The aforementioned and other features and objects of the present invention and the manner of attaining them will become more apparent and the invention itself will be best understood by reference to the following description of a preferred embodiment taken in conjunction with the accompanying drawings, wherein:
a) is a diagram of an initial ranging method;
b) is a diagram of a periodic ranging method according to the prior art;
Prior to the introduction of the CFO estimator, we shall develop a base-band signal model for the interleaving OFDMA uplink. Starting by constructing a single-user signal model, we will deduce a multi-user signal model with CFO and a time-variant frequency-selective channel.
An equivalent base-band single-user transmitter/receiver 200 is illustrated in
Focusing on frequency offset estimation, we can safely simplify the outer-modem part of the transmitter as a (de-)modulator. Define complex-valued vector SM×1=[s(0), s(1), s(2), . . . , s(M−1)]T as the signals from the modulator to be transmitted in one OFDM symbol. Then, the M signals are to be mapped onto one frequency-domain OFDM symbol vector (a complex vector of length of N×1) by a set of pre-defined index. The remaining (N−M) entries are set to be zeros. The mapping relationship can be realized by a position index (sc(0), sc(1), . . . , sc(M−1)), that is, s(i) is mapped at the sc(i)-th entries of the frequency-domain OFDM symbol vector. Define a position matrix PN×M=[εsc(0), εsc(1), . . . , εsc(M−1)], where i is (N×1) zeros vector but with its j-th entry being 1. Thus, the frequency-domain OFDM symbol signal can be expressed as P·S. IFFT operation can be realized by left-multiplication of a (N×N) IFFT matrix WH. The (k,l) entry of W is defined as
X
(N+N
)×1
=CP
(N
+N)×N
·W
N×N
H
·P
N×M
·S
M×1 Equation 1
The signal vector X is sequentially transmitted through a time-varying frequency selective channel. This continuous channel distortion can be modeled as:
where h(τ, t) is channel impulse response simplified to h(τ) during one OFDM symbol; F0 is CFO; n(t) is AWGN noise; τmax is the maximum excess delay. Discrete-time equivalent of Equation 2 by replacing t with i/Fs, (Fs is the sampling frequency), is:
where Nmax=τmax·Fs, f0=F0/Fs is the normalized CFO. If Nmax<NCP, no ISI (inter-symbol-interference) occurs, so the received time-domain signal vector is:
Y
N×1
=e
j2πf
·N
·diag(g(f0))N×N·WN×NH·PN×M·diag(h)M×M·SM×1 Equation 4
where g(f)=[ej2π·f·0, fj2π·f·1, . . . , ej2π·f·(N−1)], and h=[H(sc(0)), H(sc(1)), . . . , H(sc(M−1))] (H(i) is designated for the channel frequency response at the i-th sub-carrier). The received frequency-domain signal can be expressed by left multiplications of a FFT matrix W and position matrix pT:
R
M×1
=e
j2πf
N
P
T
·W·diag(g(f0))·WH·P·diag(h)·SM×1 Equation 5
Equation 5 is the base-band signal transmission model of the inner-modem part. If f0=0, i.e. no CFO presents, because the matrix diag(g(f0))=IN×N. And with W·WH=IN×N and PT·P=IM×M, we can rewrite R:
R
M×1
=e
j2πf
N
·diag(h)·SM×1 Equation 6
An equivalent base-band multi-user transmitter/receiver 300 is illustrated in
Comparing with the single user model, the user De-Mux block 318 is implemented on the receiver side to extract each single user data from its location within the OFDMA transmission frame.
In order to give out a multi-user signal model, we denote the superscript (•)(k) as the assignment to the k-th user. Since one OFDM symbol is shared by several users without collision (overlapping), we have:
Thus, the received time-domain signal can be a sum of those of individual users:
Similarly, the received frequency-domain of the k-th user is:
The first term on the right-hand side of Equation 9 is the received signal from the k-th user. If f0(k)≠0, the sub-carrier interference presents, denoted as self-interference. The second term on the right-hand side of Equation 9 includes the signals from the other users. If f0(l)=0, ∀l,l≠k, the sum of the second term is zero because of Equation 7; otherwise, it introduces the interference from other users, denoted as MAI.
In order to design a blind CFO estimator, we shall introduce a concept of a “virtual user”. As its name suggests, UL PUSC of IEEE802.16e system, one of the mandatory transmission structure, uses some of the sub-channels, that is, some sub-channels are deliberately set to zeros. These null sub-channels are uniformly distributed on the overall band in a given permutation way to separate different users. In a practical system, about 60%˜75% sub-channels are used, while the remainders are null sub-channels against the MAI. Thus, despite the presence of the interferences due to the existing CFOs, their influence from one user on another user would greatly diminish along with the increasing of the sub-carrier distances between the two users.
Another issue is sectorization. Like other cellular systems, IEEE802.16e system sectorizes its cell. All of the available sub-channels, excluding the null sub-channels, are grouped into three segments. Each segment is assigned to a sector's usage. Concurrently, three sets of directional transmitter/receiver antenna arrays are installed at the BS for the sectors. Therefore, in a given sector, the signal energies (or interferences) from the neighboring sectors can be low enough to be considered as white noise. Accordingly, the sub-channels of the other segments can be regarded as null sub-channels too.
Taking into account the two points above, there are a number of null sub-channels in OFDMA uplink. These null sub-channels can be regarded as a special user that transmits only zero signals without CFO. We denote this null sub-channel set as “virtual user.” Logically, it contributes no interferences on the other users; whereas the other users present interferences on it. Equation 10 expresses this relationship:
where the superscript (•)(null) is designated for the assignment to the virtual user. The mapping relationship of the virtual user can be realized by a position index (null(0), null(1), . . . , null(M(null)−1)). And a null position matrix PN×M=[εnull(0), εnull(1), . . . , εnull(M−1)].
In an ideal synchronous system, i.e., ω0(l)=0, ∀l, the virtual user only transmits the white noise; otherwise, the MAI from other users leaks on the virtual user's band. We name this MAI as “signal energy leakage.”
Due to the fact that CFO gives rise to the signal energy leakage that augments the signal energy on the virtual user's band, we design a CFO estimator that minimizes the energy.
Ranging can be regarded as a specific user. Denote the superscript (•)(ranging) as the assignment to the ranging user. Define a joint position index of the virtual user and the ranging user as ((null+ranging)(0), (null+ranging)(1), . . . , (null+ranging) (M(null)+M(ranging)−1))=(null(0), null(1), . . . , null(M(null)−1))∪(sc(ranging)(0), sc(ranging)(1), . . . , sc(ranging)(M(ranging)−1)). The joint position matrix of the virtual user and the ranging user is:
The observed frequency-domain joint signal of the virtual user and the ranging user is:
Assuming that the other users have already been synchronized with the BS, that is, f0(l)=0, ∀l,l≠k, the second term of the right hand side of Equation 12 turns to zeros:
Multiple R(null+ranging) by correction matrixes in term of a tentative CFO f(ranging), and extract the signal of the virtual user:
To explain why the estimated CFO minimizes the cost function J(ranging)(f), we note that in Equation 15 f(ranging)+f0(ranging)=0 leads to diag(g(f(ranging)+f0(ranging)))=IN×N, i.e. R′(null)=0. Thus, relying on the cost function, the CFO estimator is given by:
As noted above, the CFO estimator is based on signal energy detection on the virtual user. However, the generation of the correction matrix C(ranging)(f) is high complex operation to be performed once f(ranging) is updated. To address the simplification of the CFO estimator, we start by analyzing MAT property in OFDMA uplink.
From Equation 9, the interference from the 1-th user on the k-th user due to the CFO of the 1-th user can be modeled as:
MAI(k,l,fo(l)))=ej2πf
Define a MAI function m(k,l,f)=(P(k))T·W·diag(g(f))·WH·P(l), so the interference is re-written as:
MAI(k,l,fo(l)))=ej2πf
To investigate the MAT property, we discard the term ej2πf
It equals:
the normalized power of I(u, v) decreases dynamically with the increase of the distance |sc(l)(u)−sc(k)(v)| (it is an integer) for different f (f≠0). It can be concluded that the interference from the u-th sub-carrier of the l-th user has the influence only on its limited neighboring sub-carriers. In the case of f=0, sinc(sc(l)(u)−sc(k)(v))≡0 if and only if |sc(l)(u)−sc(k)(v)|≠0.
We introduce an interference influence factor d to express the “effective” interference limitation:
With Equation 22, we can lower the rank of the correction matrix C(ranging)(f) by discarding those null sub-carriers from which the distances to the nearest ranging sub-carriers are greater than a pre-defined distance d. Re-define null sub-carrier position index:
{sc(null′)(l)εnull∥sc(null)(l)−sc(ranging)(m)|≦d, m=0,1, . . . M(ranging)}
The cost function of J(ranging)(f) is illustrated in
based on Equation 16; step (506)
calculate J(ranging)(f(ranging)) with Equation 17, and J1=J(ranging)(f(ranging)); (step 518)
The flow chart of the iterative method of the present invention is shown in
The minimum value of the cost function is determined during the iterative method of the present invention, as is shown in
Referring now to
As is known in the art, the entire system 600, and blocks 620 and 622 in particular, can be implemented in an integrated circuit using DSP technology to realize all of the various mathematical steps and transformations in the method of the present invention.
While there have been described above the principles of the present invention in conjunction with specific components, circuitry and bias techniques, it is to be clearly understood that the foregoing description is made only by way of example and not as a limitation to the scope of the invention. Particularly, it is recognized that the teachings of the foregoing disclosure will suggest other modifications to those persons skilled in the relevant art. Such modifications may involve other features which are already known per se and which may be used instead of or in addition to features already described herein. Although claims have been formulated in this application to particular combinations of features, it should be understood that the scope of the disclosure herein also includes any novel feature or any novel combination of features disclosed either explicitly or implicitly or any generalization or modification thereof which would be apparent to persons skilled in the relevant art, whether or not such relates to the same invention as presently claimed in any claim and whether or not it mitigates any or all of the same technical problems as confronted by the present invention. The applicants hereby reserve the right to formulate new claims to such features and/or combinations of such features during the prosecution of the present application or of any further application derived therefrom.
The following Abbreviations used herein are listed in Table I:
The following Parameters are used herein in Table II:
Number | Date | Country | Kind |
---|---|---|---|
200610063945.3 | Aug 2006 | CN | national |