Channel estimation in a wireless communication system

Information

  • Patent Grant
  • 8023399
  • Patent Number
    8,023,399
  • Date Filed
    Monday, August 20, 2007
    17 years ago
  • Date Issued
    Tuesday, September 20, 2011
    13 years ago
Abstract
A plurality of communication bursts are transmitted substantially simultaneously in a time slot of a time division duplex/code division multiple access communication system. The communication system has a maximum number of K midamble shifts. Each burst has an assigned midamble. Each midamble is a shifted version of a basic midamble code having a period of P. A combined signal is received. The combined signal includes a received version of each of the communication burst's midambles. A P by P square circulant matrix is constructed including the K midamble shifts. A channel response is determined for each of the K midamble shifts using a prime factor algorithm (PFA) discrete Fourier transform (DFT) algorithm, the received combined signal and the P by P square circulant matrix. The PFA DFT algorithm has a plurality of stages. Each stage has P inputs.
Description
FIELD OF INVENTION

This invention generally relates to wireless code division multiple access communication systems. In particular, the invention relates to channel estimation in such systems.


BACKGROUND

In code division multiple access (CDMA) communication systems, multiple communications may be simultaneously sent over a shared frequency spectrum. Each communication is distinguished by the code used to transmit the communication.


In some CDMA communication systems to better utilize the shared spectrum, the spectrum is time divided into frames having a predetermined number of time slots, such as fifteen time slots. This type of system is referred to as a hybrid CDMA/time division multiple access (TDMA) communication system. One such system, which restricts uplink communications and downlink communications to particular time slots, is a time division duplex (TDD) communication system.


In a typical TDD/CDMA communication system, communication data is sent using communication bursts. FIG. 1 illustrates a communication burst. A communication burst 16 has a midamble 20, a guard period 18 and two data fields 22, 24. The data fields carry the data of the communication burst. The guard period 18 separates the communication bursts to allow for the difference in arrival times of bursts transmitted from different transmitters. The midamble 20 separates the two data fields 22, 24 and has a known training sequence used to estimate the channel that the communication burst experiences. Using the estimated channel response, data from the data fields is recovered at the receiver.


It is desirable to have efficient approaches to perform channel estimation.


SUMMARY

A plurality of communication bursts are transmitted substantially simultaneously in a time slot of a time division duplex/code division multiple access communication system. The communication system has a maximum number of K midamble shifts. Each burst has an assigned midamble. Each midamble is a shifted version of a basic midamble code having a period of P. A combined signal is received. The combined signal includes a received version of each of the communication burst's midambles. A P by P square circulant matrix is constructed including the K midamble shifts. A channel response is determined for each of the K midamble shifts using a prime factor algorithm (PFA) discrete Fourier transform (DFT) algorithm, the received combined signal and the P by P square circulant matrix. The PFA DFT algorithm has a plurality of stages. Each stage has P inputs.





BRIEF DESCRIPTION OF THE DRAWING(S)


FIG. 1 is an illustration of a communication burst.



FIG. 2 is a simplified diagram of a transmitter and a receiver using channel estimation.



FIG. 3 is a simplified diagram of a preferred channel estimator.



FIG. 4 is an illustration of constructing midamble shifts.



FIG. 5 is a preferred diagram of a 456 point discrete Fourier transform (DFT) implemented using a prime factor algorithm (PFA).



FIG. 6 is a preferred diagram of a 192 point DFT PFA.





DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)

Although the preferred embodiments are described in conjunction with a preferred TDD/CDMA or TDMA/CDMA communication system, some aspects are also applicable to CDMA systems in general.



FIG. 2 illustrates an embodiment of channel estimation as used in a wireless communication system. A transmitter 30 and a receiver 32 are shown in FIG. 2. The transmitter 30 may be located at a user equipment or multiple transmitting circuits 30 may be located at the base station. The receiver 32 may be located at either the user equipment, base station or both.


Data symbols to be transmitted to the receiver 32 are processed by a modulation and spreading device 34 at the transmitter 30. The spreading and modulation device 34 spreads the data with the codes and at a spreading factor(s) assigned to the communication(s) carrying the data. The communication(s) are radiated by an antenna 36 or antenna array of the transmitter 30 through a wireless radio interface 38.


At the receiver 32, the communication(s), possibly along with other transmitters' communications, are received at an antenna 40 or antenna array of the receiver 32. The received signal is sampled by a sampling device 42, such as at the chip rate or at a multiple of the chip rate, to produce a received vector. The received vector is processed by a channel estimation device 46 to estimate the channel impulse responses for the received communications. The channel estimation device 46 uses a training sequence in the received communication to estimate the channel experienced by each communication. A data detection device 44, such as a joint detection device, uses the code(s) of the received communication(s) and the estimated impulse response(s) to estimate soft symbols of the spread data.



FIG. 3 illustrates a preferred multiple, N, chip rate channel estimation device. Although this channel estimation device preferably uses a PFA discrete Fourier transform (DFT) to implement the Steiner algorithm, other implementations of the Steiner algorithm may be used.


Each set of the N multiple chip rate samples is input into a Steiner algorithm block 501-50N (50). For each set of samples, the Steiner algorithm uses all the possible midamble shifts to estimate the channel for each midamble shift. Each set's channel estimates are processed by a noise estimator 521-52N (52) to estimate the noise, as a noise variance (σ2), in the estimates. Using the noise estimate σ2, the channel estimates are compared to a first threshold derived from the noise estimate. Estimates less than the first threshold are eliminated by a post processing blocks 541-54N (54). Some of the estimates correspond to multipaths of the transmitted signals and other estimates result from noise. By eliminating estimates below the first threshold, the post processing block 54 filters out the noise to improve the midamble detection process. When received bursts experience a different channel response, such as in the uplink for the third generation partnership project (3GPP) TDD mode, preferred values for the first threshold are 0.0063 σ2 for burst type I and 0.015 σ2 for burst type II, although the thresholds for this type of implementation as well as others may vary.


The processed estimates from all the N sets are analyzed by a midamble detection block 56. The midamble detection block 56 determines which midamble shifts out of K possible midamble shifts were received. The midamble shifts having a power level significantly different than zero are detected midamble shifts.


As shown in FIG. 3, coherent combiners 581-58N (58) are used to combine the different sets estimates to aid in the data detection. Preferably, the sets are combined and scaled to their original amplitude. The coherent combiners 58 are optional and may not be used. Post processing blocks 601-60N (60) compare the estimates to a second threshold also derived from the noise estimate σ2. Estimates less than the second threshold are eliminated to aid in the data detection procedure. When received bursts experience a different channel response (such as in the uplink) for 3GPP TDD mode, preferred values for the second threshold are 0.016 σ2 for burst type I and 0.037 σ2 for burst type II, although the thresholds for this type of implementation as well as others may vary. Using each set's derived channel response, the data detection device 44 recovers data from the received communication bursts.


The following is a description of preferred embodiments for the Steiner algorithm blocks 50. These blocks 50 preferably perform a Steiner algorithm type channel estimation using a PFA DFT approach. When received bursts experience a different channel response (such as in the uplink) for 3GPP TDD mode, preferred values for the second threshold are 0.016 σ2 for burst type I and 0.037 σ2 for burst type II, although the thresholds for this type of implementation as well as others may vary.


In TDD mode of a 3GPP wideband code division multiple access (W-CDMA) communication system, K midamble codes are used. Each midamble code is a time shifted version of a periodic single basic midamble code, mP. mP has a period of P. The length, Lm, of each time-shifted midamble code in chips is the period, P, added to the length of the impulse response, W, less one chip, Lm=P+W−1. The relationship between K, W and P is KW=P. For a TDD 3GPP system, the values for K, P, W and Lm are shown for burst types 1, 2 and 3 in Table 1. K′ is the maximum number of midamble shifts in a cell, when no intermediate shifts are used.











TABLE 1









PARAMETER










BURST TYPE ⅓
BURST TYPE 2













LONG
NOMINAL
SHORT
NOMINAL
SHORT
















RESPONSE
114
57
28
64
32


LENGTH, Lr


K
4
8
16
3
6









K′
8
3


P
456
192


W
57
64


Lm
512
256










Lr is the response length.


For burst type 1 and 2 of nominal response length, the basic midamble code, mP, is a sequence having the values of either 1 or −1. Each ith element, mP(i) of the sequence mP is converted to a corresponding ith element, {tilde over (m)}P(i), of a complex sequence, {tilde over (m)}P, per Equation 1.

{tilde over (m)}P(i)=ji·mp(i), i=1 . . . P  Equation 1


The K midamble shifts are derived by picking K sub-sequences of length Lm from a 2P long sequence. The long sequence is formed by concatenating two periods of {tilde over (m)}P. For a kth sequence of the K sequences, each ith element, mi(k) is derived from {tilde over (m)}P per Equation 2.















m
_

i

(
k
)


=






m
~

_

p



[



(

K
-
k

)


W

+



P
K



+
i

]



,










for





1


i


P
-


(

K
-
k

)


W

-



P
K












=






m
~

_

p



[

i
-
P
+


(

K
-
k

)


W

+



P
K




]



,











for





P

-


(

K
-
k

)


W

-



P
K





i


P
+
W
-
1









Equation





2







As k increases from 1 to K, the starting point of m(k) shifts to the left by W, as shown in FIG. 4. FIG. 4 is an illustration of the derivation of the K midamble shifts. The value U in FIG. 4 is defined as U=K·W.


For the short response length of burst types 1 and 2, the maximum number of midamble shifts, K, is doubled to 16 for burst type 1 and 6 for burst type 2. K′ is the number of midamble shifts prior to doubling, 8 for burst type 1 and 3 for burst type 2. The first K′ of the K midamble shifts are determined as per the nominal case, Equation 2. The last K′ shifts are determined per Equation 3.















m
_

i

(
k
)


=






m
~

_

p



[



(

K
-
k

)


W

+
i

]



,










for





1


i


P
-


(

K
-
k

)


W










=






m
~

_

p



[

i
-
P
+


(

K
-
k

)


W


]



,











for





P

-


(

K
-
k

)


W



i


P
+
W
-
1









Equation





3







For the long response length of burst type 1, the procedure is the same as the burst type 1 nominal response length, except the successive shifts, Lr, in constructing the midambles is 114 and K=4.


The combined received midamble sequences can be viewed as a convolution of K convolutions. The kth convolution is the convolution of m(k) with h(k). h(k) is the channel response of the kth midamble. Since the impulse response from the first data field corrupts the first W−1 chips of the midamble, only the last Lm−W+1 or P chips of the midamble are used for channel estimation. For nominal burst types 1 and 2, the K convolutions are per Equation 4.











[





m
_

p








m
_




(

K
-
1

)


W

+
1









m
_



(

K
-
1

)


W









m
_




(

K
-
2

)


W

+
1

















m
_

W








m
_

1







m
_

1








m
_




(

K
-
1

)


W

+
2









m
_




(

K
-
1

)


W

+
1









m
_




(

K
-
2

)


W

+
2

















m
_


W
+
1









m
_

2







m
_

2








m
_




(

K
-
1

)


W

+
3









m
_




(

K
-
1

)


W

+
2









m
_




(

K
-
2

)


W

+
3















m
_


W
+
2









m
_

3


















































m
_


KW
-
1









m
_



(

K
-
1

)


W









m
_




(

K
-
1

)


W

-
1









m
_



(

K
-
2

)


W

















m
_


W
-
1









m
_

P




]

×

[





h
_


(
1
)








h
_


(
2
)













h
_


(
K
)





]


=

[




r
w






r

w
+
1












r

L
,
m





]





Equation





4








h
(k) is the channel response for the kth midamble. ri is the ith chip in the received combined midamble vector.


For short responses for burst types 1 and 2, the K convolutions are per Equation 5.











[





m
_

p








m
_




(

K
-
1

)


W

+
1









m
_



(

K
-
1

)


W









m
_




(

K
-
2

)


W

+
1

















m
_

W








m
_

1







m
_

1








m
_




(

K
-
1

)


W

+
2









m
_




(

K
-
1

)


W

+
1









m
_




(

K
-
2

)


W

+
2

















m
_


W
+
1









m
_

2







m
_

2








m
_




(

K
-
1

)


W

+
3









m
_




(

K
-
1

)


W

+
2









m
_




(

K
-
2

)


W

+
3















m
_


W
+
2









m
_

3


















































m
_


KW
-
1









m
_



(

K
-
1

)


W









m
_




(

K
-
1

)


W

-
1









m
_



(

K
-
2

)


W

















m
_


W
-
1









m
_

P




]

×

[





h
_


(
1
)








h
_


(
9
)








h
_


(
2
)













h
_


(
8
)








h
_


(
16
)





]


=

[




r
w






r

w
+
1












r

L
,
m





]





Equation





5







In Equations 4 and 5, the midamble sequence matrix is of size P by P. The partitions in Equations 4 and 5, indicated by vertical ellipses, represent the portion of m(k) which yields a non-zero contribution of m(k) and h(k).


Equations 4 and 5 can be rewritten as Equation 6.

r=G·h+n  Equation 6

G is the midamble sequence matrix. n is the additive white gaussian noise (AWGN) vector.


Solving for h, Equation 6 becomes Equation 7.

ĥ=G−1·r  Equation 7
ĥ is the estimate of the channel response vector.


A P point discrete Fourier transforms (DFT) can be used to solve Equation 7. Using the circulant structure of G, G can be expressed considering a column per Equation 8.

G=DP−1·ΛC·DP  Equation 8


DP is a P point DFT matrix per Equation 9.











D
p

=

[





W
~

0





W
~

0





W
~

0





W
~

0








W
~

0







W
~

0





W
~

1





W
~

2





W
~

3








W
~


(

P
-
1

)








W
~

0





W
~

2





W
~

4





W
~

6








W
~


2


(

P
-
1

)









W
~

0





W
~

3





W
~

6





W
~

9








W
~


3


(

P
-
1

)





























W
~

0





W
~


(

P
-
1

)






W
~


2


(

P
-
1

)







W
~


3


(

P
-
1

)










W
~



(

P
-
1

)



(

P
-
1

)






]










W
~






is





defined





as






W
~


=





-
j




2

π

P



.






Equation





9







ΛC is a diagonal matrix. The main diagonal is the DFT of the first column of G per Equation 10.

ΛC=diag(DP(G(:,1)))  Equation 10

G(:,1) represents the first column of matrix G.


DP is the discrete Fourier transform operator and DP x represents the P point discrete Fourier transform of the vector x.


Substituting Equation 8 into Equation 7 results in Equation 11, using the relationship of Equation 12.











h
^

_

=


(


D
P
*

·

1
P

·

Λ
C

-
1


·

)



r
_






Equation





11







D
P

-
1


=


D
P
*

P





Equation





12








DP * is the element-by-element complex conjugate of DP.


Considering a row, a diagonal matrix ΛR can be used to derive the channel estimation. Using a first row of G, ΛR can be derived per Equation 13.

ΛR=diag(DP(G(1,:)))  Equation 13


Since GT is also right circulant and its first column is the first row of G, GT is expressed per Equation 14.

GT=DP−1·ΛR·DP  Equation 14


Since DPT=DP, ΛRTR and for an invertible matrix A, (AT)−1=(A−1)T, G is per Equation 15.

G=DP·ΛR·DP−1  Equation 15


By substituting Equation 15 into Equation 8, Equation 16 results.











h
^

_

=


(



D
P

·

Λ
R

-
1


·

1
P




D
P
*


)



r
_






Equation





16







A burst type 1 has a P of 456 chips and a burst type 2 has a P of 192 chips. Using a prime factor algorithm (PFA), Equation 11 or 16 can be solved for these bursts and the approach can be extended to cover other P lengths and other types of bursts. The PFA transforms each of the non-radix P-point DFTs into smaller DFTs of relatively prime lengths. This approach leads to savings in computational complexity.


For a P of 456 chips, such as for burst type 1, a 456 point DFT is performed per FIG. 5. The DFT is performed in four stages. The input samples, a(k) are permuted by an input permutation block 76 prior to input into 152 3-point DFTs 701-70152 (70). The permutation is per Equation 17.

a3(p)=a(<152p+3q>456)  Equation 17

<x>N demodes x modulus N, or x mod N. a3(p) is the pth input to the 3-point DFT 70, where p=0, 1, 2. q is a qth DFT, where q=0, 1, . . . , 151.


After being processed by the 3-point DFTs 70, an intermediate permutation block 178 permutes the results, b(k), prior to input to 57 eight point DFTs 721-7257 (72). The permutation is per Equation 18.

a8(p)=b(<57p+8q>456)  Equation 18

a8(p) is the pth input to the 8-point DFT 72, where p=0, 1, . . . , 7. q is a qth DFT, where q=0, 1, 2, . . . , 56.


After being processed by the 8-point DFTs 72, an intermediate permutation block 280 permutes the results, c(k), prior to input to 24 nineteen point DFTs 741-7424 (74). The permutation is per Equation 19.

a19(p)=c(<24p+19q>456)  Equation 19

a19(p) is the pth input to the 19-point DFT 74, where p=0,1, . . . , 18. q is a qth DFT, where q=0,1,2, . . . , 23.


Since the outputs of the 19-point DFTs 74 have been mapped, the results of the outputs of the 19-point DFTs 74 need to be reordered. An output permutation block 82 permutes the results, d(k), to produce the final frequency components A(k). The permutation is per Equation 20.

A(k)=d(<233k>456)  Equation 20

k is the kth output of the 19-point DFTs, where k=0, 1, . . . , 455. 233 is the unscrambling factor, UF, UF=152+57+24.


To reduce the amount of memory used in the PFA, for each stage, samples can be read out of a single buffer, processed and saved into the vacated locations within the buffer. As a result, this PFA algorithm can be implemented using a single buffer of size 456.


For a P of 192 chips, such as for burst type 2, a 192 point DFT is performed per FIG. 6. The DFT is performed in four stages. The input samples, a(k) are permuted by a permutation block prior to input into 64 3-point DFTs 841-8464 (84). The permutation is per Equation 21.

a3(p)=a(<64p+3q>192)  Equation 21

a3(p) is the pth input to the 3-point DFT 84, where p=0, 1, 2. q is a qth DFT, where q=0, 1, . . . , 63.


After being processed by the 3-point DFTs 84, an intermediate permutation block 90 permutes the results, b(k), prior to input to 3 sixty-four point DFTs 861-863 (86). The permutation is per Equation 22.

a64(p)=b(<3p+64q>192)  Equation 22

a64(p) is the pth input to the 64-point DFT 86, where p=0, 1, . . . , 63. q is a qth DFT, where q=0, 1, 2.


Since the outputs of the 64-point DFTs 86 have been mapped, the results of the outputs of the 64-point DFTs 86 need to be reordered. An output permutation block 92 permutes the results, c(k), to produce the final frequency components A(k). The permutation is per Equation 23.

A(k)=c(<67k>192)  Equation 23

k is the kth output of the 64-point DFTs 86, where k=0, 1, . . . , 191. 67 is the unscrambling factor, UF, UF=64+3.


To reduce the amount of memory used in the PFA, for each stage, samples can be read out of a single buffer, processed and saved into the vacated locations within the buffer. As a result, this PFA algorithm can be implemented using a single buffer of size 192.

Claims
  • 1. A method for estimating a channel experienced by a plurality of communication bursts transmitted substantially simultaneously, each burst having an assigned midamble, the method comprising: receiving a combined signal, the combined signal including a received version of each of the communication burst's midambles;processing the received combined signal to produce initial channel estimates;estimating noise of the received combined signal using the initial channel estimates;eliminating samples of the initial channel estimates not exceeding a first threshold producing processed channel estimates;detecting received midambles using the processed channel estimates; andusing the detected midambles, processing the processed channel estimates to produce a channel estimate for each detected midamble.
  • 2. The method of claim 1 wherein the received combined signal is sampled at a multiple of N of a chip rate producing N sets of samples such that each of the sets of samples are processed separately to determine the channel estimates for each detected midamble.
  • 3. The method of claim 2 wherein the processed channel estimates resulting for the samples of each of the N sets is coherently combined prior to the step of processing the processed channel estimates to produce a channel estimate for each detected midamble.
  • 4. The method of claim 1 wherein the processing the processed channel estimates includes eliminating samples of the processed channel estimates not exceeding a second threshold.
  • 5. The method of claim 4 wherein the first and second threshold are a multiple of the noise variance.
  • 6. The method of claim 1 wherein the noise estimate is a variance of noise.
CROSS REFERENCE TO RELATED APPLICATION(S)

This application is a continuation of U.S. patent application Ser. No. 10/308,473 filed on Dec. 3, 2002, which claims the benefit of U.S. Provisional Application No. 60/384,194, filed May 29, 2002, which is incorporated by reference as if fully set forth herein.

US Referenced Citations (20)
Number Name Date Kind
6381260 Bahrenburg et al. Apr 2002 B1
6608859 De et al. Aug 2003 B2
6625203 De et al. Sep 2003 B2
6760365 Demir et al. Jul 2004 B2
6795417 Zeira et al. Sep 2004 B2
6873662 Oh et al. Mar 2005 B2
6885649 Zeira et al. Apr 2005 B2
6934271 Zeira et al. Aug 2005 B2
6985513 Zeira Jan 2006 B2
7027495 Demir et al. Apr 2006 B2
7085248 Holma et al. Aug 2006 B1
7095731 Kim et al. Aug 2006 B2
7103092 Zeira Sep 2006 B2
7428278 Buchert et al. Sep 2008 B2
7443908 Simoni et al. Oct 2008 B2
20020061005 Lee et al. May 2002 A1
20030026236 De et al. Feb 2003 A1
20030210754 Buchert et al. Nov 2003 A1
20050169198 Zeira et al. Aug 2005 A1
20050169216 Zeira et al. Aug 2005 A1
Foreign Referenced Citations (1)
Number Date Country
1069707 Jan 2001 EP
Related Publications (1)
Number Date Country
20070291641 A1 Dec 2007 US
Provisional Applications (1)
Number Date Country
60384194 May 2002 US
Continuations (1)
Number Date Country
Parent 10308473 Dec 2002 US
Child 11894282 US