y"'lJ + N ``` (99) n n n+k_k n n n n+k f n-k n n~
u=1 1=1 k=-1 u=1 1=1 f=1 k=-1 The particularity of the above multi-code model, where N. codes of each user share the same physical channel H" and the same total received power (On)2 should be n noted. Exploitation of these common features will be discussed hereinafter in relation to adapting of the power-control and the channel-identification procedures to the multi-code configuration. The ISR combining step will now be explained.
Considering first joint ISR combining among the group of N interferers, the regular ISR modes, namely TR, R, D, H and RH easily generalize to the new multi-code configuration of N,,,NI users instead of NI, as shown in Table 3. ISR
combining operations are carried out as usual using the constraint and blocking matrices Cn and &n ,1', respectively. It should be noted, however, that a further dimension of interference decomposition and rejection arises over the codes of each user, yielding two additional ISR modes. The new modes depicted in Table 3 and referred to as MCR and MCD (multi-code R and D) characterize interference from the entire set of codes of each user by its total realization or by the decomposition of this total realization over diversities, respectively. They combine the R and D modes, respectively, with the TR mode by summing the corresponding constraints over all the multi-codes of each user.
Although these modes partly implement TR over codes, they are still robust to power estimation errors. Indeed, the fact that the received power of a given user is a common parameter shared between all codes enables its elimination from the columns of the constrain matrices (see Table 3). The MCR and MCD modes inherit the advantages of the R and D modes, respectively. They relatively increase their sensitivity to data estimation errors compared to the original modes, since they accumulate symbol errors over codes. However, they reduce the number of constraints by N
For a desired user assigned the index d, the constraint matrix Cn is used to form the projector nn . The receiver of the data stream from a user-code assigned the couple-index (d,l) can simply reject the NI interfering multi-code users by steering a unit response to Pd1 ` and a null response to the constraint matrix with the p,n projector nn. It can further reject ISI by steering nulls to Pd,` and However, -l,n -+l,n the signals received from other multi-codes contribute to self-ISI. This interference, referred to here as MC-ISI, is implicity suppressed when receiving an interfering user.
It can be suppressed too when receiving the desired low-power user by joint ISR among _ ._..~ _.~.~....~...~._ .....,,~._~ .. ... ..w.,.. ......,~._~. ,~........_~ -.L. ._ __, , __ the codes of each mobile with any of the ISR modes. The multi-code constraint and blocking matrices CMC,n and CM~ n, respectively, as shown in Table 4 are formed, and derive the ISR beamformer coefficients for user-code (d,l) derived, as follows:
" 10 QMCn = (CMCnCMCn) 1 ( O) 1 1 d d"
~MC,n - IM = cu I> - AMC,nQMC,nCMC,n ~ (101) r n ~ ~iNrCnHn' (102) .-rd,l X rs1,1 1 lln --O'n n ~'1H~ 1~ l = (103) ~~,n n -O,n The projector ~'1 that is orthogonal to both MC-ISI and to the NI interferers is formed and then its response normalized to have a unity response to ~d `
-O,n The above processing organization of ISR among the high-power or low-power user-codes themselves or between both subsets is a particular example that illustrates G-ISR well. The fact that joint ISR among the high-power users and joint ISR
among the codes of a particular low-power user may each implement a different mode is another example that illustrates H-ISR well. In the more general case, ISR can implement a composite mode that reduces to a different mode with respect to each user. For instance, within the group of NI interferers, each user-code assigned the index (i, l) can form its own multi-code constraint and blocking matrices CMc,n and CMcn along a user-specific mode (IIõ should be set to identity in Table 4). The constraint and blocking matrices then can be reconstructed for joint ISR processing by aligning the individual constraint and blocking matrices row-wise into larger matrices as follows:
Cn - {MC,fl'==.',n}' (104) (~ ' ` (~+' (~ 105 `"n CMC,n~"'1 ~MC,n' ~MC,n1`"MC,n~"'~"MC,n]' ( ) This example illustrates the potential flexibility of ISR in designing an optimal interference suppression strategy that would allocate the null constraints among users in the most efficient way to achieve the best performance/complexity tradeoff. It should be noted that, in the particular case where the TR mode is implemented, the matrices in 5 Equations (104) and (105) are in fact vectors which sum the individual multi-code constraint vectors CM~n and C`cn, respectively.
After deriving the beamformer coefficients, each MC user assigned the index u estimates its Nm streams of data for l= 1, ..., Nm as follows (see Figure 34):
s"" = Real{W"'`"Y }, (106) n l7nl = .SlgiZiSn'l1, (107) u and exploits the fact that its N. access channels share the same power, and hence smooths the instantaneous signal power of each data stream over all its codes as follows:
N.
E lsn,l1 2 (~n)2 = (1-a)(~n-~)2 + a `-' N (108) m It should be noted that the multi-code data-streams can be estimated using MRC, simply by setting the constraint matrices to null matrices. This option will be referred to as MC-MRC.
After despreading of the post-correlation observation vector y by the Nm spreading codes of a user assigned the index u, the following post-correlation observation vectors for Z= 1, ..., Nm are obtained as follows:
u./'u u,l + N" = Hu u,l + ,l /109) ~'1 = HnY~nbn NPCM,n nSn NPCM n' l n The fact that all user-codes propagate through the same channel is exploited in the following cooperative channel identification scheme (see Figure 34):
N
Hn+~ = Hn + ` ~ (Zu'1 - Hnsn'l)Sn'` (110) N r=i which implements a modified DFI scheme, referred to as multi-code cooperative DFI
(MC-CDFI). MC-CDFI amounts to having the user-codes cooperate in channel identification by estimating their propagation vectors separately, then averaging them over all codes to provide a better channel estimate. It should be noted that implicit incorporation of the II-DFI version in the above MC-CDFI scheme further enhances channel identification.
Since the STAR exploits a data channel as a pilot, it can take advantage of a maximum of N. expensive despreading operations. To limit their number in practice, MC-CDFI can be restricted to a smaller subset of 1 to Nuser-codes. A
compromise can be found between channel estimation enhancement and complexity increase.
Another solution that reduces the number of despreading operations reconstructs the following data-modulated cumulative-code after ISR combining and symbol estimation i Equations (106) and (107):
N
Ck b",l~u,l (111) k ~ n Ck 1=1 K
A single despreading operation with this code yields:
Nm Nm u'~l,n>l Nn,f n Un PCM,n 7'~ = ~j~~n + ~j"Hn + M'S (112) n n ~J ~J n-n PCM,n-m m It has the advantage of further reducing the noise level by N,,, after despreading, while keeping the signal power practically at the same level3. The data-modulated cumulative-code can be used to implement channel identification as follows:
a = sign Re {ftuhlzu.8}} , -n n There is a small power loss due symbol estimation errors (very low in practice).
Hn+~ = Hn + (Z`6 - Hna~rt)a~n. (113) This CDFI version is referred to as S-CD1FI (see Figure 35).
Whereas multicode operation involves user stations transmitting using multiple spreading codes, but usually the same data rate, it is also envisaged that different users within the same system may transmit at different data rates. It can be demonstrated that the receiver modules shown in Figures 34 and 35 need only minor modifications in order to handle multirate transmissions since, as will now be explained, multicode and multirate are essentially interchangeable.
Multi-Code Ap,proach to Multi-Rate Reconsidering now the conventional MR-CDMA, in this context, STAR-ISR
operations previously were implemented at the rate 11T where T is the symbol duration.
As described earlier, with reference to Figure 32, the "X option" extensions, enables reduction of noise enhancement by increasing the dimension of the observation space and provides larger margin for time-delay tracking in asynchronous transmissions.
A
complementary approach that decomposes the observation frame into blocks rather than extends it using past reconstructed data will now be described.
This block-processing version of STAR-ISR will still operate at the rate 1/T
on data frames barely larger than the processing period T. However, it will decompose each data stream within that frame into data blocks of duration Tr where T, is a power-of-2 fraction of T. The resolution rate 1/T, can be selected in the interval [1,T,1/T,].
Hence, a receiver module that processes data frames at a processing rate 11T
with a resolution rate 1/T, can only extract or suppress data transmissions at rates slower than or equal to 1/T, Also, the channel parameters of the processed transmissions must be almost constant in the interval T, the processing period. This period should be chosen to be much larger than the delay spread AT for asynchronous transmissions, but short enough not to exceed the coherence time of the channel.
In one processing period, STAR-ISR can simultaneously extract or suppress a maximum N,õ = T/T, blocks (N,n is a power of 2). In the n-th processing period of duration T, a stream of data bu(t) yields N,,, samples b~~',,.,,bn"'Nm sampled at the resolution rate. Over this processing period, therefore, the spread data can be developed as follows:
c u(t)b "(t) b,,'UT(t - n7-)c u(t), (114) r=i where UT(t) is the indicator function of the interval [(1 - 1)Tr, lTr). This equation can be rewritten as follows:
cu(t)bu(t) = Ebu,'(t)cu,r(t), (115) r=1 where bu '(t),...,b"'Nm(t) represent Nn data-streams at rate 1/T spread by N.
vlrtUal orthogonal codes c" `(t),...,c"'" (t) (see Figure (36).
With the above virtual decomposition, one arrives at a MC-CDMA model where each of the processed users can be seen as a mobile that code-multiplexes N,,, data-streams over N,, access channels. This model establishes an equivalence between MC-CDMA and MR-CDMA and provides a unifying framework for processing both interfaces simultaneously. In this unifying context, codes can be continuous or bursty.
Use of bursty codes establishes another link with hybrid time-multiplexing CDMA (T-CDMA); only the codes there are of an elementary duration Tr that inserts either symbols or fractions of symbols. A larger framework that incorporates MR-CDMA, MC-CDM, and hybrid T-CDMA can be envisaged to support HDR transmissions for third generation wireless systems.
Exploiting this MC approach to MR-CDMA, the data model of MR-CDMA will be developed to reflect a MC-CDMA structure, then a block-processing version of STAR-ISR derived that implements estimation of a symbol fraction or sequence.
The multi-code model of Equation (97) applies immediately to MR-CDMA.
However, due to the fact that codes are bursty with duration T, < T, the self-ISI
vectors k,` and yn,` and the spread propagation vector j* ` of a given user-code do -1,n -+l,n 0,n not overlap with each other. If yr denotes an arbitrarily enlarged delay-spread (reference [20]) to leave an increased uncertainty margin for the tracking of time-varying multipath-delays (i. e., pT <yr < T), and if Nr =`J-,r/T 1 denotes the maximum delay-spread in Tr units, then only the last Nr symbols bn'i '"'',,,,,b,"im among the past symbols in the previous frame may contribute to self-ISI in the current processed frame (see Figure 37):
u N. N~ Nm Yn, = Oubn,l a + ~nbn,rvu,l + ~ ~/,nbu,r l + fftn (116) n n-l l l,n n n 10,n Wn n+l +l,n n u=1 1=N -N+1 1=1 l=1 m In this frame of duration 2T - T,, the desired signals' contribution from the Ncurrent symbols is contained in the first interval of duration T+Yr, whereas the remaining interval of the frame contains non-overlapping interference from the last Nn -Nr future symbols in the next frame, namely bn,~ =+' 9 ,.,,bn"m (see Figure 37). The remaining part of the frame can be skipped without any signal contribution loss from the current bits.
Hence, the duration of the processed frame can be reduced to T+Er- - T as follows:
Y=[ic, o, Y 1,..., Y,c,+r,,-2,1 (117) where Lo =FTRT ] is the maximum length of the enlarged delay-spread in chip samples. With the data block-size reduced to M x (L + Lo - 1), the matched-filtering observation matrix reduces to:
N N N
u 5 _ u u,l u,~~u u u,l~~u [ + ~~ th 118 Yn - ~ ~ ~nbn-1 rll,n + n~n I O,n + k Onbn+l l +1 n IV , ~ ~
u=1 [=N -N+1 l=1 1=1 where ffth is the noise matrix reduced to the same dimension. This data model equation can be rewritten in the following compact vector form:
U N +l Y onbn+k_~'1Xk +'~~ (119) n k,n -n u=1 1=1 k=-1 where Xk = 0 if k = - 1 and l E{],...,N,) or if k=+1 and l E{Nõt - Nr + 1,..., , NJ, and 1 otherwise.
The constraint matrices can be formed in an MC approach to implement joint or user-specific ISR processing in any of the modes described in Tables 3 or 4, respectively. In contrast to the conventional MC-CDMA, the factor Xk discards all non-overlapping interference vectors in the processed frame and somehow unbalances ISI
contribution among the virtual multi-code streams. In the DF modes, only the central streams of each user (i. e. , l= Nr + 1, ..., N,n - Nr) sum symbol contributions from the previous, current and future symbols; whereas the remaining streams sum signal contributions from either the current and the previous or the current and the future symbols. Indeed, the 2(N,,, - N) ISI terins discarded from summation contribute with null vectors to the processed frame. In the ISR-H mode, the columns previously allocated to individually suppress these vectors are eliminated from the constraint matrices, thereby reducing the number of its columns to N. = Nn, + 2N, constraints per _ _ -_. _.__ _ . _~..~.~...~..~.._A.W.,..~,. ~_.~.... ~...~. _ user4 (see Tables 3 and 4). ISR-H hence approaches ISR-R in computational complexity when N, is small compared to N,,,.
After derivation of the beamformer coefficients of each virtual user-code assigned the couple-index (u,!), its signal component Sn ' is estimated using Equation (106). In this process, each ISR combiner rejects the processed interferers regardless of their exact data rates, which only need to be higher than the resolution rate. This feature finds its best use when implementing ISR at the mobile station on the downlink where data rates of suppressed interferers are not necessarily known to the desired mobile-station. For instance, orthogonal variable spreading factor (OVSF) allocation of Walsh spreading codes is no longer necessary. On the uplink, each transmission rate is known to the base station. However, one can still gain from this feature by allowing joint and well integrated processing of mixed data traffic at a common resolution rate.
Indeed, the estimation of the signal components provides sequences oversampled to the resolution rate 1/Tr. Hence, after a given data stream is decomposed at this common rate, its signal component estimate must be restored to its original rate in an "analysis/synthesis" scheme. To do so, the data rate 1/Tu 5 1/T, of user u is defined and it is assumed temporarily that it is faster than the processing rate (i.
e. , 1/Tõ >_ 1/T).
Hence, one can extract from each frame Fu = TIT,, < Nn, signal component estimates out of Nn, by averaging the oversampled sequence Sn =` over consecutive blocks of size B,, = N,,,/Fõ = Tn/Tr for n' = 0,..., F,, - I as follows:
(n' +1)B.
E SI
!=n'B +1 (120) S,Fu+n ' - B
u 4ISR may be equally reformulated with Nn, + 2N, generating sequences that process all the contributing symbols as if they were independent streams without MC-ISI. Only the N. current symbols are estimated then; the 2N, remaining symbols being corrupted by the edge effect.
bnF.Y+ni = Slg/2{ nFu+n'}, (121) I" Z
snP +n' I
(On)2 - (1 - (.)(~n 1)2 + Ly n'=o F (122) u In the particular case where the data rate is equal to the processing rate (i.
e. , 1/Tu =
1/T), the equations above have simpler expressions with Fn = I and Bn = N.:
N
r ge,[
L n n (123) Sn - N ~
bn = S1g12fSnl, (124) l~n)1 - ll - ~)(0n-l)1 + a I Sn 12. (125) If the data rate is slower than the processing rate, the signal component estimate Sn of Equation (123) is further averaged over consecutive blocks of size Fõ = T/T to yield the following subsampled sequence:
F.-1 u S LnIF,,.f Fõ+n' Su = n' -0 (126) F
Ln/FJ
u Symbol and power estimations in Equations (124) and (125) are on the other hand modified as follows:
b 1Ln/F'j = Sign {s ~~n/F,~ 11 (127) Ln/Fv~, a)(ip'~n/F,~ -1) + a 1 S Ln/F~j 1z. (128) It should be noted that a higher value is needed for the smoothing factor to adapt to a slower update rate of power estimation. If the channel power variations are faster than the data rate, then it is preferable to keep the power estimation update at the processing rate in Equation (125). In this case, Equation (126) is modified as followss:
Fy-1 t~~ u u T Ln/F f Fõ +n ' S Ln/F,,.f Fu +n ~
Ln/FJ - n'-O F.~-1 (129) S ~
u 2 L~ (T Ln/FyjF,+n', to take into account channel power variations within each symbol duration.
It should be noted that the multi-rate data-streams can be estimated using MRC, simply by setting the constraint matrices to null matrices. This option may be referred to as MR-MRC.
It should be also noted that combination of Equations (106) and (120), along with Equation (128) for data rates slower than the processing rate, successively implements the processing gain of each user in fractioned ISR combining steps.
In general, regrouping the symbol-fractions back to their original rate can be exploited in the design of the constraint matrices; first by reducing reconstruction errors from enhanced decision feedback; and secondly by reducing the number of constraints 5 This signal component estimate is not used for power estimation. Only its sign is taken in Equaiton (127) as the estimate of the corresponding bit. Hence, power normalization given here for completeness is skipped in practice.
of a given user u from Nto Fu in the modes implementing decomposition over user-codes (i. e. , R, D, and H). For these modes, the common factor N,,,NI
appearing in the NI
total number of constraints N, reduces to by regrouping the constraint vectors over the user-code indices that restore a complete symbol within the limit of the processing periodb.
Regrouping the constraints of user u to match its original transmission rate amounts to regrouping the codes of this user into a smaller subset that corresponds to a subdivision of its complete code over durations covering its symbol periods instead of the resolution periods. In fact, user u can be characterized by Fu concatenated multi-codes instead of N,,,. Overall, MR-CDMA can be modeled as a mixed MC-CDMA
system where each user assigned the index u has its own number Fu of multi-codes (see Figure 38). Therefore, the ISR-combining and channel-identification steps can be carried out in one step along the MC formulation of the previous section, using user-codes simply renumbered from 1 to Fu for simplicity. Hence, as shown in Figure 39, the only change needed to the receiver module of Figure 34 is to the bank of despreaders. In the receiver module shown in Figure 34, the spreading codes used by the despreaders 19d,1,,,,,19d,Fd comprise segments of the spreading code of user d, i.e., the segments together form the part of the code used in a particular frame. The number of code segments Fu corresponds to the number of symbols bn ",,,,,bn 'FU
transmitted in the frame. The estimates of these symbols, and the signal component estimates sn'~ sn F map with those of Equations (120), (121), (123) and (124) within a parallel/serial transform.
6 Feedback of symbols with rates slower than the processing rate to the constraints-set generator is feasible.
This illustrates again the flexibility afforded by using ISR in designing optimal interference suppression strategies that suit well with MR-CDMA. It enables simultaneous processing of blocks of symbols or fractions of symbols in an integrated manner at two common resolution and processing rates.
5 To carry out channel identification operations, the M x Lo reduced-size post-correlation observation matrix of user-code (u,l) is defined as follows:
(130) r_[z:z::,...,z::J_1], -where the columns of this matrix are given for j= 0,...,Lo - 1 by:
Zu,l 1 u,l 1 u n,; = L ~ Y ;+j,cj, = L Y j j ,cj , . (131) rJl =O r 1~=(l-1)*L.
This correlation with the virtual user-code (u,l) amounts to partial despreading by a reduced processing gain Lr = T,1 T= L/1V , using the l-th block of length Lr of the user's code cj", It should be noted that, in contrast to conventional MC-CDMA, the above partial despreading operations are less expensive in terms of complexity per user-code.
The reduced-size post-correlation observation vector ZUJ resulting from vector-reshaping of 4,1 has the same model expression of Equations (109), except that vectors there all have reduced dimension (MLo) x 1. It should be noted that the post-correlation window length Lo was fixed long enough to contain the delay-spread with an enlarged margin for asynchronous time-delay estimation from the reduced-size propagation vector Hn (reference [20]). Identification with post-correlation windows n shorter than L, investigated in [6], reduces complexity and proves to work nearly as well as the original full-window version of STAR (i. e, Lo = L).
Channel identification with the MC-CDFI scheme of Equation (110) can be readily implemented using the user-code post-correlation observation vectors Zu,'.
However, this procedure would feed back symbol fractions without taking full advantage of the complete processing gain. Instead, the vectors z-,l are regrouped and averaged n in the same way the signal component estimates are restored to their original rate in Equations (120, (123) or (126), and Z~ n, Zn or Z~n/FJ ~ respectively' are obtained.
Hence, the CDFI channel identification procedure, renamed MR-CDFI, is implemented as follows:
F
n n+ fC u~u n 132 = H ~ H snF ,n 5,f. ,n ( ) n+l n F nFM+n n ~
u n'=o when the data-rate is faster than the processing ratea, or by:
Hn = Hn + ~A,IZn -)g" n~ (133) n+1 n \ n n in the particular case where the data rate is equal to the processing rate, or by:
u n 134 Ln/F~ - H Ln/F,~ s Ln/F,~ s Ln/FJ I ( ) Ln/F,~ - Ln/Fõ~ +~ (Zu when the data-rate is slower than the processing rate. It should be noted that channel identification at data rates faster than the processing gain in Equation (132) has a structure similar to MC-CDFI. Averaging over Fn despread observations there can be reduced to a smaller subset to gain in complexity like in MC-CDMA. Use of the S-CDFI version described in Equations (111) to (113) instead of, or combination with, the above scheme are other alternatives that reduce the amount of complexity due to despreading operations.
By regrouping codes to match the original data transmission rates as discussed earlier (see Figure 38), channel identification can be easily reformulated along a mixed ' In practice, these vectors are computed directly from Y. in regular despreading steps which exploit the entire spreading sequences in one step along a mixed MC-CDMA
scheme.
gImplementation of Fõ channel updates (with time-delay tracking) instead of averaging is computationally more expensive.
MC-CDMA model where each user is characterized by Fu multi-codes and Fu despread vectors as shown in Figure 39.
To reduce further the number of expensive despreading operations, slower channel identification (reference [20]) can update channel coefficients less frequently if the channel can still show very weak variations over larger update periods.
However, high mobility can prevent the implementation of this scheme and faster channel identification update may even be required. For data rates faster than the processing rate, updating at a rate higher than the processing rate is not necessary. The processing period T is chosen to guarantee that the channel parameters are constant over that time interval. For data rates slower than the processing rate, the channel update rate could be increased above the data rate up to the processing rate using Equation (133) and partial despreading to provide Zu, In Equation (133), S~n~F~ from Equation (126) n should be fed back instead of Sn to benefit from the entire processing gain in the decision feedback process.
Although the foregoing embodiments of the invention have been described as receiver modules for a base station, i. e. , implementing ISR for the uplink, the invention is equally applicable to the downlink, i. e. , to receiver modules of user stations.
Downlink ISR
To implement ISR rejection, the user/mobile station needs to identify the group of users (i. e. , interferers) to suppress. Assuming temporarily that suppression is restricted to in-cell users, served by base-station v, and that the number of suppressed interferers is limited to NI to reduce the number of receivers needed at the desired base-station to detect each of the suppressed users, in order to identify the best users to suppress, the user station can probe the access channels of base-station v, seeking the NI
strongest transmissions. Another scheme would require that the strongest in-cell interfering mobiles cooperate by accessing the first NI channels (i. e. , u =
i (E
{1, . . . , NI}) of base-station v.
Once the NI suppression channels have been identified, the desired user-station can operate as a "virtual base-station" receiving from NI mobiles on a "virtual uplink".
If the desired user is not among the NI interferers, an additional user station is considered. Similar NI channels may be identified for transmissions from the neighbouring base-stations. Accordingly, consideration will be given to the NB
base-stations, assigned the index v' E{],...,NB}, which include the desired base-station with index v' = v without loss of generality. This formulation allows the user-station to apply block-processing STAR-ISR with specific adaptations of ISR combining and channel identification to the downlink.
In essence, each "virtual base station" user station would be equipped with a set of receiver modules similar to the receiver modules 21...... 21", one for extracting a symbol estimate using the spreading code of that user station and the others using spreading codes of other users to process actual or hypothesized symbol estimates for the signals of those other users. The receiver would have the usual constraints-set generator and constraint matrix generator and cancel ISR in the manner previously described according to the mode concerned.
It should be appreciated, however, that the signals for other users emanating from a base station are similar to multicode or multirate signals. Consequently, it would be preferable for at least some of the user station receiver modules to implement the multicode or multirate embodiments of the invention with reference to Figures 34 and 39. Unlike the base station receiver, the user station's receiver modules usually would not know the data rates of the other users in the system. In some cases, it would be _ _._~_.. ~...~.~...._.,,~..,......_. _ _ _ feasible to estimate the data rate from the received signal. Where that was not feasible or desired, however, the multirate or multicode receiver modules described with reference to Figures 34 and 39 could need to be modified to dispense with the need to know the data rate.
Referring to Figure 40, the user station receiver comprises a plurality of receiver modules similar to those of Figure 39, one for each of the NB base stations whose NI
strongest users' signals are to be cancelled, though only receiver module 21"
is shown in Figure 38. Recognizing that one or more of those NI signals could be multirate or multicode, and hence involve not only different spreading codes but also different code i =N7 segmentations, the number of despreaders equals i.e.
19v''`'F~, , 19 ' "1=', , 19"''"''FN, In any given base station, the NI
users are power-controlled independently and so are received by the mobile/user station with different powers. Consequently, it is necessary to take into account their power separately, so the power estimates from power estimation means 30T" are supplied to the channel estimation unit 28T". The channel identification unit 28T"' processes the data in the same way as previously described, spreading the resulting channel estimate H' to form the spread channel estimates and supplying o,n -O n ,..., -o.n them to the ISR beamformers 47T`,1 ',..., 47Tv''"4'Fv respectively, for use in processing the observation vector K.
n The resulting signal component estimates sn sv"N"FN, are similarly fed back to the channel identification unit 28V to update the channel parameter estimates and to the decision rule units 30Tv' ''', ..., 30T "N"'^'1 for production of the corresponding symbol estimates b ''^",FN In all modes except ISR-H, these n n symbol estimates are supplied to the constraints-set generator, together with the set of channel parameter estimates from channel identification unit 28T"' for use in ..~_~.. ~~.~.... ~..~.,~.., forming the set of constraints C. The set of channel parameter estimates includes the power estimates from the power estimation units.
If the desired user is not among the NI strong users of the serving base station v, the user station receiver will also include a separate receiver module which could be 5 similar to that shown in Figure 39. However, bearing in mind that the channel estimate derived by the receiver modules for the serving base station's strong users in Figure 40 will be for the same channel, but more accurate than the estimate produced by the channel identification unit of Figure 39, it would be preferable to omit the channel identification unit (29F,) and despreaders 19d ',..., 19d'F' (Figure 39), and supply the 10 spread channel estimates from the channel identification unit of the receiver module for serving base station v, as shown in Figure 41.
The receiver module shown in Figure 40 is predicated upon the data rates of each set of NI users being known to the instant user station receiver. When that is not the case, the receiver module shown in Figure 40 may be modified as shown in Figure 42, 15 i. e. , by changing the despreaders to segment the code and oversample at a fixed rate that is higher than or equal to the highest data rate that is to be suppressed.
It is also possible to reduce the number of despreading operations performed by the receiver module of Figure 42 by using a set of compound segment codes as previously described with reference to Figure 35 to compound over segments.
However, 20 as shown in Figure 43, a set of different compound codes could be used to compound over the set of NI interferers. It would also be possible to combine the embodiment of Figure 43 with that of Figure 35 and compound over both the set of interferers and each set of code segments.
A desired user station receiver receiving transmissions on the downlink from its 25 base-station and from the base-stations in the neighbouring cells will now be discussed.
Each base-station communicates with the group of user stations located in its cell.
Indices v and u will be used to denote a transmission from base-station v destined for user u. For simplicity of notation, the index of the desired user station receiving those transmissions will be omitted, all of the signals being implicity observed and processed by that desired user station.
Considering a base-station assigned the index v, its contribution to the matched-filtering observation vector y of the desired user station is given by the signal vector of the v-th base-station r defined as:
n y`' Y"'n, (135) -u,n u,n u=1 where the vector y=u denotes the signal contribution from one of the Uv users u,n communicating with base-station v and assigned the index u. Using the block-processing approach described in the previous section, the vector y,R can be decomposed as u,n follows:
N +l n v u r r v u lb v u l~' N,u,l,/X!
~n n+k JJ,R-k n k= (136) Y1=k k=-1 It should be noted that the channel coefficients rfn just hold the index of the base-station v. Indeed, transmissions from base-station u to all its mobiles propagate to the desired user station through a common channel. Base-station signals therefore show a multi-code structure at two levels. One comes from the virtual or real decomposition of each user-stream into multiple codes, and one, inherent to the downlink, comes from summation of code-multiplexed user-streams with different powers. As will be described hereinafter, this multi-code structure will be exploited to enhance cooperative channel identification at both levels.
In a first step, the desired user-station estimates the multi-code constraint and blocking matrices of each of the processed in-cell users (i. e. , u E{],..., NI} U{d}).
Table 4 shows how to build these matrices, renamed here as CMC,n and CMC n to show the index v of the serving base-station. Indexing the symbol and channel parameter estimates with v in Table 4 follows from Equation (136). In a second step, the user-station estimates the base-specific constraint and blocking matrices CBS,n and CBS n using Table 5. These matrices enable suppression of the in-cell interferers using one of the modes described in Table 5. For the downlink, a new mode BR, for base-realization, replaces the TR mode of Table 3. Suppression of interfering signals from multiple base-stations adds another dimension of interference decomposition and results in TR over the downlink as shown in Table 6. Therefore, in a third step the mobile-station estimates the base-specific constraint and blocking matrices CBS,n and CBS; ` from the interfering base-stations and concatenates them row-wise to form the multi-base constraint and blocking matrices denoted as C and C ",1 respectively. In the TR mode, the base-n n ~
specific constraint and blocking vectors in the BR mode now are summed over all interfering base-stations, leaving a single constraint. For the other modes, the number of constraints N, in Table 3 is multiplied by the number of interfering base-stations NB.
The receiver module dedicated to extracting the data destined to the desired mobile-station # d from the serving base station # v is depicted in Figure 38.
It should be noted that the multi-rate data-streams can be estimated using MRC
on the downlink, simply by setting the constraint matrices to null matrices9.
This option will be termed D-MRC.
9 In this case, ISR processing is not needed and the desired signal is expected to be strong enough to enable reliable channel identification for its own.
__ _.....~. ..~.~.~..~.~.~_....~. ....~.. ~._-_.._,.~..._. _.....___ ____.
If the user-station knows10 the data rates of the suppressed users, it can estimate their symbols" as long as their symbol rate does not exceed the processing rate. As mentioned hereinbefore, this block-based implementation of the symbol detection improves reconstruction of the constraint matrices from reduced decision feedback errors12. Otherwise, the user-station can process all interfering channels at the common resolution rate regardless of their transmission rate. It should be noted that estimation of the interferers' powers is necessary for reconstruction in both the BR and TR modes, for channel identification as detailed below, and possibly for interference-channel probing and selection. It is carried out at the processing rate.
Identification of the propagation channels from each of the interfering base-stations to the desired user station is required to carry out the ISR
operations.
Considering the in-cell propagation channel, its identification from the post-correlation vectors of the desired user is possible as described hereinbefore with reference to Figure 39. It exploits the fact that the multi-codes of the desired user propagate through the same channel. However, the in-cell interfering users share this common channel as well.
Therefore, the MC-CDFI and MR-CDFI approaches apply at this level as well.
Indeed, the user-station has access to data channels which can be viewed as NI x Nvirtual pilot-channels with strong powers. It is preferable to implement cooperative channel identification over the interfering users whether the desired user is among the in-cell 10Data-rate detection can be implemented using subspace rank estimation over each stochastic sequence of Nsymbol fractions.
" In the ISR-H mode, only the signal component estimates are needed for power and channel estimation (see next subsection).
12 Recovery of the interfering symbols at data rates slower than the processing gain could be exploited in slow channel identification. However, selection of a user as a strong interferer suggests that its transmission rate should be high.
interferers or not. The same scheme applies to the neighbouring base-stations and therefore enables the identification of the propagation channel from each out-cell interfering base-station using its NI interfering users.
If the data rates are known to the base-station, identification of the propagation channel from a given base-station v' E{],...,NB} can be carried out individually from each of its NI interfering users, as described in the previous section. To further enhance channel identification, the resulting individual channel estimates are averaged over the interfering users. Both steps combine into one as follows:
T~v i + I 1 Fi ~ ..v, v~i I37 N
L? + 1 - !I NI HnSnP +n n ( ) This downlink version of MR-CDFI, referred to as DMR-CDFI, is illustrated in Figure 40. It should be noted that averaging over the interferers takes into account normalization by their total power. To reduce the number of despreading operations, averaging over interferers can be limited to a smaller set ranging between 1 and NI.
If the data rates of the interfering users are unknown to the user-station, identification can be then carried out along the steps described with reference to Figure 34 to process interfering signals at the common resolution rate as follows:
NI Nm H"I + r ~,"1 - H" (138) lsv "1 sv~'`'1.
n+l n NI u~ n n n n N E z ~~ l n This downlink version of MC-CDFI, referred to as DMC-CDFI, is illustrated in Figure 42. To reduce the number of despreading operations, averaging over interferers and user-codes can be limited to smaller subsets ranging between 1 and NI and 1 and N,,,, respectively.
An alternative solution that reduces the number of despreading operations utilizes the following cumulative multi-codes for l=
NI
Ck 'E'1 = 1 r Ck 't'/ (139) JNI ~=t Despreading with these cumulative codes yields:
Nl NI
V/,i.l S Nv',',' n -PCM,n -n = _~ ~ t + i 1 = HvS v' E l + Nv',E,l (140) n n NI NI -n n -PCM,n10 Averaging the user-codes over interferers does not reduce noise further after despreading. However, the composite signal Sn''1 collects an average power from the NI interferers and therefore benefits from higher diversity. The cumulative multi-codes can be used to implement channel identification as follows:
= 3 ~ + /zv',E,1 ft'SR sn ,E,tI
~ (141) n+t n N(~v, 2 1 t 1 n 15 n where:
NI
Sv'tl n s '~'` (142) R NI ' L.~ L I SRv/ ,1 I 2 (~v' E 2 2+ a 1=t ~=t (143) n ' ) = (1 ) n t ~ 1V NI
This downlink version of MC-CDFI, referred to as DSMC-CDFI, is illustrated in Figure 43. Again, averaging over a smaller set of user-codes reduces the number of 25 despreading operations. Use of the S-CDFI version described in Equations (I11) to (113) instead of, or combination with, the above scheme13, are other alternatives that reduce the amount of complexity due to despreading operations. Their implementation on the downlink is ad hoc and follows from the given descriptions.
13 Summing user-codes over resolution periods does not increase diversity.
However, use of the S-CDFI version further reduces noise after despreading.
.~ , O >, ti G) s..
U
a > > o ~
o an ~ a 2 v a a ay, a Q + + a ,~ + + + av.
t4-. bn U o v' U
cn N Fr ~
Qn = 1~-r = ~ vl .~ Ln ~+ 1- U 3 ==~ ~ U ~ -~ U
O
Cl cn cn z z z z a cn ~ x x H
cn COO
cn cn ~
~,....,.._ ~.._, _ _.,~,~~_.... ~..
M$ 2h .,~ , .
.
.--a O w, O
M '-i .,~
~ = J ~
.-i =
II I ~
I M = J
II ~I II
~-~a a' II II II
Q! C1~. {Yi UO
W rõ~ -~ --1 r-a H
2` ~ z 2 <~..,"' \\\ Y
rn r--~ r----i i-----~ &
V - + W li W~I
H
.~.,_.....o....~..w..~.~..._. _ _ .__ ~..._.....,~,, ._..~,~...r,,.,.~a....~......~.. .._..__. _ _. _~.~~... _._.._.. _ _ ._.____._._.
~
a~ =
~ ^ U O z., ~ O ~
14~
w u o <'=~.~+ ~3,,~ ~~,, >, ~ Q Z~
`'~J~ <.p" <=~.~`ti N I"~O" U
It cd M
ct cd ~C <Ur p~ an n F"
~ =~
cn ~
o .~
'i=~,'i ~ :e ^fl y y <,3=1 ~, 'y:, ~ .~
~^ . !"` ~,.= Q~
<.f~ y r-i = .~.i CHa +~,y *~ n z~1/V"i v` II N
y u ~ ~ 2s o~
W`ti 1 I
CIS
oa U U ~ W S~-i Cl*
U +
H ~ o a Q x ~
~n o r--i r--~
O y ~t ^ + ~2 ~
V vl x C
+ + W _ y I
_ + W II
~ 1 ~ti ~ y Wyl ~ W.~.~
l ~(~~I I =
st 14~
C C l ' S~ E- (~IC (vIC t- S^C ~ ( C S C (~at + W
~ + õ
+ W II
w W
~ 1I/~`11 .
1 ryI ~ I .
H
_..v_ --~..~.~,..~....,.~..~...w._..~.,...~..._w~.
o II ' ~
II
o u C
A. I ~O Q .~ h U O
'C Q U O
o U ~ N
,^ Y G~ y L: O =~L' : W ~~ z~W~ r =o /-= =~
U M .-+
W V~ rn ~ o cli Q u ~=; C
U =~ `V
cn (U
C ~'< ~ ~o _ W on < Y at C~ 'V L~"
~= ' a C rn O 'b r~l U i-~i U
4d ~ U O +
~ w. ~ i ' UO c~ v II OU
E
O E
Cld Z'\
_ __ --=---~ _..~..~...,.+.~._.~,.~.__........,.~.
.Y....,._.....,....------ ....~. ..,..__ ..
BR
F NI N NJ +1 v ~q u~ E E w,i,l v ~,i,,f~
6BSn n 1~/ n+k~fn-kn k u=1 1=1 f=1 k=-1 FM N Nj v uE F E v a l ~' t,l f-i',!' 0 1 ~BS,n n bn+k .fn=k,n i,l,k Xk u=l 1=1 f=1 k=-1 N, 1 Table 5 shows base-specific constraint and blocking matrices CBS,n and ~s nl which will apply to the modes shown in Table 3 except for TR, replaced by BR.
Indices of remaining modes in Table 3 should be modified to include the index of the base-station v as shown for the TR mode. It should be noted that channel coefficients ~-fn hold the index of the base-station u instead of the user i. Transmissions to all user-stations from base-station u propagate to the desired user station through a common channel.
It should also be noted that summation over users is weighted by the estimate of the total amplitude due to user-independent power control. Definitions of ~ ~,k and Xk are given in Table 3.
TR
NB NI N NJ +1 Cn G ~'j~ 'urr rb 'i' " ~'i'` X1 E ~ Y~ n L~ L~ G i ~ f n+k f n-k k v=1 U=1 1=1 f=1 k=-1 NB NI N NJ +1 P ll ~~ T nu~ E E w,iLAv tw,t,lbv,i,0~1 n+k f,nl-k,n v,i,1,k k v=1 u=1 1=1 f=1 k=-1 _-,_- .~,.Y..,. .........~..~,......~...mw.. _ .._...._u..~.,..,..~....,.....,......,,, N, 1 BR
Ni Nm Nf +1 ~n"E F E bv ` l~v k n n+k f,n-k,n L u=1 1=1 f=1 k=-1 +
jw't~,l1 E _q_vn,uE f E E bv,i,lTv ~w,i,l~v',t1,1~,0X1 l.n 1~/ n+k f,nIk n v,i,l,k k~
u=1 1=1 f=1 k=-1 N, NB
and C"'' i'j' which apply Table 6 shows multi-base constraint and blocking matrices Cn n to the modes of Table 3 by row-wise aligning the constraint and blocking matrices Css,n and ~sin,' from base-stations into larger matrices Cn and in the way suggested by Equations (104) and (105). The number of constraints in Table 5 is multiplied by NB as shown here for the BR mode. The additional TR mode sums the constraint-vectors of the BR mode over all base-stations. The definition of Xk is given in Table 3 and S~,i,rkl '1 0 if (v,i,l,k) = (v', i', l', k') and 1 otherwise.
It should be appreciated that, when ISR is used for the downlink, it will function where the mobile station has a single antenna.
Embodiments of the invention are not limited to DBPSK but could provide for practical implementation of ISR in mixed-rate traffic with MPSK or MQAM
modulations without increased computing complexity. Even orthogonal Walsh signalling can be implemented at the cost of a computational increase corresponding to the number of Walsh sequences.
It should also be noted that, although the above-described embodiments are asynchronous, a skilled person would be able to apply the invention to synchronous systems without undue experimentation.
__ ~ .._..~..~__ _ _ ...._ ~.........~..W.....~..,...._........~..~..____.. _ _ It should be appreciated that the decision rule units do not have to provide a binary output; they could output the symbol and some other signal state.
The invention comprehends various other modifications to the above-described embodiments. For example, long PN codes could be used, as could mixed rate or mixed modulations, large delay-spreads and large inter-user delay-spreads. Also, the invention can be used in CDMA systems employing pilot signals.
REFERENCES
For further information, the reader is directed to the following documents, the contents of which are incorporated herein by reference.
1. F. Adachi, M.Sawahashi and H. Suda, "Wideband DS-CDMA for next generation mobile communications systems", IEEE communications Magazine, vol. 36, No. 9, pp. 55-69, September 1998.
2. A. Duell-Hallen, J. Holtzman, and Z. Zvonar, "Multiuser detection for CDMA
systems", IEEE Personal Communications, pp. 46-58, April 1995.
3. S. Moshavi, "Multi-user detection for DS-CDMA communications", IEEE
Communications Magazine, pp. 124-136, October 1996.
4. S. Verdu, "Minimum probability of error for asynchronous Gaussian multiple-access channels", IEEE Trans. on Information Theory, vol. 32, no. 1, pp. 85-96, January 1986.
5. K.S. Schneider, "Optimum detection of code division multiplexed signals", IEEE
Trans. on Aerospace and Electronic Systems, vol. 15, pp. 181-185, January 1979.
6. R. Kohno, M. Hatori, and H. Imai, "Cancellation techniques of co-channel interference in asynchronous spread spectrum multiple access systems", Electronics and Communications in Japan, vol. 66-A, no. 5, pp. 20-29, 1983.
7. Z. Xie, R.T. Short, and C.K. Rushforth, "A family of suboptimum detectors for coherent multi-user communications", IEEE Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 683-690, May 1990.
8. A.J. Viterbi, "Very low rate convolutional codes for maximum theoretical performance of spread-spectrum multiple-access channels", IEEE Journal of Selected Areas in Communications, vol. 8, no. 4, pp. 641-649, May 1990.
___..._,._ ......~..~~....~._~.~.......~~._.~ _~,-9. M.K. Varanasi and B. Aazhang, "Multistage detection in asynchronous code-division multiple-access communications", IEEE Trans. on Communications, vol.
38, no. 4, pp. 509-519, April 1990.
10. R. Kohno et al, "Combination of an adaptive array antenna and a canceller of interference for direct-sequence spread-spectrum multiple-access system", IEEE
Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 675-682, May 1990.
11. A. Duell-Hallen, "Decorrelating decision-feedback multi-user detector for synchronous code-division multiple-access channel", IEEE Trans. on Communications, vol. 41, no. 2, pp. 285-290, February 1993.
12. A. Klein, G.K. Kaleh, and P.W. Baier, "Zero forcing and minimum mean-square-error equalization for multi-user detection in code-division multiple-access channels", IEEE Trans. on Vehicular Technology, vol. 45, no. 2, pp. 276-287, May 1996.
13. S. Affes and P. Mermelstein, "A new receiver structure for asynchronous CDMA
: STAR - the spatio-temporal array-receiver", IEEE Journal on Selected Areas in Communications, vol. 16, no. 8, pp. 1411-1422, October 1998.
14. S. Affes, S. Gazor, and Y. Grenier, "An algorithm for multisource beamforming and multitarget tracking", IEEE Trans. on Signal Processing, vol. 44, no. 6, pp.
1512-1522, June 1996.
15. P. Patel and J. Holtzman, "Analysis of a simple successive interference cancellation scheme in a DS/CDMA system", IEEE Journal on Selected Areas in Communications, vol. 12, no. 5, pp. 796-807, June 1994.
16. J. Choi, "Partial decorrelating detection for DS-CDMA systems", Proceedings of IEEE PIMRC '99, Osaka, Japan, vol. 1, pp. 60-64, September 12-15, 1999.
17. S. Affes and P. Mermelstein, "Signal Processing Improvements for Smart Antenna Signals in IS-95 CDMA", Proceedings of IEEE PIMRC '98, Boston, U.S.A., Vol. II, pp. 967-972, September 8-11, 1998.
18. S. Affes and P. Mermelstein, "Performance of a CDMA beamforming array-receiver in spatially-correlated Rayleigh-fading multipath", Proc. of IEEE
VTC'99, Houston, USA, May 16-20, 1999.
19. H. Hansen, S. Affes and P. Mermelstein, "A beamformer for CDMA with enhanced near-far resistance", Proc. of IEEE ICC'99, Vancouver, Canada, Vol.
3, pp. 1583-1587, June 6-10, 1999.
20. K. Cheikhrouhou, S. Affes, and P. Mermelstein, "Impact of synchronization on receiver performance in wideband CDMA networks", Proc. 34th Asilomar Conference on Signals, and Computers, Pacific Grove, USA, to appear, October 29-November 1, 2000.
21. S. Affes, A. Louzi, N. Kandil, and P. Mermelstein, "A high capacity CDMA
array-receiver requiring reduced pilot power", Proc. of IEEE GLOBECOM
'2000, San Francisco, USA, to appear, November 27-December 1, 2000.
22. S. Affes, H. Hansen, and P. Mermelstein, "Interference subspace rejection in wideband CDMA - part I: Modes for mixed power operation", to be submitted.
23. H. Hansen, S. Affes, and P. Mermelstein, "Interference subspace rejection in wideband CDMA - part II: Modes for high data-rate operation", to be submitted.
24. E.H. Dinan and B. Jabbari, "Spreading codes for direct sequence CDMA and wideband CDMA cellular networks", IEEE Communications Magazine, vol. 36, no. 9, pp. 48-54, September 1998.
25. R. Lupas and S. Verdu, "Near-far resistance of multiuser detectors in asynchronous channels", IEEE Trans. on Communications, vo138, no. 4, pp.496-508, April 1990.
X "(t) = q/"(t)H "(t) c u(t)b "(t) ! P / / ! (2a) -~ult) E Gp lt) E plt) c u(t - T p(t)) b u(t -[ plt)) p=1 where H"(t) is the channel response vector of the channel 14 between the u-th mobile station 10 and the array of antenna elements and denotes time-convolution.
In the right-hand term of the above equation, the propagation time-delays ,=P(t) E[0,T] along the P paths, p 1,==, P, (see Figure 1), are chip-asynchronous, Gp(t) are the propagation vectors and Ep(t)2 are the fractions along each path (i.e., Ep(t)Z = 1) of the total power ~i"(t)2 received from the u-th mobile station EPP-, 10 . The received power is affected by path-loss, Rayleigh fading and shadowing. It is assumed that GP (t) , EP(t)2 and ~u(t)2 vary slowly and are constant over the bit duration T.
In the preprocessing unit 18 (see Figure 6), the antenna array signal vector X(t) is filtered with the matched pulse to provide the matched-filtering signal vector Yn(t) for frame n as follows:
Yn(t) = 1 f X (aT/2 + nT + t + t ~) ~ (t ~) dt ' (3) T, d where D. denotes the temporal support of 0(t) and a E{ 0,1 } stands for a possible time-shift by T/2 to avoid, if necessary, the frame edges lying in the middle of the delay spread (see reference [13]). For the sake of simplicity, it is assumed in the following that a = 0. Note that for a rectangular pulse D. is [0, Tj. In practice, it is the temporal support of a truncated square-root raised- cosine.
It should be noted that the above description is baseband, without loss of generality. Both the carrier frequency modulation and demodulation steps can be embedded in the chip pulse-shaping and matched-filtering operations of Equations (1) and (3), respectively.
Thus, after sampling at the chip rate 1/T, and framing over 2L - 1 chip samples at the bit rate to form a frame, the preprocessing unit 18 derives the M x (2L
-1) matched-filtering observation matrix: 4)[Y 0 Y i..., Y,2c,-2]1 where Y ~ = Y (lT ).
In the despreader 19 (see Figure 7), the post-correlation vector for frame number n for user number u is obtained as:
5 Zn,l - 1E Yn j+k Ck . (5) L k=0 Framing this vector over L chip samples at the bit rate forms the post-correlation observation matrix:
Zn = IZno,,ZRJ,...,ZnL-11. (6) 10 The post-correlation data model (PCM) (see reference [13]) details the structure of this matrix as follows:
Zn = H,n,sn + NPCM,n, (7) where Zn is the spatio-temporal observation matrix, Hn is the spatio-temporal propagation matrix, SR = bn ~n is the signal component and NPCM,n is the spatio-15 temporal noise matrix. Equation 7 provides an instantaneous mixture model at the bit rate where the signal subspace is one-dimensional in the M x L matrix space.
For convenience, the vector reshaper 26 of despreader 19" transforms the matrices Zn, Hn and NPCM,n into (M x L)-dimensional vectors Zu Hu and Zu respectively, by concatenating their columns into one n' -n -PCM,n 20 spatio-temporal column vector to yield the following narrowband form of the PCM
model (see reference 13):
Z" = Hus u + )V" (8) n n n PCM,n To avoid the ambiguity due to a multiplicative factor between Hn and Sn , the norm n , of Hn is fixed to VFM
n The PCM model significantly reduces inter-symbol interference. It represents an instantaneous mixture model of a narrowband source in a one-dimensional signal subspace and enables exploitation of low complexity narrowband processing methods after despreading. Processing after despreading exploits the processing gain to reduce the interference and to ease its cancellation in subsequent steps by facilitating estimation of channel parameters.
As discussed in reference 13, the spatio-temporal array-receiver (STAR) can be used to detect each user separately at the base-station 11. In addition to exploiting the processing gain to reduce interference, the STAR allows accurate synchronization and tracking of the multipath delays and components and shows inherent robustness to interference. The STAR also allows coherent combining of the data. This receiver is found to provide fast and accurate time-varying multipath acquisition and tracking.
Moreover, it significantly improves call capacity by spatio-temporal maximum ratio combining (MRC) in a coherent detection scheme implemented without a pilot signal.
For the sake of clarity, the steps of STAR that are relevant to the implementation of the present invention will be reviewed briefly below, with reference to receiver module 21 of Figure 5.
As shown in Figure 5, the despreader 19 supplies the post-correlation observation vector Zu to both the channel identification unit 28 and the MRC beamformer 27 of n STAR unit 20 . Using spatio-temporal matched filtering (yW = ly"/M) (i.e.
n spatio-temporal maximum ratio combining, Wu"H" the STAR unit 20 provides n -n estimates of signal component Sn`, its DBPSK bit sequence bn and its total received power (,n)Z as follows:
b u s," = Real {~"HZ" l = Real ~~" (9) n n 6n = Sign {sn } , (10) (~n)2 = (1 - a)(~r.U-i)2 + a iSn 12 ~ (11) where a is a smoothing factor. It should be noted that with ad hoc modifications, differential modulation and quasi-coherent differential decoding still apply with DMPSK.
Orthogonal modulation can even be detected coherently by STAR without a pilot (references [17] and [18]). Using the post-correlation observation vector Zu and the new n signal component estimate sn from the beainformer 27 , the channel identification unit 28 provides an estimate Hu of the channel 14 for user station 10 . The channel n identification unit 28 updates the channel parameter estimate H" by means of a decision n feedback identification (DFI) scheme whereby the signal component estimate SR
is fed back as a reference signal in the following eigen-subspace tracking procedure:
Hn+l = Hn + (Zn -HnSn ~ri , (12) where is an adaptation step-size. Alternatively, the product ~n gn could be fed back instead of the symbol component estimate sn, This DFI scheme allows a 3 dB
coherent detection gain in noise reduction by recovering the channel phase offsets within a sign ambiguity without a pilot. Note that a reduced-power pilot can be used to avoid differential coding and decoding (reference [21]). The procedure that further enhances the channel estimate H" to obtain H" from the knowledge of its spatio-temporal n+1 -n+l structure (i.e. manifold) allows a fast and accurate estimation of the multipath time-delays l,n ~ ~TP,n in both the acquisition and the tracking modes (both versions of this procedure can be found in reference [13]). This improved estimation accuracy achieves robustness to channel estimation errors, and reduces sensitivity to timing errors, when STAR is used in multiuser operation.
For further information about STAR, the reader is directed to the articles by Affes and Mermelstein identified as references [13] and [17] to [21].
If, as was assumed in reference 13, the spatio-temporal noise vector Nu is PCM,n spatially uncorrelated, power control on the uplink is generally able to equalize the received signal powers. However, the assumption that noise is uncorrelated becomes untenable on the downlink due to path-loss and shadowing and when the power of particular users (e.g.,"priority links", acquisition, higher-order modulations or higher data-rates in mixed-rate traffic) is increased intentionally. Within a particular cell, there may be users having many different "strengths", perhaps because of different data rates.
Figure 8 illustrates, as an example, a cell in which there are four different sets of users arranged hierarchically according to data rate. The first set I comprises users which have relatively high data rates, the second set M1 and third set M2 both comprise users which have intermediate data rates, and the fourth set D comprises users which have relatively low data rates. In practice, the receivers of the high data rate users of set I
will not need to cancel any "outset" interference from the users in sets M I, M2 and D, but their transmissions will contribute to interference for the receiver modules in those sets. Intermediate data rate users in sets M1 and M2 will need to cancel "outset"
interference from the high data rate users of the set I but not from the users in set D.
They will themselves be contributors of "outset" interference to the users in set D. The receivers of users in set D must cancel "outset" interference from sets I, MI
and M2.
It is also possible for a receiver of a user within a particular set to cancel "inset"
interference from one or more users within the same set; and itself be a contributor to such "inset" interference. Embodiments of the invention applicable to these "outset" and "inset" situations will be described hereinafter. In the description, where a particular user's signal is treated as interference and cancelled, it will be deemed to be a "contributor" and, where a particular user's receiver module receives information to enable it to cancel another user's interference, it will be deemed to be a "recipient". To simplify the description of the preferred embodiments described herein, it will be assumed that all users employ the same modulation at the same rate. For the purpose of developing the theory of operation, initially it will be assumed that, among the mobile stations in the cell, there will be a first set I of "strong" contributor users, one of which is identified in Figures 1 and 2 by index "i", whose received signal powers are relatively high and hence likely to cause more interference, and a second set D of "low-power"
recipient users, one of which is identified in Figures 1 and 2 by index "d", whose received signal powers are relatively low and whose reception may be degraded by interference from the signals from the strong users. In order to receive the low-power users adequately, it usually is desirable to substantially eliminate the interference produced by the high-power users. For simplicity, most of the preferred embodiments of the invention will be described on the basis that the high-power users can be received adequately without interference suppression. It should be appreciated, however, that the "strong user stations could interfere with each other, in which case one could also apply to any interfering mobile the coloured noise model below and the near-far resistant solution proposed for the low-power user, as will be described later.
Assuming the presence of Ni interfering users assigned the indices i = I to NI, then the spatio-temporal observation vector of any interfering user (u = i E(1,...,N1)) is given from Equation 8 by:
Z' - H's' + N' (13) n n n PCM,n where Ni can still be assumed to be an uncorrelated white noise vector if the PCM,n processing gain of this user is not very low. On the other hand, from the point of view of any low-power user (u=d 1,...,N1}), the spatio-temporal observation vector is:
NI
Zd = HdsR + Id + Nd = Hds,d + ~ 1~=i + Nd , (14) n n PCM,n -PCM,n -n -PCM,n -PCM,n i=1 where, in addition to the uncorrelated white noise vector Nd there is included a total PCM,n I
interference vector ld which sums a random coloured spatio-temporal interference -PCM,n vector from each interfering mobile denoted by p1J for i = 1, ..., NI. At frame PCM,n number n, the realization of the vector 10 results from matched-pulse filtering, ship-PCM,n rate sampling, bit-rate framing, despreading with ctd, and matrix/vector reshaping of the received signal vector k(t) from the i-th interfering mobile using Equations (3) to (6).
The receiver shown in Figure 5 would receive the signals from all of the user stations independently of each other. It should be noted that there is no cross-connection between the receiver modules 2l...21", specifically between their STAR units ...20 ...20", for suppression of interference from the signals of mobile stations which constitute strong interferers. While the matched beamformer of Equation (9) is optimal in uncorrelated white noise, it is suboptimal when receiving the low-power users due to spatial correlation of the interference terms. To allow the accommodation of additional users in the presence of much stronger interfering mobiles in the target cell, in embodiments of the present invention the receiver of Figure 5 is upgraded to obtain much stronger near-far resistance, specifically by adapting the beamformer of Equation 9 to reject the interference contributions from the interfering strong users.
In the general case, the total interference Id experienced by a user d in set 'PCM,n D is an unknown random vector which lies at any moment in an interference subspace spanned by a matrix, say CpcM,n (1=e= , Id E Vec { CPcM,n }) with dimension -PCM,n depending on the number of interference parameters (i.e., power, data, multipath components and delays) assumed unknown or estimated a priori. As will become apparent from the following descriptions of preferred embodiments, in practice, the matrix CPCM,n, which will be referred to as the "constraint matrix", can be derived and estimated in different ways. To achieve near-far resistance, the beamformer must conform to the following theoretical constraints:
WdHHd 1, WdNHd 1, l-n n ~ -n n (15) d" d d" d CPCM,n = 0, yVn IPC'M,n = 0 The first constraint provides a substantially distortionless response to the low-power user while the second instantaneously rejects the interference subspace and thereby substantially cancels the total interference. This modification of the beamforming step of STAR will be referred to as interference subspace rejection (ISR).
With an estimate of the constraint matrix CPCM,n available (as described later), the ISR combiner (i. e. , the constrained spatio-temporal beamformer) Wd after 5 despreading is obtained by:
"
d QPCM,n - ~CPCM,nCPCM,n) ~ (16) _ d d d" ~PCM,n IM L CPCM,nQPCm,nCpCM,n ~ (17) ]gd Hd Wd PCMn -n , (1 g) ~,d f n L7 n IlPCM,n Hn where IM*L denotes a M * L x M L identity matrix. First, the projector IIPCM,n orthogonal to the constraint matrix CPCM,n is formed. It should be noted from Equations (16) and (17) that the inverse matrix QpCM,n is not the direct inverse of constraint matrix CpCM,n but part of the pseudo-inverse of CPCMn, For convenience, however, it will be referred to as the inverse matrix hereafter. Second, the estimate of the low-power response vector yd is projected and normalized.
n Whereas, using the above constraints, the ISR beamformer may process the low-power user's data vector after it has been despread, it is possible, and preferable, to process the data vector without first despreading it. In either case, however, the data vector will still be despread for use by the channel identification unit.
Although it is computationally more advantageous to do so without despreading, embodiments of both alternatives will be described. First, however, the spread data model of Equation (2) will be reformulated and developed and then used to derive various modes that implement ISR combining of the data, without despreading, suitable for different complementary situations.
Data Model Without Despreading The observation matrix Yn of Equation (4) which provides the post-correlation matrix Zõ of Equation (7) by despreading and framing at the bit rate, can be expressed as:
t, Yn = E Yn + Nnth , (19) n=1 where each user u contributes its user-observation matrix yn, obtained by Equations (3) and (4) with X(t) replaced by Xu(t) in Equation (3), and where the preprocessed thermal noise contributes:
N~th = [NPI1Z(nl),NPhhz(nT + T ),...,Nprn(nT + (2L - 2)T )J. (20) Using the fact that any bit-triplet [b:1, bn , bn;,, contributing to channel convolution (see Equation (2a) in yn can be composed as:
[b,1,b:,b,+1] = bn 1[1, 0, 0] + bn [0,1, 0] + bn:l [0,0,1] , (21) the sequence bu(t) can be locally approximated over the n-th block by means of the canonic generating sequences gl(t), g2 (t) and g3(t) in Figure 22 as:
b"(t) = bn glor(t) + bn 1&`-(t) + bn lg`.,r(t), (22) where the indices lo n, l_, n, l+, n E { 1, 2, 3} are permuted at each block so that the corresponding canonic generating sequences locally coincide with /0, 1, 0], [1, 0, 0] and [0, 0, 1], respectively. Assuming slow time-variations of ~(t) and H(t) compared to the symbol duration:
~~u ~~u y~ u I n = SnuIO,n + Snu-1 `-l,n + Snu+l yl,n , (3) where the canonic user-observation matrices yk n are obtained by Equations (3) and (4) with X(t) in Equation (3) replaced, respectively for k = -1, 0, +1, by:
Xk (t) = H n(t) (D gl`,.(t) c i'(t) . (24) Good approximations of y_1 n and y+l,n can be actually obtained at each iteration by L simple backward/forward shifts of the columns of yo n with zero column inputs.
It should be noted that the canonic generating sequences allow more accurate reconstruction (e.g., overlap-add) of time-varying channels. Also,the resulting decomposition in Equation (23) holds for long PN codes.
It should be noted that this decomposition also holds for any complex-valued symbol-triplet [bu1, bR , bna~. With ad hoc modifications, therefore, the ISR
approach according to this invention applies to any complex modulation (e.g., MPSK, MQAM, even analog). This new signal decomposition is used to derive the different implementations of ISR which will be described later.
With respect to the low-power user assigned the index d and the NI strong interfering mobiles assigned the indices i= 1, ..., NI, the observation vector obtained by reshaping the observation matrix, before despreading, can now be rewritten as:
y= Yd Sn + Id + 1 + N, (25) n -O,n ISI.n n -n.
where the first canonic observation vector yd appears as the "channel" vector of the O,n low-power user d. The total interference vector before despreading:
NI NI NI
1 {si + S~ + - ~ {sZ + (2v) -O,n l,n +l,n X. I SI,n i=1 i=1 i=1 is the sum of the interfering signal vectors yi and:
n jn n ~+ n u (27) Sln - Sn 1 Nln Sn+l ~+ln' l 10 is the intersymbol interference (ISI) vector of user u. In large processing gain situations, the self ISI vector ld can be combined with the uncorrelated spatio-temporal noise -ISI,n vector N~ leading to the following data vector model before despreading: d yn = dnsn + In + Nn. (28) Despreading the observation vector in the above equation with the spreading sequence of the low-power user d provides the data vector model after despreading in Equaiton (14). It is possible to derive a finer decomposition of the date model to allow implementation of one or more of the ISR modes over diversities.
Finer Decomnositionof the Data Model Over Diversities Thus, Equation (2a) can be further decomposed over the Nf = MP diversity branches or fingers in such a way that the observation signal contribution Xn~f(t) received by the m-th antenna along the p-th path for f = (p - 1)M + m = 1,..., Nf can be separated as follows:
Nj Xn(t) = EXnf(t). (29) f~' The observation signal contribution from the f-th finger is defined as:
Xnf(t) = ~n(t)Hn~f(t) c n(t)b u(t) (30) = 'Yn(t)Gp f(t)-Cp(t)b u(t - Tp(t))C n(t - 7p(t))e where the propagation vector from thef-th finger is:
Gpf(t) = yf(t)Rm. (31) In the above equation, the scalar .yf(t) is the channel coefficient over the f-th finger and R= [0,..., 0,1, 0,..., 0f is a M x I vector with null components except for the m-th one. With the above definitions, one can easily check the following decompositions of the channel and the propagation vectors:
Nj Hn(t) _ L H"'t(t), (32) f=1 M
Gp (t) _ 1: Gp,~V -1)M+m(t). (33) m=1 Accordingly, after preprocessing, the matched-filtering observation matrix can be decomposed as follows:
U U Nj yn - L~ I n + trnh -E y ~nJf,nl nl +`vth, (34) u=1 u=1 f=1 l where each user u contributes its user-observation matrices y,"~f from fingers f 1,...,Nf, obtained by Equations (3) and (4) with X(t) replaced by Xnf(t) in Equation (3).
Note that the complex channel coefficient y f(nT) _f(nT)Ep(nT) is separated from the matrix' y'nf which contains a purely-delayed replica of the spread-data without attenuation or phase offset from finger f. This matrix, which is obtained by Equations (3) and (4) with X(t) in Equation (3) replaced by:
X"~f(t) = RmS(t - rP(t)) b "(t)c "(t), (35) can be further decomposed over the canonic generating sequences as follows:
rn f = bn ro n+ bri y" i + bn+l Y+i n, (36) where the canonic user-observation matrices yk n from finger f are obtained by Equations (3) and (4) with X(t) in Equation (3) replaced, respectively for k =
-1, 0, +1, by:
'This matrix is real-valued in the case of a binary modulation.
Xk At) = Rmb(t - TP(t)) gl'-(t)c "(t), (37) where b(t) denotes the Dirac impulse. Therefore one obtains:
U Nf +1 Yn = L: L~ E 'Sn+kJf,nYk n+ ~Ylh (38) u=1 f=1 k=-1 A coarser decomposition over fingers of the total interference vector before despreading defined in Equation (26) gives:
NI NI Nf In = L~ Yt =E !~ VnSf,n~n = (39) 1=1 i=1 f=1 After despreading with the spreading sequence of the low-power user d, it gives:
NI NI Nf Id = Id' - _ ~ >G"~" larJ
(40) PCM,n -PCM,n ^ f=1 n f n-PCM,n Embodiments of the invention which use the above decompositions of interference, denoted as ISR-D implementations before and after despreading, will be described later with reference to Figures 16 and 23.
ISR Combining Before Despreading As described hereinbefore, the combining step of STAR is implemented without despreading by replacing Equation (9) for the low-power user with:
sn = RealfE~ "Yn}, (41) where the spatio-temporal beamformer Wd now implements ISR without despreading n to reject 1 by complying with the following constraints (see Equation (15)):
d d" d K'd"Y
4V Y.n = 1, ~ -n -o,n = 1, (42) WdHC - 0, YYdHl ~ 0, n n n n and Cn is the constraint matrix without despreading that spans the interference subspace of the total interference vector In (i.e., In E Vec { Cn}).
The constraint matrix without despreading, Cn, is common to all low-power users.
Thus, it characterizes the interference subspace regardless of the low-power user. In contrast, each constraint matrix after despreading CPCM,n in Equaiton (15) is obtained by despreading Cn with the spreading sequence of the corresponding low-power user.
Therefore ISR combining before despreading, although equivalent to beamforming after despreading, is computationally much more advantageous.
In contrast to the "after despreading" case described earlier, when the data vector 5 is not despread before processing by the ISR combiner (i. e. , the constrained spatio-temporal beamformer) Wd the estimate of the constraint matrix is obtained by:
n Qn - CCn Cn)-1 , (43) Un - IM * (2L-1) - ~nQn~n ~ (44) 10 Wd = n O,n (45) n ~,d ]_O,n n Y_O,n where IM.(2L_l) denotes a M * (2L - 1) x M*(2L - 1) identity matrix. As before, it can be seen from Equations (43) and (44) that the inverse matrix Qn is not the direct inverse of constraint matrix Cn but part of the pseudo-inverse of Cn . It should also be noted 15 that the above operations are actually implemented in a much simpler way that exploits redundant or straightforward computations in the data projection and the normalization.
As before, the projector IIn orthogonal to the constraint matrix Cn is formed once for all low-power users. This would have not been possible with ISR after despreading.
Second, the estimate of the low-power response vector yd is projected and normalized.
-0,n 20 The estimate pdn is reconstructed by reshaping the following matrix:
Yo n= Hn g`~- c,d (46) n the fast convolution with the channel being implemented row-wise with the spread sequence. The channel estimates fid i,c. H`` is provided by STAR as explained earlier and includes the total contribution of the shaping pulse 0(t) matched with itself [13}. If 25 the channel time-variations are slow, the channel coefficients can be assumed constant over several symbol durations [20], thereby reducing the number of computationally expensive despreading operations required (see Figure 9).
It should be noted that, although these ISR modes have formulations that are analogous whether ISR is implemented with or without first despreading the data vector, 30 ISR combining of the data without it first being despread reduces complexity significantly.
Receivers which implement these different ISR modes will now be described, using the same reference numerals for components which are identical or closely similar to those of the receiver of Figure 5, with a suffix indicating a difference. A
generic ISR
receiver which does so without despreading of the data will be described first, followed by one which does so after despreading of the data. Thereafter, specific implementations of different ISR modes will be described.
Thus, Figure 9 illustrates a receiver according to a first embodiment of the invention which comprises a first set I of "strong user" receiver modules 21'..,21NI
which are similar to those in the receiver of Figure 5, and, separated by a broken line 34, a second set D of "low-power" user receiver modules which differ from the receiver modules of set I but are identical to each other so, for convenience, only one, receiver module 2 1 A d comprising a STAR module 20A' having a modified beamformer 47A1, is shown. The outputs of the decision rule units 29...... 29NI and of the channel identification units 28', ,28N` from the set I modules are shown coupled to a constraints-set generator 42A which processes the corresponding symbol estimates and channel parameter estimates to produce a set of N, constraints (C-The constraints-set generator 42A may, however, use hypothetical symbol values instead, or a combination of symbol estimates and hypothetical values, as will be described later.
Each individual constraint lies in the same observation space as the observation matrix Y,, from preprocessor 18. The constraints-set generator 42A supplies the set of constraints Cn to a constraint matrix generator 43A which uses them to form a constraint matrix Cn and an inverse matrix Q, which supplies it to the beamformer 47d and each of the corresponding beamformers in the other receiver modules of set D. The actual content of set of constraints cCn and the constraint matrix C n will depend upon the particular ISR mode being impleinented, as will be described later.
The receiver of Figure 9 also comprises a vector reshaper 44 which reshapes the observation matrix Yn from the preprocessing unit 18 to form an observation vector Y
having dimension M(2L-1) and supplies it to the beamformer 47A' and to each of the other beamformers in the other receiver modules in set D.
The STAR unit 40Aa of receiver module 41 A' comprises a channel identification unit 28Ad, a decision rule unit 27Ad and a power estimation unit 30A' which are similar to those of the STAR units 20'...20" described hereinbefore. In addition to the STAR
unit 40A', the receiver module 41Ad comprises a despreader 19d. The despreader 19d despreads the observation matrix Yn using the spreading code for user d and supplies the resulting post-correlation observation vector Z to the channel identification unit 28Ad only. The decision rule unit 27Ad and power estimation unit 30Aa produce output symbol estimates f d and power estimates ( ~y~2, respectively. The ISR
beamformer n 47Ad of STAR unit 40Ad produces corresponding signal component estimates Sn but differs from the MRC beamformers 271...27" because it operates upon the observation vector Y, which has not been despread. In a manner similar to that described with respect to Figure 5, the channel identification unit 28A' receives the post-correlation observation vector Zd and the signal component estimate sri and uses them to derive n the spread channel estimates yd which it uses to update the weighting o,n' coefficients ypn of the beamformer 47Ad in succeeding symbol periods. The symbol period corresponds to the spread data frame of M(2L-1) elements. The coefficients of the ISR beamformer 47Ad also are updated in response to the constraint matrix Cn and its inverse Qn, as will be described later. As shown in Figure 9, the same matrices Cn and a are supplied to all of the receiver modules in set D, specifically to their beamformers.
As shown in Figure 10, the constraint matrix generator means 43A comprises a bank of vector reshapers 48A1 , ..., 48A N~ and a matrix inverter 49A. Each of the vector reshapers 48A 1, ..., 48A N reshapes the corresponding one of the set of constraints-set matrices Cn,...,e` to form one column of the constraint matrix Cn, which is processed by matrix inverter 49A to form inverse matrix Qn,. For simplicity of description, it is implicitly assumed that each of the columns of C is n normalized to unity when collecting it from the set of constraints ~'n.
As also illustrated in Figure 10, beamformer 47A' can be considered to comprise a coefficient tuning unit 50A' and a set of M(2L-1) multipliers 51; ...51M(u,-,). The coefficient tuning unit 50Ad uses the constraint matrix Cn, the inverse matrix Qn and the channel parameter estimates yd to adjust weighting coefficients Wd' ~d' -O,n 1,n M(2L-1),n according to Equation 45 supra. The multipliers 51; ...51~,(2L-,) use the coefficients to weight the individual elements y.,, y respectively, of the observation 1,n -M(2L-1),n' vector y The weighted elements are summed by an adder 52d to form the raw filtered symbol estimate sn for output from the beamformer 47Ad.
An alternative configuration of receiver in which the low-power STAR units of set D implement ISR beamforming qfter despreading of the observation matrix Yn from preprocessor 18 will now be described with reference to Figures 11 and 12, which correspond to Figures 9 and 10. The receiver shown in Figure 11 is similar to that shown in Figure 9 in that it comprises a preprocessing unit 18 which supplies the observation matrix Yn to the set I receiver modules 21'...21NI, a constraints-set generator 42B and a constraint matrix generator means 43B. It does not, however, include the vector reshaper 44 of Figure 9 and each of the low-power user STAR modules in set D
has a modified beamformer. Thus, modified beamformer 47Bd operates upon the post-correlation observation vector Zd from the output of the despreader 19d which is n supplied to both the channel identification unit 28Bd and the beamformer 47Ba.
The channel identification unit 28Bd generates channel estimates ftd and supplies them to the n beamformer 47Bd which updates its coefficients in dependence upon both them and a user-specific constraint matrix CPCM,n and user-specific inverse matrix QPCM,n-It should be noted that the constraint matrix generator means 43B supplies user-specific constraint and inverse matrices to the other receiver modules in set D.
Referring now to Figure 12, the common constraint matrix generator means 43B
comprises a bank of user-specific constraint matrix generators, one for each of the receiver modules of set D, and each using a respective one of the spreading codes of the users of set D. Since the only difference between the user-specific constraint matrix generators is that they use different spreading codes, only user-specific constraint matrix 43Bd is shown in Figure 12, with the associated beamformer 47Ad. Thus, user-specific constraint matrix generator 43Bd comprises a bank of despreaders 55Bd ', ..., 55Bd'r", and a matrix inverter 46Bd. The despreaders 55Bd ', ..., 55Bd'N` despread respective ones of the N, matrices in the set of constraints C,, to form one column of the individual constraint matrix CPCM,n implicitly normalized to unity. The matrix inverter 46Bd processes individual constraint matrix CPCM,n to form inverse matrix QPCM,n, The user-specific constraint matrix generator 4313d supplies the constraint matrix C cM,. and inverse matrix QP Mn to the coefficient tuning unit 50Bd of beamformer 47Bd. As shown in Figure 12, the beamformer 47Bd has ML multipliers 51 i... 51ML which multiply weighting coefficients yyd `. ., yyd' by elements Zd ,,, Zd of the post-correlation -1,n -ML n -t,n -ML,n observation vector Zd. As before, adder 52d sums the weighted elements to form the -n signal component estimate sri - The beamformer coefficeints are timed according to Equation (18).
Either of these alternative approaches, i. e. with and without despreading of the data vector supplied to the beamformer, may be used with each of several different ways of implementing the ISR beamforming, i.e. ISR modes. It should be noted that all cases use a constraint matrix which tunes the ISR beamformer to unity response to the desired channel and null response to the interference sub-space. In each case, however, the actual composition of the constraint matrix will differ.
Specific embodiments of the invention implementing the different ISR modes without despreading of the data will now be described with reference to Figure 13 to 20, following which embodiments implementing the same ISR modes after despreading will be described with reference to Figures 21 to 26.
Interference Subspace Rejection over Total Realisation (ISR-TR) The receiver unit shown in Figure 13 is similar to that shown in Figure 9 in that it comprises a set I of receiver modules 21'...21" for processing signals of NI strongly interfering mobile stations and a set D of receiver modules for signals of other, "low-power", users. The receiver modules of set D are identical so only receiver module 21Cd, for channel d, is shown in Figure 13. As in the receiver of Figure 9, the observation matrix Yn from preprocessor 18 is supplied directly to each of the despreaders 19'...19'" of the set 1 receiver modules. Before application to each of the receiver modules of set D, however, it is delayed by one symbol period by a delay element 45 and reshaped by vector reshaper 44. The resulting observation vector y n -I
is supplied to the beamformer 46C`' and to each of the other beamformers in the set D
receiver modules (not shown). In addition to beamformer 47Cd, receiver module 21Cd comprises despreader 19' and a STAR receiver unit 20Cd comprising channel identification unit 28Cd, decision rule unit 27Cd and power estimation unit 30Cd which are siniilar to those shown in Figure 9. The set of channel parameter estimates nn, which are supplied to the constraints-set generator 42C comprise the channel estimates H',,,,,and the power estimates n~ n n n The constraints-set generator 42C comprises a bank of respreaders 57C'...57CNI
each having its output connected to the input of a respective one of a corresponding bank of channel replication units 59C'...59CNI by a corresponding one of a bank of multipliers 58C'...58CN'. The respreaders 57C1 ...57CNI are similar so only one, respreader 57C , is illustrated in Figure 14. Respreader 57C is similar to the corresponding spreader 13 (Figure 3) in that it spreads the symbol bn from the corresponding decision rule unit 29C using a periodic personal code sequence c," at a rate 1/T, where Tc is the chip pulse duration. It differs, however, in that it does not include a shaping-pulse filter.
The effects of filtering both at transmission with the shaping-pulse (see Figures 2 and 3) and at reception with the matched shaping-pulse (see Figures 5 and 6) are included baseband in the channel estimate or Hn~ as disclosed in reference [13].
n 5 Referring again to Figure 13 and, as an example, receiver module 21C', replication of the propagation characteristics of channel 14' is accomplished by digital filtering in the discrete time domain, i.e. by convolution at the chip rate of the channel estimate Hl with the respread data bn cf . This filtering operation immediately provides n decomposed estimates of the signal contribution of user station 10' to the observation 10 matrix Y. Thus, respreader 57C' respreads the symbol Ln' from decision rule unit 29C', multiplier 58C1 scales it by the total amplitude estimate ,,n and channel replication filter 59C' filters the resulting respread symbol using the channel estimate Hl from channel identification unit 28C'. The symbol estimates from the other n STAR units in set I are processed in a similar manner.
15 It should be noted that the respreaders 57C'...57CN', multipliers 58C'...58CN' and channel filters 59C'...50CN' correspond to the elements 13', 15' and 14' in the interfering user channel of Figure 2. The coefficients of the channel replication filter units 59C'...59CN' are updated in successive symbol periods by the channel identification units 28C'...28CN' using the same coefficients gn... Hn 1, corresponding to the transmission 20 channels 14'...14N', respectively, used to update their respective MRC
beamformers 27C'...27CN'. It will be appreciated that the re-spread signals Yri 1 yn 1 from the channel replication filter units 59C...59CN', respectively, include information derived from both the sign and the amplitude of each symbol, and channel characteristics information, and so are the equivalents of the set I strong interferer's spread signals as 25 received by the base station antenna elements 12'...12M.
The constraint-set generator 42C also comprises an adder 60 coupled to the outputs of the channel replication units 59C'...59CN'. The adder 60 sums the estimates yn 1 y'1 of the individual contributions from the different interferers to form the estiinate In-1 of the total interference from the NI interferers in the received 30 observation matrix Y,,. The sum can be called total realization (TR) of the interference.
In this embodiment, the constraint matrix generator simply comprises a vector reshaper 43CB which reshapes the total realization matrix In-1 to form the vector I
which, n-1 in this embodiment, constitutes the constraint matrix C. It should be noted that, because the constraint matrix really is a vector, the inverse matrix Q, reduces to a scalar and, assuming implicit normalization, is equal to 1. Hence, no matrix inverter is needed.
The reshaped vector I is supplied to the ISR beamformer 47Cd of receiver n-1 module 21 C' and to the beamformers of the other receiver modules in set D.
The beamformer 47Cd uses the reshaped vector I and the channel estimates yd to -n-1 -o,n-1 update its coefficients, according to Equation (45), for weighting of the elements of observation vector y n-1 The beamformer 47Cd adjusts its coefficients so that, over a period of time, it will nullify the corresponding interference components in the observation vector y from n-1 the vector reshaper 44 and, at the same time, tune for a unity response to the spread channel. vector estimate so as to extract the raw signal component estimate sR , substantially without distortion.
ISR-TR constitutes the simplest way to characterize the interference subspace, yet the most difficult to achieve accurately; namely by a complete estimation of the instantaneous realization of the total interference vector I in a deterministic-like approach. The constraint matrix is therefore defined by a single null-constraint (i.e., N, =1) as:
NI
C = I n = ` ' (47) IIInII I~TrI ~II
i=1 n where each estimate y` is reconstructed by reshaping the following matrix:
n f;, = ~n Ha bhcl` . (48) For each interfering user assigned the index i = 1, ..., NI, this mode uses estimates of its received power (~,R)2 and its channel H` , both assumed constant over -n the adjacent symbols and made available by STAR. This mode also requires a bit-triplet estimate {h, bR, b;,,,, of each interfering user (see Equation (23)). To obtain estimates of the signs of the interferer bits for both the current and next iterations (i.e., bn and bn,,), the ISR-TR inode requires that the processing of all the low-power users be further delayed by one bit duration and one processing cycle (pc), respectively. The one-bit delay is provided by the delay 45 in Figure 13.
In the ISR-TR mode and in the alternative ISR modes to be described hereafter, the interference (due to the strongest users) is first estimated, then eliminated. It should be noted that, although this scheme bears some similarity to prior interference cancellation methods which estimate then subtract the interference, the subtraction makes these prior techniques sensitive to estimation errors. ISR on the other hand rejects interference by beamforming which is robust to estimation errors over the power of the interferers. As one example, ISR-TR would still implement a perfect null-constraint if the power estimates were all biased by an identical multiplicative factor while interference cancellers would subtract the wrong amount of interference. The next mode renders ISR even more robust to power estimation errors.
The receiver illustrated in Figure 13 may be modified to reduce the information used to generate the interfering signal estimates y' ... yNj specifically by omitting the n-1 n-11 amplitude of the user signal estimates, and adapting the ISR beamformer 47Cd to provide more (NI) null constraints. Such a modified receiver will now be described with reference to Figure 15.
Interference Subspace Rejection over Realisations (ISR-R) In the receiver of Figure 15, the receiver modules in set I are identical to those of Figure 13. Receiver module 21Dd has the same set of components as that shown in Figure 13 but its beamformer 47Dd differs because the constraint matrix differs. The constraints-set generator 42D differs from that shown in Figure 13 in that it omits the multipliers 58C'...58CN' and the adder 60. The outputs from the power estimation units 30'...30N` are not used to scale the re-spread signals from the respreaders 57C'...57CN1, respectively. Hence, in the receiver of Figure 15, the signals 6n... bnl from the STAR
units 20'...20N', respectively, are re-spread and then filtered by channel replication filter units 59C'...59CN1, respectively, to produce user specific observation matrices yn 1 ynll, respectively, as the constraints-set C. In contrast to the receiver of Figure 13, however, these respread matrices are not summed but rather are processed individually by the constraint matrix generator 43D, which comprises a bank of vector reshapers 48D' ... 48DN' and a matrix inverter 49D (not shown but similar to those in Figure 10). The resulting constraint matrix C0 comprising the column vectors yl .., yNr is supplied, together with the corresponding inverse matrix Q~, to n-1' '-n-1 each of the receiver modules in set D. Again, only receiver module 21Dd is shown, and corresponds to that in the embodiment of Figure 13. Each of the vectors P ... ~I represents an estimate of the interference caused by the n-1 n-1' corresponding one of the strong interference signals from set I and has the same dimension as the reshaped observation vector y n-i In this ISR-R mode, the interference subspace is characterized by normalized estimates of the interference vectors y` , Consequently, it spans their individual n realizations with all possible values of the total received powers (0n)2. The constraint matrix is defined by NI null-constraints (i.e., N,=NI) as:
~ n~ Cn = ~ ,..., ~l , (49) ~~-n ~~ ~~ n ~~
where each estimate y` is reconstructed by reshaping the following matrix:
n Yn = Hn bn C,` (50) It should be noted that, in the reconstruction of y` , the total amplitude of the n i-th interferer ~n (see Figure 15) has been omitted intentionally; hence the higher robustness expected to near-far situations as well as the enlarged margin for power control relaxation.
Interference Subspace Rejection over Diversity (ISR-D) The ISR-D receiver shown in Figure 16 is predicated upon the fact that the signal from a particular user will be received by each antenna element via a plurality of sub-paths. Applying the concepts and terminology of so-called RAKE receivers, each sub-path is termed a "finger". In the embodiments of Figures 9, 11, 13 and 15, the channel identification units estimate the parameters for each finger as an intermediate step to estimating the parameters of the whole channel. In the ISR-D receiver shown in Figure 16, the channel identification units 28E'...28E" supply the whole channel estimates Hl HNI respectively, to the beamformers 27'...27N', respectively, as before.
In R n addition, they supply the sets of channel parameter estimates Y{n NI of each individual sub-channel or finger to the constraints-set generator 42E. The set of channel parameter estimates y{' comprises the sub-channel estimates g' H''Nj, The n n~"' ~ n constraints-set generator 42E is similar to that shown in Figure 15 in that it comprises a bank of respreaders 571 ...57" but differs in that the channel replication units 59D'...59DN' are replaced by sub-channel replication units 59E1 ...59EN', respectively.
The sub-channel replication units 59E'...59EN' convolve the respread symbols with the sub-channel estimates H1 1 H1'N; ;H^'I,1 ,gNr'D1f respectively, to produce n n n , n normalized estimates yl,l y1n'; ;y'''rl, of the sub-channel-specific n-i n-1 n-1 n-1 observation matrices decomposed over fingers. Hence, the matrices span the space of their realizations with all possible values of the total received powers (~n)2 and complex channel coefficients ~'fn, The estimates are supplied to a constraint matrix generator 43E which generally is as shown in Figure 10 and produces the constraint matrix accordingly.
The constraint matrix Cn is simply defined by NflVl null-constraints (i.e., N, _ NfxNI=MxPxN1)as:
~,l,l 1 ~,],Nf .~VI,1 ~iV/Nf C' -~n -n I-~ -n ]-= -n (51) I
n FIVII 71r, ~~ ~'1 IrFl, Eac h estimate yf is reconstructed by reshaping the following matrix:
n Ynf = Cl n bn Cl~. (52) It should be noted that, in the reconstruction of the total amplitude of the i-th interferer ~a as well as the channel coefficients f~ (see Figure 1) are intentionally omitted; hence the relative robustness of ISR-D to power mismatch, like ISR-R. Unlike other modes, it additionally gains robustness to channel identification errors and remains sensitive only to the estimated channel parameters remaining, namely the multipath time-delays, and to symbol estimation errors.
It should be noted that, in the receivers of Figures 13, 15 and 16, estimation errors of the interference bit signs may introduce differences between the estimated constraints and the theoretical ones. Hence, although ISR-D, ISR-R and ISR-TR
modes are satisfactory in most situations, it is possible that the realisation could be erroneous, which would affect the validity of the interference cancellation.
Additionally, estimation of the signs of the interference bits for reconstruction in the ISR-D mode, as in the ISR-R and ISR-TR modes, requires that the processing of all of the low-power users be further delayed by one bit duration, i.e., by delay 45, and one processing cycle (pc).
To avoid these drawbacks, alternative ISR approaches to implementation of the constraints of Equation (42) are envisaged and will now be described, beginning with ISR-H which avoids processing delays and is completely robust to data estimation errors.
Interference Subspace Rejection over HYpotheses (ISR-H) It is possible to use a set of signals which represent all possible or hypothetical values for the data of the interfering signal. Each of the interfering signals constitutes a vector in a particular domain. It is possible to predict all possible occurrences for the 5 vectors and process all of them in the ISR beamformer and, therefore, virtually guarantee that the real or actual vector will have been nullified. As mentioned, the strong interferers are relatively few, so it is possible, in a practical system, to determine all of the likely positions of the interference vector and compensate or nullify all of them.
Such an alternative embodiment, termed Interference Subspace Rejection over 10 Hypotheses (ISR-H) because it uses all possibilities for the realisations, is illustrated in Figure 17.
The components of the "interferer" receiver modules of set I, namely the despreaders 19'...19" and STAR units 20'...20N', are basically the same as those in the receiver of Figure 15 and so have the same reference numbers. In the embodiment of 15 Figure 17, however, the constraints-set generator 42F differs because the symbol estimates b' .,, b` from the outputs of the decision rule units 29'. ..29N' are not supplied n n to the respreaders 57F...57FN', respectively, but are merely outputted to other circuitry in the receiver (not shown).
Instead, bit sequence generators 63F...63FN' each generate the three 20 possibilities g~, g2 n, g3 which cover all possible estimated values of the previous, current and next bits of the estimated data sequences n..,bn including the realisation itself (as explained later), and supply them to the respreaders 57F'...57FN', respectively, which each spread each set of three values again by the corresponding one of the spreading codes. The resulting re-spread estimates are filtered by the channel replication filters 25 59F...59FN', respectively, to produce, as the constraint set, the matrix estimates ^1 " "1 Y ~,NI YNI YNI The bit sequence generators could, of course, be on, Y._1~, Y+1~; ... 10n _1,n, +1,n*
replaced by storage units.
The constraint matrix generator 43F is generally as shown in Figure 10 and processes the set of estimate matrices to form the column vectors 30 yl , y , yl ;... ;~`'r, krvl , yN' of constraint matrix Cn, which it supplies with -O,n --1,n -+1,n -O,n 1,n -+1,rt corresponding inverse matrix Q,,, in common to the beamformer 47Fd and the beamformers of the other set D receiver modules.
Receiver module 21Fd comprises similar components to those of the receiver module 21E`' shown in Figure 16. It should be noted, however, that, because the "next"
bit is being hypothesized, it need not be known, so the delay 45 is omitted.
As mentioned above, the two bits adjacent to the processed bit of the i-th interferer contribute in each bit frame to the corresponding interference vector (symbol) to be rejected. As shown in Figure 18, enumeration of all possible sequences of the processed and adjacent bits gives 23 = 8 triplets, each of three bits. Only one of these triplets could occur at any one time at each bit iteration as one possible realization that generates the user-specific observation matrix yn, These eight triplets can be identified within a sign ambiguity with one of the four triplets identified as (a)... (d) in the left-hand part of Figure 18, since the four triplets (e)... (h) are their opposites.
It should be appreciated that the bit sequence generators 63'...63N1 (Figure 17) each supply only three values, gl , g2, g3 because the dimension of the generated signal n n n subspace is 3. It should be noted that frames of duration 3T, taken from these sequences at any bit rate instant, reproduce the eight possible realisations of the bit triplets of Figure 18. Therefore, at any bit iteration, the bit sequence bn of the interfering mobile station can be locally identified as the summation of the generating sequences g~, k = 1,..., 3 weighted by the bit signs bn-1, bõ and b,;,l. Replacing the estimate in Equation (50) by gn, k 1,..., 3, , yields canonic observation matrices that span all possible realisations of the received signal vector from the i-th interfering mobile within a sign ambiguity.
In the ISR-H embodiment of Figure 17, the interference subspace is characterized by normalized estimates of the canonic interference vectors y` . Accordingly, it spans k,n their individual realizations with all possible values of the total received powers (0n)2 and bit triplets [b1, bn ,bn+lThe constraint matrix is defined by null-constraints (i.e., N,. = 3NI) as:
2 l" I" l" ~ 2" 1 1" 1 C = O'n --l,n -+l.n -p,n --l,n -+l,n (53) n > > >..., ~ , ~ ' M ~,n (lIl~l,nll II~nII Il~l.nll 30 where each estimate is reconstructed, respectively, for k = -1, 0, + 1 by reshaping k,n the following matrix:
(54) Yk n= Fln gn'- c,`.
It should also be noted that, in the reconstruction above, only the channel estimates (assumed stationary over the adjacent symbols) are needed for complete interference rejection regardless of any 2D modulation employed (see Figure 19); hence the extreme robustness expected to power control and bit/symbol errors of interferers.
The ISR-H combiner coefficients are symbol-independent and can be computed less frequently when the channel time-variations are slow.
Merging of the D mode with the H mode along the decomposition of Equation (38) yields ISR-HD (hypothesized diversities) with a very close form to the decorrelator.
This ISR-HD mode requires a relatively huge number of constraints (i. e. , 3Nf NI).
Consequently, the ISR-HD mode is not considered to be practical at this time.
In fact, it wotild be desirable to reduce the number of constraints required by the ISR-H receiver described above. This can be done using an intermediate mode which is illustrated in Figure 20 and in which the receiver modules of both sets I
and D are similar to those of Figure 15; most of their components are identical and have the same reference numbers. In essence, the constraint-set generator 42G of the receiver in Figure combines the constraint-set generators of Figures 15 and 17 in that it uses estimated symbols and hypothetical values. Thus, it comprises a bank of respreaders 57G'...57G", a corresponding bank of channel replication units 59G'...59GN` and a bank of bit symbol generators 63G'...63G". In this case, however, each of the bit symbol generators 20 63G'...6GEN' supplies only one bit symbol to the corresponding one of the respreaders 57G'...57GN', which receive actual bit symbol estimates bn ... b n', respectively, from the decision rule units 29...... 29', respectively. It should be appreciated that, although the bit symbol generators 63G...... 63GN' each supply only one bit symbol for every actual symbol or realization from the corresponding one of the decision rule units 29',...,29"', that is sufficient to generate two hypothetical values of "future" symbols gri+l ,===, bn i for every one of the symbol estimates gn+l bn'1 since only two hypothetical values of the symbols, namely 1 and -1, are required. The respreaders 57G...... 57GN' supply the spread triplets to the channel replication units 59G'...59GNI
which filter them, using the channel parameter estimates Hl =.. g"", respectively, to n rt produce pairs of matrices yr,n, y+l n, .., yNn', yN ~ and supply them to the constraint matrix generator 43G which is configured generally as shown in Figure 9. The constraint matrix generator 43G reshapes the matrices y1 y+l n; yNn, yN,n to form vectors y' yl y~" y"'' which then are used as the column vectors of the constraint r n~ -+1n~ rn~ -+1n matrix Cn. The constraint matrix generator 43G supplies the constraint matrix Cn and the corresponding inverse matrix Q,t in common to the beamformer 47Ga and the beamformers of other receiver modules in set D.
Hence, the beamformer 47Gd uses the past symbol estimate bn_1 of the interference data as well as the present one bn (delayed by one processing cycle, i. e.
the time taken to derive the interference estimates), and the unknown sign of bn+l reduces the number of possible bit triplets and the corresponding realisations for each interference vector to 2.
The receiver of Figure 20, using what is conveniently referred to as ISR-RH
mode for reduced hypotheses over the next interference bits, rejects reduced possibilities of the interference vector realisations. Compared to the receiver of Figure 17 which uses the ISR-H mode, it is more sensitive to data estimation errors over bn-1 and brs and requires only 2 constraints per interferer instead of 3.
Using the previous and current bit estimates of interferers, uncertainty over the interference subspace can be reduced and it can be characterized by the following matrix of 2NI null-constraints (i.e., N, = 2NI):
I I I" 1 r!
C, = r,n -+1,n r,n -+1,n (55) where: n Il~,nll' Il~l,nll' ' II r,nll' II-+1,nll ' b` Y` + b` ~ (56) r,n n-On n 1--1,n' and where each estimate is reconstructed by reshaping the matrices in Equation k,n (38), respectively for k=-1,0,+1. It should be noted that this mode requires a delay of one processing cycle for the estimation of the current interference bits.
The ISR-RH mode has the advantage of reducing the number of null-constraints as compared to the ISR-H mode. A larger number of null -constraints indeed increases complexity, particularly when performing the matrix inversion in Equation (43), and may also result in severe noise enhancement, especially when the processing gain L
is low.
As the number of strong interferes NI increases in a heavily loaded system, the number of null-constraints (2N1 and 3NI) approaches the observation dimension M x(2L -1) and the constraint-matrix may become degenerate. To reduce complexity, guarantee stability in the matrix inversion of Equation (43), and minimize noise enhancement, the constraint matrix Cn in Equations. (43) and (44) is replaced by the orthonormal interference subspace of rank K that spans its column vectors as follows:
Vn = VeC{Cn} _{V i,...,V k,...,V K} (57) In practice, V n can hardly reflect the real rank of C n . It corresponds to the subspace of reduced rank k with the highest interference energy to cancel. To further minimize noise enhancement, one can also increase the observation dimension M
x(2L -1), as will be described later as "X option", and so on.
It should be noted that each of the receivers of Figures 13, 15, 16, 17 and 20 could be modified to perform ISR "after despreading" of the observation vector Yn, in effect in much the same way that the generic "after despreading" receiver of Figure 11 differs from the generic "without despreading" receiver of Figure 9. Such modified receivers will now be described with reference to Figures 21 to 26.
Thus, in the ISR-TR receiver shown in Figure 21, which corresponds to that shown in Figure 13, the delay 45 delays the observation matrix Yn from the preprocessing unit 18 by 1 bit period and supplies the resulting delayed observation matrix Yn_,, in common, to each of the low-power user receiver modules in set D. Only one of these receiver modules, 21 H', is shown in Figure 21, since all are identical. The observation matrix Yn_, is despread by despreader 19a and the resulting post-correlation observation vector Zd is supplied to both the channel identification unit 28Hd and the n-1 beamformer 47H . The receiver modules of set I and the constraints-set generator 42C
are identical to those in the receiver shown in Figure 13, and supply the matrices Yl YNI to an adder 60 which adds them to form the total interference n-1 "' n-1 matrix I_1 which it supplies to each of the receiver modules in set D.
Receiver module 21Hd is similar to that shown in Figure 13 but has a second despreader 43Hd which uses the spreading code for user d to despread the total interference matrix In 1 to form the user-specific constraint matrix as a single column vector id This despreader 43Hd, in effect, constitutes a user-specific constraint PCM,n-1 matrix generator because the constraint matrix is a vector and an inverse matrix is not needed. Also, in this case, the channel identification unit 28Hd supplies the channel estimate Hd to the beamformer 47Hd.
-n-1 It should be noted that the despread data vector Zd is equal n-1 to Hd Sri + Id + Nd, where Hd is the channel response for user station 10d, Sri is n PCM,n n n the signal transmitted by the mobile station 10d of user d, and Id is the interference -PCM,n component present in the signal Zd as a result of interference from the signals from the n other user stations 10' in set I, where Id is as defined in Equation (14). The -PCM,n value s d is additional noise which might comprise, for example, the summation of PCM,n the interference from all of the other users on the system at that time, as well as thermal 5 noise. "Other users" means other than those covered by the channels in set I.
As before, the coefficients of the beamformer 47Hd are tuned according to Equations (16) to (18) and the constraint matrix is defined by a single null-constraint (i.e., N,=1) as:
NI
d F Id,i I -PCM,n ) 10 .d _ PCM,n _ i=1 (58) 1~PCM,n ~~ N' P,i -PCM,n where the estimate Id is obtained by despreading the matrix I(See Equations (47) -PCM,n n and (48)) with the spreading sequence of the desired low-power user.
15 Figure 22 shows a similar modification to the low-power (set D) receiver modules of the "without despreading" ISR-R receiver of Figure 15. In this case, the output of the constraint-set generator 42D, as before, comprises the matrices yn 1 yn'1 As before, only receiver module 21Jd is shown in Figure 22 and is identical to that shown in Figure 21 except that the second despreader 43Hd is replaced by a user-specific 20 constraint matrix generator 43Jd of the kind shown in Figure 12. The channel identification unit 28Jd again supplies the vector Ad to the beamformer 47Jd.
The n-1 bank of despreaders in the user-specific constraint matrix generator 43Ja despread the respective ones of the matrices Y. 1 yn'1 to form the vectors PJ which constitute the columns of the user-specific constraint PCM,n-1' -PCM,n-1 25 matrix C' cM,_1 and the matrix generator 46Gd produces the corresponding inverse matrix QpCM,n-1, Both of these matrices are supplied to the associated beamformer 47Jd which uses them and the channel estimate ftd 1 to adjust its coefficients that are used to weight the elements of the post-correlation observation vector Zd . As before, the -n-1 coefficients are adjusted according to Equations (16) to (18) and the constraint matrix is 30 defined by NI null-constraints (i.e., N,=N1) as:
;d,l id,Nl ~+d _ [PCM,n PCM,n (59) PCM,n ~t ,d ~~-PCM,n11 ~ ' ~~-PCM,n~~
where each estimate Id ` is obtained by despreading the matrix y` of Equation (50) -PCM,n n with the spreading sequence of the desired low-power user.
Figure 23 illustrates the modification applied to the low-power user receiver module of the ISR-D receiver of Figure 16. Hence, there is no common matrix inverter.
Instead, in the receiver of Figure 23, each of the receiver modules of set D
has a user-specific constraint matrix generator 43K which recevies the constraints from the constraints-set generator 42E. As illustrated, user-specific constraint matrix generator 43Kd processes the sets of matrices yn 1,,, yn'"1f , .., ; y,~-il ,~Ii'f to form the set of vectors j1 l wf = ~t~`'r,l PN 'f which constitute the columns of user--PCM,n-1 -PCM,n-1' -PCM,n-1' '-PCM,n-1' specific constraint matrix CPCM,n-1~ and the corresponding inverse matrix QPCM,n-1 which it supplies to the beamformer 47Kd. As before, the beamformer 47Kd tunes its coefficients according to equations (16) and (18). The constraint matrix is defined by N,,NI null-constraints (i. e. , N, = Nf X NI = M x P x NI) as:
d,1,1 id,1,Nl id,N1,1 l~d,M,NJ
j,d /-PCM,n -PCM,n -PCM,n -PCM,n (60) l. -PCM,n ^d 1 l I,1 PCM,I
I PCM n II III PCM,n II II I PCM,n where each estimate Id,'J is obtained by despreading Pf of Equation (52) with the PCM,n -n spreading sequence of the desired low-power user.
Figure 24 illustrates application of the modification to the ISR-H receiver of Figure 17. Again, the common constraint matrix generator (43F) is replaced by a user-specific constraint matrix generator 43L' in receiver module 21Ld and similarly in the other receiver modules of set D. The constraints-set generator 42L' differs from constraints-set generator 42F of Figure 17 because its bit sequence generators 63L...... 63LNI use different generating sequences. The sets of matrices y, n, y>,nl y3,n; =. ; yl ,,, y2 ~, ys ~ from the constraints-set generator 42F' are processed by the user-specific constraint matrix generator 43Ld to form the vectors P 1 ~,1 ~r,l= =~,~vr ~.^'r ~,n'' which constitute the columns of the user-specific l~, -2~ -3~> >_ln ~ 2,n ' 3,n constraint matrix CpCMn, and the matrix inverter (not shown) produces the corresponding inverse matrix QPCM,n. The constraint matrix CPCM,n and the inverse matrix QpCM,n are used by the beamformer 470, together with the channel estimate #d, to adjust its coefficients that are used to weight the elements of the post-n correlation observation vector Zd received from despreader 19a. As before, the n coefficients are adjusted according to Equations (16) and (18) and the constraint matrix is defined by 3N1 null-constraints (i. e. , N, = 3N1) as:
l,l ^ ,1,2 ^ ,I,3 ,Nl,l [;d,N1,2 ;d,N1,3 \
Cd _ PCM,n -PCM,n -PCM,n !-PCM,n -PCM,n !-PCM,n (61) PCM, n d 1 1 I 2 ' I 3 II' ' N1,1 ~I ' I) ^d N1,2 II ' II ^d N1,3 II ' 5 ~~~PCM,n~~ CM,nJJ~~tCM,n ~~CM,n ~PCM,n I ~PCM,n where each estimate Id,`,k is obtained by despreading the matrix y" `k n with the -PCM,n spreading sequence of the desired low-power user.
In this case, each of the bit sequence generators 63L...... 63LN' uses four generating bit sequences 9 1 (t), g 2(t), 9 3(t) and g 4(t) as shown in Figure 25.
It should be noted that, in any frame of duration 3T in Figure 25, a bit triplet of any of the four generating sequences is a linear combination of the others.
Therefore, any one of the four possible realisations of each interference vector is a linear combination of the others and the corresponding null-constraint is implicitly implemented by the three remaining null-constraints. The four null-constraints are restricted arbitrarily to the first three possible realisations.
Figure 26 illustrates application of the modification to the ISR-RH receiver of Figure 20. Again, the common constraint matrix generator 43G of Figure 20 is replaced by a set of user-specific constraint matrix generators, 43M' in receiver module 21Md and similarly in the other receiver modules of set D. The constraints-set generator 42M
shown in Figure 26 differs slightly from that (42G) shown in Figure 20 because each of the bit sequence generators 63M',...63M" in the receiver of Figure 26 generate the bit sequence g t.l^, n The user-specific constraint generator 43Md processes the pairs of constraint-set matrices ykl~, y~~; ...; yk ~, y"~ n from the channel identification units 59M...... 59MN', respectively, by to produce the corresponding set of vectors P, 1AI P l~ ..= f~1~`l f~1,"2 which constitute the columns of the user-specific PCM,n' PCM,n' ' PCM,n' -PCM,n constraint matrix CpCM,n.? and to produce the corresponding inverse matrix QPCM,n=
are used by the The constraint matrix Cd and the inverse matrix QP~Mn PCM,n beamformer 47Md, together with the channel estimate Hd, to adjust its coefficients that n are used to weight the elements of the post-correlation observation vector Zd received n from despreader 19 . As before, the coefficients are adjusted according to Equations (16) to (18) and the constraint matrix is defined by 2NI null-constraints (i.e., N, = 2NI) as follows:
id,l,k, l ;d,l,kz jd,Nl,k, ;d,Nl,ki d -PCM,n -PCM,n -PCM,n /-PCM,n (62) > >,d > ,.d l !
1~, CM ,n II `I PCM,n I` II -PCM n II II -PCM n II
where each pair of estimates Id ` k, and Id `,k2 is obtained by despreading the -PCM,n -PCM,n matrices yk n and yk n, respectively, with the spreading squence of the desired low-~
power user.
Inter-Symbol Interference (ISI) Rejection In any of the above-described embodiments of the invention it may be desirable to reduce inter-symbol interference in the receiver modules in set D, especially when low processing rates are involved. As noted in the PCM model where despreading reduces ISI to a negligible amount, for a large processing gain, yd" yd = 0 and yd _yd 0, Hence, the before despreading spatio-temporal -O,n--1,n -O,n +1,it beamformer yyd approximately implements the following additional constraints:
n Wd"~ - 0, n --l,n (63) Wd"Yd - 0.
-n -+l,n Accordingly, it rejects interference and significantly reduces ISI. Complete ISI
rejection can be effected by modifying the receiver to make the set of the channel parameter estimators available to the constraints-sets generator 42 for processing in parallel with those of the set I receiver modules. The resulting additional constraint matrix and inverse matrix would also be supplied to the beamformer 47d and taken into account when processing the data.
In such a case, the following matrix can be formed:
II Y II ~' d _ n l,n n -+l,n CISI,n ~ ~ ~ ~ ~ ~
II n- l,nll II n+l,nll (64) and the following 2 x 2 matrix /] (~' H 1 ( 7~ISI,n ~ Shn CSl,n 65) inverted to obtain the constrained spatio-temporal beamformer yyd before despreading n by:
iiSl,n - IM = (ZL-u - CS1,n Li I,n ~' Sl,n 1 AdH (66) (67) d d ~n - ~ISI,n ~n ' nd ,d Wd = n I-o,n (68) -n 1. ~,dH Hd kd -O,n n-O,n The projector IIn is produced in the manner described earlier according to Equations (43) and (44). The projector nn orthogonal to both C, In and C'n, is formed and then the low-power response vector yd projected and normalized to form the O,n beamformer which fully rejects ISI from the processed user d and interference from the NI users in set I.
It should be noted that, if the suppression of strong interferers is not needed, ISI
can still be rejected by the following beamformer:
d Wd _ H1SI,n--O n (V7Ln) -n [Xd x ~'nHISI,n-O,n where projector II n in equations 47 - 49 would be set to identity and hence would have no effect. This is the same as setting the matrix Cn to null matrix. If the projector ii~lSjn in the above equation is replaced by an identity matrix, (equivalent to setting matrix Csln to null matrix) then a simple MRC beamformer is implemented before despreading. A receiver module using such an MRC beamformer is illustrated in Figure 27 and could be used to replace any of the "contributor" only receiver modules, such as receiver modules 21', ..., 211' in Figure 9 et seq. The receiver module shown in Figure 27 is similar to receiver module 21Ad of Figure 9 except that the ISR beamformer 47A' is replaced by an MRC beamformer 27Nd which implements the equation yyd - ~ (70) n 11 i`` 112 o,n It is also envisaged that the receiver module of Figure 27 using the MRC
beamformer denoted Wd in the following, could be incorporated into a STAR
which MRC,n did not use ISR, for example the STAR described in reference [13].
5 Joint ISR Detection In the foregoing embodiments of the invention, ISR was applied to a selected set D of users, typically users with a low data-rate, who would implement ISR in respect of a selected set I of high-rate users. Although this approach is appropriate in most cases, particularly when the number of high-rate users is very low, there may be cases 10 where the mutual interference caused by other high-rate users is significant, in which case mutual ISR among high-rate users may be desired as well. Such a situation is represented by user sets M 1 and M2 of Figure 8. Hence, whereas in the foregoing embodiments of the invention, the receiver modules of set I do not perform ISR
but merely supply constraints sets for use by the receiver modules of set D, it is envisaged 15 that some or all of the receiver modules in set Ml and M2 also could have beamformers employing ISR. Such a Joint ISR (J-ISR) embodiment will now be described with reference to Figure 28, which shows only one receiver module, 21', as an example. In any symbol period, each such receiver module 21' (i) receives a constraint matrix Cn 1 and an inverse matrix Qn_I and uses them in suppressing interference, 20 including its own interference component, and (ii) contributes constraints to the constraint matrix n and inverse matrix Qn which will be used in the next symbol period. In the case of ISR-H mode receivers, which use hypothetical symbols, it is merely a matter of replacing the receiver modules in set I with receiver modules 21d having ISR beamformers, since the constraints sets are generated by the hypothetical 25 symbols from the bit sequence generators 63...... 63N'. Contrary to other ISR modes which require decision-feedback, in the ISR-H mode receiver module, no processing delay is required for one user to cancel another. Hence, ISR-H can be implemented to cancel strong interferers without successive interference cancellation or multi-stage processing, which will be described later.
30 Using Cn and Qn already computed, the ISR combiner for each interferer can be obtained readily by:
~
Wn = CnQn R3 . (i_,) +, 9 71 where Rk =[0, ..., 0, 1, 0, ..., 0]T is a(3NI)-dimensional vector with null components except for the k-th one. This implementation has the advantage of implicitly rejecting ISI among strong interferers with a single 3N1 x 3NI-matrix inversion.
For the ISR-TR, ISR-R and ISR-D modes, each receiver module, in effect, combines a receiver module of set I with a receiver module of set D, some components being omitted as redundant. Referring again to Figure 28, which shows such a combined receiver module, the preprocessor 18 supplies the observation matrix Y,, to a 1-bit delay 45 and a first vector reshaper 44/1, which reshapes the observation matrix Y,, to form the observation vector L. A second vector reshaper 44/2 reshapes the delayed observation matrix Yõ_, to form delayed observation vector Y_,. These matrices and vectors are supplied to the receiver module 21 P' and to others of the receiver modules, together with the constraint matrix Cn_1 and the inverse matrix Q,_I from a common constraint matrix generator 43P, which generates the constraint matrix Cõ_, and the inverse matrix Q,_, from the constraints-set Cn_I produced by constraint set generator 42P.
The receiver module 21 P' comprises a despreader 19', a channel identification unit 28P', a power estimation unit 30P', and a decision rule unit 29P', all similar to those of the above-described receiver modules. In this case, however, the receiver module 21P' comprises two beamformers, one an ISR beamformer 47P' and the other an MRC
beamformer 27P', and an additional decision rule unit 29P/2' which is connected to the output of MRC beamformer 27P'. The ISR beamformer 47P' processes the delayed observation vector Y to form the estimated signal component estimate sn_1 and supplies it to the first decision rule unit 29P', the power estimation unit 30P', and the channel identification unit 28P', in the usual way. The decision rule unit 29P' and the power estimation unit 30P' operate upon the signal component estimate sn to derive the corresponding symbol estimate gn_1 and the power estimate and supply them to other parts of the receiver in the usual way.
The despreader 19' despreads the delayed observation matrix Yn_, to form the post-correlation observation vector Zn 1 and supplies it to only the channel identification unit 28P', which uses the post-correlation observation vector Zi and the signal component n-i estimate to produce both a spread channel estimate and a set of channel parameter o,n-1 estimates At the beginning of the processing cycle, the channel identification unit 28P' supplies the spread channel estimate y` to both the ISR beamformer 47P' and O,n-1 ~....a..m.w......,.W.~..w..~.,,~..._...._ _.......m~,,..~.~~..,.~~..~.____...___ _ the MRC beamformer 27P' for use in updating their coefficients, and supplies the set of channel parameter estimates to the constraints-set generator 42P.
The MRC beamformer 27P' processes the current observation vector Y to produce a"future" signal component estimate sMRC,n for use by the second decision rule unit 29P/2' to produce the "future" symbol estimate MRC,W which it supplies to the constraints-set generator 42P at the beginning of the processing cycle. The constraints-set generator 42P also receives the symbol estimate bn 1 from the decision rule unit 29', but at the end of the processing cycle. The constraints-set generator 42P
buffers the symbol BMRd,n from the decision rule unit 29P/2' and the symbol estimate f ~ 1 from the decision rule unit 29P' at the end of the processing cycle. Consequently, in a particular symbol period n-1, when the constraints-set generator 42P is computing the constraints-set Cn-1 it has available the set of channel parameter estimates J<_,, the "future" symbol estimate b` the "present" symbol estimate b` and the "past"
MRC,W MRC,n-1 symbol estimate bn 2, the latter two from its buffer.
Each of the other receiver modules in the "joint ISR" set supplies its equivalents of these signals to the constraints-set generator 42P. The constraints-set generator 42P
processes them all to form the constraints set ccrt-1 and supplies the same to the constraint matrix generator 42P, which generates the constraint matrix C n and the inverse matrix a and supplies them to the various receiver modules.
The constraints-set generator 42P and the constraint matrix generator 43P will be constructed and operate generally in the same manner as the constraints-set generator 43 and constraint matrix generator 42 of the embodiments of the invention described hereinbefore with reference to Figures 9 to 27. Hence, they will differ according to the ISR mode being implemented.
When the constraints-set generator 42P of the receiver of Figure 28 is configured for the ISR-D mode, i.e. like the constraints-set generator shown in Figure 16, the constraint matrix Cn supplied to the ISR beamformer 47P' contains enough information for the beamformer 47P' to estimate the channel parameters itself. Hence, it forwards these estimates to the channel identification unit 28P' for use in improving the channel parameter estimation and the set of channel estimates produced thereby.
An ISR-RH receiver module will use a similar structure, except that the one-bit delay 45 will be omitted and the constraints-set generator 42P will use the previous symbol, estimate bn_,, the current MRC symbol estimate bMRC.n and the two hypothetical values for "future" symbol b~+l to produce current symbol estimate bn, Modification of the receiver module shown in Figure 28 to implement such a "ISR-RH
mode" will be straightforward for a skilled person and so will not be described hereafter.
In order to implement J-ISR, a more general formulation of the constraint matrix is required. The general ISR constraint matrix counting N, constraints, is as follows:
' N` (72) C= C'1 c C
n II Cn l I~ ,..., II C~ II '..., II Cn N II
where thej-th constraint C is given by:
-n,~
(73) n j k,n (u fk)E5.
where S; defines a subset of diversities which form the j-th constraint when summed.
As shown in Table 2, the sets Sj, j = 1, ===, N, are assumed to satisfy the following restrictions:
S = S1US2U...USN={(u,f,k)I uNl;f=1,=-=,N~ k=-1,0,+1}, and S1nS2n...nSN = 0 0 being the empty set. Table 1 defines the sets S;, j=1, ===, N, for all presented ISR
modes of operation.
The objective signal belongs to the total interference subspace as defined by the span of the common constraint matrix C n . Therefore, to avoid signal cancellation of the desired user d by the projection:
nd d H n - IM * (2L-1) - ~nQnCn , (74) the desired-signal blocking matrix Cd is introduced, as given by:
n ~'d = "''1 ni n'~` !75) n nj ~i A
where:
s ~ Yn , (76) nj k,n (a,f,k)ES.AS
with Sd ={(u,f,k) I u = d; f = 1, ..., N; k = 0}. Normally Sd is a small subset of S
and Cd is very close to C, n n Joint multi-user data estimation and channel gain estimation in ISR-D
Neglecting the signal contributions from the weak-power low-rate users, and limiting to the signals of the NI interferers, yi can be formulated as:
n NI n'i y = E WnJf,nn + Npth (77) i=1 f=1 1j-~ ~/~ NIj~ I =,' Nj~ T A
p = ~'n I~nJl.n~ ~ ~nJNfn~... `Yn Jl,n~ ...'Yn JNn, + ~ (78) = C r + (79) n-n. n where r is a NfNI x 1 vector which aligns channel coefficients from all fingers over n all users. Estimation of r' may be regarded as a multi-source problem:
n Pn = QnCn y . (80) This constitutes one step of ISR-D operations and allows joint multi-user channel identification.
Multi-stage processing may be used in combination with those of the above-described embodiments which use the above-described joint ISR, i.e. all except the receivers implementing ISR-H mode. It should be appreciated that, in each of the receivers which use decision-feedback modes of ISR (TR,R,D,RH), coarse MRC
symbol estimates are used in order to reconstruct signals for the ISR operation.
Because they are based upon signals which include the interference to be suppressed, the MRC
estimates are less reliable than ISR estimates, causing worse reconstruction errors.
Better results can be obtained by using multi-stage processing and, in successive stages other than the first, using improved ISR estimates to reconstruct and perform the ISR
operation again.
Operation of a multi-stage processing receiver module which would perform several iterations to generate a particular symbol estimate is illustrated in Figure 29, which depicts the same components, namely constraint-sets generator 42P, constraint matrix generator 43P, ISR beamformer 47P' and decision rule unit 29P/1', MRC
5 beamformer 27P' and decision rule unit 29P/2', in several successive symbol periods, representing iterations 1, 2,...,NS of frame n which targets the symbol estimate 6 n _1 for user station 10'. Iteration 1, if alone, would represent the operation of the receiver module 21' of Figure 28 in which the constraints-set generator 42P uses the coarse symbol estimates g`RCn-1 previously received from the second decision rule unit 29P/2' M
10 (and others as applicable) and buffered. In each iteration within the frame, the other variables used by the constraints-set generator 42P remain the same. These variables comprise, from at least each "contributor" receiver module in the same joint processing set, the previous symbol estimate 6 n_2, the set of channel parameters and the current MRC symbol estimate LMRCn, Likewise, the spread channel estimate and o,n-1 15 the delayed observation vector Y_, used by the ISR beamformer 47P' will remain the same.
In iteration 1, the constraint matrix generator 42P generates constraint matrix C_1(1) and the inverse matrix Qõ_,(1) and supplies them to the beamformer 47P' which uses them, and the spread channel estimate y' to tune its coefficients for o,n-1 20 weighting each element of the delayed observation vector Y_,, as previously described, to produce a signal component estimate which the decision rule unit 29P/ 1' processes to produce the symbol estimate 6 n_1(1) at iteration 1, which would be the same as that generated by the receiver of Figure 28. This symbol estimate bn_1(j) is more accurate than the initial coarse MRC estimate bMRC,n i(0) so it is used in iteration 2 as the input 25 to the constraints-set generator 42P', i.e., instead of the estimate coarse MRC
beamformer 27P' estimate. As a result, in iteration 2, the constraint matrix generator 42P produces a more accurate constraint matrix Cn_1(2) and inverse matrix a_I
(2).
Using these improved matrices, the ISR beamformer 47P' is tuned more accurately, and so produces a more accurate symbol estimate gn_1(2) in iteration 2. This improved symbol estimate is used in iteration 3, and this iterative process is repeated for a total of NS iterations. Iteration NS will use the symbol estimate b;~_1(N -1) produced by the preceding iteration and will itself produce a symbol estimate bn 1(NS) which is the target symbol estimate of frame n and hence is outputted as symbol estimate fn 1 This symbol estimate bn 1 will be buffered and used by the constraints-set generator 42P in every iteration of the next frame (n+1) instead of symbol estimate 6 n_2. Other variables will be incremented appropriately and, in iteration 1 of frame n+], a new coarse MRC beamformer 27P' symbol estimate bMRC,n+I will be used by the constraints-set generator 42P. The iterative process will then be repeated, upgrading the symbol estimate in each interation, as before.
It should be noted that, in Figure 29, the inputs to the channel identification unit 28P' use subscripts which reflect the fact that they are produced by a previous iteration.
These subscripts were not used in Figure 28 because it was not appropriate to show the transition between two cycles. The transition was clear, however, from the theoretical discussion.
One stage ISR operation can be generalized as follows:
Sn(l) = SMRC,n WMRC,n~n(I)yn(1)' Un(1) = Qn(1)6n(1)H~' (81) where Sn(1) is the ISR estimate from first ISR stage, SMRCn is the MRC signal estimate, and the constraint matrices 6n(1), 6n(1), and Qn(l) are formed from MRC
estimates at the first stage. Generalizing notation, the signal estimate at stage NS may be derived after the following iterations:
Sn(2) = SMRC,n - WMRC,n~n(2)Un(2), Un(2) - Qn(2)Cn(2)HY ~
(82) Sn(N) = SMRC,n - Wdx C n(N)U lNs~. U(N) - Qn(N9l..nlN)y~ , MRC,n n n n The multistage approach has a complexity cost; however, complexity can be reduced because many computations from one stage to the next are redundant.
For instance, the costly computation õo) could instead be tracked because u(j) -õ(j-1) if the number of symbol estimation errors does not change much from stage to stage, which can be expected in most situations.
In practice, the receiver of Figure 28 could be combined with one of the earlier embodiments to create a receiver for a "hierarchical" situation, i. e. , as described hereinbefore with reference to Figure 8, in which a first group of receiver modules, for the weakest signals, like those in set D of Figure 8, for example, are "recipients" only, i. e. , they do not contribute to the constraint matrix at all; a second group of receiver modules, for the strongest signals, like the receiver modules of set I in Figure 8, do not need to cancel interference and so are "contributors" only, i. e. , they only contribute constraints-sets to the constraint matrix used by other receiver modules; and a third set of receiver modules, for intermediate strength signals, like the receiver modules of sets M2 of Figure 8, are both "recipients" and "contributors", i.e. they both use the constraint matrix from the set I receiver modules to cancel interference from the strongest signals and contribute to the constraint matrix that is used by the set D receiver modules. Generally, this approach is referred to as "Group ISR" (G-ISR) and the equations for the constraint matrices and inverse matrices comprising the set K C C used by the ISR beamformers in the different n { AOutset,n ~ QOutset,n ~ Inset,O Qlnset,n receivers are as follows:
(83) " ' QOutset,n ~COuset,n~Outset,n~ 9 H HOutset,n IM * (2L-1) - COutset,nQOulset,nCOutset,n~ (84) Clnset,n 11Outset,ncInset,n, (85) d" 1 86 (?Inset,n ~CInset,Slnset,n) ( ) d = /rd H 87 HInset,n - IM * (2L-1) - ~"lnset,nQlnset,nelnset,n1 ( ) d d n (88) ~n ~Inset,nOutset,n d^
Wd = ~~'n = Ild X -o,n . (89) ~,d n ~ ,d -n ~,d x, d2 2 jld:,d I"_O,n n'_o,n n n 1"-O,n It should be noted that normalization of the columns of Clnset,n and Couuet,n is implicit.
A receiver module for set D will set IIInset in Equation (88) to identity which means that only "outset" interference will be cancelled. Otherwise, the processing will be as described for other receivers of set D.
A receiver in set M1 does not need to cancel "outset" interference, but does need to cancel "inset" interference. Consequently, it will set IIouUet in Equation (88) to identity so that only inset interference will be cancelled. This corresponds to the joint ISR embodiment described with reference to Figure 28.
Finally, a receiver in set I does not need to cancel any interference.
Consequently, it will set both IIrnset and IIouftet to identity, which means that nothing will be cancelled. This corresponds to the group I receiver modules 21'...21"I
described with reference to Figures 9, 11, 13, 15-17, 20-24 and 26.
Successive versus Parallel Detection Although the embodiments of ISR receivers described hereinbefore use a parallel implementation, ISR may also be implemented in a successive manner, denoted S-ISR, as illustrated in Figure 30. Assuming implementation of successive ISR among NI
interferers, U users, and assuming without loss of generality that are sorted in order of decreasing strength such that user 1 is the strongest and user NI is the weakest user, when processing user i in S-ISR, the ISR estimate can be computed as:
Sn = SMRCn - WMRC,n~>nUn(Z) Un(Z) = Qn Cin ~~ (90) where Ci n spans only the subspace of users 1, -==, i-1 Z, Qn is the corresponding inverse and where C` is the user specific constraint matrix. Clearly, C` is no longer yn t,n common for all users, which entails expensive matrix inversion for each user.
However, with ISR-TR this inversion is avoided, since C"ff CI is a scalar, and S-ISR-TR
is a good alternative to its parallel counterpart, ISR-TR. Other ISR modes may take advantage of the conimon elements of Cd . n from one processing cycle to the next using matrix inversion by partitioning.
It should also be appreciated that the different ISR modes may be mixed, conveniently chosen according to the characteristics of their signals or transmission channels, or data rates, resulting hybrid ISR implementations (H-ISR). For example, referring to Figure 8, the sets I, M 1 and M2 might use the different modes ISR-H, ISR-D and ISR-TR, respectively, and the receiver modules in set D would use the different modes to cancel the "outset" interference from those three sets. Of course, alternatively or additionally, different modes might be used within any one of the sets.
In all of the above-described embodiments of the invention, the channel identification units 28d in the ISR receiver modules use the post-correlation observation vector Zn to generate the spread channel estimate ~ -n (by spreading H ).
Unfortunately, the interference present in the observation matrix Yn is still present in the Z And also user i if ISR rejection is desired.
post-correlation observation vector Zi (see Equation (14)) and, even though it is n reduced in power by despreading, it detracts from the accuracy of the spread channel estimate yd , As has been discussed hereinbefore, specifically with reference to -o,n Equations (83) to (89), the ISR beamformer 47d effectively constitutes a 5 projector ~ lid and a tuning and combining portion '-0n I`HW- I`
,d 10 which, in effect, comprises a residual MRC beamformer Ed = o,n n IIf' IIZ
,n Figure 31 illustrates a modification, applicable to all embodiments of the invention described herein including those described hereafter, which exploits this relationship to improve the spread channel estimate yd (or unspread channel estimate Hd) by using ~,n -n 15 the projector IIn to suppress the interference component from the observation vector Y.
In the receiver module of Figure 31, the ISR beamformer 47Qd is shown as comprising a projector 100d and a residual MRC beamformer portion 27Qd. The projector 100d multiplies the projection ~ jid by the observation vector , to produce the "cleaned"
observation vector yIId and supplies it to the residual MRC beamformer 27Qd, which n 20 effectively comprises a tuner and combiner to process the "cleaned"
observation vector yn,d and produce the signal component estimate sn from which decision rule n unit 29Qa derives the symbol estimate bn d in the usual way.
The "cleaned" observation vector ylLd is reshaped by matrix reshaper 102Qd to n form "cleaned" observation matrix yII d which despreader 19d despreads to form the "cleaned" post-correlation observation vector ZII,d for application to the channel n identification unit 28Qd for use in deriving the spread channel estimate yd , The new "cleaned" vector resulting from the projection of the observation vector y by nn is defined as follows:
n Y",d = Ildy = IId y" + N (IId yd )S d +(IIdN ) = Y ,dS d + Nn,d. (91) _n '~n n _n -n n~n n n-n _O,n -n uE (1,...,N/)U{d}
The new observation vector is free from the interferers and ISI and contains a projected version of the channel vector yn,d. Without being a condition, it is reasonable -O,n to assume that the projector nn is almost orthogonal to the channel vector, especially in high processing gain situations and/or in the presence of few interferers, and therefore consider that yn,d _ yd , When despreader 19a despreads yr-,d with the spreading -O,n -O,n n sequence of the desired user d, it produces an interference-free projected post-correlation observation vector zfl,n which the channel identification unit 28Qd uses to create the n channel estimate n ` to use in updating the coefficients of the residual MRC
beamformer portion 27Qd.
With respect to the new observation vectors yn,d and _7fl,n, before and after -n -n despreading, respectively, the ISR and DFI steps in STAR are modified as follows:
FT1,d i,d Wd = 2~" O,n c I-"0'n (92) -n II `~Idll2 I +~dl 10,n -O,n n-O,n sn = Real{Wd" -Yn R=d}, (93) n tY = Hd + (~T'd - l7 gIs~. (94) -n+ n n n The equivalence between the two expressions of the beamformer coefficients in Equation (92) due to the nilpotent property of projections should be noted. In more adverse near-far situations, the modification illustrated in Figure 31 allows more reliable channel identification than simple DFI and hence increases near-far resistance. If necessary, this new DFI version will be termed II-DFI. It is expected to be suitable for situations where the interferers are moderately strong and when the null constraints cover them all. For simplicity of discussion, projection of the observation will become implicit without reference to yd n~ Znn or to the corresponding modifications in STAR-ISR
operations.
Expanding Dimensionality (X-option) When the number of users becomes high compared to the processing gain, the dimension of the interference subspace becomes comparable to the total dimension (M(2L
-1)). The penalty paid is an often devastating enhancement of the white noise.
Unlike ISR-TR, which always requires a single constraint, other DF modes, namely ISR-R and ISR-D, may suffer a large degradation because the number of constraints these modes require easily becomes comparable to the total dimension available. However, the dimension may be increased by using additional data in the observation. This option also allows for complete asynchronous transmission and for the application of ISR
to Mixed Spreading Factor (MSF) systems.
The matched-filtering observation vector Y is generated to include additional past spread data which has already been processed. If the model is expanded to include past processed NX symbols and arrive at a total temporal dimension N,. =(NX+1)L-1, the observation becomes:
y N )u f Apth N
-n NX+1 U -n NY+1 n-NX+1 U f Y + Y"f + 1rh (95) n =n =n Y u_1 f_1 mth u_1 f1 _n _n _n where double underlining stresses the extended model. It should be noted that yuf is -i overlapping temporally ynJ and only the first ML samples of the past frames n-1, n-2, Jf1 etc. are used; however the same syntax is used for simplicity of notation.
As an example, application of the X option to ISR-D, referred to as ISR-DX, requires the following constraint matrix:
- 2cn cn 2=n _n Cn (96) - `,~
II l 1 II ~...~ II I,Nfll ~...~ II 1 11 1 1 NjII
-n -n -n -n The extended vectors in Equation (96) have been treated in the same way as those in Equation (95), i.e., by concatenating reconstructed vectors from consecutive symbols in the extended frame and by implicitly discarding overlapping dimensions in the concatenated vectors. Clearly, extension of the observation space leaves additional degrees of freedom and results in less white noise enhancement. However, it may exact a penalty in the presence of reconstruction errors.
Although the X-option was illustrated in the case of ISR-D, its application to the remaining DF modes is straightforward. It should also be noted that the X-option allows for processing of more than one symbol at each frame while still requiring one matrix inversion only. The duration of the frame, however, should be small compared to the variations of the channel.
In the above-described embodiments, ISR was applied to a quasi-synchronous system where all temporal delays were limited to 0 < T< L. Although this model reflects well the large processing gain situation, where the limit (L - oo), allows for placing a frame of duration 2L - I chips which fully cover one bit of all users, including delay spreads. With realistic processing gains, and in particular in the low processing gain situation, this model tends to approach a synchronous scenario. Using the X-option serves as a method supporting complete asynchronous transmission.
Referring to Figure 32, assuming that the users of the system have processing gain L as usual, the transmitted signal of any user is cyclo-stationary and a possible time-delay of the primary path Tl is therefore 0 < T, < L where possible time delays of remaining paths are T, < r2 < ... < L + OT where OT is the largest possible delay spread considered. To ensure that the frame covers at least one bit of all users, the frame must at least span L + OT in the despread domain and therefore 2L + OT
in the spread domain. The observation should be extended slightly beyond that to ease interpolation near the edges of the frame.
Multi-Modulation (MM), Multi-Code (MC), and Mixed Spreading Factor (MSF) are technologies that potentially can offer mixed-rate traffic in wideband CDMA. MSF, which has become very timely, was shown to outperform MC in terms of performance and complexity and is also proposed by UMTS 3 third generation mobile system as the mixed-rate scenario. Application of ISR to MSF as the mixed rate scenario considered herein will now be discussed.
In MSF, mixed rate traffic is obtained by assigning different processing gains while using the same carrier and chip-rate. In a system counting two groups of users, a low-rate (LR) and a high rate (HR) group, this means that every time a LR
rate user transmits 1 symbol, a HR user transmits 2r + 1 HR symbols, r = Li/L,, being the ratio of the LR processing gain to HR processing gain. This is illustrated in Figure 33 with r = 2.
Therefore, fitting the ISR frame subject to LR users or in general the lowest-rate users ensures that also at least r HR symbols are covered when HR and LR have the same delay spread. The ISR generalizes readily to this scenario regarding every HR user ._.. . . __~ ~ _~.....~~..~,~.,,~ M. Y .. . . .._ ....,~n~.....,..~.__.~..-..._.. _ _ as r LR users. In Figure 33, the grey shaded HR/LR bits symbolize the current bits to be estimated; whereas, former bits have already been estimated (ISR-bits) and future bits are unexplored. It should be noted that current HR bits should be chosen to lie at the end of the frame.
Multicode It is envisaged that a user station could use multiple codes, N,,, in number, each to transmit a different stream of symbols. Figure 34 illustrates this modification as applied to a"without despreading" receiver module 2 1 R d for receiving such a multicode 10 signal and using ISR cancellation to cancel interference from other users.
The receiver module shown in Figure 34 is similar to that shown in Figure 9 except that, instead of a single ISR beamformer 47d; the receiver module of Figure 34 has a bank of ISR
beamformers 47Rdj ... d " for extracting si nal com onent estimates s a,l dr''"
,47R g P n ,...,sn respectively, and supplying them to a bank of decision rule units 29Rd,',...,29Ra'NT, 15 respectively which produce a corresponding plurality of symbol estimates bn'1nN^'.
Likewise, the receiver module 21 Rd has a bank of despreaders 19d,1 '_õ '19d>^
m each of which uses a respective one of the multiple spreading codes of the corresponding user d to despread the observation matrix Yõ from the preprocessing unit 18 to produce a corresponding one of a multiplicity of post-correlation observation 20 vectors which are supplied to a common channel identification unit 28Rd.
n n It should be appreciated that the post-correlation observation vectors share the same channel characteristics, i. e. , of the channel 14d between user station 10d and the base station antenna array. Consequently, only one channel identification unit 28Rd is required, which essentially processes the plural signal component 25 estimates sn ~' ,,..,gn'N"' and the post-correlation observation vectors and, in essence, averages the results to produce a single channel estimate I~-'d representing the physical n channel 14d. The channel identification unit 28Rd has a bank of spreaders (not shown) which spread the channel estimate #d using the multiple spreading codes to create a set n of spread channel estimates yd=1 .,. ~~'^" which it supplies to the ISR
o~, ,---On , beamformers 47Rd ',...,47Rd,' T, respectively. Likewise, the power estimation unit 30Rd is adapted to receive plural signal component estimates sd,l d'^'. and essentially n ,...,Sn average their powers to produce the power estimate ,T, nd, While using all of the multiple codes advantageously gives a more accurate channel estimate, it requires many expensive despreading operations. In order to reduce the cost and complexity, the receiver module 21 Md may use only a subset of the spreading codes.
It can be demonstrated that the multiple spreading codes can be replaced by a single spreading code formed by multiplying each of the multiple spreading codes by the corresponding one of the symbol estimates 6n 1,...,6nN'^ and combining the results.
Figure 35 illustrates a receiver module which implements this variation. Thus, the receiver module 21R' shown in Figure 35 differs from that shown in Figure 34 in that the bank of despreaders 19d.1,.,.,19d,N are replaced by a single despreader 19d 1 which receives the symbol estimates f n ',,..,6n N'" and multiplies them by the multiple spreading codes to form a compound spreading code, which it then uses to despread the observation matrix Yõ and form a single post-correlation observation vector Zd,a, The n channel identification unit 28Rd does not receive the signal component estimates but instead receives the total amplitude ,n from the power estimation unit 30Rd.
This serves as a compound signal component estimate because the use of the compound code is equivalent to modulating a constant " 1" or a constant "-1 " with that code, as will be formulated by equation later. The channel identification unit 28Rd processes the single post-correlation observation vector Zd>a to produce a single channel estimate Hd and n n spreads it, as before, using the multiple spreading codes to form the multiple spread channel estimates ? 1 ... ~~'^~ for use by the beamformers 47Rd '...,47Rd N as before.
O,n' '-o,rz The theory of such multicode operation will now be developed. Assuming for simplicity that each user assigned the index u transmits Nstreams of DBPSK
data b",1(t), ,,,, b" N~(t), using Nn, spreading codes c" '(t), ..., c"'N-(t), each spread stream can be seen as a separate user among a total of U x Naccess channels, assigned the couple-index (u,l). The data model can then be written as follows:
u N +1 U N Nf +1 n n+k k,n n n n+k rt k,n n~
Yn ~~ub u'1 I'1 + NP~ ~ub u'1 '/~ ~lf + Np~ (97) u=1 1=1 k=-1 u=1 1=1 f=1 k=-1 where the canonic u-th user l-th code observation matrices yk,n,f from finger f are obtained by Equations (3) and (4) of with X(t) in Equaiton (3) replaced, respectively for k = -1,0, +1, by:
Xk'1 At) = Rm8(t -7p(t)) g1Rr(t)c " l(t). (98) In the equation above, R=[0, ...., 0, 1, 0, ..., 0J' is an M-dimensional vector with null components except for the m-th one and b(t) denotes the Dirac impulse.
Reshaping matrices into vectors yields:
U N +1 U N Nf +1 Y = E E E ~"b "'l + NPth = E E E E ~"b ",l y"'lJ + N ``` (99) n n n+k_k n n n n+k f n-k n n~
u=1 1=1 k=-1 u=1 1=1 f=1 k=-1 The particularity of the above multi-code model, where N. codes of each user share the same physical channel H" and the same total received power (On)2 should be n noted. Exploitation of these common features will be discussed hereinafter in relation to adapting of the power-control and the channel-identification procedures to the multi-code configuration. The ISR combining step will now be explained.
Considering first joint ISR combining among the group of N interferers, the regular ISR modes, namely TR, R, D, H and RH easily generalize to the new multi-code configuration of N,,,NI users instead of NI, as shown in Table 3. ISR
combining operations are carried out as usual using the constraint and blocking matrices Cn and &n ,1', respectively. It should be noted, however, that a further dimension of interference decomposition and rejection arises over the codes of each user, yielding two additional ISR modes. The new modes depicted in Table 3 and referred to as MCR and MCD (multi-code R and D) characterize interference from the entire set of codes of each user by its total realization or by the decomposition of this total realization over diversities, respectively. They combine the R and D modes, respectively, with the TR mode by summing the corresponding constraints over all the multi-codes of each user.
Although these modes partly implement TR over codes, they are still robust to power estimation errors. Indeed, the fact that the received power of a given user is a common parameter shared between all codes enables its elimination from the columns of the constrain matrices (see Table 3). The MCR and MCD modes inherit the advantages of the R and D modes, respectively. They relatively increase their sensitivity to data estimation errors compared to the original modes, since they accumulate symbol errors over codes. However, they reduce the number of constraints by N
For a desired user assigned the index d, the constraint matrix Cn is used to form the projector nn . The receiver of the data stream from a user-code assigned the couple-index (d,l) can simply reject the NI interfering multi-code users by steering a unit response to Pd1 ` and a null response to the constraint matrix with the p,n projector nn. It can further reject ISI by steering nulls to Pd,` and However, -l,n -+l,n the signals received from other multi-codes contribute to self-ISI. This interference, referred to here as MC-ISI, is implicity suppressed when receiving an interfering user.
It can be suppressed too when receiving the desired low-power user by joint ISR among _ ._..~ _.~.~....~...~._ .....,,~._~ .. ... ..w.,.. ......,~._~. ,~........_~ -.L. ._ __, , __ the codes of each mobile with any of the ISR modes. The multi-code constraint and blocking matrices CMC,n and CM~ n, respectively, as shown in Table 4 are formed, and derive the ISR beamformer coefficients for user-code (d,l) derived, as follows:
" 10 QMCn = (CMCnCMCn) 1 ( O) 1 1 d d"
~MC,n - IM = cu I> - AMC,nQMC,nCMC,n ~ (101) r n ~ ~iNrCnHn' (102) .-rd,l X rs1,1 1 lln --O'n n ~'1H~ 1~ l = (103) ~~,n n -O,n The projector ~'1 that is orthogonal to both MC-ISI and to the NI interferers is formed and then its response normalized to have a unity response to ~d `
-O,n The above processing organization of ISR among the high-power or low-power user-codes themselves or between both subsets is a particular example that illustrates G-ISR well. The fact that joint ISR among the high-power users and joint ISR
among the codes of a particular low-power user may each implement a different mode is another example that illustrates H-ISR well. In the more general case, ISR can implement a composite mode that reduces to a different mode with respect to each user. For instance, within the group of NI interferers, each user-code assigned the index (i, l) can form its own multi-code constraint and blocking matrices CMc,n and CMcn along a user-specific mode (IIõ should be set to identity in Table 4). The constraint and blocking matrices then can be reconstructed for joint ISR processing by aligning the individual constraint and blocking matrices row-wise into larger matrices as follows:
Cn - {MC,fl'==.',n}' (104) (~ ' ` (~+' (~ 105 `"n CMC,n~"'1 ~MC,n' ~MC,n1`"MC,n~"'~"MC,n]' ( ) This example illustrates the potential flexibility of ISR in designing an optimal interference suppression strategy that would allocate the null constraints among users in the most efficient way to achieve the best performance/complexity tradeoff. It should be noted that, in the particular case where the TR mode is implemented, the matrices in 5 Equations (104) and (105) are in fact vectors which sum the individual multi-code constraint vectors CM~n and C`cn, respectively.
After deriving the beamformer coefficients, each MC user assigned the index u estimates its Nm streams of data for l= 1, ..., Nm as follows (see Figure 34):
s"" = Real{W"'`"Y }, (106) n l7nl = .SlgiZiSn'l1, (107) u and exploits the fact that its N. access channels share the same power, and hence smooths the instantaneous signal power of each data stream over all its codes as follows:
N.
E lsn,l1 2 (~n)2 = (1-a)(~n-~)2 + a `-' N (108) m It should be noted that the multi-code data-streams can be estimated using MRC, simply by setting the constraint matrices to null matrices. This option will be referred to as MC-MRC.
After despreading of the post-correlation observation vector y by the Nm spreading codes of a user assigned the index u, the following post-correlation observation vectors for Z= 1, ..., Nm are obtained as follows:
u./'u u,l + N" = Hu u,l + ,l /109) ~'1 = HnY~nbn NPCM,n nSn NPCM n' l n The fact that all user-codes propagate through the same channel is exploited in the following cooperative channel identification scheme (see Figure 34):
N
Hn+~ = Hn + ` ~ (Zu'1 - Hnsn'l)Sn'` (110) N r=i which implements a modified DFI scheme, referred to as multi-code cooperative DFI
(MC-CDFI). MC-CDFI amounts to having the user-codes cooperate in channel identification by estimating their propagation vectors separately, then averaging them over all codes to provide a better channel estimate. It should be noted that implicit incorporation of the II-DFI version in the above MC-CDFI scheme further enhances channel identification.
Since the STAR exploits a data channel as a pilot, it can take advantage of a maximum of N. expensive despreading operations. To limit their number in practice, MC-CDFI can be restricted to a smaller subset of 1 to Nuser-codes. A
compromise can be found between channel estimation enhancement and complexity increase.
Another solution that reduces the number of despreading operations reconstructs the following data-modulated cumulative-code after ISR combining and symbol estimation i Equations (106) and (107):
N
Ck b",l~u,l (111) k ~ n Ck 1=1 K
A single despreading operation with this code yields:
Nm Nm u'~l,n>l Nn,f n Un PCM,n 7'~ = ~j~~n + ~j"Hn + M'S (112) n n ~J ~J n-n PCM,n-m m It has the advantage of further reducing the noise level by N,,, after despreading, while keeping the signal power practically at the same level3. The data-modulated cumulative-code can be used to implement channel identification as follows:
a = sign Re {ftuhlzu.8}} , -n n There is a small power loss due symbol estimation errors (very low in practice).
Hn+~ = Hn + (Z`6 - Hna~rt)a~n. (113) This CDFI version is referred to as S-CD1FI (see Figure 35).
Whereas multicode operation involves user stations transmitting using multiple spreading codes, but usually the same data rate, it is also envisaged that different users within the same system may transmit at different data rates. It can be demonstrated that the receiver modules shown in Figures 34 and 35 need only minor modifications in order to handle multirate transmissions since, as will now be explained, multicode and multirate are essentially interchangeable.
Multi-Code Ap,proach to Multi-Rate Reconsidering now the conventional MR-CDMA, in this context, STAR-ISR
operations previously were implemented at the rate 11T where T is the symbol duration.
As described earlier, with reference to Figure 32, the "X option" extensions, enables reduction of noise enhancement by increasing the dimension of the observation space and provides larger margin for time-delay tracking in asynchronous transmissions.
A
complementary approach that decomposes the observation frame into blocks rather than extends it using past reconstructed data will now be described.
This block-processing version of STAR-ISR will still operate at the rate 1/T
on data frames barely larger than the processing period T. However, it will decompose each data stream within that frame into data blocks of duration Tr where T, is a power-of-2 fraction of T. The resolution rate 1/T, can be selected in the interval [1,T,1/T,].
Hence, a receiver module that processes data frames at a processing rate 11T
with a resolution rate 1/T, can only extract or suppress data transmissions at rates slower than or equal to 1/T, Also, the channel parameters of the processed transmissions must be almost constant in the interval T, the processing period. This period should be chosen to be much larger than the delay spread AT for asynchronous transmissions, but short enough not to exceed the coherence time of the channel.
In one processing period, STAR-ISR can simultaneously extract or suppress a maximum N,õ = T/T, blocks (N,n is a power of 2). In the n-th processing period of duration T, a stream of data bu(t) yields N,,, samples b~~',,.,,bn"'Nm sampled at the resolution rate. Over this processing period, therefore, the spread data can be developed as follows:
c u(t)b "(t) b,,'UT(t - n7-)c u(t), (114) r=i where UT(t) is the indicator function of the interval [(1 - 1)Tr, lTr). This equation can be rewritten as follows:
cu(t)bu(t) = Ebu,'(t)cu,r(t), (115) r=1 where bu '(t),...,b"'Nm(t) represent Nn data-streams at rate 1/T spread by N.
vlrtUal orthogonal codes c" `(t),...,c"'" (t) (see Figure (36).
With the above virtual decomposition, one arrives at a MC-CDMA model where each of the processed users can be seen as a mobile that code-multiplexes N,,, data-streams over N,, access channels. This model establishes an equivalence between MC-CDMA and MR-CDMA and provides a unifying framework for processing both interfaces simultaneously. In this unifying context, codes can be continuous or bursty.
Use of bursty codes establishes another link with hybrid time-multiplexing CDMA (T-CDMA); only the codes there are of an elementary duration Tr that inserts either symbols or fractions of symbols. A larger framework that incorporates MR-CDMA, MC-CDM, and hybrid T-CDMA can be envisaged to support HDR transmissions for third generation wireless systems.
Exploiting this MC approach to MR-CDMA, the data model of MR-CDMA will be developed to reflect a MC-CDMA structure, then a block-processing version of STAR-ISR derived that implements estimation of a symbol fraction or sequence.
The multi-code model of Equation (97) applies immediately to MR-CDMA.
However, due to the fact that codes are bursty with duration T, < T, the self-ISI
vectors k,` and yn,` and the spread propagation vector j* ` of a given user-code do -1,n -+l,n 0,n not overlap with each other. If yr denotes an arbitrarily enlarged delay-spread (reference [20]) to leave an increased uncertainty margin for the tracking of time-varying multipath-delays (i. e., pT <yr < T), and if Nr =`J-,r/T 1 denotes the maximum delay-spread in Tr units, then only the last Nr symbols bn'i '"'',,,,,b,"im among the past symbols in the previous frame may contribute to self-ISI in the current processed frame (see Figure 37):
u N. N~ Nm Yn, = Oubn,l a + ~nbn,rvu,l + ~ ~/,nbu,r l + fftn (116) n n-l l l,n n n 10,n Wn n+l +l,n n u=1 1=N -N+1 1=1 l=1 m In this frame of duration 2T - T,, the desired signals' contribution from the Ncurrent symbols is contained in the first interval of duration T+Yr, whereas the remaining interval of the frame contains non-overlapping interference from the last Nn -Nr future symbols in the next frame, namely bn,~ =+' 9 ,.,,bn"m (see Figure 37). The remaining part of the frame can be skipped without any signal contribution loss from the current bits.
Hence, the duration of the processed frame can be reduced to T+Er- - T as follows:
Y=[ic, o, Y 1,..., Y,c,+r,,-2,1 (117) where Lo =FTRT ] is the maximum length of the enlarged delay-spread in chip samples. With the data block-size reduced to M x (L + Lo - 1), the matched-filtering observation matrix reduces to:
N N N
u 5 _ u u,l u,~~u u u,l~~u [ + ~~ th 118 Yn - ~ ~ ~nbn-1 rll,n + n~n I O,n + k Onbn+l l +1 n IV , ~ ~
u=1 [=N -N+1 l=1 1=1 where ffth is the noise matrix reduced to the same dimension. This data model equation can be rewritten in the following compact vector form:
U N +l Y onbn+k_~'1Xk +'~~ (119) n k,n -n u=1 1=1 k=-1 where Xk = 0 if k = - 1 and l E{],...,N,) or if k=+1 and l E{Nõt - Nr + 1,..., , NJ, and 1 otherwise.
The constraint matrices can be formed in an MC approach to implement joint or user-specific ISR processing in any of the modes described in Tables 3 or 4, respectively. In contrast to the conventional MC-CDMA, the factor Xk discards all non-overlapping interference vectors in the processed frame and somehow unbalances ISI
contribution among the virtual multi-code streams. In the DF modes, only the central streams of each user (i. e. , l= Nr + 1, ..., N,n - Nr) sum symbol contributions from the previous, current and future symbols; whereas the remaining streams sum signal contributions from either the current and the previous or the current and the future symbols. Indeed, the 2(N,,, - N) ISI terins discarded from summation contribute with null vectors to the processed frame. In the ISR-H mode, the columns previously allocated to individually suppress these vectors are eliminated from the constraint matrices, thereby reducing the number of its columns to N. = Nn, + 2N, constraints per _ _ -_. _.__ _ . _~..~.~...~..~.._A.W.,..~,. ~_.~.... ~...~. _ user4 (see Tables 3 and 4). ISR-H hence approaches ISR-R in computational complexity when N, is small compared to N,,,.
After derivation of the beamformer coefficients of each virtual user-code assigned the couple-index (u,!), its signal component Sn ' is estimated using Equation (106). In this process, each ISR combiner rejects the processed interferers regardless of their exact data rates, which only need to be higher than the resolution rate. This feature finds its best use when implementing ISR at the mobile station on the downlink where data rates of suppressed interferers are not necessarily known to the desired mobile-station. For instance, orthogonal variable spreading factor (OVSF) allocation of Walsh spreading codes is no longer necessary. On the uplink, each transmission rate is known to the base station. However, one can still gain from this feature by allowing joint and well integrated processing of mixed data traffic at a common resolution rate.
Indeed, the estimation of the signal components provides sequences oversampled to the resolution rate 1/Tr. Hence, after a given data stream is decomposed at this common rate, its signal component estimate must be restored to its original rate in an "analysis/synthesis" scheme. To do so, the data rate 1/Tu 5 1/T, of user u is defined and it is assumed temporarily that it is faster than the processing rate (i.
e. , 1/Tõ >_ 1/T).
Hence, one can extract from each frame Fu = TIT,, < Nn, signal component estimates out of Nn, by averaging the oversampled sequence Sn =` over consecutive blocks of size B,, = N,,,/Fõ = Tn/Tr for n' = 0,..., F,, - I as follows:
(n' +1)B.
E SI
!=n'B +1 (120) S,Fu+n ' - B
u 4ISR may be equally reformulated with Nn, + 2N, generating sequences that process all the contributing symbols as if they were independent streams without MC-ISI. Only the N. current symbols are estimated then; the 2N, remaining symbols being corrupted by the edge effect.
bnF.Y+ni = Slg/2{ nFu+n'}, (121) I" Z
snP +n' I
(On)2 - (1 - (.)(~n 1)2 + Ly n'=o F (122) u In the particular case where the data rate is equal to the processing rate (i.
e. , 1/Tu =
1/T), the equations above have simpler expressions with Fn = I and Bn = N.:
N
r ge,[
L n n (123) Sn - N ~
bn = S1g12fSnl, (124) l~n)1 - ll - ~)(0n-l)1 + a I Sn 12. (125) If the data rate is slower than the processing rate, the signal component estimate Sn of Equation (123) is further averaged over consecutive blocks of size Fõ = T/T to yield the following subsampled sequence:
F.-1 u S LnIF,,.f Fõ+n' Su = n' -0 (126) F
Ln/FJ
u Symbol and power estimations in Equations (124) and (125) are on the other hand modified as follows:
b 1Ln/F'j = Sign {s ~~n/F,~ 11 (127) Ln/Fv~, a)(ip'~n/F,~ -1) + a 1 S Ln/F~j 1z. (128) It should be noted that a higher value is needed for the smoothing factor to adapt to a slower update rate of power estimation. If the channel power variations are faster than the data rate, then it is preferable to keep the power estimation update at the processing rate in Equation (125). In this case, Equation (126) is modified as followss:
Fy-1 t~~ u u T Ln/F f Fõ +n ' S Ln/F,,.f Fu +n ~
Ln/FJ - n'-O F.~-1 (129) S ~
u 2 L~ (T Ln/FyjF,+n', to take into account channel power variations within each symbol duration.
It should be noted that the multi-rate data-streams can be estimated using MRC, simply by setting the constraint matrices to null matrices. This option may be referred to as MR-MRC.
It should be also noted that combination of Equations (106) and (120), along with Equation (128) for data rates slower than the processing rate, successively implements the processing gain of each user in fractioned ISR combining steps.
In general, regrouping the symbol-fractions back to their original rate can be exploited in the design of the constraint matrices; first by reducing reconstruction errors from enhanced decision feedback; and secondly by reducing the number of constraints 5 This signal component estimate is not used for power estimation. Only its sign is taken in Equaiton (127) as the estimate of the corresponding bit. Hence, power normalization given here for completeness is skipped in practice.
of a given user u from Nto Fu in the modes implementing decomposition over user-codes (i. e. , R, D, and H). For these modes, the common factor N,,,NI
appearing in the NI
total number of constraints N, reduces to by regrouping the constraint vectors over the user-code indices that restore a complete symbol within the limit of the processing periodb.
Regrouping the constraints of user u to match its original transmission rate amounts to regrouping the codes of this user into a smaller subset that corresponds to a subdivision of its complete code over durations covering its symbol periods instead of the resolution periods. In fact, user u can be characterized by Fu concatenated multi-codes instead of N,,,. Overall, MR-CDMA can be modeled as a mixed MC-CDMA
system where each user assigned the index u has its own number Fu of multi-codes (see Figure 38). Therefore, the ISR-combining and channel-identification steps can be carried out in one step along the MC formulation of the previous section, using user-codes simply renumbered from 1 to Fu for simplicity. Hence, as shown in Figure 39, the only change needed to the receiver module of Figure 34 is to the bank of despreaders. In the receiver module shown in Figure 34, the spreading codes used by the despreaders 19d,1,,,,,19d,Fd comprise segments of the spreading code of user d, i.e., the segments together form the part of the code used in a particular frame. The number of code segments Fu corresponds to the number of symbols bn ",,,,,bn 'FU
transmitted in the frame. The estimates of these symbols, and the signal component estimates sn'~ sn F map with those of Equations (120), (121), (123) and (124) within a parallel/serial transform.
6 Feedback of symbols with rates slower than the processing rate to the constraints-set generator is feasible.
This illustrates again the flexibility afforded by using ISR in designing optimal interference suppression strategies that suit well with MR-CDMA. It enables simultaneous processing of blocks of symbols or fractions of symbols in an integrated manner at two common resolution and processing rates.
5 To carry out channel identification operations, the M x Lo reduced-size post-correlation observation matrix of user-code (u,l) is defined as follows:
(130) r_[z:z::,...,z::J_1], -where the columns of this matrix are given for j= 0,...,Lo - 1 by:
Zu,l 1 u,l 1 u n,; = L ~ Y ;+j,cj, = L Y j j ,cj , . (131) rJl =O r 1~=(l-1)*L.
This correlation with the virtual user-code (u,l) amounts to partial despreading by a reduced processing gain Lr = T,1 T= L/1V , using the l-th block of length Lr of the user's code cj", It should be noted that, in contrast to conventional MC-CDMA, the above partial despreading operations are less expensive in terms of complexity per user-code.
The reduced-size post-correlation observation vector ZUJ resulting from vector-reshaping of 4,1 has the same model expression of Equations (109), except that vectors there all have reduced dimension (MLo) x 1. It should be noted that the post-correlation window length Lo was fixed long enough to contain the delay-spread with an enlarged margin for asynchronous time-delay estimation from the reduced-size propagation vector Hn (reference [20]). Identification with post-correlation windows n shorter than L, investigated in [6], reduces complexity and proves to work nearly as well as the original full-window version of STAR (i. e, Lo = L).
Channel identification with the MC-CDFI scheme of Equation (110) can be readily implemented using the user-code post-correlation observation vectors Zu,'.
However, this procedure would feed back symbol fractions without taking full advantage of the complete processing gain. Instead, the vectors z-,l are regrouped and averaged n in the same way the signal component estimates are restored to their original rate in Equations (120, (123) or (126), and Z~ n, Zn or Z~n/FJ ~ respectively' are obtained.
Hence, the CDFI channel identification procedure, renamed MR-CDFI, is implemented as follows:
F
n n+ fC u~u n 132 = H ~ H snF ,n 5,f. ,n ( ) n+l n F nFM+n n ~
u n'=o when the data-rate is faster than the processing ratea, or by:
Hn = Hn + ~A,IZn -)g" n~ (133) n+1 n \ n n in the particular case where the data rate is equal to the processing rate, or by:
u n 134 Ln/F~ - H Ln/F,~ s Ln/F,~ s Ln/FJ I ( ) Ln/F,~ - Ln/Fõ~ +~ (Zu when the data-rate is slower than the processing rate. It should be noted that channel identification at data rates faster than the processing gain in Equation (132) has a structure similar to MC-CDFI. Averaging over Fn despread observations there can be reduced to a smaller subset to gain in complexity like in MC-CDMA. Use of the S-CDFI version described in Equations (111) to (113) instead of, or combination with, the above scheme are other alternatives that reduce the amount of complexity due to despreading operations.
By regrouping codes to match the original data transmission rates as discussed earlier (see Figure 38), channel identification can be easily reformulated along a mixed ' In practice, these vectors are computed directly from Y. in regular despreading steps which exploit the entire spreading sequences in one step along a mixed MC-CDMA
scheme.
gImplementation of Fõ channel updates (with time-delay tracking) instead of averaging is computationally more expensive.
MC-CDMA model where each user is characterized by Fu multi-codes and Fu despread vectors as shown in Figure 39.
To reduce further the number of expensive despreading operations, slower channel identification (reference [20]) can update channel coefficients less frequently if the channel can still show very weak variations over larger update periods.
However, high mobility can prevent the implementation of this scheme and faster channel identification update may even be required. For data rates faster than the processing rate, updating at a rate higher than the processing rate is not necessary. The processing period T is chosen to guarantee that the channel parameters are constant over that time interval. For data rates slower than the processing rate, the channel update rate could be increased above the data rate up to the processing rate using Equation (133) and partial despreading to provide Zu, In Equation (133), S~n~F~ from Equation (126) n should be fed back instead of Sn to benefit from the entire processing gain in the decision feedback process.
Although the foregoing embodiments of the invention have been described as receiver modules for a base station, i. e. , implementing ISR for the uplink, the invention is equally applicable to the downlink, i. e. , to receiver modules of user stations.
Downlink ISR
To implement ISR rejection, the user/mobile station needs to identify the group of users (i. e. , interferers) to suppress. Assuming temporarily that suppression is restricted to in-cell users, served by base-station v, and that the number of suppressed interferers is limited to NI to reduce the number of receivers needed at the desired base-station to detect each of the suppressed users, in order to identify the best users to suppress, the user station can probe the access channels of base-station v, seeking the NI
strongest transmissions. Another scheme would require that the strongest in-cell interfering mobiles cooperate by accessing the first NI channels (i. e. , u =
i (E
{1, . . . , NI}) of base-station v.
Once the NI suppression channels have been identified, the desired user-station can operate as a "virtual base-station" receiving from NI mobiles on a "virtual uplink".
If the desired user is not among the NI interferers, an additional user station is considered. Similar NI channels may be identified for transmissions from the neighbouring base-stations. Accordingly, consideration will be given to the NB
base-stations, assigned the index v' E{],...,NB}, which include the desired base-station with index v' = v without loss of generality. This formulation allows the user-station to apply block-processing STAR-ISR with specific adaptations of ISR combining and channel identification to the downlink.
In essence, each "virtual base station" user station would be equipped with a set of receiver modules similar to the receiver modules 21...... 21", one for extracting a symbol estimate using the spreading code of that user station and the others using spreading codes of other users to process actual or hypothesized symbol estimates for the signals of those other users. The receiver would have the usual constraints-set generator and constraint matrix generator and cancel ISR in the manner previously described according to the mode concerned.
It should be appreciated, however, that the signals for other users emanating from a base station are similar to multicode or multirate signals. Consequently, it would be preferable for at least some of the user station receiver modules to implement the multicode or multirate embodiments of the invention with reference to Figures 34 and 39. Unlike the base station receiver, the user station's receiver modules usually would not know the data rates of the other users in the system. In some cases, it would be _ _._~_.. ~...~.~...._.,,~..,......_. _ _ _ feasible to estimate the data rate from the received signal. Where that was not feasible or desired, however, the multirate or multicode receiver modules described with reference to Figures 34 and 39 could need to be modified to dispense with the need to know the data rate.
Referring to Figure 40, the user station receiver comprises a plurality of receiver modules similar to those of Figure 39, one for each of the NB base stations whose NI
strongest users' signals are to be cancelled, though only receiver module 21"
is shown in Figure 38. Recognizing that one or more of those NI signals could be multirate or multicode, and hence involve not only different spreading codes but also different code i =N7 segmentations, the number of despreaders equals i.e.
19v''`'F~, , 19 ' "1=', , 19"''"''FN, In any given base station, the NI
users are power-controlled independently and so are received by the mobile/user station with different powers. Consequently, it is necessary to take into account their power separately, so the power estimates from power estimation means 30T" are supplied to the channel estimation unit 28T". The channel identification unit 28T"' processes the data in the same way as previously described, spreading the resulting channel estimate H' to form the spread channel estimates and supplying o,n -O n ,..., -o.n them to the ISR beamformers 47T`,1 ',..., 47Tv''"4'Fv respectively, for use in processing the observation vector K.
n The resulting signal component estimates sn sv"N"FN, are similarly fed back to the channel identification unit 28V to update the channel parameter estimates and to the decision rule units 30Tv' ''', ..., 30T "N"'^'1 for production of the corresponding symbol estimates b ''^",FN In all modes except ISR-H, these n n symbol estimates are supplied to the constraints-set generator, together with the set of channel parameter estimates from channel identification unit 28T"' for use in ..~_~.. ~~.~.... ~..~.,~.., forming the set of constraints C. The set of channel parameter estimates includes the power estimates from the power estimation units.
If the desired user is not among the NI strong users of the serving base station v, the user station receiver will also include a separate receiver module which could be 5 similar to that shown in Figure 39. However, bearing in mind that the channel estimate derived by the receiver modules for the serving base station's strong users in Figure 40 will be for the same channel, but more accurate than the estimate produced by the channel identification unit of Figure 39, it would be preferable to omit the channel identification unit (29F,) and despreaders 19d ',..., 19d'F' (Figure 39), and supply the 10 spread channel estimates from the channel identification unit of the receiver module for serving base station v, as shown in Figure 41.
The receiver module shown in Figure 40 is predicated upon the data rates of each set of NI users being known to the instant user station receiver. When that is not the case, the receiver module shown in Figure 40 may be modified as shown in Figure 42, 15 i. e. , by changing the despreaders to segment the code and oversample at a fixed rate that is higher than or equal to the highest data rate that is to be suppressed.
It is also possible to reduce the number of despreading operations performed by the receiver module of Figure 42 by using a set of compound segment codes as previously described with reference to Figure 35 to compound over segments.
However, 20 as shown in Figure 43, a set of different compound codes could be used to compound over the set of NI interferers. It would also be possible to combine the embodiment of Figure 43 with that of Figure 35 and compound over both the set of interferers and each set of code segments.
A desired user station receiver receiving transmissions on the downlink from its 25 base-station and from the base-stations in the neighbouring cells will now be discussed.
Each base-station communicates with the group of user stations located in its cell.
Indices v and u will be used to denote a transmission from base-station v destined for user u. For simplicity of notation, the index of the desired user station receiving those transmissions will be omitted, all of the signals being implicity observed and processed by that desired user station.
Considering a base-station assigned the index v, its contribution to the matched-filtering observation vector y of the desired user station is given by the signal vector of the v-th base-station r defined as:
n y`' Y"'n, (135) -u,n u,n u=1 where the vector y=u denotes the signal contribution from one of the Uv users u,n communicating with base-station v and assigned the index u. Using the block-processing approach described in the previous section, the vector y,R can be decomposed as u,n follows:
N +l n v u r r v u lb v u l~' N,u,l,/X!
~n n+k JJ,R-k n k= (136) Y1=k k=-1 It should be noted that the channel coefficients rfn just hold the index of the base-station v. Indeed, transmissions from base-station u to all its mobiles propagate to the desired user station through a common channel. Base-station signals therefore show a multi-code structure at two levels. One comes from the virtual or real decomposition of each user-stream into multiple codes, and one, inherent to the downlink, comes from summation of code-multiplexed user-streams with different powers. As will be described hereinafter, this multi-code structure will be exploited to enhance cooperative channel identification at both levels.
In a first step, the desired user-station estimates the multi-code constraint and blocking matrices of each of the processed in-cell users (i. e. , u E{],..., NI} U{d}).
Table 4 shows how to build these matrices, renamed here as CMC,n and CMC n to show the index v of the serving base-station. Indexing the symbol and channel parameter estimates with v in Table 4 follows from Equation (136). In a second step, the user-station estimates the base-specific constraint and blocking matrices CBS,n and CBS n using Table 5. These matrices enable suppression of the in-cell interferers using one of the modes described in Table 5. For the downlink, a new mode BR, for base-realization, replaces the TR mode of Table 3. Suppression of interfering signals from multiple base-stations adds another dimension of interference decomposition and results in TR over the downlink as shown in Table 6. Therefore, in a third step the mobile-station estimates the base-specific constraint and blocking matrices CBS,n and CBS; ` from the interfering base-stations and concatenates them row-wise to form the multi-base constraint and blocking matrices denoted as C and C ",1 respectively. In the TR mode, the base-n n ~
specific constraint and blocking vectors in the BR mode now are summed over all interfering base-stations, leaving a single constraint. For the other modes, the number of constraints N, in Table 3 is multiplied by the number of interfering base-stations NB.
The receiver module dedicated to extracting the data destined to the desired mobile-station # d from the serving base station # v is depicted in Figure 38.
It should be noted that the multi-rate data-streams can be estimated using MRC
on the downlink, simply by setting the constraint matrices to null matrices9.
This option will be termed D-MRC.
9 In this case, ISR processing is not needed and the desired signal is expected to be strong enough to enable reliable channel identification for its own.
__ _.....~. ..~.~.~..~.~.~_....~. ....~.. ~._-_.._,.~..._. _.....___ ____.
If the user-station knows10 the data rates of the suppressed users, it can estimate their symbols" as long as their symbol rate does not exceed the processing rate. As mentioned hereinbefore, this block-based implementation of the symbol detection improves reconstruction of the constraint matrices from reduced decision feedback errors12. Otherwise, the user-station can process all interfering channels at the common resolution rate regardless of their transmission rate. It should be noted that estimation of the interferers' powers is necessary for reconstruction in both the BR and TR modes, for channel identification as detailed below, and possibly for interference-channel probing and selection. It is carried out at the processing rate.
Identification of the propagation channels from each of the interfering base-stations to the desired user station is required to carry out the ISR
operations.
Considering the in-cell propagation channel, its identification from the post-correlation vectors of the desired user is possible as described hereinbefore with reference to Figure 39. It exploits the fact that the multi-codes of the desired user propagate through the same channel. However, the in-cell interfering users share this common channel as well.
Therefore, the MC-CDFI and MR-CDFI approaches apply at this level as well.
Indeed, the user-station has access to data channels which can be viewed as NI x Nvirtual pilot-channels with strong powers. It is preferable to implement cooperative channel identification over the interfering users whether the desired user is among the in-cell 10Data-rate detection can be implemented using subspace rank estimation over each stochastic sequence of Nsymbol fractions.
" In the ISR-H mode, only the signal component estimates are needed for power and channel estimation (see next subsection).
12 Recovery of the interfering symbols at data rates slower than the processing gain could be exploited in slow channel identification. However, selection of a user as a strong interferer suggests that its transmission rate should be high.
interferers or not. The same scheme applies to the neighbouring base-stations and therefore enables the identification of the propagation channel from each out-cell interfering base-station using its NI interfering users.
If the data rates are known to the base-station, identification of the propagation channel from a given base-station v' E{],...,NB} can be carried out individually from each of its NI interfering users, as described in the previous section. To further enhance channel identification, the resulting individual channel estimates are averaged over the interfering users. Both steps combine into one as follows:
T~v i + I 1 Fi ~ ..v, v~i I37 N
L? + 1 - !I NI HnSnP +n n ( ) This downlink version of MR-CDFI, referred to as DMR-CDFI, is illustrated in Figure 40. It should be noted that averaging over the interferers takes into account normalization by their total power. To reduce the number of despreading operations, averaging over interferers can be limited to a smaller set ranging between 1 and NI.
If the data rates of the interfering users are unknown to the user-station, identification can be then carried out along the steps described with reference to Figure 34 to process interfering signals at the common resolution rate as follows:
NI Nm H"I + r ~,"1 - H" (138) lsv "1 sv~'`'1.
n+l n NI u~ n n n n N E z ~~ l n This downlink version of MC-CDFI, referred to as DMC-CDFI, is illustrated in Figure 42. To reduce the number of despreading operations, averaging over interferers and user-codes can be limited to smaller subsets ranging between 1 and NI and 1 and N,,,, respectively.
An alternative solution that reduces the number of despreading operations utilizes the following cumulative multi-codes for l=
NI
Ck 'E'1 = 1 r Ck 't'/ (139) JNI ~=t Despreading with these cumulative codes yields:
Nl NI
V/,i.l S Nv',',' n -PCM,n -n = _~ ~ t + i 1 = HvS v' E l + Nv',E,l (140) n n NI NI -n n -PCM,n10 Averaging the user-codes over interferers does not reduce noise further after despreading. However, the composite signal Sn''1 collects an average power from the NI interferers and therefore benefits from higher diversity. The cumulative multi-codes can be used to implement channel identification as follows:
= 3 ~ + /zv',E,1 ft'SR sn ,E,tI
~ (141) n+t n N(~v, 2 1 t 1 n 15 n where:
NI
Sv'tl n s '~'` (142) R NI ' L.~ L I SRv/ ,1 I 2 (~v' E 2 2+ a 1=t ~=t (143) n ' ) = (1 ) n t ~ 1V NI
This downlink version of MC-CDFI, referred to as DSMC-CDFI, is illustrated in Figure 43. Again, averaging over a smaller set of user-codes reduces the number of 25 despreading operations. Use of the S-CDFI version described in Equations (I11) to (113) instead of, or combination with, the above scheme13, are other alternatives that reduce the amount of complexity due to despreading operations. Their implementation on the downlink is ad hoc and follows from the given descriptions.
13 Summing user-codes over resolution periods does not increase diversity.
However, use of the S-CDFI version further reduces noise after despreading.
.~ , O >, ti G) s..
U
a > > o ~
o an ~ a 2 v a a ay, a Q + + a ,~ + + + av.
t4-. bn U o v' U
cn N Fr ~
Qn = 1~-r = ~ vl .~ Ln ~+ 1- U 3 ==~ ~ U ~ -~ U
O
Cl cn cn z z z z a cn ~ x x H
cn COO
cn cn ~
~,....,.._ ~.._, _ _.,~,~~_.... ~..
M$ 2h .,~ , .
.
.--a O w, O
M '-i .,~
~ = J ~
.-i =
II I ~
I M = J
II ~I II
~-~a a' II II II
Q! C1~. {Yi UO
W rõ~ -~ --1 r-a H
2` ~ z 2 <~..,"' \\\ Y
rn r--~ r----i i-----~ &
V - + W li W~I
H
.~.,_.....o....~..w..~.~..._. _ _ .__ ~..._.....,~,, ._..~,~...r,,.,.~a....~......~.. .._..__. _ _. _~.~~... _._.._.. _ _ ._.____._._.
~
a~ =
~ ^ U O z., ~ O ~
14~
w u o <'=~.~+ ~3,,~ ~~,, >, ~ Q Z~
`'~J~ <.p" <=~.~`ti N I"~O" U
It cd M
ct cd ~C <Ur p~ an n F"
~ =~
cn ~
o .~
'i=~,'i ~ :e ^fl y y <,3=1 ~, 'y:, ~ .~
~^ . !"` ~,.= Q~
<.f~ y r-i = .~.i CHa +~,y *~ n z~1/V"i v` II N
y u ~ ~ 2s o~
W`ti 1 I
CIS
oa U U ~ W S~-i Cl*
U +
H ~ o a Q x ~
~n o r--i r--~
O y ~t ^ + ~2 ~
V vl x C
+ + W _ y I
_ + W II
~ 1 ~ti ~ y Wyl ~ W.~.~
l ~(~~I I =
st 14~
C C l ' S~ E- (~IC (vIC t- S^C ~ ( C S C (~at + W
~ + õ
+ W II
w W
~ 1I/~`11 .
1 ryI ~ I .
H
_..v_ --~..~.~,..~....,.~..~...w._..~.,...~..._w~.
o II ' ~
II
o u C
A. I ~O Q .~ h U O
'C Q U O
o U ~ N
,^ Y G~ y L: O =~L' : W ~~ z~W~ r =o /-= =~
U M .-+
W V~ rn ~ o cli Q u ~=; C
U =~ `V
cn (U
C ~'< ~ ~o _ W on < Y at C~ 'V L~"
~= ' a C rn O 'b r~l U i-~i U
4d ~ U O +
~ w. ~ i ' UO c~ v II OU
E
O E
Cld Z'\
_ __ --=---~ _..~..~...,.+.~._.~,.~.__........,.~.
.Y....,._.....,....------ ....~. ..,..__ ..
BR
F NI N NJ +1 v ~q u~ E E w,i,l v ~,i,,f~
6BSn n 1~/ n+k~fn-kn k u=1 1=1 f=1 k=-1 FM N Nj v uE F E v a l ~' t,l f-i',!' 0 1 ~BS,n n bn+k .fn=k,n i,l,k Xk u=l 1=1 f=1 k=-1 N, 1 Table 5 shows base-specific constraint and blocking matrices CBS,n and ~s nl which will apply to the modes shown in Table 3 except for TR, replaced by BR.
Indices of remaining modes in Table 3 should be modified to include the index of the base-station v as shown for the TR mode. It should be noted that channel coefficients ~-fn hold the index of the base-station u instead of the user i. Transmissions to all user-stations from base-station u propagate to the desired user station through a common channel.
It should also be noted that summation over users is weighted by the estimate of the total amplitude due to user-independent power control. Definitions of ~ ~,k and Xk are given in Table 3.
TR
NB NI N NJ +1 Cn G ~'j~ 'urr rb 'i' " ~'i'` X1 E ~ Y~ n L~ L~ G i ~ f n+k f n-k k v=1 U=1 1=1 f=1 k=-1 NB NI N NJ +1 P ll ~~ T nu~ E E w,iLAv tw,t,lbv,i,0~1 n+k f,nl-k,n v,i,1,k k v=1 u=1 1=1 f=1 k=-1 _-,_- .~,.Y..,. .........~..~,......~...mw.. _ .._...._u..~.,..,..~....,.....,......,,, N, 1 BR
Ni Nm Nf +1 ~n"E F E bv ` l~v k n n+k f,n-k,n L u=1 1=1 f=1 k=-1 +
jw't~,l1 E _q_vn,uE f E E bv,i,lTv ~w,i,l~v',t1,1~,0X1 l.n 1~/ n+k f,nIk n v,i,l,k k~
u=1 1=1 f=1 k=-1 N, NB
and C"'' i'j' which apply Table 6 shows multi-base constraint and blocking matrices Cn n to the modes of Table 3 by row-wise aligning the constraint and blocking matrices Css,n and ~sin,' from base-stations into larger matrices Cn and in the way suggested by Equations (104) and (105). The number of constraints in Table 5 is multiplied by NB as shown here for the BR mode. The additional TR mode sums the constraint-vectors of the BR mode over all base-stations. The definition of Xk is given in Table 3 and S~,i,rkl '1 0 if (v,i,l,k) = (v', i', l', k') and 1 otherwise.
It should be appreciated that, when ISR is used for the downlink, it will function where the mobile station has a single antenna.
Embodiments of the invention are not limited to DBPSK but could provide for practical implementation of ISR in mixed-rate traffic with MPSK or MQAM
modulations without increased computing complexity. Even orthogonal Walsh signalling can be implemented at the cost of a computational increase corresponding to the number of Walsh sequences.
It should also be noted that, although the above-described embodiments are asynchronous, a skilled person would be able to apply the invention to synchronous systems without undue experimentation.
__ ~ .._..~..~__ _ _ ...._ ~.........~..W.....~..,...._........~..~..____.. _ _ It should be appreciated that the decision rule units do not have to provide a binary output; they could output the symbol and some other signal state.
The invention comprehends various other modifications to the above-described embodiments. For example, long PN codes could be used, as could mixed rate or mixed modulations, large delay-spreads and large inter-user delay-spreads. Also, the invention can be used in CDMA systems employing pilot signals.
REFERENCES
For further information, the reader is directed to the following documents, the contents of which are incorporated herein by reference.
1. F. Adachi, M.Sawahashi and H. Suda, "Wideband DS-CDMA for next generation mobile communications systems", IEEE communications Magazine, vol. 36, No. 9, pp. 55-69, September 1998.
2. A. Duell-Hallen, J. Holtzman, and Z. Zvonar, "Multiuser detection for CDMA
systems", IEEE Personal Communications, pp. 46-58, April 1995.
3. S. Moshavi, "Multi-user detection for DS-CDMA communications", IEEE
Communications Magazine, pp. 124-136, October 1996.
4. S. Verdu, "Minimum probability of error for asynchronous Gaussian multiple-access channels", IEEE Trans. on Information Theory, vol. 32, no. 1, pp. 85-96, January 1986.
5. K.S. Schneider, "Optimum detection of code division multiplexed signals", IEEE
Trans. on Aerospace and Electronic Systems, vol. 15, pp. 181-185, January 1979.
6. R. Kohno, M. Hatori, and H. Imai, "Cancellation techniques of co-channel interference in asynchronous spread spectrum multiple access systems", Electronics and Communications in Japan, vol. 66-A, no. 5, pp. 20-29, 1983.
7. Z. Xie, R.T. Short, and C.K. Rushforth, "A family of suboptimum detectors for coherent multi-user communications", IEEE Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 683-690, May 1990.
8. A.J. Viterbi, "Very low rate convolutional codes for maximum theoretical performance of spread-spectrum multiple-access channels", IEEE Journal of Selected Areas in Communications, vol. 8, no. 4, pp. 641-649, May 1990.
___..._,._ ......~..~~....~._~.~.......~~._.~ _~,-9. M.K. Varanasi and B. Aazhang, "Multistage detection in asynchronous code-division multiple-access communications", IEEE Trans. on Communications, vol.
38, no. 4, pp. 509-519, April 1990.
10. R. Kohno et al, "Combination of an adaptive array antenna and a canceller of interference for direct-sequence spread-spectrum multiple-access system", IEEE
Journal on Selected Areas in Communications, vol. 8, no. 4, pp. 675-682, May 1990.
11. A. Duell-Hallen, "Decorrelating decision-feedback multi-user detector for synchronous code-division multiple-access channel", IEEE Trans. on Communications, vol. 41, no. 2, pp. 285-290, February 1993.
12. A. Klein, G.K. Kaleh, and P.W. Baier, "Zero forcing and minimum mean-square-error equalization for multi-user detection in code-division multiple-access channels", IEEE Trans. on Vehicular Technology, vol. 45, no. 2, pp. 276-287, May 1996.
13. S. Affes and P. Mermelstein, "A new receiver structure for asynchronous CDMA
: STAR - the spatio-temporal array-receiver", IEEE Journal on Selected Areas in Communications, vol. 16, no. 8, pp. 1411-1422, October 1998.
14. S. Affes, S. Gazor, and Y. Grenier, "An algorithm for multisource beamforming and multitarget tracking", IEEE Trans. on Signal Processing, vol. 44, no. 6, pp.
1512-1522, June 1996.
15. P. Patel and J. Holtzman, "Analysis of a simple successive interference cancellation scheme in a DS/CDMA system", IEEE Journal on Selected Areas in Communications, vol. 12, no. 5, pp. 796-807, June 1994.
16. J. Choi, "Partial decorrelating detection for DS-CDMA systems", Proceedings of IEEE PIMRC '99, Osaka, Japan, vol. 1, pp. 60-64, September 12-15, 1999.
17. S. Affes and P. Mermelstein, "Signal Processing Improvements for Smart Antenna Signals in IS-95 CDMA", Proceedings of IEEE PIMRC '98, Boston, U.S.A., Vol. II, pp. 967-972, September 8-11, 1998.
18. S. Affes and P. Mermelstein, "Performance of a CDMA beamforming array-receiver in spatially-correlated Rayleigh-fading multipath", Proc. of IEEE
VTC'99, Houston, USA, May 16-20, 1999.
19. H. Hansen, S. Affes and P. Mermelstein, "A beamformer for CDMA with enhanced near-far resistance", Proc. of IEEE ICC'99, Vancouver, Canada, Vol.
3, pp. 1583-1587, June 6-10, 1999.
20. K. Cheikhrouhou, S. Affes, and P. Mermelstein, "Impact of synchronization on receiver performance in wideband CDMA networks", Proc. 34th Asilomar Conference on Signals, and Computers, Pacific Grove, USA, to appear, October 29-November 1, 2000.
21. S. Affes, A. Louzi, N. Kandil, and P. Mermelstein, "A high capacity CDMA
array-receiver requiring reduced pilot power", Proc. of IEEE GLOBECOM
'2000, San Francisco, USA, to appear, November 27-December 1, 2000.
22. S. Affes, H. Hansen, and P. Mermelstein, "Interference subspace rejection in wideband CDMA - part I: Modes for mixed power operation", to be submitted.
23. H. Hansen, S. Affes, and P. Mermelstein, "Interference subspace rejection in wideband CDMA - part II: Modes for high data-rate operation", to be submitted.
24. E.H. Dinan and B. Jabbari, "Spreading codes for direct sequence CDMA and wideband CDMA cellular networks", IEEE Communications Magazine, vol. 36, no. 9, pp. 48-54, September 1998.
25. R. Lupas and S. Verdu, "Near-far resistance of multiuser detectors in asynchronous channels", IEEE Trans. on Communications, vo138, no. 4, pp.496-508, April 1990.
26. A. Duell-Hallen, "A family of multiuser decision-feedback detectors for asynchronous code-division multiple-access channels", IEEE Trans. on Communications, vol. 43, no. 5, pp. 796-807, June 1994.
27. C. Schlegel, P. Alexander, and S. Roy, "Coded asynchronous CDMA and its efficient detection", IEEE Trans. on Information Theory, vol. 44, no. 7, pp.
2837-2847, November 1998.
2837-2847, November 1998.
28. L.K. Rasmussen, T.J. Lim, and A.-L. "A matrix-algebraic approach to successive interference cancellation in CDMA", IEEE Trans. on Communications, vol. 48, no. 1, pp. 145-151, January 2000.
29. M. Latva-aho and M.J. Juntti, "LMMSE detection for DS-CDMA systems in fading channels, IEEE Trans. on Communications, vol. 48, no. 2, pp. 194-199, February 2000.
Claims (16)
1. A receiver suitable for either a base station or a user station of a CDMA
communications system comprising at least one base station (11) and a plurality of user stations (10 1...10U) each communicating with said at least one base station via a corresponding one of a plurality of channels, said base station and each user station having a transmitter and a said receiver, the receiver receiving a signal comprising components corresponding to signals from the different transmitters of the base station and/or user stations and comprising processing means (18) for deriving an observation matrix from the received signal, the receiver comprising a plurality of receiver modules (21) each comprising means (19) for deriving from the observation matrix one or both of a corresponding observation vector and post-correlation observation vector and a beamformer for processing one or other of the observation vector and the post-correlation observation vector to provide estimates of symbols transmitted by a corresponding user station, and means (42,43) for providing at least one constraint matrix representing interference subspace of components of the received signal corresponding to selected ones of the user signals of the plurality of receiver modules, at least one (21d) of said plurality of receiver modules having means (28d) responsive to at least the post-correlation observation vector for deriving an estimate of the channel parameters for the channel between the receiver and the corresponding transmitter, and a beamformer (47d) for processing one or other of the observation vector and the post-correlation observation vector to produce estimates of the symbols transmitted by said transmitter, the beamformer having means for adjusting coefficients of the beamformer in dependence upon the constraint matrix and the channel estimate so as to tune the beamformer to provide a substantially unity response for that portion of the received signal from the corresponding transmitter and a substantially null response to that portion of the received signal corresponding to predetermined ones of other user signals and/or base station signals also received by the receiver.
communications system comprising at least one base station (11) and a plurality of user stations (10 1...10U) each communicating with said at least one base station via a corresponding one of a plurality of channels, said base station and each user station having a transmitter and a said receiver, the receiver receiving a signal comprising components corresponding to signals from the different transmitters of the base station and/or user stations and comprising processing means (18) for deriving an observation matrix from the received signal, the receiver comprising a plurality of receiver modules (21) each comprising means (19) for deriving from the observation matrix one or both of a corresponding observation vector and post-correlation observation vector and a beamformer for processing one or other of the observation vector and the post-correlation observation vector to provide estimates of symbols transmitted by a corresponding user station, and means (42,43) for providing at least one constraint matrix representing interference subspace of components of the received signal corresponding to selected ones of the user signals of the plurality of receiver modules, at least one (21d) of said plurality of receiver modules having means (28d) responsive to at least the post-correlation observation vector for deriving an estimate of the channel parameters for the channel between the receiver and the corresponding transmitter, and a beamformer (47d) for processing one or other of the observation vector and the post-correlation observation vector to produce estimates of the symbols transmitted by said transmitter, the beamformer having means for adjusting coefficients of the beamformer in dependence upon the constraint matrix and the channel estimate so as to tune the beamformer to provide a substantially unity response for that portion of the received signal from the corresponding transmitter and a substantially null response to that portion of the received signal corresponding to predetermined ones of other user signals and/or base station signals also received by the receiver.
2. A receiver for either a base station of a CDMA communications system in which a plurality of user stations (10 1...10U) each having an antenna array comprising one or more antennas communicate with a base station (11) having an antenna array (12) comprising one or more reception antennas (12 1...12M), each of the user stations having spreading means (13 1...13U) for using a spreading code (c1(t)...c U(t)) unique to that station to spread a corresponding one of a plurality of user signals (b1n....b U n) ) and means for transmitting the spread user signals to the base station antenna array (12) via a propagation channel (14 1...14U) unique to that user station, the receiver comprising preprocessing means (18) and a plurality of receiver modules (21I ...21U) having their respective inputs connected in common to an output of the preprocessing means (18) and each corresponding to a respective one of the user stations, the preprocessing means (18) being arranged to receive from the antenna array an antenna array signal vector (X(t)) comprising a plurality of spread data vectors (X1(t)... X U(t)) corresponding to the signals from the different user stations received by the reception antenna array and having means for filtering, sampling and buffering the antenna array signal vector (X(t)) to produce a succession of observation matrices (Y n), and supplying the observation matrices (Y n) to each of the receiver modules (21 1...21U);
each of the receiver modules (21 1...21U) comprising a despreader (19 U), a channel identification means (28U), a beamformer (27U) and output means (29U,30U), the despreader (19U) being arranged to despread each observation matrix using the spreading code of the corresponding user to form a post-correlation observation vector (Z n) and the channel identification means (28 u) being arranged to derive from the post-correlation observation vector a set of estimated channel parameters (y~u) for the channel whereby the signal from the corresponding user station reached the antenna array, the beamformer (27u) having means (51) for weighting each of the elements of each observation vector in turn using weighting coefficients (W d n), tuning means (50) for adjusting the weighting coefficients ( W n d) in dependence upon at least said estimated channel parameters, and means (52) for combining the weighted elements to produce a respective symbol of a corresponding one of a plurality of output signals (~b1 n...~b u n ) corresponding to the plurality of user signals (b1 n...b u n), respectively, the receiver further comprising constraints-set generation means (42) responsive to a set of channel parameter estimates and either or both of an actual value of the symbol from at least one of the beamformers and at least one hypothetical symbol value for deriving a constraints-set, constraint matrix generation means (43) responsive to said constraints-set to form at least one constraint matrix and for generating an inverse matrix by inverting the constraint matrix and conjugating it with itself;
the respective tuning means of at least some of the beamformers being responsive to said at least one constraint matrix to adjust the weighting coefficients (~S d n) of their respective beamformers such that, in successive symbol periods, the coefficients of each of said at least some of the beamformers are adjusted so as to tune a substantially unity response for that portion of the antenna array signal vector corresponding to the user signal from the corresponding user station and a substantially null response to that portion of the antenna array signal vector corresponding to the user signals received from those user stations corresponding to the receiver modules which contribute a constraint waveform to the constraint matrix generation means;
the output means of each receiver module being responsive to the output of the corresponding beamformer for providing estimates of the symbols of the corresponding user signal.
each of the receiver modules (21 1...21U) comprising a despreader (19 U), a channel identification means (28U), a beamformer (27U) and output means (29U,30U), the despreader (19U) being arranged to despread each observation matrix using the spreading code of the corresponding user to form a post-correlation observation vector (Z n) and the channel identification means (28 u) being arranged to derive from the post-correlation observation vector a set of estimated channel parameters (y~u) for the channel whereby the signal from the corresponding user station reached the antenna array, the beamformer (27u) having means (51) for weighting each of the elements of each observation vector in turn using weighting coefficients (W d n), tuning means (50) for adjusting the weighting coefficients ( W n d) in dependence upon at least said estimated channel parameters, and means (52) for combining the weighted elements to produce a respective symbol of a corresponding one of a plurality of output signals (~b1 n...~b u n ) corresponding to the plurality of user signals (b1 n...b u n), respectively, the receiver further comprising constraints-set generation means (42) responsive to a set of channel parameter estimates and either or both of an actual value of the symbol from at least one of the beamformers and at least one hypothetical symbol value for deriving a constraints-set, constraint matrix generation means (43) responsive to said constraints-set to form at least one constraint matrix and for generating an inverse matrix by inverting the constraint matrix and conjugating it with itself;
the respective tuning means of at least some of the beamformers being responsive to said at least one constraint matrix to adjust the weighting coefficients (~S d n) of their respective beamformers such that, in successive symbol periods, the coefficients of each of said at least some of the beamformers are adjusted so as to tune a substantially unity response for that portion of the antenna array signal vector corresponding to the user signal from the corresponding user station and a substantially null response to that portion of the antenna array signal vector corresponding to the user signals received from those user stations corresponding to the receiver modules which contribute a constraint waveform to the constraint matrix generation means;
the output means of each receiver module being responsive to the output of the corresponding beamformer for providing estimates of the symbols of the corresponding user signal.
3. A receiver according to claim 1 or 2, wherein:-the receiver further comprises means (44) for reshaping each of the observation matrices to form an observation vector;
the ISR beamformer operates upon the observation vectors, the channel estimation unit supplies spread channel parameters to the beamformer for use in updating its coefficients;
the constraint matrix generator supplies user-specific observation matrices to the constraint matrix generator; and the constraint matrix generator comprises means for reshaping each user-specific observation matrix to form a respective one of a plurality of columns of the constraint matrix and supplies the resulting constraint matrix to each of the desired user stations.
(Fig.9)
the ISR beamformer operates upon the observation vectors, the channel estimation unit supplies spread channel parameters to the beamformer for use in updating its coefficients;
the constraint matrix generator supplies user-specific observation matrices to the constraint matrix generator; and the constraint matrix generator comprises means for reshaping each user-specific observation matrix to form a respective one of a plurality of columns of the constraint matrix and supplies the resulting constraint matrix to each of the desired user stations.
(Fig.9)
4. A receiver according to claim 1 or 2, wherein:
the constraints-set generator (42C) comprises a plurality of respreaders (57C
etc) each for respreading a respective one of the estimated symbols from the STAR
units, means (58C etc) for scaling each of the respread symbol estimates by the amplitude of the corresponding estimated symbol, and a plurality of channel replication means (59C) having coefficients adjustable in dependence upon the channel coefficient estimate for filtering the corresponding respread and scaled symbol estimate to provide a user-specific observation matrix estimate and means for summing the user-specific observation matrices and supplying the observation matrix estimate so obtained to the constraint matrix generator, the constraint matrix generator comprising means (43C) for reshaping the estimated observation matrix to form a single column constraint matrix and supplying the constraint matrix to the beamformer.
(ISR-TR Fig. 13)
the constraints-set generator (42C) comprises a plurality of respreaders (57C
etc) each for respreading a respective one of the estimated symbols from the STAR
units, means (58C etc) for scaling each of the respread symbol estimates by the amplitude of the corresponding estimated symbol, and a plurality of channel replication means (59C) having coefficients adjustable in dependence upon the channel coefficient estimate for filtering the corresponding respread and scaled symbol estimate to provide a user-specific observation matrix estimate and means for summing the user-specific observation matrices and supplying the observation matrix estimate so obtained to the constraint matrix generator, the constraint matrix generator comprising means (43C) for reshaping the estimated observation matrix to form a single column constraint matrix and supplying the constraint matrix to the beamformer.
(ISR-TR Fig. 13)
5. A receiver according to claim 1 or 2, wherein the constraints-set generator (42E) comprises respreaders (57D) and channel replicators (59D), the set of observation matrices are supplied to the constraint matrix generator (43D) which reshapes each matrix to form one column of the constraint matrix.
(ISR-R Fig. 15)
(ISR-R Fig. 15)
6. A receiver according to claim 1 or 2, wherein the channel identification unit generates an estimate of each of a plurality of sub-channels of the propagation channel and the channel replicator produces a set of observation matrices comprising one for each of said sub-channels.
(ISR-D Fig. 16)
(ISR-D Fig. 16)
7. A receiver according to claim 1 or 2, wherein the constraints-set generator uses hypothetical values of said symbols to produce said set of user-specific observation matrices.
(ISR-H Fig.17)
(ISR-H Fig.17)
8. A receiver according to claim 1 or 2, wherein the constraints-set uses a combination of estimated symbol values and hypothetical symbol values in producing said set of user-specific observation matrices.
(ISR-RH Fig. 20)
(ISR-RH Fig. 20)
9. A receiver according to any one of claims 3 to 8, wherein the beamformer operates upon the post-correlation observation vector and the constraint matrix generator comprises means for despreading each of the user-specific observation matrices.
(Figs. 21, 22, 23, 24, 26 - AD)
(Figs. 21, 22, 23, 24, 26 - AD)
10. A receiver according to claim 1, wherein the ISR receiver module employs both an MRC beamformer and an ISR beamformer.
11. A receiver according to claim 1, wherein the receiver module employs group ISR.
12. A receiver according to claim 1, comprising a plurality of receiver modules arranged adapted to perform successive ISR, the receiver modules being arranged in hierarchical order according to signal power and each lower power receiver module using a constraint matrix formed from the constraints supplied by each of the higher power receiver modules.
13. A receiver according to claim 1, wherein the ISR receiver module is adapted to receive multicode signals and the despreader comprises means for despreading the observation matrix using a plurality of codes corresponding to the multicodes.
14. A receiver according to claim 12, wherein the despreader uses a compound code formed by weighting the multicodes with the corresponding estimated symbols.
15. A receiver according to claim 1, wherein the receiver module performs multirate ISR.
16. A receiver according to any one of claims 11 to 15, wherein the receiver is located at a user/mobile station and receives signals from a plurality of base stations.
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2318658A CA2318658C (en) | 1999-12-23 | 2000-09-12 | Interference suppression in cdma systems |
PCT/CA2000/001524 WO2001048944A1 (en) | 1999-12-23 | 2000-12-22 | Interference suppression in cdma systems |
JP2001548942A JP4666865B2 (en) | 1999-12-23 | 2000-12-22 | Interference suppression in CDMA systems |
CA002394630A CA2394630C (en) | 1999-12-23 | 2000-12-22 | Interference suppression in cdma systems |
AU23352/01A AU2335201A (en) | 1999-12-23 | 2000-12-22 | Interference suppression in cdma systems |
EP00986926A EP1240731B1 (en) | 1999-12-23 | 2000-12-22 | Interference suppression in cdma systems |
US09/742,421 US6975666B2 (en) | 1999-12-23 | 2000-12-22 | Interference suppression in CDMA systems |
DE60027199T DE60027199T2 (en) | 1999-12-23 | 2000-12-22 | NOISE SIGNAL SUPPRESSION IN CDMA SYSTEMS |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002293097A CA2293097A1 (en) | 1999-12-23 | 1999-12-23 | Interference suppression in cdma systems |
CA2,293,097 | 1999-12-23 | ||
CA2318658A CA2318658C (en) | 1999-12-23 | 2000-09-12 | Interference suppression in cdma systems |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2318658A1 CA2318658A1 (en) | 2001-06-23 |
CA2318658C true CA2318658C (en) | 2010-03-23 |
Family
ID=25681425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2318658A Expired - Lifetime CA2318658C (en) | 1999-12-23 | 2000-09-12 | Interference suppression in cdma systems |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2318658C (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111954281A (en) * | 2020-07-28 | 2020-11-17 | 西安理工大学 | Swarm unmanned aerial vehicle formation clustering routing method based on wireless ultraviolet light communication |
CN112752291B (en) * | 2020-12-15 | 2022-12-13 | 中国联合网络通信集团有限公司 | Uplink rate evaluation method and device |
-
2000
- 2000-09-12 CA CA2318658A patent/CA2318658C/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
CA2318658A1 (en) | 2001-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6975666B2 (en) | Interference suppression in CDMA systems | |
EP0978951B1 (en) | Linear space-time multiuser detector | |
US8588349B2 (en) | Interference cancellation in variable codelength systems for multi-access communication | |
Moshavi | Multi-user detection for DS-CDMA communications | |
KR0158092B1 (en) | Adaptive spectrum spreading receiver | |
US7158558B2 (en) | Wideband multiple access telecommunication method and apparatus | |
EP1197006B1 (en) | Multistep rake combining method and apparatus | |
JP3893151B2 (en) | Multiple access digital transmission apparatus and radio base station and receiver for use in such apparatus | |
JP3305650B2 (en) | Multiple code code division multiple access receiver and its receiving method | |
Buehrer et al. | A comparison of multiuser receivers for cellular CDMA | |
US20050207477A1 (en) | Technique for adaptive multiuser equalization in code division multiple access systems | |
EP1726101A1 (en) | Successive interference cancellation in a generalized rake receiver architecture | |
EP1851869A1 (en) | System, apparatus, and method for adaptive weighted interference cancellation using parallel residue compensation | |
EP1678841A1 (en) | A unified mmse equalization and multi-user detection approach for use in a cdma system | |
WO2007071056A1 (en) | Method and system for adaptive duplicated filters and interference cancellation. | |
EP1240731B1 (en) | Interference suppression in cdma systems | |
US20110065441A1 (en) | Method and system for optimizing programmable interference suppression | |
CA2318658C (en) | Interference suppression in cdma systems | |
CA2394630C (en) | Interference suppression in cdma systems | |
CA2293097A1 (en) | Interference suppression in cdma systems | |
Mao | Improved Subtractive Interference Cancellation for DS-CDMA | |
Kumar | Performance Comparison of Decorrelating Rake Receiver and MMSE Detector | |
Lin et al. | A low complexity partially adaptive CDMA receiver for downlink mobile satellite communications | |
Tenqchen et al. | Design of an efficient RAKE receiver architecture for multiuser detection with adaptive channel estimation | |
Faragalla | Improving Digital Signaling on Time Varying Channels using RAKE Receiver |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20200914 |
|
MKEX | Expiry |
Effective date: 20200914 |