WO2001033791A1 - Increasing data transmission bit rates - Google Patents

Increasing data transmission bit rates Download PDF

Info

Publication number
WO2001033791A1
WO2001033791A1 PCT/GB2000/002648 GB0002648W WO0133791A1 WO 2001033791 A1 WO2001033791 A1 WO 2001033791A1 GB 0002648 W GB0002648 W GB 0002648W WO 0133791 A1 WO0133791 A1 WO 0133791A1
Authority
WO
WIPO (PCT)
Prior art keywords
isi
symbols
constellation
reliable
estimation
Prior art date
Application number
PCT/GB2000/002648
Other languages
French (fr)
Inventor
Eilon Riess
Original Assignee
Verticalband Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verticalband Limited filed Critical Verticalband Limited
Priority to AU59963/00A priority Critical patent/AU5996300A/en
Priority to US09/836,281 priority patent/US7143013B2/en
Publication of WO2001033791A1 publication Critical patent/WO2001033791A1/en
Priority to US09/899,852 priority patent/US7085691B2/en
Priority to US09/899,843 priority patent/US7110923B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/06Dc level restoring means; Bias distortion correction ; Decision circuits providing symbol by symbol detection
    • H04L25/067Dc level restoring means; Bias distortion correction ; Decision circuits providing symbol by symbol detection providing soft decisions, i.e. decisions together with an estimate of reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0238Channel estimation using blind estimation

Definitions

  • This invention relates to signal transmission systems, and in particular, to systems in which a continuously transmitted signal carries a series of discrete voltage levels
  • a multi-level input passes through a signal path having the characteristics of a finite response (FIR) filter
  • FIR finite response
  • a communication system can be divided into three basic elements transmitter, channel and receiver The second element - the channel is the one that determines the upper limit of the communication bit rate For binary transmission (e g transmission of + 1 V and -1 V), when the bit rate is close to the channel bandwidth, internal noise is introduced This noise, which is responsible for the upper limit on the bit rate, is called ISI (Inter Symbol Interference) Under
  • bit rate can be thought as the area of a rectangle, where one axis is the symbol rate and the other axis is the log2 of the constellation size (voltage axis)
  • This training sequence Normally a training sequence is initially sent to the receiver This training sequence, in effect, provides the receiver with information about the channel parameters
  • the use of a training sequence implies a delay before proper transmission can begin, and if the nature of the communication channel changes frequently, as is the case (for example) in the case of mobile telephone systems, it is necessary to repeat the training sequence regularly, which slows down the total possible rate of data communication, so requiring a wider bandwidth or lower bit rate Also, in a situation where a receiver begins to receive a transmission which has already started (e g digital TV), the training sequence will not necessarily be available
  • the present invention seeks to provide a method of enabling high order constellation communication, without lowering the symbol rate, by evaluating the channel characteristics without the use of a specific training sequence
  • High order constellation communication through ISI channels has the property that the ISI noise effect is much larger than at lower order constellation
  • the high order constellation acts in effect, as an amplifier on the basic binary ISI noise level This high level noise prohibits the estimation of the channel characteristics under high order constellation in known systems
  • the present invention provides a method of high order constellation signal transmission through an ISI channel, by identifying "reliable symbols", that is to say symbols which are closer to their received constellation points (i e their scaled transmitted symbols free from ISI noise effect symbols) than to any other received constellation point
  • the constellation may be of any size and the channel may be up to the binary open eye channel limit ( ⁇ H ⁇ D- telSI
  • the method of the invention preferably comprises identifying a symbol having surrounding symbols of a relatively lower level, up to some predetermined distance before and after the identified symbol, nominating the identified symbol as a "reliable symbol", and repeating the process a number of times along the received signal sequence, in order to gather a sufficient number of reliable symbols to enable a proper evaluation of channel characteristics to be achieved
  • the method of the invention includes the step of estimating the constellation points location, so as to establish the channel gain, and then estimating the ISI coefficients so that a suitable inverse operation can be carried out in order to minimise the ISI noise
  • Figure 1 is a functional block diagram of the method of the invention
  • Figure 2 is a diagram illustrating a first sequence of transmitted symbols
  • Figure 3 is a diagram illustrating a second sequence of transmitted symbols
  • Figure 4 shows a 256 QAM signal constellation
  • Figure 5 shows the algorithm for constellation points location estimation
  • Figure 6 shows the algorithm for channel parameters (ISI coefficient) estimation
  • a signal constellation 4 is applied to a QAM modulator 2 so as to produce an output which is applied to an ISI channel 6
  • the resultant transmitted constellation after demodulation as indicated at 8, consists of constellation points which have been shifted by the ISI channel, and the output from the demodulator 10 is applied to a reliable symbols extractor 12 which produces two outputs
  • One output, indicated at 14, consists of the extracted reliable symbols, whilst the other output 16 consists of the related surrounding symbols for each reliable symbol, and these two signals are applied to a channel parameter estimator 18
  • These two outputs 20 and 22 are applied to the input of an inverse channel filter
  • this illustrates the transmission of a series of different symbols 30, 32 , 40, 42, having voltage levels +1 1 , -5, +7, +7, +1 1 , -3, and +13 respectively
  • each different transmitted symbol in the case illustrated, is represented by a different voltage level, the voltage levels being separated by two volts, the maximum being 13 volts
  • a received central symbol is illustrated at 44, and it will be seen that this has an amplitude of just under 13 volts, but this amplitude is not likely to be "reliable", because the surrounding symbols 30, 32, 34 and 38, 40, 42 are of relatively high amplitude, and in fact, of course, the received symbol 44 really represents the transmitted symbol 36 but has a considerably greater apparent amplitude
  • Figure 3 illustrates the situation in the same ISI channel, where a series of low amplitude transmitted signals, 46, 48, 50, 52, 54 and 56 surround a relatively high amplitude signal (7V) 58
  • the received symbol 60 is much closer in amplitude to the signal 58 than any other possible constellation point because the inter symbol interference is at a lower level, as a result of the lower amplitudes of the surrounding symbols
  • the channel characteristics can be derived if a sufficient number of reliable symbols can be identified
  • Figure 4 shows (by way of example) a 256 QAM signal constellation
  • Figure 5 shows the algorithm for constellation points location
  • Figure 6 shows the algorithm for channel parameter estimation
  • the following analysis presents a model for the noise that is generated from the combination of ISI and high order constellation
  • n? s , ⁇ ISI,-keeping-Xn ⁇ ie[n-b,n + f],i ⁇ n
  • Figure 2.2 Comparison of the n, S ⁇ pdf (ISI length -3) with the gaussian pdf
  • Blind detection under high order constellation and Intersymbol Interference (ISI) channel is a desired capability. Enabling high order constellation communication without lowering the symbol rate enables higher bit rate, for very important present and future communication scenarios. Examples for such scenarios are: one receiver for several transmitters, mobile phones and digital TV transmission. High order constellation is shown to have an amplifier effect on the level of the ISI channel affect. We present a new method, the ' ⁇ Reliable Symbols" method, which enables estimation of the channel parameters and the received constellation points under high order constellation and ISI channel. Based on these estimations, successful detection can be done using non-blind methods.
  • the "Reliable Symbols” method enables to identify received symbols that are closer to their constellation points, than to any other constellation point. An estimation of the received constellation points (the product of the transmitted constellation points and the channel gain) based on the "Reliable Symbols” method is presented. Using in addition to the reliable symbols, the surrounding symbols of every reliable symbol, an estimation of the channel parameters is presented.
  • the “Reliable Symbols” method enables estimation for channels up to the binary open eye level ( while there is no limit on the constellation size. Simulations confirm the "Reliable Symbols" method and the related estimations to be successful under channels up to the binary open eye level and for constellation up to at least 1024QAM.
  • ISI Intersymbol Interference
  • the CMA main advantage is that it does not requires carrier frequency recovery.
  • the CMA is suitable for constellation size of up to 64 points [1]
  • the MultiModulus Algorithm (MMA) [1],[7], is based on the CMA but acts on each axis, in the QAM constellation, separately
  • the (MMA) is suitable for constellation size of up to 128 points [1]
  • the General MMA (GMMA) [1] is the latest algorithm, which in principle divides the full constellation to subsets and minimise the MMA cost function according to each subset
  • the GMMA was shown to be suitable for constellation size of 256 points [1] All the mentioned algorithms do not address the problem of the constellation size amplifier effect Consequently they are optimal just for 4QAM or PSK
  • the minimum of the different cost functions raise with the constellation size, which make them unsuitable for use in common ISI channels where just low order constellation communication operates successfully
  • the present algorithms require the knowledge of the transmitted points and the channel gain recovery
  • the estimation is blind, in the sense that no training sequence is used
  • the required length of the data sequence is a function of the length and level of the ISI, and the constellation size
  • Channel estimation using "Reliable Symbols” is suitable under variety of environments: Mobile phone channels where the ISI “window” length is short (about four coefficients) can be recovered effectively in “real time” for moderate constellation sizes Data transmission over the telephone line, even under very high constellation size or/and long ISI window, where by using data storage capability the channel parameters can be recovered Digital TV and other applications using VDSL, where the very high symbol rates enables to recover the channel parameters even for very high constellations or/and long ISI windows, effectively in "real time” High order constellation in software radio [1 1], where the transmitter and the channel parameters has to be recovered [12]
  • Scaled transmitted symbols because of the channel gain Channel and transmitter parameters estimations based on the "Reliable Symbols" method enable higher bit rate communication, by using higher order constellation, for a given limited bandwidth channel with symbol rate of up to the limit of the binary closed eye for 4QAM constellation.
  • Section 4.2 presents the "Reliable Symbols" theory.
  • Section 4.3 presents the constellation points estimation.
  • Section 4.4 presents the ISI coefficients estimation.
  • Section 4.5 presents adaptive estimation properties and Section 4.6 presents the simulation results and Section 8 contains the conclusions.
  • the data points are considered to have the same importance when they are following the same statistics laws.
  • a fraction of the data points are closer to their origin points, their received constellation points, than to any other received constellation points (Ch. 2).
  • the name, "Reliable Symbols” indicates that their metric from their closest received constellation points are the real metrics that are caused because of the channel noise. It is shown in the following sections, that knowing the right metric enables to recover or to estimate some key parameters in data communication as the ISI coefficients and the channel gain.
  • AWGN Gaussian Noise
  • the surrounding symbols can be considered as controllable In general as the energy of the surrounding symbols are smaller the metric of a received data point from its origin point is smaller. Let us examine the case where the surrounding symbols have the same sign as the related ISI coefficients. In this case the metric is.
  • the ISI is assume to be in the worst case, where its coefficients are distributed uniformly and equal the maximum one Following a restriction on the sum of the absolute of the ISI noise
  • a symbol is from the Reliable Symbol subset if (not if and just if) its surrounding symbols fulfils
  • the open eye limit is not a hard limit. Even in the case where the ISI channel exceeds the open eye limit reliable symbols could be found, but in addition not reliable symbols, mistakenly, could be considered as reliable. This error effect increases as the increases. Conceptually it can be considered similar to the Error - Rate function
  • the surrounding symbols can be with one symbol from the second layer of the constellation points
  • the surrounding symbols can be from both the first and second layer of the constellation points
  • one of the surrounding symbols can be in addition to the first and second layers, in the third layer of the constellation points
  • the I axis surrounding symbols have an influence on the Q axis symbols (and the same for Q on I)
  • the criterion on the surrounding symbols is to be under some energy limit, the real energy of the symbol, that is influenced from both the I and Q axis
  • the surrounding symbols have to be from the four lowest energy symbols, the lowest 4QAM in the QAM constellation
  • the probability to find a reliable symbol in this case is
  • x' is the ensemble of surrounding sequences under the 0 5 limit criterion, where one of the symbols is in the second layer of the constellation (the second layer under the same scale has magnitude of three)
  • the probability to find a reliable symbol is k+ ⁇ time higher than in the regular limit 1 reliable symbols detection In other words, the required sequence length becomes substantial shorter when allowing controllable small error events
  • a received signal has a low energy because 1) Its origin point has low level energy, and its surrounding symbols have low level energies 2) Its origin point has low level energy and its surrounding symbols have higher level energies, then the received signal in half of the cases will approach zero or even change sign if the combination of ISI and surrounding symbols are high 3) The origin point has high energy level and a special combination of relative high level energies surrounding symbols occurs
  • the last scenario is the problematic one, which may include surrounding symbols that are not under the required criterion
  • the probability of scenario 3 depends on the size of the ISI and dramatically on the criterion limit The lower the limit the lower the number of combination for scenario 3, which means a smaller probability of scenario 3 to happened In the cases when the ISI is known to be very short, as 2-4 coefficients at most, and the ISI or the constellation size are relative large, it is required to take more than just 2-4 reliable symbols to deal with scenario 3 effect (4-6 respectively, are recommended)
  • a major estimation parameter is the gain of the channel.
  • the channel gain provides to recover the location of the transmitted points, the constellation points, on the I-Q plan.
  • the detection process relies deeply on the constellation points estimation.
  • Hard decision detection, or the variety of soft decision detection methods use the distance between the transmitted point to the received point as a central parameter for detection. Communication through an ISI channel will result with symbols exceeding the extreme points of the transmitted constellation. In fact the received data points could reach as far as 1 + ⁇
  • Reliable symbols by definition, have the property that the maximum distance from their origin transmitted points are, at most, half the distance of the nearest transmitted points in the constellation. Lets again define this distance to be one unit. After detecting "enough" received data points, we'll choose the maximum in magnitude in the I and Q axes from the reliable symbols set to be the initial maximum constellation point in each axis. Enough data points, according to the probability to find reliable symbols from the highest magnitude. Let 'ma be the initial estimation of the maximum constellation point, then:
  • consttelation - 1 is the estimation of the remaining constellation points in each axis, where is the index from zero to each direction.
  • Eq.(4.14) is the number of constellation point for every axis minus one) Notice that while the error in the maximum estimated points can be up to one unit, for points that are closer to zero the upper limit on the error goes down to,
  • ISI coefficients estimation is a crucial stage in data detection under ISI channel.
  • the ISI coefficients are essential for the recovering data process, using either equalization or soft decision detection as MAP [8], [9], or both.
  • High order constellation communication under ISI channel has a much larger noise level because of the amplifier effect caused by the constellation size (Chapter 2).
  • reliable symbols in effect, we bypass the high constellation noise effect. In other words, using reliable symbols enables to make the estimation under the same conditions as for the low order constellation case.
  • the estimation method is divided into two methods groups, when the ISI effect is known to be under ⁇ lSl ⁇ ⁇ 0.5 (or under a lower limit) and for the more general case where
  • the metric of a received signal from its origin depends on the ISI coefficients, the surrounding symbols and the AWGN Eq.(2.1)).
  • the ISI coefficients are simply a solution of k (the length of the ISI window) linear equations. The exact solution becomes to be the estimation when the surrounding symbols are noisy, then the optimal linear mean square solution is required.
  • the surrounding transmitted symbols are not known. Instead we use the received signal energies. For: y ⁇ x n + n, s ⁇ (4.22) where n is from a surrounding symbols set, y n the related received signal and n ⁇ s , the related ISI noise effect. Under the assumption that a low level received signal represent a low level surrounding symbol (Sec 4 2 5), we'll use the general LS
  • the constellation points estimation process uses the surrounding received signals, by choosing those that are under some magnitude limit In the ISI coefficients estimation, beside of choosing the surrounding received signals to be under some magnitude limit, the estimation process uses the exact value of them (The X matrix)
  • the quality and the limit of the estimation depend on the surrounding received signals noise level From simulation it appear that the limit is
  • /S/[ 0 5 Above this limit the statistical
  • the quality of estimation is a monotonically increasing function of the number of rows in the A' matrix, the number of reliable symbols Simulation shows that from k+2 rows the estimation has a very small error for moderate SNR
  • the central symbol, the reliable symbol has a major effect on the surrounding received signals (Sec 4 2 5)
  • the limit on the energy of the reliable symbols is a function of the assumed upper limit
  • the probability to find a reliable symbol under the additional constraint then becomes a For ⁇ 0 5 it was found that the reliable symbol magnitude can be up to the second layer of the constellation The probability then becomes
  • the W matrix operates as a diagonal weighted matrix [15]
  • Eq (4 23) uses the W matrix to attach different weights for the different reliable symbols rows As the reliable symbol is higher, up to its energy limit, the related weight value is lower In such way the low energy reliable symbols that can produce better estimation, have larger weight in the estimation process than the higher energy levels symbols Simulations have shown that values in the range of 0 7-1 are useful When the ISI channel is a symmetric FIR filter it is easy to show that the LS equation requires just half of the required rows, reliable symbols, although the length of the surrounding symbols has to remain the same Fig (4 1-4 3) shows the required data length
  • ISI length Figure 4.1 Required data length vs. ISI length for different constellations
  • ISI length Figure 4.3 Required data length vs. ISI length for different constellations. ⁇ lSl ⁇ ⁇ 0.5
  • the ISI channel is a symmetric FfR filter.
  • the reliable symbols can be placed between five discrete possible magnitudes (but not just there), lower than their origin points, with different probabilities, for each origin point Because of the relative high level ISI the reliable symbols is limited to be just from the first layer of the constellation points.
  • the five discrete magnitudes that reliable symbols can be placed in, the related surrounding symbols set-up and the related probabilities are (for probability comparison we'll use the condition probability, where the surrounding symbols are assumed to be in the first layer The probability on the sign is 05 ) a The scenario with no ISI noise
  • the probability is 0125 d
  • the length of the required data for the estimation is based on the probability from Eq (4 1 1) multiplied by the probability to have reliable symbols just from the first layer in the constellation points Fig (4 4) shows the required data length for estimation, with eight reliable symbols (according to the probabilities in 4 2 1 a-c), as a function of the constellation size
  • the upper limit on the variation speed is a function of the minimum number of reliable symbols needed for estimation N TMm ) and the rate of finding a reliable symbol (R re ⁇ ) Because in the estimation process the processed data has to be under similar channel environment, the upper limit on the variation is determines by the product N n - Rrd
  • Figure 4.6 64 QAM under ISI [-0.15, 0.35, 0.35, -0 15] the edge of "close eye ”) than 10% and constellation points estimation with error smaller than 2 5%, for the lowest towards zero constellation point, with 180,000 received data points
  • ISI [-0 15,0 35,0 35,-0 15] (
  • 1 ) I-Q graph, where the errors for both estimations were zero Although the lower limit is around 64,000 points, for most ISI channels 40,000 received data points was enough for successful estimations

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Digital Transmission Methods That Use Modulated Carrier Waves (AREA)

Abstract

A method of high order constellation communication through ISI channels, by identifying 'reliable symbols' which are closer to their received constellation points or scaled transmitted symbols free from ISI noise effect symbols, than to any other constellation point, and using them to evaluate the channel characteristics.

Description

Increasing Data Transmission Bit Rates
This invention relates to signal transmission systems, and in particular, to systems in which a continuously transmitted signal carries a series of discrete voltage levels Thus it may be applied to communication systems or to any other system in which a multi-level input passes through a signal path having the characteristics of a finite response (FIR) filter Such a system is referred to herein generally as an "ISI channel" In conventional digital data transmission systems, signals are usually transmitted in a "binary" scheme, that is to say as two discrete voltage levels However, it is possible to increase the data rate over a given channel, by transmitting higher order constellations, in which, instead of two distinct voltage levels, several voltage levels are used A communication system can be divided into three basic elements transmitter, channel and receiver The second element - the channel is the one that determines the upper limit of the communication bit rate For binary transmission (e g transmission of + 1 V and -1 V), when the bit rate is close to the channel bandwidth, internal noise is introduced This noise, which is responsible for the upper limit on the bit rate, is called ISI (Inter Symbol Interference) Under the "ISI noise" the received bit voltage level is the sum of a scaled transmitted bit level plus noise, which is a linear combination of the surrounding bits of the received bit Once the channel characteristics are known an inverse operation can be done, at the receiver, to minimise the ISI noise effect When the transmission rate is low enough (no ISI effect), the bit rate can be increased by transmission of higher order constellation Then instead of a binary transmission the transmitter can send one of several different voltage levels each
representing a symbol In general, 2" constellation order transmission, where every symbol carries n bits, has n times higher bit rate than in the binary transmission The bit rate can be thought as the area of a rectangle, where one axis is the symbol rate and the other axis is the log2 of the constellation size (voltage axis)
Normally a training sequence is initially sent to the receiver This training sequence, in effect, provides the receiver with information about the channel parameters
Unfortunately, however, the use of a training sequence implies a delay before proper transmission can begin, and if the nature of the communication channel changes frequently, as is the case (for example) in the case of mobile telephone systems, it is necessary to repeat the training sequence regularly, which slows down the total possible rate of data communication, so requiring a wider bandwidth or lower bit rate Also, in a situation where a receiver begins to receive a transmission which has already started (e g digital TV), the training sequence will not necessarily be available
Accordingly, the present invention seeks to provide a method of enabling high order constellation communication, without lowering the symbol rate, by evaluating the channel characteristics without the use of a specific training sequence
High order constellation communication through ISI channels has the property that the ISI noise effect is much larger than at lower order constellation The high order constellation acts in effect, as an amplifier on the basic binary ISI noise level This high level noise prohibits the estimation of the channel characteristics under high order constellation in known systems
Accordingly, the present invention provides a method of high order constellation signal transmission through an ISI channel, by identifying "reliable symbols", that is to say symbols which are closer to their received constellation points (i e their scaled transmitted symbols free from ISI noise effect symbols) than to any other received constellation point The constellation may be of any size and the channel may be up to the binary open eye channel limit ( ∑ H ≤ D- telSI
Since the ISI noise results from a combination of the ISI coefficient values and the surrounding symbols, the method of the invention preferably comprises identifying a symbol having surrounding symbols of a relatively lower level, up to some predetermined distance before and after the identified symbol, nominating the identified symbol as a "reliable symbol", and repeating the process a number of times along the received signal sequence, in order to gather a sufficient number of reliable symbols to enable a proper evaluation of channel characteristics to be achieved Preferably, therefore the method of the invention includes the step of estimating the constellation points location, so as to establish the channel gain, and then estimating the ISI coefficients so that a suitable inverse operation can be carried out in order to minimise the ISI noise
One embodiment of the invention will now be described by way of example, with reference to the accompanying drawings in which
Figure 1 is a functional block diagram of the method of the invention, Figure 2 is a diagram illustrating a first sequence of transmitted symbols, Figure 3 is a diagram illustrating a second sequence of transmitted symbols, Figure 4 shows a 256 QAM signal constellation, Figure 5 shows the algorithm for constellation points location estimation, and
Figure 6 shows the algorithm for channel parameters (ISI coefficient) estimation Referring to Figure 1 , a signal constellation 4 is applied to a QAM modulator 2 so as to produce an output which is applied to an ISI channel 6 The resultant transmitted constellation after demodulation, as indicated at 8, consists of constellation points which have been shifted by the ISI channel, and the output from the demodulator 10 is applied to a reliable symbols extractor 12 which produces two outputs One output, indicated at 14, consists of the extracted reliable symbols, whilst the other output 16 consists of the related surrounding symbols for each reliable symbol, and these two signals are applied to a channel parameter estimator 18 This in turn produces two parallel outputs, one output 20 consisting of ISI coefficients, whilst the other output 22 consists of the actual constellation points These two outputs 20 and 22 are applied to the input of an inverse channel filter
24, another input of which receives the output of the demodulator 10 directly, on line 26 Consequently, the inverse channel filter is able to produce a corrected symbols constellation 28, by applying the derived inverse channel characteristics to the symbols constellation received on line 26 The principle of operation of the reliable symbols extractor is illustrated in Figures
2 and 3, each of which illustrate a series of transmitted and received symbols
Referring to Figure 2, this illustrates the transmission of a series of different symbols 30, 32 , 40, 42, having voltage levels +1 1 , -5, +7, +7, +1 1 , -3, and +13 respectively Thus each different transmitted symbol, in the case illustrated, is represented by a different voltage level, the voltage levels being separated by two volts, the maximum being 13 volts
A received central symbol is illustrated at 44, and it will be seen that this has an amplitude of just under 13 volts, but this amplitude is not likely to be "reliable", because the surrounding symbols 30, 32, 34 and 38, 40, 42 are of relatively high amplitude, and in fact, of course, the received symbol 44 really represents the transmitted symbol 36 but has a considerably greater apparent amplitude
By contrast, Figure 3 illustrates the situation in the same ISI channel, where a series of low amplitude transmitted signals, 46, 48, 50, 52, 54 and 56 surround a relatively high amplitude signal (7V) 58 In these circumstances, the received symbol 60 is much closer in amplitude to the signal 58 than any other possible constellation point because the inter symbol interference is at a lower level, as a result of the lower amplitudes of the surrounding symbols Thus it is identified as a reliable symbol Since the ISI channel can be characterised by a channel gain and a series of coefficients operating on the symbols surrounding the "reliable symbol", the channel characteristics can be derived if a sufficient number of reliable symbols can be identified Figure 4 shows (by way of example) a 256 QAM signal constellation Figure 5 shows the algorithm for constellation points location, while Figure 6 shows the algorithm for channel parameter estimation The following analysis presents a model for the noise that is generated from the combination of ISI and high order constellation
2
Model of the noise under ISI and high order constellation
To present the "Reliable Symbols" theorem and the following different estimation methods, a model for the noise that is generated from the combination of ISI and high order constellation is derived. The Standard Deviation (STD) of the ISI noise under high order constellation is: n+f n+f n+f
E(ths,2 ) = E( ∑ x, ISI.X7 =E( ∑ ∑ x.-xp lSI,-„ - ISI ,_„) ι=n—b i—n—b j=n-b ≠n i≠n j≠n where χ„ is a transmitted symbol, i.i.d with uniform distribution, and ISI,, is an ISI coefficient.
Then, π+ f „ „?
E(n )= Σ E(x,2)-/S/,_„2 =E(x2)- ∑ZS7f_„2 = σ* 2-|/.S7|| (2.1) ι=n—b ι=—b i≠n ;≠0
Easy to show that E(nm) = 0.
Eq.(2.1) shows that the high order constellation is acting in effect as an amplifier on the basic STD of the ISI. Fig. (2.1) shows the STD of the ISI noise effect as a function of the size of the constellation. We'll use the pdf derivation of the sum of independent random variables [1] to find the pdf for a weighted sum of independent identical uniform distribution variables. For the weighted sum:
n?s, = ΣISI,-„-Xn ■ ie[n-b,n + f],i≠n
the characteristic function of «,", , is:
φ„ ω ) = E(ejωnχ = E(e ■ I I"" *')
Figure imgf000007_0001
= Φxι(ω)---φX2χω)
Wc refer as "noise" to the ISI effect on the signal AWGN refers to the gaussian noise where χt = ISh-n x, ■
Based on the property that the characteristic function is the Fourier transform of the pdf function/, the pdf of «,-„■ is:
/(/ι,«) = fχι * fχ2 * - * fx7k = fUSI-k x) * fUSI-k+x ) * • • • * KlSh x) (2.3) For the case where all the ISI coefficients are identical, the pdf of «,„■ is k-\ convolution of identical rectangular windows. When the ISI coefficients are not identical it's easy to show that the pdf of ms, is identical, in the second derivation
Figure imgf000008_0001
10 100 1000 10000
Constellation size [Log]
Figure 2.1: STD of the ISI effect as a function of the constellation size.
Figure imgf000008_0002
- \)
sign and similar in shape, to the pdf with identical coefficients. /(/;„,) becomes closer to the pdf of the gaussian process as a function of k (in a finite size range). Fig. (2.2) shows the pdf of //,•„• for ISI with k=3 where the coefficients are identical and as a comparison the gaussian distribution. Notice that while the central limit theorem [1] ensure that f(nιsι) has a gaussian pdf for infinite k, as low as k=3 where the pdf of nιsi is a function of ± χ2 (minus for the central part) f(n,S!) is already very close to the gaussian pdf.
Defining the range of magnitudes in each axis of the constellation to be unity, a uniform discrete distribution of the constellation points are dense enough, at high order constellation, to be considered as continues uniform distribution This means that the noise produced by high order constellation, uniform distributed communication, through an ISI channel can be modelled as a gaussian noise with zero mean and variance as in Eq.(2 1)
This gives the ability to use the SNR to model the noise level of the combine ISI - high order constellation, using the same scale as for the gaussian case
- ISI length 3 - Gaussian
Figure imgf000009_0001
-6 -4 -2 0 2 4 6
Figure 2.2: Comparison of the n, pdf (ISI length -3) with the gaussian pdf
The SNR as a function of the ISI and the constellation size, is then
Figure imgf000009_0002
Eq (2 4) emphasise the high level of ISI noise caused by the high order constellation "amplifier effect" In the next chapters we use the properties of the ISI- high order constellation noise that were developed in this chapter
Reference
[1] A Leon-Garcia, "Probability and random processes for electπcal engineering," Addison Wesley, Second edition, September 1994 "Reliable Symbols" theory and Channel
Parameters Estimations
Abstract
Blind detection under high order constellation and Intersymbol Interference (ISI) channel is a desired capability. Enabling high order constellation communication without lowering the symbol rate enables higher bit rate, for very important present and future communication scenarios. Examples for such scenarios are: one receiver for several transmitters, mobile phones and digital TV transmission. High order constellation is shown to have an amplifier effect on the level of the ISI channel affect. We present a new method, the '^Reliable Symbols" method, which enables estimation of the channel parameters and the received constellation points under high order constellation and ISI channel. Based on these estimations, successful detection can be done using non-blind methods.
The "Reliable Symbols" method enables to identify received symbols that are closer to their constellation points, than to any other constellation point. An estimation of the received constellation points (the product of the transmitted constellation points and the channel gain) based on the "Reliable Symbols" method is presented. Using in addition to the reliable symbols, the surrounding symbols of every reliable symbol, an estimation of the channel parameters is presented. The "Reliable Symbols" method enables estimation for channels up to the binary open eye level (
Figure imgf000010_0001
while there is no limit on the constellation size. Simulations confirm the "Reliable Symbols" method and the related estimations to be successful under channels up to the binary open eye level and for constellation up to at least 1024QAM. 4.1 Introduction
In this chapter a new method that enables successful parameters estimations under high order constellation communication through Intersymbol Interference (ISI) channels, is presented
Channel bandwidth limitations motivate the use of high order constellation communication, which enables high bit rates Fligh order constellation communication through ISI channel, as it is shown, has a very high ISI noise effect, where the constellation size is acting in effect as an amplifier on the ISI noise level Blind detection, which is based on channel parameters estimations, has been therefore a very difficult, if not impossible, task for high order constellation communication D [2] Normally blind detection for high order constellation is done using blind equalization Blind equalization is a mechanism that finds and implements the inverse filter for the channel impulse respond, which minimise some cost function The cost functions that are involved depend on the statistics of the transmitted symbols The simplest blind equalizer is the Reduce Constellation Algorithm (RCA) [1],[3] The cost function minimised by the RCA is the Minimum Square Error (MSE) with respect to a reduce number of symbols, which normally are not a subset of the constellation points The RCA is suitable for constellation size up to 32 points [1] The most common equalization method is the Constant Modulus Algorithm (CMA) [4], [5], [6] The cost function minimised by the CMA is the dispersion of the output of the equalizer around a circle. The CMA main advantage is that it does not requires carrier frequency recovery. The CMA is suitable for constellation size of up to 64 points [1] The MultiModulus Algorithm (MMA) [1],[7], is based on the CMA but acts on each axis, in the QAM constellation, separately The (MMA) is suitable for constellation size of up to 128 points [1] The General MMA (GMMA) [1] is the latest algorithm, which in principle divides the full constellation to subsets and minimise the MMA cost function according to each subset The GMMA was shown to be suitable for constellation size of 256 points [1] All the mentioned algorithms do not address the problem of the constellation size amplifier effect Consequently they are optimal just for 4QAM or PSK The minimum of the different cost functions raise with the constellation size, which make them unsuitable for use in common ISI channels where just low order constellation communication operates successfully In addition the present algorithms require the knowledge of the transmitted points and the channel gain recovery
We present a new method, which identifies symbols that are less affected by the ISI channel The distances from their origin points, the received constellation2 points, are less than half the distance of the nearest points in the received constellation We call these symbols cReliable Symbols", "Reliable" because the nearest constellation point to the received "Reliable Symbol" is its origin point. The different parameters estimations use then the reliable symbols for the estimation process Two applications of parameters estimation under high order constellation communication through ISI channel, based on reliable symbols are presented 1) Estimation of the constellation points, the product of the transmitted constellation points and the channel gain, and 2) ISI coefficients estimation The estimations are shown to be suitable even for time varying channels These parameters estimations enable to successfully detect the received signal by using equalization or/and by soft decision methods [8], [9], [10] It is shown that the upper limit on channel ISI level is ∑\ISI, \ - \ (the binary
modulation open eye channel condition e g 4QAM), while there is no theoretical limit on the constellation size (estimation under up to 1024QAM is shown to be reliable by simulation)
The estimation is blind, in the sense that no training sequence is used The required length of the data sequence is a function of the length and level of the ISI, and the constellation size
Channel estimation using "Reliable Symbols" is suitable under variety of environments: Mobile phone channels where the ISI "window" length is short (about four coefficients) can be recovered effectively in "real time" for moderate constellation sizes Data transmission over the telephone line, even under very high constellation size or/and long ISI window, where by using data storage capability the channel parameters can be recovered Digital TV and other applications using VDSL, where the very high symbol rates enables to recover the channel parameters even for very high constellations or/and long ISI windows, effectively in "real time" High order constellation in software radio [1 1], where the transmitter and the channel parameters has to be recovered [12]
Scaled transmitted symbols because of the channel gain Channel and transmitter parameters estimations based on the "Reliable Symbols" method enable higher bit rate communication, by using higher order constellation, for a given limited bandwidth channel with symbol rate of up to the limit of the binary closed eye for 4QAM constellation.
The chapter is divided into seven sections: After the Section 4.2 presents the "Reliable Symbols" theory. Section 4.3 presents the constellation points estimation. Section 4.4 presents the ISI coefficients estimation. Section 4.5 presents adaptive estimation properties and Section 4.6 presents the simulation results and Section 8 contains the conclusions.
The following notations will be applied. xn ≡ Transmitted symbols at time n. yn ≡ The related received signal of χ„
Figure imgf000013_0001
ISI ≡ 1 (Normalised ISI).
Figure imgf000013_0002
k=f+b ( "-forward, b-backwards)
4.2 Reliable Symbols under high order constellation and ISI
In the estimation process normally the data points are considered to have the same importance when they are following the same statistics laws. In high order constellation communication under ISI conditions, a fraction of the data points are closer to their origin points, their received constellation points, than to any other received constellation points (Ch. 2). Let us define the received pulses that are closer to their origin points than to any other received constellation points, as "Reliable Symbols". The name, "Reliable Symbols", indicates that their metric from their closest received constellation points are the real metrics that are caused because of the channel noise. It is shown in the following sections, that knowing the right metric enables to recover or to estimate some key parameters in data communication as the ISI coefficients and the channel gain.
The problem is to find these precious symbols Finding the whole set of reliable symbols is a very difficult if not impossible task. Instead we'll find data points from the reliable symbols set, where this subset is normally a small fraction of the reliable symbol set
In high order constellation communication under ISI channel the metric of every received point depends on the ISI coefficients, the "future" and the "past" symbols (the surrounding symbols) and the adaptive gaussain noise
d„ = "∑x, - ISI,-n + nn (4.1) ι=n-b i ≠n where, {x} is the surrounding symbols sequence and «πis an Adaptive White
Gaussian Noise (AWGN) process.
For the moment let us assume high SNR so we can ignore the AWGN. Between the first two parameters x, and ISI„_, just the first, the surrounding symbols, can be considered as controllable In general as the energy of the surrounding symbols are smaller the metric of a received data point from its origin point is smaller. Let us examine the case where the surrounding symbols have the same sign as the related ISI coefficients. In this case the metric is.
Figure imgf000014_0001
i≠ n
This situation is the "worst case" scenario, where the surrounding symbols fulfils
Figure imgf000015_0001
i≠n then, the metric of the related received data (the central symbol) from its origin point is ensured to be smaller than d\ιm
Normally in blind detection the distribution of the ISI coefficients are not known Therefore to ensure that symbols are under some reliable condition, the ISI is assume to be in the worst case, where its coefficients are distributed uniformly and equal the maximum one Following a restriction on the sum of the absolute of the ISI noise
Figure imgf000015_0002
provides us with a criterion to find the reliable symbols
Criterion: A symbol is from the Reliable Symbol subset if (not if and just if) its surrounding symbols fulfils
M ≤ Vi e [n - b,n + f],, e n (4 4)
Figure imgf000015_0003
where dlm is half the distance between the two nearest received constellation points The number of detected reliable symbols for a given d m is obviously a monotonically increasing function of the probability,
PR {\XI\ < ^≡-} (4 5)
I Him
which is a monotonically increasing function of - — l- — For a given dlιm , the number
\ISI{m of reliable symbols is a monotonically decreasing function of the constraint on the ISI
For further presentation of the reliable symbols theory we'll use the common QAM
(or the similar CAP) as a demonstration vehicle Furthermore, we assume that the ISI effect is orthogonal, the noise in I and Q directions is a function just of symbols from the I and Q sequences respectively (in 4 2 3 the case where the ISI have complex coefficients is treated) Let us define two units as the distance between two nearest transmitted symbols in the I direction (the same is for the Q direction) Then, according to the definition of the reliable symbols, a reliable symbol has a metric of up to one unit, c/um ^l, from its origin transmitted point Then the maximum of the absolute of the ISI coefficients cannot exceed one The proof is straight forwards From Eq.(4.4) maximum l/S/j is abled when {x}, the surrounding symbols, have minimum magnitude, thus { .* j≡l . Then according to Eq.(4.4) when d\im = dh
|AS7| = "" < - = 1 (4.6) 1
Notice that one as an upper limit to the ISI noise effect is the definition of an open eye in the binary scheme modulation which exist as an example in 4QAM and 2ASK.
This enables us to define an engineering oriented sentence:
Sentence: For channels where the binary modulation scheme has the property of an open eye, Reliable Symbols could be found for high order constellation communication.
The open eye limit is not a hard limit. Even in the case where the ISI channel exceeds the open eye limit reliable symbols could be found, but in addition not reliable symbols, mistakenly, could be considered as reliable. This error effect increases as the increases. Conceptually it can be considered similar to the Error - Rate function
[18] where the rate exceeds the capacity point, the error cannot be any more zero, and it is growing as a function of the rate.
4.2.1 The probability to find a reliable symbol
To have an indicator to the data sequence length that is required for the different estimation process based on the reliable symbols, we derive the probability function to find a reliable symbol.
For the most general case where the only restriction is the open eye restriction, thus \lSl\ < 1 the probability to find a reliable symbol is:
Figure imgf000016_0001
Proof: to ensure reliable symbol all the surrounding symbols must be from the lowest level of the constellation points, thus two points among the I (or Q) constellation points. This probability must be powered by the length of the ISI window to insure that every surrounding symbol that participates in the ISI effect is from the lowest points. The multiplication of two is because the points are gathered independently from both I and Q axes. For lower upper limits to the absolute of the sum of the ISI,
Figure imgf000017_0001
, the probabilities to find reliable symbols become
a. PR (k + 1) |/S/| < 0 5 (4 8)
Figure imgf000017_0002
It is easy to show that for the 0 5 limit, in addition to the first layer of points in the constellation, the surrounding symbols can be with one symbol from the second layer of the constellation points
Figure imgf000017_0003
For 0 33 limit, the surrounding symbols can be from both the first and second layer of the constellation points
Figure imgf000017_0004
For 0 25 limit, one of the surrounding symbols can be in addition to the first and second layers, in the third layer of the constellation points
The basic idea for all three proofs is to find all the possible arrangements of the surrounding symbols for every given upper limit
4.2.2 Reliable Symbols under unknown transmitted symbols
In blind detection where no training sequence is available, the receiver in the stage of the parameters estimation process, does not know what are the surrounding symbols There are two ways to deal with this 1) to assume a certain surrounding symbols sequence and 2) to select the symbols of the surrounding sequence according to their received energy The first way can be implemented when the parameters estimations is done in parallel to some trellis decoding The second way, the more broad solution, can be implemented for the parameters estimation just after the demodulation to an I- Q plan For the parameters estimations that are addressed, we'll use the second approach The surrounding symbols selection by their received energy, raises some difficulties that will be treated in section 4 5 4.2.3 Complex ISI coefficients
Reliable symbols can be found even when the ISI channel operates in a not orthogonal way on the I and Q axes In the more general form where the ISI coefficients are complex, the I axis surrounding symbols have an influence on the Q axis symbols (and the same for Q on I) The criterion on the surrounding symbols is to be under some energy limit, the real energy of the symbol, that is influenced from both the I and Q axis As an example, for the QAM constellation, where 757 < 1 , the surrounding symbols have to be from the four lowest energy symbols, the lowest 4QAM in the QAM constellation The probability to find a reliable symbol in this case is
PR =
Figure imgf000018_0001
(4 1 1 ) constellation J
which has 2 times smaller probability than the same limit with
Figure imgf000018_0002
real ISI coefficients
Reliable symbols can be found even under complex ISI noise, obviously it requires longer received data sequence length
4.2.4 Reliable symbols with control errors
When the data sequence length is a critical parameter, where just relative short data sequence is available, under some assumption, a "noisy" reliable symbols detection can be done "noisy" in the sense that in addition to the "real" reliable symbols the system wrongly defines not reliable symbols as reliable The number of wrong reliable symbols can be controllable and made relatively small
Based on the QAM demonstration vehicle, upper bound to the probability of a symbol to be detected wrongly as a reliable symbol is derived for the open eye limit case If,
1 max(|/S/,|) < 0 25, / e n, m n,m ^ k
2 max(|/S/ ,|) < 0 1667 \/ι <£ n, m and the criterion for selecting the surrounding symbols is according to the 0 5 limit instead of the 1 limit, then the upper bond on the probability for a wrongly detected symbol is pR (error) = P(\ISI * x\ ≥ 1, x e x' ) = P(x e x' ) ■ P(\ISI * x\ ≥ 1 | x e x' )
= = 3) P{sιgn(Xm ISI )„) = sιgn( ISIn)}
Figure imgf000019_0001
P{sιgn( ∑ ISI x) = sιgn(Xm ISI m)} ιen,
+
Figure imgf000019_0002
3) P{sιgn(Xm ISI = sιgn(Xq ISI q)}2 P{sιgn( ∑ ISI - x) = sιgn(Xq ISIq)} ιin,m,q
Figure imgf000019_0003
where x' is the ensemble of surrounding sequences under the 0 5 limit criterion, where one of the symbols is in the second layer of the constellation (the second layer under the same scale has magnitude of three)
The probability to find a reliable symbol is k+\ time higher than in the regular limit 1 reliable symbols detection In other words, the required sequence length becomes substantial shorter when allowing controllable small error events
4.2.5 Estimation under received symbols energies
Reliable symbols are found through a criterion on the surrounding symbols The surrounding symbols are not known in this case, so the selection of the reliable symbols relays on the received surrounding signals energies The surrounding received signals are also influenced by the ISI and their own surrounding symbols The question that immediately raises is how do we know that a received signal with low level energy has a low-level transmitted energy as well7 Generally we can't be sure, but when the level of the ISI is controllable, as in our case, following some guidelines as will be explained, a low level energy received signal has a very high probability to represent a low level energy transmitted symbol A general proof, if possible, is very hard to derive A motivation for the proof is described We proved it empirically by computer simulations
Proof motivation A received signal has a low energy because 1) Its origin point has low level energy, and its surrounding symbols have low level energies 2) Its origin point has low level energy and its surrounding symbols have higher level energies, then the received signal in half of the cases will approach zero or even change sign if the combination of ISI and surrounding symbols are high 3) The origin point has high energy level and a special combination of relative high level energies surrounding symbols occurs The last scenario is the problematic one, which may include surrounding symbols that are not under the required criterion The probability of scenario 3 depends on the size of the ISI and dramatically on the criterion limit The lower the limit the lower the number of combination for scenario 3, which means a smaller probability of scenario 3 to happened In the cases when the ISI is known to be very short, as 2-4 coefficients at most, and the ISI or the constellation size are relative large, it is required to take more than just 2-4 reliable symbols to deal with scenario 3 effect (4-6 respectively, are recommended)
The central symbol influences on the surrounding symbols as well In effect if sιgn(x, ISI,) = sιgn(xo) , (4 12)
Then the effect of the central symbol on the surrounding symbol is effecl(on y = -sιgn(χ,) Xo ISI., (4 13) and obviously vice versa (concerning the signs), where x, is from the surrounding symbol and yt is the related received signal For the case where the ISI behaves as a symmetric FIR filter, thus ISI, = ISI-, then when Eq (4 12) is fulfilled, t becomes smaller in magnitude, or even change the sign (but for limit ISI effect it will still have a small magnitude) Therefore the probability of surrounding signals that fulfils Eq (4 12) to pass the surrounding symbols criterion, is much higher than for those that do not fulfil it. Then it is easy to show that reliable symbols under symmetric ISI effect have lower magnitude on the average, than their origin points (Actually the same situation happens for just symmetric in sign ISI) To deal with this ef ect the final constellation estimation is done with the subset s of reliable symbols The subset s contains reliable symbols with lower energy, so that the probability to have symbols from both sides of the origin points is higher The size of subset s depends on the ISI effect, as it increases the subset contains reliable symbols with smaller energy and vice versa 4.3 Constellation points estimation (includes the channel gain)
In blind detection a major estimation parameter is the gain of the channel. The channel gain provides to recover the location of the transmitted points, the constellation points, on the I-Q plan. The detection process relies deeply on the constellation points estimation. Hard decision detection, or the variety of soft decision detection methods, use the distance between the transmitted point to the received point as a central parameter for detection. Communication through an ISI channel will result with symbols exceeding the extreme points of the transmitted constellation. In fact the received data points could reach as far as 1 + ∑|/S/,| times the maximum
transmitted points (ignoring the gaussain noise, which with it the maximum received data point is even larger in magnitude).
For the estimation of the transmitted constellation points we assume no prior knowledge on the ISI coefficients. The estimation of the transmitted constellation points is done in two stages.
4.3.1 Initial estimation of the constellation points
Reliable symbols, by definition, have the property that the maximum distance from their origin transmitted points are, at most, half the distance of the nearest transmitted points in the constellation. Lets again define this distance to be one unit. After detecting "enough" received data points, we'll choose the maximum in magnitude in the I and Q axes from the reliable symbols set to be the initial maximum constellation point in each axis. Enough data points, according to the probability to find reliable symbols from the highest magnitude. Let 'ma be the initial estimation of the maximum constellation point, then:
Pli = sιgn(i) - F max (21/1 - 1) (4.14) consttelation - 1 is the estimation of the remaining constellation points in each axis, where is the index from zero to each direction.
(We assume a rectangular QAM constellation. For different shapes the numerator in
Eq.(4.14) is the number of constellation point for every axis minus one) Notice that while the error in the maximum estimated points can be up to one unit, for points that are closer to zero the upper limit on the error goes down to,
lerrorl ≤
Figure imgf000022_0001
(4.15)
1 lπun Jconstelltion - 1 for the points with the smallest magnitude.
4.3.2 Final estimation of the constellation points
It is easy to show that,
Figure imgf000022_0002
when,
P = P - p, (4 17) where p, is the /th constellation point Let us express the reliable symbol y'n by the origin point plus the related ISI noise coefficient d'n Using Eq (4 14,4 16,4 17) we obtain
Figure imgf000022_0003
where // is the index of the reliable symbol and /' the index of the related constellation point. In chapter 2 it is shown that the ISI noise, d'n can be modelled as a zero mean almost gaussian distribution parameter that does not depends on / Using the weighted average estimator over Pt' - y'n , where {_y} is a subset s of the reliable symbols (Sec
4.2.5), we get
Figure imgf000022_0004
where the expectation of P, , is
£[ I ] =
Figure imgf000022_0005
PI - Pi ) + E() = / - p = />*
Figure imgf000022_0006
then,
Figure imgf000022_0007
where { P } are the final estimation of the constellation points. The estimation in Eq.(4.19) is done on the first estimation error. Eq.(4.20) indicates that the estimation in Eq.(4.19) is not biased. Because [d] is close to the gaussian process, and it is known that the averaging-estimator is optimal under gaussian process [15], the estimation in Eq.(4.21) can be considered as almost optimal.
4.4 ISI coefficients estimation
ISI coefficients estimation is a crucial stage in data detection under ISI channel. The ISI coefficients are essential for the recovering data process, using either equalization or soft decision detection as MAP [8], [9], or both. High order constellation communication under ISI channel, has a much larger noise level because of the amplifier effect caused by the constellation size (Chapter 2). By using reliable symbols, in effect, we bypass the high constellation noise effect. In other words, using reliable symbols enables to make the estimation under the same conditions as for the low order constellation case.
The estimation method is divided into two methods groups, when the ISI effect is known to be under \lSl\ < 0.5 (or under a lower limit) and for the more general case where |ZS7| < 1 .
4.4.1 ISI coefficients estimation for |/S/| upper limit under or equal to 0.5
The metric of a received signal from its origin, depends on the ISI coefficients, the surrounding symbols and the AWGN Eq.(2.1)). When the SNR is high and the surrounding symbols and the desired related metrics are known, then the ISI coefficients are simply a solution of k (the length of the ISI window) linear equations. The exact solution becomes to be the estimation when the surrounding symbols are noisy, then the optimal linear mean square solution is required. In our case, as was discussed before, the surrounding transmitted symbols are not known. Instead we use the received signal energies. For: yχ xn + n, (4.22) where n is from a surrounding symbols set, yn the related received signal and nιs, the related ISI noise effect. Under the assumption that a low level received signal represent a low level surrounding symbol (Sec 4 2 5), we'll use the general LS
(weighted linear least square) solution for estimating the ISI coefficients
ISl = ( TWXy1 XTWA (4.23) where, X - n x k matrix where n≥k, is the ensemble of the surrounding signals for each reliable symbol
W - An n x n diagonal weight matrix.
Δ - // x 1 vector, is the metric of each reliable symbol from its origin
Because n,s, , the noise on the surrounding symbols, has a close to gaussian distribution (as was shown in section 2) and the LS is the optimal estimation for the gaussian noise [15], Eq (4 23) can be considered as close to optimal estimation of the
ISI coefficients
Under a certain constraint to the upper limit on
Figure imgf000024_0001
(up to 0 5) at least k reliable symbols are chosen under the related criterion (4 2 1 a - 4 2 1 c), where k is the assumed upper limit on the ISI length The metrics of the reliable symbols from their origin points creates the Δ vector The related received surrounding signals values (magnitude and sign) creates the X matrix Let us assume for the moment that the W matrix is a diagonal 1 matrix The data sequence length is a function of the number of required reliable symbols
Notice that for the case where the constellation is small enough where all the symbols are reliable, the estimation of Eq (4.23) merges to the regular optimal LS solution The rows of the X matrix are then, the surrounding received signals of sequential symbols, as all symbols are reliable The Δ vector is then, the related metrics of the sequential symbols from their origins
The constellation points estimation process uses the surrounding received signals, by choosing those that are under some magnitude limit In the ISI coefficients estimation, beside of choosing the surrounding received signals to be under some magnitude limit, the estimation process uses the exact value of them (The X matrix) The quality and the limit of the estimation depend on the surrounding received signals noise level From simulation it appear that the limit is |/S/[ = 0 5 Above this limit the statistical
LS estimation does not produces valid estimation Under or equal to 0 5 limit, the quality of estimation, like the gaussian case, is a monotonically increasing function of the number of rows in the A' matrix, the number of reliable symbols Simulation shows that from k+2 rows the estimation has a very small error for moderate SNR The central symbol, the reliable symbol, has a major effect on the surrounding received signals (Sec 4 2 5) By applying an upper limit to the energy of the reliable symbol, we reduce the noise on the surrounding symbols The limit on the energy of the reliable symbols is a function of the assumed upper limit
Figure imgf000025_0001
The probability to find a reliable symbol under the additional constraint then becomes a For < 0 5 it was found that the reliable symbol magnitude can be up to the second layer of the constellation The probability then becomes
PR = 2 - - (k + \) \ISI\ ≤ 0 5 (4 24) const const b For < 0 33 and 0 25 it was found that the reliable symbol magnitude can be up to the third layer of the constellation The probabilities then become
Figure imgf000025_0002
The best case is when the reliable symbols are iimited to be just from the smallest constellation layer Obviously under such constraint the required length of the data sequence has to be longer, two times longer for the 0 5 limit and three times for 0 33 and 0.25 limits
In the case where the estimation of the ISI coefficients is based on the estimation of the constellation points, limiting the reliable symbol energy introduce another advantage. In Section 4 3 it was shown that error of the received constellation points estimation is smaller as the constellation points are closer to the zero This means that reliable symbols under constraint of energy have a more accurate Δ vector in addition to a more accurate X matrix
The W matrix operates as a diagonal weighted matrix [15] Eq (4 23) uses the W matrix to attach different weights for the different reliable symbols rows As the reliable symbol is higher, up to its energy limit, the related weight value is lower In such way the low energy reliable symbols that can produce better estimation, have larger weight in the estimation process than the higher energy levels symbols Simulations have shown that values in the range of 0 7-1 are useful When the ISI channel is a symmetric FIR filter it is easy to show that the LS equation requires just half of the required rows, reliable symbols, although the length of the surrounding symbols has to remain the same Fig (4 1-4 3) shows the required data length
Figure imgf000026_0001
10 12
ISI length Figure 4.1: Required data length vs. ISI length for different constellations
Figure imgf000026_0002
Figure imgf000026_0003
2 4 6 8 10 12
ISI length
Figure 4.2: Required data length vs. ISI length for different constellations
Figure imgf000026_0004
Figure imgf000027_0001
10 12
ISI length Figure 4.3: Required data length vs. ISI length for different constellations. \lSl\ ≤ 0.5
as a function of the ISI length and the constellation size, for several
Figure imgf000027_0002
constraints, for the case the ISI channel is a symmetric FfR filter.
4.4.2 ISI coefficients estimation for \lSl\ ≤ 1
It is shown in Sec. 4.4.1 that when the ISI effect is high and the noise in the X matrix in Eq.(27) is high, successful estimation by using the statistical random processing of the LS method cannot be carried out. For the case where the \ISI\ is known to be smaller than unity, the length of the ISI is up to four coefficients and the ISI channel is a symmetric FIR filter, is practically important since it covers most of the mobile communication channels. The ISI coefficients estimation, using reliable symbols, for these kind of channels is now presented.
When the surrounding symbols are from the first layer of the constellation points and assuming high SNR, the reliable symbols can be placed between five discrete possible magnitudes (but not just there), lower than their origin points, with different probabilities, for each origin point Because of the relative high level ISI the reliable symbols is limited to be just from the first layer of the constellation points. The five discrete magnitudes that reliable symbols can be placed in, the related surrounding symbols set-up and the related probabilities are (for probability comparison we'll use the condition probability, where the surrounding symbols are assumed to be in the first layer The probability on the sign is 05 ) a The scenario with no ISI noise
*n-\ = ~xn+\ l e t1'2] => y„ =x„ (427)
The probability is 0.25 b The scenario where two anti-symmetric symbols cancel their ISI effect
Figure imgf000028_0001
κn-\ -x„+ι x„_2 =xπ+2 sιgn(xπ_2[SX2) = -sιgn(xn)
(429)
=> )'n =Xn +2 ISI Xn-2 (\)' n | < \X n |)
The probabilities for both c 1 and c 2 is 025 c The scenario where all symbols contribute towards zero
The probability is 0125 d The scenario where the related symbols to the higher ISI coefficients contributes towards zero and the other symbols contributes in the opposite way is xπ-, =xn+, n sιgn(xn_llSI,) = -sιgn(xπ) sιgn(xn_JlSIJ) = sιgn(xn) i G /»<ex(max(|/S,|) & j ≠ i (431)
Figure imgf000028_0003
The probability is 0125 Notice that
2-*min-Cv +>'t9) =
Figure imgf000028_0004
(432)
Where y2* and y29 are the reliable symbols that fulfil Eq (28) and (29) respectively The estimation algorithm
1 Receiving "enough" data points
"enough" received data points according to the probability to find a suitable reliable symbol
Figure imgf000029_0001
y constellation ,
(where, the reliable symbol and its six surrounding symbols are from the first layer of the constellation points.)
2 Identifying a set of relibale symbols {y} (e g ten reliable symbols)
3 Calculating the ISI total effect by
\data\
Figure imgf000029_0002
where
Figure imgf000029_0003
is the value of the maximum in ma Dgnitude received data p roint, and is the value of the maximum in magnitude received constellation point
4 Updating the received constellation points estimation
(This stage is for the case where the constellation points are from estimation ) Defining the closest reliable symbol to the smallest estimated received constellation point (in magnitude) as the new estimation of the estimated points that equal | | Then calculating the other constellation points in each axis to be
P, = Slgn(i) -
Figure imgf000029_0004
-k, -1,1, k where, 2k is the number of constellation points in each axis 5. Updating the ISI total effect
Defining the closest data point to |x| • (1 - \ISI |) as the reliable symbols that fulfils condition 4 4.2 c The distance between this point to the first constellation point is the updated \ISI\
6 Finding all pairs of data that fulfil Eq (4 32) (up to some small margin) Because there is a small probability for symbols that are not reliable symbols to fulfil Eq (4 32), the set of pairs that appear most frequently, Y, is picked Then defining ys as the smallest, in magnitude, value from the set Y, and yL as the largest, in magnitude, value from the set Y
7 Estimating the magnitude of the ISI coefficients (without indexes) The magnitude of the four coefficients of the ISI are calculated (because the assumption is a symmetric ISI channel, actually there are just two coefficient that are being estimated)
Using Eq (28) and (29), the absolute of the two coefficients are calculated
■ \ \ i
IISI l-m, = (4 33)
Figure imgf000030_0001
8 Finding the signs of the ISI coefficients
The surrounding symbols of the maximum, in magnitude, received signal,
Figure imgf000030_0002
from the extreme points of the constellation Because \ISI\ ≤ 1 , the signs of the surrounding symbols do not switch in any case The signs of the ISI coefficients are then the same as the signs of the related four immediate surrounding symbols
9 Last stage Recovering the indexes to the ISI coefficients
Defining the reliable symbols from the set Y, that in magnitude are closer to ys than y, , as the set YS The remaining reliable symbols from the set Y, which are closer in magnitude to yL than ys are then defined as the set YL
If the set YS has relatively more reliable symbols with immediate surrounding symbols with opposite signs than YL, then the indexes of the smallest in ma become -1,1 and the
Figure imgf000030_0003
indexes of the largest become -2,2 On the other hand, If the set YL has relatively more reliable symbols with immediate surrounding symbols with opposite signs than YS, then the indexes of the smallest in magnitude ISI coefficient, between
Figure imgf000030_0004
become -2, '2 and the indexes of the larg σest become -1,1
By using the criterion of Eq (4 32) we can ignore scenario 4 2 2 d In addition it enables to distinguish it from other not reliable symbols There are some combination of surrounding symbols of not reliable symbols that can fulfil Eq (4 32) Because their probabilities are small the number of appearance can be checked to find the correct pairs
Figure imgf000031_0001
64 QAM 144 QAM 256 QAM Constellation
Figure 4.4: Required data length vs. constellations (ISI length - 4) j/S l < 1
The length of the required data for the estimation is based on the probability from Eq (4 1 1) multiplied by the probability to have reliable symbols just from the first layer in the constellation points Fig (4 4) shows the required data length for estimation, with eight reliable symbols (according to the probabilities in 4 2 1 a-c), as a function of the constellation size
Under this estimation for high SNR there is in effect no error in the ISI coefficients, and in the by-product estimation, the estimation of the constellation points This accuracy is available because noise is not participating in the process Most of the mobile phone standards, like CDMA and UMTS, use as part of their standard, the TDMA (Time Division Multiple Axis) technique In down link channels where the base-station transmit to the mobile, the data rate is number of times faster (just for the use as random symbols) under TDMA when using the data of the other users Then the time that is necessary for the estimation process is much shorter For TDMA with twenty users as an example, where 64,000 symbols are required for the estimation, it takes less then a second to gather the data Channel estimation under the TDMA standard can be considered then as almost real time process 4.5 Adaptive properties
Wide range of channels have the property that their parameters are varying with time Using the "Reliable Symbols" method enables adaptive channel parameters estimations for time varying channels. The limit to the speed the channel can be varying under successful estimation, depends on how fast reliable symbols can be found. For continues channel variation, the different estimations can use a "sliding window" The new members, for the estimation process are then the new reliable symbols with their related surrounding symbols.
The upper limit on the variation speed is a function of the minimum number of reliable symbols needed for estimation N™m ) and the rate of finding a reliable symbol (Rreι) Because in the estimation process the processed data has to be under similar channel environment, the upper limit on the variation is determines by the product N n - Rrd
The upper limit on the variation is then The maximum variation where Nmin - Λ're/ ransmitted symbols still experience similar channel conditions Notice that while Nmm depends on the specific parameter estimation, Rre, is a function of the probability to find a reliable symbol
4.6 Simulations
Monte-Carlo simulation was done jointly on the estimation of constellation points and the ISI coefficients. The QAM constellation was used with up to 1024 constellation points For evaluation of the estimation performance the ISI filter was imposed on the base band symbols The ISI filters were of the type of symmetric real FIR filter Up-to \ISI\ < 0 5 estimations: The theoretical lower limit on the required received data length was confirmed to be enough for estimation for all limits up to 0 5 and ISI length of up to 6 coefficients For 1024QAM under ISI=(-0 05,0 15,0 15,-0 05) (l/S/1 < 0 4) , (Fig (4 5)) ISI coefficients estimation was done with an error smaller
Figure imgf000033_0001
Figure 4.5: I024OAM under ISI-f-0.05, 0.15, 0.15,-0.05]
Figure imgf000033_0002
Figure 4.6: 64 QAM under ISI [-0.15, 0.35, 0.35, -0 15] the edge of "close eye ") than 10% and constellation points estimation with error smaller than 2 5%, for the lowest towards zero constellation point, with 180,000 received data points For
256QAM with the same ISI and errors, 10,000 points were enough 64QAM with the same ISI and errors required just 400 received data points 64QAM with
ISI=(0 2,-0 07,0 16,0 16,-0 07,0 02)
Figure imgf000034_0001
< 0 5) , required 3000 received data points, for the estimation process with about the same errors
Up to ≤ 1 estunatioms The theoretical lower limits of the required data length have been confirmed by simulations Variety of ISI length-four channels were checked, with 64,000 received data points The estimations for both constellation points and ISI coefficients have effectively zero errors Fig (4 6) shows 64 QAM with
ISI=[-0 15,0 35,0 35,-0 15] (|/S/| = 1 ) I-Q graph, where the errors for both estimations were zero Although the lower limit is around 64,000 points, for most ISI channels 40,000 received data points was enough for successful estimations
4.7 Conclusions
We present a new method the "Reliable Symbols" method, which enables successful parameters estimations under high order constellation communication through ISI channels It is shown that the constellation size is acting as an amplifier on the basic ISI noise level Reliable symbols can be found under high order constellation, as long as the ISI level does not exceeds the binary open eye level While there is a limit on the ISI level, there is no theoretical limit on the constellation size Reliable symbols can be found under real and complex ISI coefficients Estimations applications, based on "Reliable Symbols" method, for the constellation points and ISI coefficients are derived The required data length for the channel estimation as a function of the level and length of the ISI, and the constellation size are presented The estimations were shown to be suitable for a variety of channels, as the telephone and mobile phone channels and for application up to real time tasks The ISI coefficients estimation reduces to the optimal least square estimation for low order constellation Simulations results confirm the "Reliable Symbols" method for the channel parameters estimation (blind estimation) under high order constellations Successful estimation was demonstrated up to 1024QAM References
[1] J J Werner et al, "Blind equalization for broadband access", IEEE
Communication magazine, pp. 87-93, April 1997 [2] D. N Godard and P. E Thirion, "Method and device for training an adaptive equalizer by means of an unknown data signal in a QAM transmission system,"
U.S Patent 4 227 152, Oct 7, 1980 [3] D N Godard, "Self-recovery equalization and carrier tracking in two- dimensions data communication systems," IEEE Trans, on Communication, vol com-28, No 1 1, pp 1867-1875, November 1980 [4] N Jablon, " Joint blind equalization, carrier recovery and timing recovery for high order QAM signal constellations," IEEE Trans, on Signal Processing, vol 40, pp 1383-1397, June 1992 [5] C R Johnson et al, "Blind equalization using the constant modulus criterion A review," Proceeedmg of the IEEE, vol 86, No 10, pp 1927-1950,
October 1998 [6] J Yang, J J Werner and G A Dumont, " The multimodulus blind equalization algorithm," Proc. 13th Inl "I. Coi . Digital Sig. Processing, Santorini, Greece,
July 2-4, 1997 [7] J. R Treichler et al, "Practical blind demodulators for high-order QAM signals,"
Proceeedmg of the IEEE, vol. 86, No 10, pp. 1907-1926, October 1998 [8] L. R Bahl et al, "Optimal decoding of linear codes for minimizing symbols error rate," ZE£E Trans. Information Theory, vol. IT-20, pp. 284-287, March 1974 [9] M J Gerstman, J. H Lodge, "Symbol by Symbol MAP demodulation of CPM and PSK signals on Rayleigh flat-fading channels," IEEE Trans, on commun., vol 45, No 7, pp 788-799, July 1997 [10] S Benedetto et al, "A soft-input soft-output APP module for iterative decoding of concatenated codes," IEEE Communication letters, vol l, No 1, pp 22-24,
January 1997 [1 1] P B Kenington, "Emerging technologies for software radio," Electron. &
Commun. Eng. J., pp 69-83, April 1999 [12] E Riess, L F Turner, "Constellation order identification in blind detection,"
Submitted for publication to IEEE Trans. Commun [13] B Porat, B Fπedlander, "Blind equalization of digital communication channels using high-order moments," IEEE Trans on Signal Processing, vol 39, No 2, pp 522-526, February 1991 [14] Y Sato, "A method of self -Recovering equalization for multilevel amplitude modulation systems," IEEE Trans Commun., pp 679-682, June 1975 [15] B Porat, " Digital processing of random signals, theory & methods," Prentice- Hall, 1994 [16] S Benedetto et al, "A soft-input soft-output APP module for iterative decoding of concatenated codes," IEEE Communication letters, vol l, No 1, pp 22-24,
January 1997 [17] J G Proakis, "Digital Communication," McGray-H U, Third Edition, 1995 [18] A J Viterbi and J K Omura, " Principles of Digital Communication and
Coding," McGraw-Hill, New- York, 1979

Claims

1 A method of high order constellation signal transmission through an ISI channel, by identifying "reliable symbols" which are closer to their received constellation points or scaled transmitted symbols free from ISI noise effect symbols, than to any other received constellation point, and using them to evaluate the channel characteristics
2 A method according to claim 1 in which comprises identifying a reliable symbol as one wh.ch has surrounding symbols each having a relat.vely lower level, up to some predetermined distance before and after the identified symbol, nominating the identified signal as a "reliable symbol", and repeating the process a number of t.mes along the received signal sequence in order to gather a sufficient number of reliable symbols to enable a proper evaluation of channel characteristics to be achieved
3 A method according to claiml or claim 2 further comprising the steps of determin.ng the constellation point locations to establish the channel gain, estimating the ISI coefficients, and setting up an inverse channel filter with corresponding parameters .n order to minimise the ISI noise
4 A method according to claim 3 in which an initial estimation of constellation point locations is made as
P; l = signiϊ) (2|z - 1)
Figure imgf000037_0001
Where,
P max - The maximum (m magmtude) reliable symbol.
i = -k, -k + 1 , ,-1 1 k + 1 ,k where, 2k is the number of constellation points in each axis and a final estimation is made as
Figure imgf000038_0001
Where,
Figure imgf000038_0002
i = -k, -k + 1 , ,-1 , 1 , k + 1 ,k where, 2k is the number of constellation points in each axis
S - The set of detected reliable symbols
|S| - The number of reliable symbols in the set S
5 A method according to claim 3 or claim 4 for channels up to the level of
IISII < 0 5 in which ISI coefficients for the channel are estimated as
Figure imgf000038_0003
where, - n x k matrix where n≥k, is the ensemble of the surrounding signals for each reliable symnbol. W - An n x n diagonal weight matrix. Δ - n x 1 vector, is the metric of each reliable symbol from its origin. 6 A method of high order constallation communication according to claim 3 or claim 4 including a method of estimating ISI coefficients for channels up to the level of |ISI| < 1 , substantially as herein described
7 A method of high order constellation communication through ISI channels substantially as herein described with reference to the accompanying drawings
PCT/GB2000/002648 1999-11-04 2000-07-10 Increasing data transmission bit rates WO2001033791A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
AU59963/00A AU5996300A (en) 1999-11-04 2000-07-10 Increasing data transmission bit rates
US09/836,281 US7143013B2 (en) 1999-11-04 2001-04-18 Reliable symbols as a means of improving the performance of information transmission systems
US09/899,852 US7085691B2 (en) 1999-11-04 2001-07-09 Reliable symbols as a means of improving the performance of information transmission systems
US09/899,843 US7110923B2 (en) 1999-11-04 2001-07-09 Fast, blind equalization techniques using reliable symbols

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9926167.9 1999-11-04
GB9926167A GB2356112B (en) 1999-11-04 1999-11-04 Increasing data transmission bit rates

Publications (1)

Publication Number Publication Date
WO2001033791A1 true WO2001033791A1 (en) 2001-05-10

Family

ID=10863974

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2000/002648 WO2001033791A1 (en) 1999-11-04 2000-07-10 Increasing data transmission bit rates

Country Status (3)

Country Link
AU (1) AU5996300A (en)
GB (1) GB2356112B (en)
WO (1) WO2001033791A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002087179A2 (en) * 2001-04-18 2002-10-31 Verticalband Limited Blind equalization using reliable symbols
WO2002087183A1 (en) * 2001-04-18 2002-10-31 Verticalband Limited Blind equalization using reliable symbols

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60329321D1 (en) * 2002-11-20 2009-10-29 Interdigital Tech Corp COMMUNICATION SYSTEM AND METHOD WITH SIGNAL / NOISE RELATED ESTIMATION FOR SCALING THE PROCESSING OF RECEIVED WIRELESS COMMUNICATION SIGNALS
US8699553B2 (en) 2010-02-19 2014-04-15 Telefonaktiebolaget Lm Ericsson (Publ) Data-aided SIR estimation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5214675A (en) * 1991-07-02 1993-05-25 Motorola, Inc. System and method for calculating channel gain and noise variance of a communication channel
US5550924A (en) * 1993-07-07 1996-08-27 Picturetel Corporation Reduction of background noise for speech enhancement
US5694423A (en) * 1996-08-06 1997-12-02 Lucent Technologies Inc. Method and apparatus for detecting and correcting misconvergence of a blind equalizer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5214675A (en) * 1991-07-02 1993-05-25 Motorola, Inc. System and method for calculating channel gain and noise variance of a communication channel
US5550924A (en) * 1993-07-07 1996-08-27 Picturetel Corporation Reduction of background noise for speech enhancement
US5694423A (en) * 1996-08-06 1997-12-02 Lucent Technologies Inc. Method and apparatus for detecting and correcting misconvergence of a blind equalizer

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WERNER J -J ET AL: "BLIND EQUALIZATION FOR BROADBAND ACCESS", IEEE COMMUNICATIONS MAGAZINE,US,IEEE SERVICE CENTER. PISCATAWAY, N.J, vol. 37, no. 4, April 1999 (1999-04-01), pages 87 - 93, XP000823992, ISSN: 0163-6804 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002087179A2 (en) * 2001-04-18 2002-10-31 Verticalband Limited Blind equalization using reliable symbols
WO2002087183A1 (en) * 2001-04-18 2002-10-31 Verticalband Limited Blind equalization using reliable symbols
WO2002087179A3 (en) * 2001-04-18 2003-01-16 Verticalband Ltd Blind equalization using reliable symbols

Also Published As

Publication number Publication date
GB2356112A9 (en) 2001-06-04
GB2356112A (en) 2001-05-09
AU5996300A (en) 2001-05-14
GB2356112B (en) 2002-02-06
GB9926167D0 (en) 2000-01-12

Similar Documents

Publication Publication Date Title
US6862326B1 (en) Whitening matched filter for use in a communications receiver
US20150312065A1 (en) Joint sequence estimation of symbol and phase with high tolerance of nonlinearity
US20020122510A1 (en) Apparatus for and method of converting soft symbol information to soft bit information
US20020054634A1 (en) Apparatus and method for using adaptive algorithms to exploit sparsity in target weight vectors in an adaptive channel equalizer
AU6549290A (en) A method of adapting a viterbi algorithm to a channel having varying transmission properties, and apparatus for carrying out the method
WO2006086261A2 (en) Wireless communications device performing block equalization based upon prior, current and/or future autocorrelation matrix estimates and related methods
EP1794960B1 (en) Metrics calculations utilising pre-stored values
WO1997039550A2 (en) Equalizer with a sequence estimation method with state reduction for a receiver in a digital transmission system
US6567481B1 (en) Receivers including iterative map detection and related methods
Li et al. A blind equalizer for nonstationary discrete-valued signals
US20040259504A1 (en) Multiuser detection for wireless communications systems in the presence of interference
WO2004014031A1 (en) Apparatus and methods for suppression of interference
Clark et al. Adaptive adjustment of receiver for distorted digital signals
WO2001033791A1 (en) Increasing data transmission bit rates
US7143013B2 (en) Reliable symbols as a means of improving the performance of information transmission systems
Roßler et al. Matched-filter-and MMSE-based iterative equalization with soft feedback for QPSK transmission
JP3589471B2 (en) Adaptive equalization method for reducing inter-symbol interference, receiving apparatus for implementing the method, and application system thereof
US7085691B2 (en) Reliable symbols as a means of improving the performance of information transmission systems
US8644369B1 (en) Equalizer adaptation for heavily compressed or clipped communications signals
CN109639301B (en) Confidence estimation-based FTN (fiber to the home) equalization method
US20040013213A1 (en) Receiver for and method of recovering transmitted symbols in a H-ARQ packet retransmission
US6674815B2 (en) Method for symbol-spaced estimation and/or tracking of a fractionally-spaced fading radio channel
EP2460329B1 (en) Soft bit value generation in a sequence estimator
US6320904B1 (en) Clustering blind convergence process in an adaptive decision feedback equalizer
Alsaid et al. New constant modulus blind equalizer with optimum tap-length for QAM signals

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP