throbber

`
`V-BLAST:An Architecture for Realizing Very High Data Rates
`Over the Rich-Scattering Wireless Channel
`
`P.W. Wolniansky, G. J. Foschini, G. D. Golden, R. A. Valenzuela
`Bell Laboratories, Lucent Technologies, Crawford Hill Laboratory
`791 Holmdel-Keyport Rd., Holmdel, NJ 07733
`
`ABSTRACT
`
`2. SYSTEM OVERVIEW
`
`Receni information theory research has shownthat the
`rich-scattering wireless
`channel
`is
`capable
`of
`enormous theoretical capacities if the multipath is
`properly exploited.
`In this paper, we describe a
`wireless
`communication
`architecture
`known
`as
`vertical BLAST (Bell Laboratories Layered Space-
`Time) or V-BLAST, which has been implemented in
`realtime in the laboratory. Using our laboratory
`prototype, we have demonstrated spectral efficiencies
`of 20 - 40 bps/Hz
`in an indoor propagation
`environment at realistic SNRs and error rates. To the
`best of our knowledge, wireless spectral efficiencies of
`this magnitude
`are
`unprecedented,
`and
`are
`jurthermore unattainable using traditional techniques.
`
`1. INTRODUCTION
`
`A high-level block diagram of a BLAST system is
`shown
`in Fig.l.
`A single
`data
`stream is
`demultiplexed into M substreams, and each substream
`is then encoded into symbols and fed to its respective
`transmitter.
`(The encoding process is discussed in
`more detail below.) Transmitters 1 — M operate co-
`channel
`at
`symbol
`rate 1/7 symbols/sec, with
`synchronized symboltiming. Each transmitteris itself
`an ordinary QAM transmitter. The collection of
`transmitters comprises,
`in effect,
`a vector-valued
`transmitter, where components of each transmitted
`M-vector
`ate
`symbols
`drawn
`from a QAM
`constellation. We assume that the same constellation
`is used for each substream, and that transmissions are
`organized into bursts of L symbols. The power
`launched by each transmitter is proportional to 1/M so
`that
`the
`total
`radiated power
`is
`constant
`and
`independent of M,
`
`
`
`environment
`
`
`
`
`
`
`In the past few years, theoretical investigations have
`revealed that the multipath wireless channel is capable
`of enormous capacities, provided that
`the multipath
`scattering is sufficiently rich and is properly exploited
`D>
`through the use of
`an
`appropriate processing
`£=
`D
`architecture [1-4]. The diagonally-layered space-time
`RX
`architecture proposed by Foschini [1], now known as
`3s
`Vector
`7x
`processing:
`dita
`Eotmate «
`
`2a
`diagonal BLAST (Bell Laboratories Layered Space-
`and decode
`Time) or D-BLAST,is one such approach. D-BLAST
`utilizes multi-element
`antenna
`arrays
`at
`both
`transmitter and receiver and an elegant diagonally-
`layered coding structure in which code blocks are
`dispersed across diagonals in space-time.
`In an
`independent Rayleigh scattering environment, this
`processing structure leads to theoretical rates which
`grow linearly with the number of antennas (assuming
`equal numbers of transmit and receive antennas) with
`these rates approaching 90% of Shannon capacity.
`from
`However,
`the diagonal
`approach suffers
`certain implementation complexities which makc it
`inappropriate for initial implementation,
`In this paper,
`we describe a simplified version of BLAST known as
`vertical BLAST or V-BLAST, which has been
`implemented in realtime in the laboratory. Using our
`laboratory prototype. we have demonstrated spectral
`efficiencies of 20 - 40 bps/Hz at average SNRs
`ranging from 24 to 34 dB. Although these results were
`obtained in a rclatively benign indoor environment,
`webelieve that spectral efficiencies of this magnitude
`are
`unprecedented,
`regardless
`of
`propagation
`environment or SNR, and are simply unattainable
`using traditional techniques.
`
`data|eneoder 1’
`
`
`
`
`
`
`
`Notation:
`F
`B Vector symbol: a = Ce
`B Numberof transmitters: M
`; Numberof receivers: N
`
`Figure 1: V-BLASThigh level system diagram
`
`The essential difference between D-BLAST and V-
`BLAST lics in the vector encoding proccss.
`In D-
`BLAST,
`redundancy between the
`substreams
`is
`introduced through the use of specialized imter-
`substream block coding. The D-BLAST code blocks
`are organized along diagonals in space-time.
`It is this
`coding that
`leads
`to D-BLAST’s higher
`spectral
`efficiencies for a given number of transmitters and
`receivers. In V-BLAST, however, the vector encoding
`process is simply a dernultiplex operation followed by
`independent
`bit-to-symbol mapping
`of
`each
`substream. No intcr-substream coding, or coding of
`any kind, is required, though conventional coding of
`the individual substreams may certainly be applied.
`For the remainder of this paper, we will assume for
`
`0-7803-4900-8/98/$ 10.00 © 1998 IEEE
`
`Authorized licensed use limited to: Fish & Richardson PC. Downloaded on January 10,2022 at 15:09:41 UTC from IEEE Xplore. Restrictions apply.
`
`4
`
`SAMSUNG 1011
`
`1
`
`SAMSUNG 1011
`
`

`

`
`
`the substreams comprise uncoded,
`simplicity that
`independent data symbols.
`individually, conventional
`Receivers
`1
`AN are,
`QAM receivers. These receivers also operate co-
`channel, each receiving the signals radiated from all M
`transmit antennas. For simplicity in the sequel, flat
`fading is assumed, and the matrix channel
`transfer
`function is H’”™, where h,, is the (complex) transfer
`function from transmitter j to receiver i, and M<N.
`We take the quasi-stationary viewpoint
`that
`the
`channel time variation is negligible over the L symbol
`periods comprising a burst, and that the channel
`is
`estimated accurately, e.g. by use of a
`training
`sequence embedded in each burst, thus, for brevity in
`the remainder of the paper, we will not make the
`distinction between H andits estimate.
`Although V-BLAST,as shown above, is essentially
`a single-user system which uses multiple transmitters,
`one can naturally ask in what ways the BLAST
`approach differs
`from simply using
`traditional
`multiple access techniques in a single-user fashion,i.e.
`by driving all the transmitters from a single user’s data
`which has been split into substreams. Some of these
`differences are worth pointing out: First, unlike code-
`division or other spread-spectrum multiple access
`techniques, the total channel bandwidth utilized in a
`BLAST system is only a small fraction in excess of
`the symbol rate, ic. similar to the excess bandwidth
`required by a conventional QAM system. Second,
`unlike FDMA, each transmitted signal occupies the
`entire system bandwidth, Finally, unlike TDMA, the
`entire system bandwidth is used simultaneously by all
`of the transmitters all of the time.
`together are
`Taken together,
`these differences
`precisely what give BLAST the potential to realize
`higher spectral efficiencies than the multiple-access
`techniques. In fact, an essential feature of BLAST is
`that no explicit orthogonalization of the transmitted
`signals is imposed by the transmit structure at all.
`Instead, the propagation environment itself, which is
`assumed to exhibit significant multipath, is exploited
`to achieve the signal decorrelation necessary to
`separate the co-channel signals. V-BLAST utilizes a
`combination of old and newdetection techniques to
`separate the signals in an efficient manner, permitting
`operation at significant
`fractions of the Shannon
`capacity and achieving large spectral efficiencies in
`the process.
`
`3. V-BLAST DETECTION
`In what follows, we take a discrete-time baseband
`view of the detection process for a single transmitted
`vector
`symbol,
`assuming
`symbol-synchronous
`receiver
`sampling
`and
`ideal
`timing.
`Letting
`a= (d},49, °°: dy)" denote
`the
`vector
`of
`transmit symbols, then the corresponding received N-
`vectoris
`
`r, = Ha + v
`
`()
`
`where V is a noise vector with components drawn from
`TID wide-sense stationary processes with variance 0°.
`One way to perform detection for this system is by
`using conventional adaptive antenna array (AAA)
`techniques,
`i.c.
`linear combinatorial nulling [6]:
`Conceptually, each substream in turn is considered to
`be the desired signal, and the remainder are considcred
`as
`"interferers". Nulling is performed by linearly
`weighting the received signals so as to satisfy some
`performance-related criterion,
`such
`as minimum
`mean-squared error (MMSE)or zero-forcing (ZF).
`For example, zero-forcing nulling can be performed
`by choosing weight vectors w;, = 1,2, ---,.M,
`such that
`
`w) (HD, = 3i
`
`(2)
`
`is the j-th column of H, and 3 is the
`where (H);
`Kronecker delta. Thus,
`the decision statistic for the
`i-th substreamisy; = wir;.
`This linear nulling approach is viable, but superior
`performance is obtained if nonlinear techniques are
`used. One particularly attractive nonlinear alternative
`is to exploit the timing synchronism inherent in the
`system model
`(the
`assumption
`of
`co-located
`transmitters makes this completely reasonable) and
`use symbol cancellation as well as linear nulling to
`perform detection. Using
`symbol
`cancellation,
`interference from already-detected components of a is
`subtracted out
`from the received signal vector,
`resulting in a modified received vector
`in which,
`effectively,
`fewer
`interferers are present. This
`is
`somewhat
`analogous
`to
`decision
`feedback
`equalization.
`the order in
`When symbol cancellation is used,
`which the components of a are detected becomes
`important to the overall performance of the system.
`Later, we will show how to determine a particular
`ordering which is optimal in a certain sense; for now,
`we first discuss the general detection procedure with
`respect to an arbitrary ordering.
`Let the ordered set
`
`S= {hy kp, - ++, Rag}
`
`(3)
`
`imtegers 1,2, ---,M
`the
`a permutation of
`be
`specifying the order
`in which components of the
`transmitted symbol vector a are extracted. The
`detectton process proceeds generally as follows:
`Step 1: Using nulling vector w,,,
`form decision
`Statistic Vp,
`
`7
`_
`Ye, = Wet
`
`(4)
`
`Step 2: Slice y,. to obtain a,:
`
`Authorized licensed uselimited to: Fish & Richardson PC. Downloaded on January 10,2022 at 15:09:41 UTC from IEEE Xplore. Restrictions apply.
`
`2
`
`2
`
`

`

`
`
`ay=On) (5)
`
`(slicing)
`quantization
`the
`denotes
`where Q(:)
`operation appropriate to the constellation in use.
`Step 3: Assuming that @,, = d,,, cancel a,, from the
`received vector r,,
`resulting im modified received
`vector 4:
`
`wi, (HDs,
`
`=~
`
`19
`1
`
`|
`4
`
`IL
`
`7
`
`
`particular w,
`is constrained to be orthogonal to, the
`larger its norm, and thus, according to (8), the smaller
`its post-detection SNR. Whenusing cancellationthen,
`the px, are lower bounded (with equality only for px,)
`by their corresponding nulling-onlyp,.
`The importance of ordering is simply that it permits,
`during the detection of the i-th component, a choice as
`to which subset of M — i rows that w,, should be
`(6)
`ry = 1) ~ ay, (H),,
`constrained by; different choices lead to different p,.
`
`
`
`
`For an M=3>system,example, in detecting
`where (H),, denotes the &,-th column of H. Steps 1-
`component | first (in the presence of 2 and 3) will, in
`3 are then performed for components ky, +--+ , ky by
`general, result in a different p,
`than if component 2
`operating in turn on the progression of modified
`was detected first (in the presence of 1 and 3), With
`received vectors 2,13, °°°, ly.
`pure nulling, each component is always detected in the
`Thespecifics of the detection process depend onthe
`presenceof ali the others, so ordering does not matter,
`criterion chosen to compute the nulling vectors wy.
`Now recall that all components of a are assumed to
`thc most common of these being MMSE or ZF. The
`utilize the same constellation. Under this assumption,
`detection process is described here with respect to the
`the component with the smallest p,, will dominate the
`ZF critcrion since it is somewhat simplerto state. The
`error performance of the system. Thus, an obvious
`k;-th ZF-nulling vector
`is defined as
`the unique
`figure of merit for this system - though not the only
`minimum norm vector satisfying
`one possible - is the maximization of the worst,
`i.e.
`the minimum, of the p, over all possible detection
`orderings. A surprising result - and one which we
`believe has not been previously appreciated -
`is that
`simply choosing the best p,, a! each stage in the
`detection pracess leads
`to the globally optimum
`ordering, Sop:
`in this maximin scnsc. The proof is
`given in the appendix.
`We remark that
`this optimality result may have
`wider applicability to multi-user canccllation-based
`detection
`as well. Although
`the
`“best
`first”
`cancellation approach is widely known within the
`multi-user community [7-8], essentially being the
`defacto approach, we are not aware of any previous
`proofofits optimality in the sense given here.
`The tull ZF V-BLAST detection algorithm can now
`be described compactly as a recursive procedure,
`including determination of the optimal ordcring, as
`follows:
`
`is orthogonal to the subspace spanned by
`Thus, w,,
`the contributions to r; due to those symbols not yet
`estimated and cancelled,
`It is not difficult to show that
`the unique vector satisfying (7) is just the &;-th row of
`Hy, where the notation Hj; denotes the matrix
`obtained by zeroing columns k,,k2, °°:
`,k; of H
`and * denotes the Moore-Penrose pseudoinverse [5].
`The post-detection SNR for
`the &,-th detected
`componentof a is easily obtained by substituting (1)
`and (7) into (4), and taking expected values,i.e.
`<a,[?>
`a?|| wz, |I°
`
`Px,
`
`(4)
`
`where the expectation in the numerator is taken over
`the constellation set.
`
`3.1 OPTIMAL DETECTION ORDERING
`As mentioned earlier, when symbol cancellation is
`uscd, the system performanceis affected by the order
`in which the components of a are detected, whereas it
`does not matter when pure nulling is used. In order to
`appreciate this, first consider why it
`is that nulling
`with cancellation performs better than pure nulling,
`regardless of ordering.
`When nulling alone is used, each uulling vecwur is
`required, according to (2), to be orthogonal w M — 1
`rows of H. However, when symbol cancellation is
`employed in addition to nulling, w,, is required to be
`orthogonal only to the M — i undetected components
`av per (7) A simple consequence of the Gauchy-
`Schwartz inequality is that the more rows of H that a
`
`297
`
`initialization:
`ie i
`.
`G, =H
`ky
`= argmin| (Gj)
`recursion:
`
`We = (Gis,
`Ye = WEE
`a, = O(n)
`Pei
`= FT ay, (HDs,
`Gio = He
`Rist = argmin | (Gie all
`if itl
`
`(9a)
`(9b)
`(Ye)
`
`(9d)
`(9e)
`(Of)
`(9g)
`(9h)
`(91)
`(9)
`
`Authorized licensed uselimited to: Fish & Richardson PC. Downloaded on January 10,2022 at 15:09:41 UTC from IEEE Xplore. Restrictions apply.
`
`3
`
`3
`
`

`

`
`
`are used for training. In this experiment, each of the
`eight substreams utilized uncoded 16:QAM,i.e. 4
`bits/symbol/Lransmitter, so that the payload block size
`is 8x4x80 = 2560 bits. The raw spectral efficiency
`of this configuration is thus
`Eo
`=
`(8xmtrs )x(4b/sym/xmtr) x(24,3 ksym/s)
`“
`30kHz
`
`= 25.9 bps/Hz
`
`and the payload efficiency is 80% of the above, or
`20.7 bps/Hz, corresponding to a payload data rate of
`621 kbps in 30 kHz. bandwidth.
`
`M=8, N=12 8 x 16QAM = 26 bps/Hz
`
`O nutionty
`© Null + optimized cancel
`
`
`
`19°
`
`1077
`
`iq?
`
`au
`
`s a"
`
`10%
`
`
`———
`20
`22
`24
`26
`28
`SNR (dB)
`Figure 2: Single-position performance
`
`The upper curve in Fig.2 shows performance
`obtained when conventional nulling is used. The lower
`curve
`shows
`performance
`using mulling
`and
`optimally-ordered cancellation. The average difference
`is about 4 dB, which corresponds to a raw spectral
`efficiency differential
`(for
`this
`configuration) of
`around 10 bps/Hz.
`
`BLER ond BER at 24 dB SNR vs. position
`ToT
`oT TT TT
`.
`
`+
`
`
`
`-
`
`o
`
`1
`
`L
`2
`
`.
`
`P
`}
`2
`
`.
`
`e
`
`*
`
`soe oe -
`
`
`4
`ae
`
`1
`L
`6
`5
`4
`Position Number
`
`I
`7
`
`4
`
`1
`
`l
`8
`
`|
`9
`
`a
`
`a (10
`197!
`-1
`-3
`
`se
`+ 10
`nN
`© 10
`wi
`a tot
`107
`me
`ge We
`1977
`
`=A
`
`Figure 3: Multiple-position performance
`
`Figure 3 shows performanceresults obtained using
`the
`same BLAST system configuration (M = 8,
`N = 12, 16-QAM) when the receive array was left
`fixed and the transmit array was located at different
`positions throughout the environment. In each case,
`
`(9c,i)
`is the j-th row of G;. Thus,
`where (G;);
`determine the elements of 5,the optimal ordering;
`(9d-f) compute respectively the ZF-nulling vector, the
`decision statistic, and the estimated componentof a;
`(9g) performs cancellation of the detected component
`from the received vector, and (9h) computes the new
`pseudoinverse for the next iteration. Note that
`this
`new pscudcinverse is based on a "deflated" version of
`H,
`in which columns k,,k2,-°--,k; have been
`zeroed. This is because these columns correspond to
`components of a which have already been estimated
`and cancelled, and thus the system becomes equivalent
`to a “deflated” version of Fig, 1 in which transmitters
`k,, ka. --+, k; have been removed, or equivalently, a
`system in which ay, = --- = dy, = 0.
`
`4. LABORATORY RESULTS
`
`A laboratory prototype of a V-BLAST system has
`been constructed for the purpose of demonstrating the
`feasibility of the BLAST approach. The prototype
`Operates at a carrier frequency of 1.9 GHz, and a
`symbol rate of 24.3 ksymbols/sec, in a bandwidth of
`30 kHz. The receiver processing is similar to that
`shownin (9).
`The system was operated and characterized in the
`actual laboratory/office environment, not a test range,
`with transmitter and receiver separations up to about
`12 meters. This environment is relatively benign in
`that the delay spread is negligible, the fading rates are
`low, and there is significant neat-field scattering from
`nearby equipmentand office furniture. Nevertheless,it
`is a representative indoor lab/office situation, and no
`attempt was made to “tune”
`the system to the
`environment, or to modify the environment in any
`way.
`The antenna arrays consisted of A/2 wire dipoles
`mounted im various arrangements. For the results
`shown below,the receive dipoles were mounted on the
`surface of a metallic hemisphere approximately 20 cm
`in diameter, and the transmit dipoles were mounted on
`a flat metal sheet, in a roughly rectangular array with
`about 2/2 inter-element spacing.
`In general,
`the
`system performance was
`found
`to
`be nearly
`independent of small details of the array geometry.
`Fig. 2 shows results obtained with the prototype
`system, using M = 8
`transmitters
`and N = 12
`receivers. In this experiment, the transmit and receive
`arrays were each placed at a single representative
`position within the environment, and the performance
`characterized.
`The horizontal axis
`is
`spatially
`averaged received SNR,i.c., I &¥ SNR ;, where SNR;
`i=l
`is the the ratio of received signal power (from all M
`transmitters) to noise power at the i-th receiver. The
`yertical axis is the block error rate, where a "block"is
`defined as a single transmission burst. In this case, the
`burst length 1 is 100 symbol durations, 20 of which
`
`Authorizedlicensed uselimited to: Fish & Richardson PC. Downloaded on January 10,2022 at 15:09:41 UTC from IEEE Xplore. Restrictions apply.
`
`4
`
`4
`
`

`

`
`
`the transmit power was adjusted so that the avérage
`received SNR was 24+0.5 dB. Nulling with optimized
`cancellation was used.
`spectral
`this
`It can be seen that operation at
`efficiency is reasonably robust with respect to antenna
`position. In all positions,
`the system had at
`least 2
`orders of magnitude margin relative 10 107* BER.
`For a completely uncoded system, these are entirely
`reasonable error rates, and application of ordinary
`error correcting codes would significantly reduce this.
`At 34 dB SNR, spectral efficiencies as high as 40
`bps/Hz have been demonstrated at similar error rates,
`though with less robust performance.
`to be
`We believe
`these
`spectral
`efficiencies
`It
`is
`unprecedented
`for
`the wireless
`channel.
`worthwhile to point out that spectral efficiencies of
`these magnitudes are essentially impossible to obtain
`using traditional
`approaches
`in which a
`single
`transmitter
`is used,
`simply because the required
`constellation
`loadings would
`be
`immense.
`For
`example, to obtain the equivaicnt of the 32 bits per
`vector symbol in the experiments above, but using a
`single transmitter, would require a constellation with
`2°? or more than a billion (10°) points, which seems
`well outside of the realm of practicality, regardless of
`SNR.
`
`SUMMARY AND CONCLUSIONS
`We have described V-BLAST,a wireless architecture
`capable of realizing extraordinary spectral efficiencies
`over the rich-scattering wireless channel. The general
`BLASTapproach and the V-BLASTdetection scheme
`were motivated and described in detail, and an
`interesting
`new
`optimality
`result
`regarding
`cancellation-based detection (which may have wider
`applicability to multi-user detection as well) was
`reported. Early results with our V-BLAST realtime
`laboratory prototype have proven the feasibility of the
`concept,
`and we
`have
`demonstrated
`spectral
`efficiencies of 20 - 40 bps/Hz under real-world indoor
`conditions, exceeding any results that we are aware of
`using traditional modulation techniques. Although
`these resulls were obtained in a relatively benign
`environment,
`we
`are.
`nevertheless
`strongly
`encouraged, and believe that
`the BLAST approach
`mayeventuallylead to significantly improved spectral
`efficiencies in wireless systems.
`
`APPENDIX: PROOF OF THE OPTIMALITY OF
`ORDERING IMPOSEDBYEQ.(9)
`
`Definitions and notation:
`ordering
`detection
`For
`a
`given
`5 = {8,,8_, +++ ,Sy} detine the constraini set of
`S;
`to be the set {Siat, Si4a, 00° ou), or the null
`set
`if
`¢ = M. The constraint
`set
`is
`just
`those
`gomponents cf a whieh have net yet been detected and
`cancelled.
`
`Let Sbe a detection ordering. Then define p g, 10 be
`thc post-detection SNR at
`the i-th stage of the
`detection process whenusing this ordering,ie. ps is
`the post-detection SNR when detecting as, according
`to (e).
`Let £2 {L,,L2, ---,Ly} be
`optimum ordering obtained using (9).
`The following trivial
`lemmas are used in what
`follows and are stated here withoutproof:
`
` locally-
`
`the
`
`Lemma I: Let A and B be two distinct orderings. If
`Ay = By, and the constraint sets of A, and By,
`consist of identical elements (regardless of their
`order), then py, — Pz,-
`
`Lemma 2; Let A and 8 be two distinct orderings. If
`Ay = By, and the constraint set of A, is a subset of
`the constraint set of #,, thenp,, 2 pz,.
`
`Proof:
`arbitrary
`an
`Let Q= (Q1,@Q2,°°::,Qy)} be
`ordering distinct from 4. Let d be the indexof thefirst
`Ueftmost) element for which £ and Q differ. Let r be
`the index for which QO, = L,. (Note thatr > d, since
`£ and Q have commonelements up to index d—-1.)
`By Lemma1,
`
`PL. = Po,
`
`l<i<d-1.
`
`(Al)
`
`Now define Q’ to be a perturbation of Q obtained by
`moving Q, from index r to index d, and "squcezing”
`the rest of Qso that the elements of Q’ are
`
`Q = {Q1, Q2, 1+ ,Og-1, Q,; Qasr. Qu}
`
`where it is understood that the sequence above Q, is
`actually “missing” the repositioned Q, element. Note
`that Q’ matches £ in the first d positions, whercas Q
`matches £ only in the first d—1 positions.
`Now consider the post-dcetection SNRs that would
`result from using Q ins:cad of @
`By Lemma
`1, Po, =Po,, Pe, = Pai. >
`Po... = Pg’... since tiese eleménis have the same
`constraint sets.
`By either Lemma 1 or Lemma 2, py, SPqg,,>
`Pon, SPO.» Po, SPQ’, since these elements
`either have the same constraint sets, or the constraint
`set of the Q’ elements are subsets of the constraint sets
`of the corresponding Qelcments.
`Finally, Pg, S Pg, since Pg, = pz, and p,, is,
`by virtue of the local naaximization procedure (9), at
`least as large as any other choice in that position.
`Thus,
`
`min
`1 Pa
`
`< minpy:
`u Pe,
`
`A.2)
`
`(
`
`that by
`allows
`induclive argument
`An obvious
`successive similar perturbations, Q can be transformed
`
`Authorized licensed uselimited to: Fish & Richardson PC. Downloaded on January 10,2022 at 15:09:41 UTC from IEEE Xplore. Restrictions apply.
`
`5
`
`5
`
`

`

`
`
`into £, while maintaining at each perturbation an
`inequality analogous to (A.2). Thefinal result is that
`minpg, $ min, «
`(A.3)
`
`Since Qis any arbitrary ordering distinct from £ the
`steps leading to (A.3) are valid for all possible
`orderings, and thus no ordering does better than £.
`
`REFERENCES
`{1] G. J. Foschini, “Layered Space-Time Architecture
`for Wireless Communication
`in
`a
`Fading
`Environment When Using Multiple Antennas",
`Bell Laboratories Technical Journal, Vol. 1, No.
`2, Autumn, 1996, pp. 41-59.
`.
`[2] G. G. Raleigh, and J. M. Cioffi, “Spatio-Temporal
`Coding for Wireless Communications", Proc.
`1996 IEEE Globecom, Nov. 1996, pp. 1809-1814.
`(31 G, J. Foschini and M. J. Gans, “On Limits of
`Wireless
`Communications
`in
`a
`Fading
`Environment When Using Multiple Antennas",
`Wireless Personal Communications, Vol. 6, No. 3.
`1998, pp. 311-335.
`[4] G. G. Raleigh, and J. M. Cioffi, "Spatio-Temporal
`Coding for Wireless Communication",
`[EEE
`Trans. Communications, Vol. 46, No. 3, March,
`1998, pp. 357-366.
`{5] G. H. Golub and C. F. Van Loan, “Matrix
`Computations’, Johns Hopkins University Press,
`Baltimore, MD, 1983.
`[6] R. L. Cupo, G. D. Golden, C. C. Martin, K. L.
`Sherman, N. R. Sollenberger, J. H. Winters, P. W.
`Wolniansky, "A Four-Element Adaptive Antenna
`Array for IS-136 PCS Base Stations",
`in review,
`IEEE Trans. Vehicular Technology.
`(7] C. ¥. Yoon, R. Kohno, H.
`Imai. “A Spread-
`Spectrum Multiaccess System with Cochannel
`Interference Cancellation for Multipath Fading
`Channels",
`IEEE
`J.
`Selected
`Areas
`of
`Communications, Vol. 11, pp. 1067-1075, Sept.,
`1993.
`"Successive
`(8] A. L. C. Hui, K. B. Letaief,
`Multiuser
`Interference
`Cancellation
`for
`Asynchronous DS/CDMADetectors in Multipath
`Fading Links", IEEE Trans. Comm., Vol. 46, No.
`3, March, 1998.
`
`Authorizedlicensed uselimited to: Fish & Richardson PC. Downloaded on January 10,2022 at 15:09:41 UTC from IEEE Xplore. Restrictions apply.
`
`6
`
`6
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket