throbber

`
`
`
`
`
`Section 4.15 Baseband Processing for Channel Estimation and Equalization
`
`23‘!
`
`In practice, the operation of a wireless communication system deviates from this ideal
`setting—hence the need to speak of an “estimate” of the complex impulse response
`Mt) at the output of the matched filter. Hereafter, we refer to this estimate as hesdt) .
`Ignoring the effect of channel noise, we now note from Eqs. (4.45) and (4.46) that
`
`imam a p(t) e Elm TC)
`
`(4.47)
`
`where Jim is the actual value of the complex baseband impulse response of the chan-
`nel. The effect of ignoring w(r) is justified only when the signal-to-noise ratio is high.
`
`4.15.2 Viterbi Equalization
`
`As mentioned previously, a primary objective of the baseband processor is to undo
`the convolution performed on the transmitted signal by the channel, which is
`indeed a task well suited for the Viterbi algorithm functioning as an equalizer. This
`is yet another novel application of the algorithm, buiiding on what we said earlier in
`Section 4.9 on convolutional decoding: the Viterbi algorithm is a maximum-likeiihood
`sequence estimator.
`Consider, then, a channel with memory I, requiring the use of a Virerbi equalizer
`with a window of length I. (For the application at hand, a value of 4 is considered typi-
`cal for l.) Correspondingly, the equalizer has 21 possible states, with each state consist-
`ing of 1 symbols. As with convolutionai decoding, we need a metric for the design of
`the equalizer, which, in turn, requires the generation of two kinds of waveforms:
`
`1. Estimated received waveforms. This set of waveforms is generated by cycling a
`local modulator and channel model through all the possible l—bit sequences for
`every bit period. The combination of local modulator and channel model based
`on the channel estimate hestU) is termed the estimated waveform generator, with
`its output denoted by the complex waveform East“) .
`
`2. Compensated received waveform. From Eq. (4.45), we note that, except for a
`delay, the complexflimpuise response estimate hesfit) equals the actual complex
`impulse response Mt), convolved with the real autocorrelation function p(t).
`Since the estimated waveform generator embodies the channel model, it follows
`that the actual received signai Emma) should also be convolved with p(r) .Then
`the compensated version of idatalf} , namely,
`
`Edatait) = p(r)®fi(r)
`
`(4-48)
`
`would be on par with the estimated received waveform Emu) .
`~
`Note that Edam) and East“) are both continuous-time signals.
`In order to generate fairly accurate digital representations of édataU) and
`565d!) , it is necessary that they be sampled at a rate of n times the incoming bit rate,
`so as to prevent aliasing. That is, each bit of data (actual as well as estimated) is repre~
`sented by rt samples, where n is an integer equal to or greater than two.
`The squared Euclidean distance between the ith sample of the kth bit in the
`actual received waveform Eden-4(3) and the corresponding ith sample of the estimated
`
`
`
`
`
`Page 251 of 474
`
`SAMSUNG EXHIBIT 1010 (Part 3 of 4)
`
`Page 251 of 474
`
`SAMSUNG EXHIBIT 1010 (Part 3 of 4)
`
`

`

`232
`
`Chapter 4 Coding and Time-Division Multiple Access
`
`received waveform 555:0) pertaining to a possible state v of the equalizer may be
`expressed as the sum of two squared terms, one due to the in-phase components of
`these two waveforms and the other due to their quadrature components:
`~
`~
`2
`~
`~
`11:41) = (5.1.1.41. 11—565mm», 1)) +rcdara,Q(k.11—éeagrv,a)
`With 11 samples per bit, the sample index 1' ranges from 0 to n— 1. Hence, we may
`define the transition metric for bit k of the actual signal and possible state v of the
`equalizer as
`
`2
`
`2
`11—1
`= Z pkgvp')
`.:0
`
`(4.49)
`
`where V : 0,1,...2!‘1
`Putting the ideas discussed here together, we may now formulate the block dia-
`gram of. Fig. 4.22 for the baseband processor for channel estimation and equalization,
`leading to data recovery. The processor consists of three subsystems: the estimated
`waveform generator, transition metric computer, and Viterbi equalizer.
`Building on the idea of the Viterbi algorithm as a maximum-likelihood sequence
`estimator, we may now describe the way in which the Viterbi equalizer performs its
`computations. The basic difference between the Viterbi equalizer and the Viterbi
`decoder (discussed in Section 4.9) lies in what is used for the transition metric. Specifi-
`cally, we use ,uk’v (defined in Eq. (4.49)) for equalization and the Hamming distance
`for hard-decision—based convolutional decoding. Accordingly, the steps involved in the
`Viterbi equalization are as follows:
`
`1. Compute the transition metric #kv for bit k of the actual received signal and
`state V of the equalizer, where v—— 0,1" ”21— 1 and 1 stands for the window length
`of the equalizer.
`
`2. Compute the accumulated transition metric for every possible path in the trellis
`representing the equalizer. The metric for a particular path is defined as the
`squared Euclidean distance between the estimated received waveform repre-
`sented by that path and the actual received waveform. For each node in the trellis
`
`JTaiwamnailt)
`
`4135(0)
`* .1 .1 -.»
`
`Channel
`estimator
`
`Estimated
`waveform WWW“ ~
`_cnerator
`
` igchannelu)
`
`XaaiaU)
`
`Auto-
`correlator
`
`Transition
`metric
`com nuter
`
`“mm-i»
`dam“)
`
`Baseband
`local
`mod ulator
`
`Viterbi
`equalizer
`
`Maximum-
`likelihood
`estimate of
`interleaved
`output
`
`FIGURE 4.22 Block diagram of baseband processor for channel estimation and equalization.
`The lighter arrows indicate complex signals.
`
`
`
`Page 252 of 474
`
`Page 252 of 474
`
`

`

`
`
`Section 4.16 Time—Division Multiple Access
`
`233
`
`(i.e., each state of the equalizer), the Viterbi algorithm compares the two paths
`entering that node. The path with the lower metric is retained, and the other path
`is discarded.
`
`3. Repeat the computation for every bit of the received signal.
`
`4. The survivor, or active, path discovered by the algorithm defines the 1—bit
`sequence applied to the local modulator in Fig.4.22 for which the estimated
`received waveform 56510)
`is the closest
`to the actual received waveform
`‘g’damm in Euclidean distance. With this sequence at hand, the tasks or" channel
`estimation and equalization are completed.
`
`One last comment is in order: The window length l assigned to the equalizer depends
`not only on the memory of the channel, but also on whether the modulator used in
`the transmitter has memory of its own or not (i.e., partial-response modulation). Let
`Imam denote the memory of the modulator and [channel denote the memory of the
`channel. Then we may express the window length of the equalizer as
`
`For example, I
`
`mcm
`
`z 2 for GMSK.With lchaunel = 4, for example, we thus have I = 6.
`
`I = [mam + [channel
`
`(4‘50)
`
`4.16 TIME-DIVISION MULTIPLE ACCESS
`
`The discussion thus far has focused on specific functional blocks (i.e., speech coding,
`channel shaping, coding, and modulation) that are basic to the design of a digital com-
`munication system. With this material at hand, we are now ready to discuss TDMA, a
`widely used form of multiple access for wireless communications.
`The purpose of a time-division. multiple-access (TDMA) system is to permit a
`number of users, say, N, to access a wireless communication channel of bandwidth B
`on a time—shared basis. The immediately apparent features that distinguish TDMA
`from FDMA are twofold:
`
`1. Each user has access to the full bandwidth B of the channel, whereas in FDMA
`each user is assigned a fraction of the channel. bandwidth, namely, B/N.
`
`2. Each user accesses the channel for only a fraction of the time that it is in use and
`on a periodic and orderly basis, with the transmission rate being N times the
`user’s required rate. By contrast, in FDMA, each user accesses the channel on a
`continuous-time basis.
`
`Both of these features have significant implications for the operation of a TDMA
`wireless communication system. Access to the full bandwidth of the wireless channel
`means that we may now be dealing with wideband data transmission, which makes the
`TDMA system vulnerable to frequency-selective fading. In contrast, FDMA deals
`with narrowband transmission, which means that the fading channels are typically fre-
`quency flat. To combat the frequency—selective fading problem requires the use of
`sophisticated signalaprocessing techniques. Access to the channel on a time-shared
`basis has implications of its own. In particular, the transmission of information-bearing
`data over the channel takes place in the form of bursts, which, in turn, further complim
`cates the requirement of synchronizing the receiver to the transmitter.
`
`
`
`Page 253 of 474
`
`Page 253 of 474
`
`

`

`234
`
`Chapter 4 Coding and Time-Division Multiple Access
`
`In the context of implementation, unfortunately, there is no TDMA structure
`applicable to all TDMA wireless systems in operation. Nevertheless, they do share a
`common feature: Each frame of the TDMA structure contains N time slots of equal
`duration. It is in the detailed structure of each slot and in the way in which the transmit-
`ting and receiving slots are assigned in time that TDMA systems differ from one another.
`Typically, the bits constituting each slot of a TDMA frame are divided into two
`functional groups:
`
`0 Traffic data bits, which represent digitized speech or other forms of information-
`bearing data.
`
`' Overhead bits, whose function is to assist the receiver in performing some auxil-
`iary functions that are essential for satisfactory TDMA operation.
`
`The auxiliary functions include synchronization and channel estimation. Specifically,
`the synchronization bits in a slot enable the receiver to recover sinusoidal carrier and
`bit-timing information, which are needed for coherent demodulation. The framing bits
`are used to estimate the unknown impulse response of the channel, which is needed
`for estimating the transmitted signal. As already mentioned, in TDMA systems, the
`transmission of information-bearing signals pertaining to any user is not continuous in
`time. Rather, it is discontinuous, requiring the use of a buffer-and—bnrsr strategy. The
`burst form of data transmission over the channel results in an increase in the synchro-
`nization overhead, as each receiver is required to piece the transmitted signal (e.g.,
`speech) together as it is received over a succession of frames.
`Up to now, the discussion of the TDMA framing structure has been of a generic
`nature. Theme Example 1, presented in Section 4.17, describes the frame structure of a
`specific system.
`
`4.16.1
`
`Advantages of TDMA over FDMA
`
`The following are some of the advantages TDMA has over FDMA:
`
`1. With TDMA, the use of a diplcxer can be avoided at the mobile terminal. A
`diplexcr is a complicated and expensive arrangement of filters that allows the
`mobile terminal to transmit and receive data at the same time without jamming
`its own information-bearing signal. In TDMA, the terminal need not transmit
`and receive at the same time; hence, a diplexer is not needed.
`
`2. With TDMA, only one RF carrier at a time is present in the channel. If the chan-
`nel includes a nonlinearity, then the effects of the nonlinearity are much reduced
`on a single carrier than if multiple carriers were present, as in FDMA. Examples
`of such nonlinearities are the power amplifiers employed in base stations or
`those in satellite transponders.
`
`3. With voice, a significant portion of the call consists of quiet time, when neither
`party is speaking. With a TDMA strategy, special processing techniques can be
`employed to fill the quiet times with data or other voice calls to improve the
`channel’s efficiency.
`
`
`
`Page 254 of 474
`
`Page 254 of 474
`
`

`

`
`
`
`4.16.2
`
`Section 4.16 Time-Division Multiple Access
`
`235
`
`4. With FDMA, the base station rnust have a channel unit (transmitterlreceiver pair)
`for each active session.With TDMA, the same channel unit is shared between mul~
`
`tiple sessions; thus, the base station hardware can be significantly simplified.
`
`To achieve some of these advantages requires the use of complicated signal-processing
`techniques, which, in turn, necessitates a reliance on digital signal-processing technoi-
`ogy in the form of silicon chips for cost-effectiveness. Moreover, this same enabhng
`technology has made it possible to implement other functionai needs of TDMA sys-
`terns efficiently:
`
`0 sophisticated timing and fast acquisition operations for synchronizing the
`receiver to the transmitter, and
`
`0 source coding and channel coding techniques for the efficient and reliable trans-
`mission of information over the channel.
`
`Putting all these operational advantages and practical realities together has made
`"FDMA preferable to FDMA. However, a major disadvantage of TDMA is that its
`deployment requires an increased rate of data transmission across the wireless channel,
`which, in turn, may result in increased intersymbol interference (ISI), making channel
`equalization in the receiver a necessary practical requirement in TDMA systems.
`
`TDMA Overlaid on FDMA
`
`From the discussion presented thus far, it may appear that TDMA is implemented in a
`rigorous, pure form. In reality, however, TDMA is implemented in an overlaid fashion
`on FDMA, for practical reasons. To appreciate this point, it is important that we first rec—
`ognize that the usable radio spectrum extends from tens of hertz to tens of gigahcrtz,
`which represents over nine orders of magnitude. By international agreement, this spec—
`trum is shared by allotting certain portions of it to certain applications. For example, in
`North America, the band from 11.8 to 130 MHz is dedicated to aeronautical safety com-
`munications, and the bands from 82M49 to 869-894 MHz are dedicated to public tele—
`phony. In a very high level sense, this is a form of FDMA: sharing the Spectrum on the
`basis offiequency.
`Hence, every wireless communication system has an FDMA baseline, and
`multiple-access schemes such as TDMA are overlaid on this baseline. One of the
`issues is the granularity of the underlying FDMA structure. In this sense, TDMA
`comes in three basic forms:
`
`1. Widebtmd TDMA. in this form of TDMA, there is only one or a small number of
`frequency channels, typically several megahertz wide. Wideband TDMA has
`been used in satellite communication systems in which the TDMA service occu~
`pics the full bandwidth of the satellite transponder.
`
`2. Medium-band TDMA. In this form of TDMA, there is a significant number of
`frequency (FDMA) channels, but the bandwidth of each channel is still large
`enough (100 to 500 kHz) that frequency-selective fading can be expected. The
`GSM system discussed as a theme example in Section 4.17 is an example of
`medium-band TDMA, with sufficient FDMA channels being available to assign
`differenbfrequency channels to different cells and to perform the necessary task
`of interference management.
`
`
`
`Page 255 of 474
`
`Page 255 of 474
`
`

`

`236
`
`Chapter 4 Coding and Time-Division Multiple Access
`
`3. Narrowband TDMA. This last form of TDMA is a simple step up from a pure
`FDMA system. The number of users time~sharing a single channel is small, and
`the number of frequency channels is typically large. The bandwidth of a channel
`in narrowband TDMA is relatively small (usually less than 50 kHz), and, as a
`consequence, we can usually assume the multipath phenomenon to be flat fad-
`ing. The North American IS-54 digital telephone system is an example of a nar-
`rowband TDMA system. (See Note 2 of Chapter 3.)
`
`The appropriate choice of granularity for the underlying FDMA systems depends
`upon several factors:
`
`- In a cellular system, the granularity has to be sufficient to allow different fre-
`quency assignments in a neighboring cell and perform flexible interference
`management.
`
`0 System complexity increases with the channel bandwidth and data-transmission
`rate, with the increase in complexity occurring in both the synchronization and
`processing aspects of the system. Lower bandwidths tend to imply lower cost
`solutions and lower power requirements.
`
`0 Propagation conditions may favor higher bandwidth systems, but only if appro-
`priate measures are implemented to use this advantage. Frequency-selective fad~
`ing that occurs in medium and wideband TDMA systems can provide a diversity
`advantage, but only if the receiver includes an effective equalizer.
`
`One final comment is in order: TDMA is the not the only choice of multiple access for
`overlaying on an FDMA baseline. In Chapter 5, we will present code-division multiple
`access (CDMA), which can be considered a wideband system, but, in reality, is still
`overlaid on an FDMA baseline. Moreover, wireless communication is not limited to a
`
`single overlay. For example, from the discussion to be presented in Section 4.17, we
`will see that the GSM system is not simply TDMA overlaid on FDMA; rather, it also
`includes a third multiple-access strategy known as frequency hopping (FH); that is,
`GSM is, in reality, an FDMA/TDMAIFH system. Frequency hopping is also discussed
`in Chapter 5.
`
`4.17 THEME EXAMPLE 1: (55M13
`
`The Global Sysrem for Mobile (GSM) communications is a digital wireless communica-
`tion system that is used all over the world. Figure 4.23 displays the basic TDMA frame
`structure of GSM. The structure is composed of eight 577—,us slots, which makes the
`total frame duration equal to 4.616 ms. The 1-bit flag adjacent to each data burst of 57
`bits is used to identify whether the data bits are digitized speech or some other infor-
`mation-bearing signal. The 3 mil bits, all logical zeros, are used in convolutional decod-
`ing of the channel~encoded data bits. The 26-bit training sequence in the middle of the
`time slot is used for channel equalization. Finally, the guard time, occupying 8.25 bits, is
`included at the end of each slot to prevent data bursts received at the base station from
`mobile users from overlapping with each other; this is achieved by transmitting no sig-
`nal at all during the guard time.
`
`
`
`Page 256 of 474
`
`Page 256 of 474
`
`

`

`
`
`
`
`%— Frame : 4.6155 ms —%
`
`
`
`T5,
`
`T52
`
`T53
`
`rs4 T55
`
`rs6
`
`Section 4.17 Theme Example 1: GSM
`
`237
`
`rs7
`
`TS: Time slot
`T: Tail (bits)
`F: Flag (bit)
`Train: Training interval for equalizer
`Guard: Guard time interval
`
`Guard
`Data
`Train
`I Data
`3 II-IF-I-
`? Tirne slot = 156.25 bits = 577;“ 4%
`FIGURE 4.23 Frame structure of GSM communications.
`
`The frame efi‘iciency of a TDMA system is defined as the number of bits repre-
`senting information-bearing signals (e.g., digitized speech), expressed as a percentage
`of the total number of bits {including the overhead) that are transmitted in a frame.
`With each slot consisting of 156.25 bits, of which 40.25 bits are overhead (ignoring the
`2 flag bits), the frame efficiency of GSM is
`
`
`[1 _ 40.25
`
`156.25
`
`)x 100 = 74.24%
`
`It is important to note, however, that (as remarked in Section 4.16.2) GSM is not a
`pure TDMA system. Rather, it combines TDMA with frequency hopping. Accord—
`ingly, a physical channel is partitioned in both time and frequency. The channei is parti-
`tioned in time because, with eight slots in a TDMA frame, each carrier frequency
`supports eight physical channels mapped onto the eight slots. A time slot assigned to a
`particular physical channei is naturally used in every TDMA frame for as long as that
`channel is engaged by a mobile user. Consequently, partitioning of the channel in fre—
`quency arises because the carrier assigned to such a slot changes its frequency from
`one frame to the next in accordance with a frequency-hopping algorithm.
`In Section 4.10, we introduced the idea of interleaving as a way of combatting
`the Rayleigh fading problem. Frequency hopping combined with interleaving enables
`a TDMA system to combat the fading problem even more effectively. In the context
`of a TDMA system, the principle of frequency hopping embodies the following two
`considerations:
`
`1. The carrier used to modulate a TDMA frame changes its frequency from one
`frame to the next.
`
`2. If a particular TDMA frame happens to be in a deep fade, then it is highly
`unlikely that the next TDMA frame will also be in a deep fade, provided that the
`change in carrier frequency applied by the frequency-hopping algorithm from
`the particular frame in question to the next one is sufficiently iarge.
`
`For uplink transmission, in Europe, GSM uses the frequency band 890 to 915 MHZ, and
`for downiink transmission, it uses the frequency band 935 to 960 MHZ. In either case,
`the maximum frequency change from one frame to the next is 25 MHZ. Expressed as a
`
`
`
`Page 257 of 474
`
`Page 257 of 474
`
`

`

`238
`
`Chapter 4 Coding and Time-Division Multiple Access
`
`percentage of the mean carrier frequency, the maximum frequency hopping for the
`downlink is approximately
`
`0
`_
`25
`W0 x 100 — 2.8 /o
`
`With this percentage of maximum frequency hopping, it turns out that the time spent
`by a rapidly moving mobile user in a deep fade is reduced to about 4.6 ms, which is
`essentially the frame duration. In the case of slowly moving mobile users (e.g.,
`pedestrians), the frequency-hopping algorithm built into the design of GSM pro-
`duces substantial gains against fades.
`GSM employs a moderately complicated, 13—kilobits/s regular pulse-excited
`speech codec (coder/decoder) with a long-term predictor. To provide error proteCw
`tion for the speech-encoded bits, concatenated convolutional codes and multilayer
`interleaving are employed. An overall speech delay of 57.5 ms occurs in the system.
`Turning next to the type of digital modulation used in GSM, we find that the
`method of choice is Gaussian minimum-shift keying (GMSK), which was discussed in
`Sections 3.7 and 4.14. For GSM, the timeubandwidth product WT of GMSK is stan-
`dardized at 0.3, which provides the best compromise between increased bandwidth
`occupancy and resistance to cochannel interference. Ninety-nine percent of the radio
`frequency (RF) power of GMSK signals so specified is confined to a bandwidth of 250
`kHz, which means that, for all practical purposes, the sidelobes of the GMSK signal
`are insignificant, for all practical purposes, outside this frequency band.
`The available spectrum is divided into ZOO-kHz-wide subchannels, each of which
`is assigned to a GSM system transmitting data at 271 kb/S. Figure 4.24 depicts the
`power spectrum of a channel in relation to its two adjacent channels; this plot is the
`
`a Power spectrum, dB
`
`|II :
`
`-60r
`
`ll
`
`l
`
`1
`
`l
`
`Carrier
`i
`Carrier
`frequency n,,,,,r frequency
`F200 ah—zooah—mu —>l ——> Frequency, kHz
`
`FIGURE 4.24 Power spectrum of GMSK signal for GSM communications.
`
`
`
`Page 258 of 474
`
`
`
`
`
`7
`
`:i
`l
`1—80
`ll
`Limp
`
`1
`
`l
`
`Page 258 of 474
`
`

`

`1 i
`
`i
`
`i
`
`i
`
`.
`
`E
`
`'
`
`
`
`Section 4.18 Theme Example 2: Joint Equalization and Decoding
`
`239
`
`passband version of the baseband power spectrum of Fig. 3.21 corresponding to
`WTb : 0.3. From Fig. 4.24, we may make the following important observation: The
`RF power spectrum of the subchannel shown shaded is down by an amount close to
`40 dB at the carrier frequencies of both adjacent subchannels, which means that the
`
`effect of cochannel interference in GSM is smail.
`
`4.13 THEME EXAMPLE 2: JOINT EQUALEZATEON AND DECODING14
`
`The material presented in Section 4.12 has taught us an important principle in digital
`communication theory, hereafter referred to as the turbo coding principle. The princi~
`ple may be stated as foliows:
`
`The performance of the receiver of a digital communication system, embodying
`the plot of bit error rate (BER) versus transmitted signal energy per bit—to-noise
`spectral density ratio, Eb/NO, may be significantly improved by using
`
`(i) a concatenated encoding strategy at the transmitter and
`
`(ii) an iterative receiver, with all of its components operating in soft-input, soft-
`oatpat (i.e., analog) form.
`
`The iterative receiver is the hallmark of the turbo coding principie.
`In Fig. 4.15, the concatenated encoding strategy is implemented in parallel form,
`so called because encoder 1 and encoder 2 operate in parallel on their respective
`inputs. Moreover, the two encoder inputs are essentially statisticaliy independent by
`virtue of the turbo interleaver that separates them.
`Alternatively, we can implement the concatenated encoding strategy in serial
`form, as illustrated in Fig. 4.25(a). Although, at first sight, this structure Eooks familiar
`
`Binary
`stream
`
`
`
`Channel encoder:
`Outer encoder l
`
`Interleaver
`
`Wireless channel:
`Inner encoder
`
`Received
`signal
`
`
`
`
`(a)
`
`Additive white
`Gaussian noise
`
`
`
`
`
`qualizer:
`Inner decoder
`
`RECEIVSd
`Signal
`
`Deinterleaver
`
`
`
`
`
`Channel decoder:
`Outer decoder
`
`Hard
`limiter
`
`Estimate
`of original
`binary
`stream
`
`(b)
`
`Joint equalizationvandwdecoding problem.
`FIGURE 4.25
`(a) Turbo encoder of the serial form. with the channei viewed as the inner encoder.
`(b) Iterative Turbo decoder, highlighting the application of feedback around the two decoding
`stages.
`
`
`
`Page 259 of 474
`
`Page 259 of 474
`
`

`

`240
`
`Chapter 4 Coding and Time-Division Multiple Access
`
`in the context of a fast-fading wireless communication system, the viewpoint embod-
`ied in its description as a two—stage encoder can be justified along the following lines:
`
`0 The channel encoder, introduced into the transmitter chain to improve the reli-
`ability of communication, is viewed as the outer encoder.
`
`- The wireless channel, essential for the communication process, is viewed as the
`inner encoder.
`
`0 The channel interleaver, introduced to disperse the burst of errors produced by
`the possible presence of the fast-fading phenomenon in the wireless channel,
`separates the two encoders in accordance with the transmit part of the turbo-
`coding principle.
`
`Correspondingly, the two-stage decoder is configured as an iterative receiver, as
`shown in Fig. 425(b), in accordance with the receiver part of the turbo-coding prinr
`ciple. Herein lies the basis of a novel receiver structure made up of the following
`constituents:
`
`0 A soft-input, soft—output channel equalizer, designed to mitigate the effect of
`intersymbol interference (ISI) produced by the transmission of the encoded-
`interleaved signal across the channel; the equalizer acts as the inner decoder.
`
`° A soft—input, soft-output channel decoder, designed to improve the estimates of
`encoded data symbols; the channel decoder acts as the outer decoder.
`
`0 A channel deinterleaver, designed to undo the permutation that is present in soft
`outputs produced by the equalizer, so as to facilitate proper channel decoding.
`
`- An interleaver, designed to repermute the soft outputs produced by in the chan-
`nel decoder, so that the feedback signal applied to the equalizer assumes a form
`consistent with the received signal.
`
`Now, if we were to open the feedback loop in Fig. 4.25(b) by removing the interleavet
`in the feedback path, we would be left with a conventional receiver defined by the for-
`ward path made up of the channel-equalizer, channel-deinterleaver, channel-decoder
`chain. The practical advantage of the iterative receiver is that it performs joint equal-
`ization and decoding, thereby offering the potential for improving the performance of
`the receiver by virtue of the feedback around the two stages of processing: channel
`equalization and channel decoding.
`In particular, the reduction in bit error rate through joint equalization and
`decoding performed iteratively can be explained by observing that each compo-
`nent in the receiver, namely, the equalizer and the decoder, helps to bootstrap the
`performance of the other. The bootstrap action manifests itself as follows:
`
`- The equalizer uses frequency diversity in the channel to improve the decoder
`performance through [SI reduction.
`
`0 The decoder uses time diversity in the code to improve the equalizer perfor—
`mance through improved estimates ofuncoded data symbols.
`
`Page 260 of 474
`
`Page 260 of 474
`
`

`

`
`
`i
`l
`
`---l
`
`i
`
`Section 4.18 Theme Example 2: Joint Equalization and Decoding
`
`24‘!
`
`The net result of this bootstrap action is that, in the course of three to five iterations, a
`significant reduction in the bit error rate is accomplished, as is illustrated in a simple,
`yet insightful, computer experiment described next.
`
`Computer Experiment
`
`the serial concatenated encoder of Fig.4.25(a), with the following
`Consider
`specifications:
`
`1. Channel encoder (outer encoder): convolutional encoder
`Code rate 21/2
`
`Constraint length, K m 3
`Generator polynomials:
`g(1)(D)=1~l-Dz
`543(1)): 1 +1) +02
`2. Interleavcr:
`Type: pseudorandom interieaver
`Block size: 1000 bits
`
`3. Wireless channei: Tapped-delay-iine model with the foliowing tap weights (see
`Fig. 4.26, where T denotes the symbol duration):
`
`wO = 0.93
`
`W1 2 “0.17
`
`W2 = 0.35
`
`Euclidean norm of the tap-weight vector w:
`
`2 1/2
`2
`2
`leIl = (wO-i—wl ~I— W2)
`
`= ((0.93)2+{70.17)2+(0.35)2)
`:1
`
`1/2
`
`4. Modulation (not shown in Fig. 425(3)): Binary phase-shift keying (BPSK). With
`this simple method of modulation, the baseband model of the system assumes a
`real—valued form throughout the system.
`
`
`
`Output
`
`FIGURE 4.26 Tappededelay—line model of wireless channel with three tap—weights; the
`blocks labeied Tact like unit-delay operations
`
`
`
`Page 261 of 474
`
`Page 261 of 474
`
`

`

`242
`
`Chapter 4 Coding and Time-Division Multiple Access
`
`The iterative two—stage receiver of Fig. 4.25(b) was implemented as follows:
`
`1. Equalizer (inner decoder).
`. The channel impulse response, assumed to be known.
`- The decoding trellis, formed on the basis of the channel impulse response (i.e.,
`tap weights of the tapped-delay-line model) and BPSK.
`2. Deinterleaver, designed to deinterleave the soft outputs produced by the
`equalizer.
`3. Channel decoder (outer decoder).
`- The decoding trellis, formed on the basis of the convolutional encoder’s gen-
`erator polynomials g(1)(D) and g(2)(D)
`0 Construction of the decoding trellis, discussed in Section 4.7
`4. Interleaver, designed to interleave the soft outputs produced by the channel
`decoder.
`
`5. Decoding algorithm for both the equalizer and channel decoder: The logarith-
`mic form of the maximum a posterior probability (MAP) algorithm, discussed in
`Section 4.12.
`
`Using computer simulations of the encoderfdecoder system of Fig. 4.25, we plot the
`receiver performance, in terms of BER versus EbI’NO, in Fig. 4.27, on the basis of which
`we may make the following observations:
`
`10“
`
`Iteration 1
`
`Iteration 2
`
`—1
`
`10 E
`
`fi 10'2 E
`m
`1
`
`10’3 I;
`
`
`
`
`
`Iterations 4,5
`Iteration
`
`
`10‘ 4
`—4
`
`I
`—2
`
`I
`0
`
`I
`2
`
`I
`4
`EbeU
`
`I
`6
`
`I
`8
`
`I
`10
`
`12
`
`FIGURE 4.27 Performance receiver curves for the iterative joint equalization-and-decoding
`experiment.
`
`
`
`Page 262 of 474
`
`Page 262 of 474
`
`

`

`Section 4.19 Theme Example 3: Random-Access Techniques
`
`243
`
`1. Iterative detection, performed in accordance with the turbo coding principle,
`provides a significant improvement in receiver performance measured with
`respect to the first iteration; in effect, iteration 1 represents what is achievable
`with a noniterative (i.e., conventional) receiver.
`2. The receiver converges in about five iterations.
`3. Littie change in receiver performance occurs in going from iteration 4 to
`iteration 5.
`
`Problem 4.5 The baseband model used in the computer experiment on joint equalization
`and decoding is real valued, which is justified for BPSK modulation. To improve spectral effi-
`ciency, QPSK modulation is commonly used. Discuss the modifications that would have to be
`made to the baseband model in order for it to handle QPSK modulation.
`I
`
`The computer experiment just presented assumes that the receiver has perfect knowl-
`edge of the channel state information (CSI). In practice, we have to deai with a wireless
`channel that is typically nonstationary, in which case the equalizer structure has to be
`expanded to include a CSI estimator. (See Problem 4.24.)
`
`There are many instances in multiaccess communications in which a user terminal is
`required to send a packet of information to the base station at a random instant in
`time. Such instances occur, for example, when the terminal wishes to log onto the sys«
`tem or when the user Wishes to make a telephone call. The system must provide a
`means by which these random requests can be serviced. This could be done in antim-
`ber of ways:
`
`1. The system could permanently assign one channel to each user.
`
`2. The system could poll each user at regular intervals to see if he or she had any-
`thing to transmit.
`
`3. The system could provide a random-access channel that the users could access at
`any time.
`
`Since a typical user has a low duty cycle, the first approach is wasteful of spectrum. The
`second approach could result in long deiays if there is a large number of users, and if
`the users are mobile, the polling process can become compiicated. In this section, we
`will consider the third approach of assigning a random-access channel.
`
`:
`
` 4.19 THEME EXAMPiE 3: RANDOM-ACCESS TECHNIQUES
`
`4.19.1 Pure Aioha15
`
`Consider

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket