The present disclosure relates to coherent demodulation in a wireless communications system.
The topic of reliable signal transmission at very low Signal-to-Noise Ratio (SNR) has recently become of interest in the context of machine communication in a cellular communications network. For example, an appliance in a home basement would need an extra 20 decibels (dB) of link margin to communicate with an outdoor base station. Note that this very low SNR theme was also an active topic in the context of mobile and satellite communications some years ago, resulting in a solution called high penetration paging.
The basic question that must be addressed is what modulation scheme, i.e., coherent or non-coherent, works best at very low SNR. Somewhat surprisingly, the answer is unclear, as classical communication theory essentially addresses high SNR operation. In a coherent scheme, a transmitter transmits a non-differential modulation along with pilots, and a receiver uses pilot-aided demodulation, consisting of channel estimation over the pilots to obtain knowledge of Channel State Information (CSI), followed by coherent demodulation. The CSI includes a channel estimate for a wireless communication channel between the transmitter and the receiver. In contrast, in a non-coherent scheme, a transmitter uses a differential modulation, and a receiver uses a differential demodulator. A non-coherent scheme does not require pilot transmission or knowledge of CSI.
Assuming a coherent scheme, the issue then becomes achieving reliable communication at very low SNR. Here, SNR is from the perspective of the signal, while performance is from the perspective of the bits transmitted within the signal. That is, SNR is the ratio of signal power to noise power, and performance is the bit or block error rate. From this perspective, given a modulation choice, e.g., Quadrature Phase Shift Keying (QPSK) or 16 Quadrature Amplitude Modulation (16-QAM), and a certain fixed SNR, suppose that the performance is unreliable. Then, one way to boost the performance at the fixed SNR is to accumulate more energy per bit. This is achieved with coding such as repetition, which is the simplest form of coding. More complex coding schemes can also provide some coding gain on top of the energy gain of repetition. But at low SNR, a low rate coding is needed, which effectively becomes repetition.
Repetition schemes transmit the same modulation symbol multiple times. If the channel is highly correlated across repetitions, then channel estimation can be improved. However, in the extreme case where the channel is independent across repetitions, there is no improvement in channel estimation from the repetitions. Nevertheless, overall performance will improve. The general case where the channel is correlated follows naturally in a similar way. Note that repetition is technically the same regardless of whether the repetition is in time, in frequency, or by receiving on multiple antennas. Also, correlation in time, frequency, or across multiple receive antennas, or lack of it, can be captured in the same manner. Therefore, these scenarios are interchangeably referred to herein as a Single Input Multiple Output (SIMO) scheme.
One issue with the coherent scheme is that current coherent demodulation schemes (e.g., a Maximum Likelihood (ML) receiver) assume a channel estimate at the receiver that is noiseless. However, particularly at very low SNR, this assumption is incorrect. As such, there is a need for systems and methods for improved coherent demodulation in the presence of noisy CSI and, in particular, in the presence of noisy channel estimation.
Systems and methods for improved coherent demodulation that account for variation of an effective channel estimation error with transmitted symbols are provided. In one embodiment, a wireless node includes a receiver front-end, a channel estimator, and a soft-value processor. The receiver front-end is adapted to output samples of a received signal. The channel estimator is adapted to estimate a channel between a transmitter of the received signal and the wireless node based on the samples of the received signal. The soft-value processor is adapted to process the samples of the received signal according to a soft-value generation scheme that accounts for variation of an effective channel estimation error with transmitted symbols to thereby provide corresponding soft values. By accounting for the variation of the effective channel estimation error with transmitted symbols, the soft-value processor provides improved performance, particularly in a low Signal-to-Noise Ratio (SNR) scenario.
In one embodiment, the soft-value generation scheme is based on a modified Maximum Likelihood (ML) metric that accounts for the variation of the effective channel estimation error with transmitted symbols. Further, in one embodiment, the modified ML metric is defined as:
μ(s)=β(s)−1∥r−ĥs∥2+MN0Inβ(s)
where μ(s) is the modified ML metric for a symbol s, r is the received signal, h is a channel estimate provided by the channel estimator, M is a number of receive antennas of the wireless node, N0 is noise spectral density, and β(s) is defined as:
β(s)=1+|s|2/G,
where G is a processing gain resulting from channel estimation.
In one embodiment, a modulation scheme of the received signal is a Gray-Mapped N Quadrature Amplitude Modulation (N-QAM) scheme having a modulation alphabet A containing 2k=N symbols. Further, in one embodiment, in order to provide the soft values, the soft-value processor is adapted to, for each sample of the received signal, generate a soft value for each bit bi in b0 . . . bk-1 of a corresponding received symbol utilizing less than N values of the modified ML metric.
Those skilled in the art will appreciate the scope of the present disclosure and realize additional aspects thereof after reading the following detailed description of the embodiments in association with the accompanying drawing figures.
The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the disclosure, and together with the description serve to explain the principles of the disclosure.
The embodiments set forth below represent information to enable those skilled in the art to practice the embodiments and illustrate the best mode of practicing the embodiments. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the disclosure and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
Systems and methods for improved coherent demodulation in the presence of a noisy channel estimate are provided. In particular, systems and methods for improved coherent demodulation that account for an effective channel estimation error that varies with transmitted symbols are provided. In this regard,
The wireless device 14 is generally any type of device equipped with a transceiver capable of wireless communication with the base station 12. For example, the wireless device 14 may be a mobile device (e.g., a mobile phone), a Machine Type Communication (MTC) device, or the like. For instance, in 3GPP LTE, the wireless device 14 may be a User Equipment device (UE). Note that the term “wireless node” is used herein to generally refer to any type of device utilizing an embodiment of the coherent demodulation schemes disclosed herein. In other words, in the example of
The channel coder 18 receives information bits to be transmitted and spreads each information bit over multiple code bits. The interleaver 20 provides frequency-domain interleaving of the code bits from the channel coder 18 to thereby provide frequency domain distribution of the code bits. This is beneficial where, for example, frequency-domain diversity is desirable due to a frequency-selective channel (e.g., an Orthogonal Frequency Division Modulation (OFDM) channel where different sub-carriers experience different channel conditions). The modulator 22 then applies a desired modulation, e.g., OFDM. Note that, for OFDM, a number of modulation symbols are transmitted in parallel on different subcarriers. The modulation symbols can be from any desired modulation constellation, or alphabet, such as, for example, Quadrature Phase Shift Keying (QPSK), 16 Quadrature Amplitude Modulation (16-QAM), 64-QAM, etc. The RF front-end 24 processes the output signal of the modulator 22 to provide, e.g., D/A conversion, upconversion to a desired carrier frequency, and amplification to provide RF transmit signal(s) to be transmitted via the antenna(s) 26.
The RF front-end 30 receives RF signals from the antennas 32 and processes the RF signals to output samples of a received signal. The samples of the received signal are then processed by the demodulator 34, which, as discussed below, outputs corresponding soft values and, in some embodiments, bit decisions. As discussed below, the demodulator 34 processes the samples of the received signal according to a coherent demodulation scheme that takes into account an effective channel estimation error that varies with the transmitted symbols. In this manner, the demodulator 34 provides improved performance, particularly in a low Signal-to-Noise Ratio (SNR) scenario. The de-interleaver 36 provides frequency-domain interleaving of the soft values (and in some embodiments bit decisions) output by the demodulator 34. The channel decoder 38 performs channel decoding on the de-interleaved soft values (and in some embodiments bit decisions) to provide received information bits. While not illustrated, the received information bits may then be processed by, e.g., a processor of the wireless node.
The soft-value generation scheme utilized by the soft-value processor 42 is based on a modified Maximum Likelihood (ML) metric that takes into account variation in the effective error of the channel estimate ĥ. In particular, for a SIMO system with M receive antennas 32, the modulation alphabet, or constellation, A has a size 2k. At the transmit side, the modulator 22 maps a block of k bits b1 . . . bk into a normalized symbol s. As used herein, normalized means that a variable has average energy 1, or the components of a vector each have average energy of 1. The received signal r at the receive side is given by:
r=hs+v (1)
where v is a noise vector, modeled as White (independent components) and Gaussian (WG) with covariance Rv=N0I, where N0 is noise power spectral density. The channel h (i.e., a channel vector) is modeled as WG, with covariance Rh=EsI, where energy Es is attached to the channel, without loss of generality. The noise and the channel are assumed to be mutually independent.
At the receiver 28, the channel estimate is given by:
ĥ=h+e (2)
where e is a channel estimation error modeled as independent and WG with covariance:
R
e
=R
v
/G=(N0/G)I (3)
Channel estimation results in a processing gain G, which is reflected in the covariance of the channel estimation error e. The channel estimation error e and the receiver noise v are assumed to be mutually independent.
In the traditional ML receiver, soft values are generated according to an ML scheme that treats the channel estimate ĥ as the noiseless channel h. Accordingly, the ML soft-value generation scheme uses the familiar Squared Euclidian Distance (SED) ∥r−ĥ{tilde over (s)}∥2, where {tilde over (s)} is an instance of the transmitted symbol s. Specifically, the ML soft-value generation scheme searches over all symbol hypotheses {tilde over (s)} in the modulation alphabet A for the symbol hypotheses {tilde over (s)} that minimizes the SED metric. But as explained below, this baseline approach is not quite right, as it ignores the effect of channel estimation error.
Note that:
r−ĥs=r−hs−es=v−es
w (4)
So, the receiver 28 sees an effective error w (also referred to herein as the effective channel estimation error or the effective error of the channel estimate ĥ), with covariance
R
w
=R
v
+|s|
2
R
e
=N
0(1+|s|2/G (5)
where Equation (5) accounts for the mutual independence of the receiver noise v and the channel estimation error e. The covariance Rw of the effective error w is modulated by the magnitude of the transmitted symbol via the function:
β(s)=1+|s|2/G (6)
which is not reflected in the SED metric. If the modulation scheme has constant magnitude symbols (e.g., Binary Phase Shift Keying (BPSK) or QPSK), then β(s) is constant and, as such, the modulation effect is not an issue (i.e., constant terms do not matter in metric comparisons). However, for a modulation scheme with variable magnitude symbols (e.g., N Quadrature Amplitude Modulation (N-QAM)), β(s) varies with the transmitted symbols and, as such, the modulation effect on the covariance Rw of the effective error w becomes an issue.
As such, a new symbol metric is proposed for a modified ML soft-value generation scheme that takes into account the modulation effect on the covariance Rw of the effective error w in the channel estimate ĥ produced by the variation of the magnitude of the transmitted symbols. By taking this modulation effect into account, the modified ML soft-value generation scheme boosts performance over the traditional ML soft-value generation scheme, particularly in very low SNR conditions when using modulation schemes with variable magnitude symbols.
In order to derive the modified ML symbol metric, we start from the probability of the received signal r, conditioned on the transmitted symbol s and the estimated channel h, expressed in logarithmic form for convenience:
InP(r|ĥ,s)=InP(r−ĥs)=InP(w) (7)
This can be written as:
InP(r|ĥ,s)=−N0−1β(s)−1∥r−ĥs∥2−Inβ(s)−MInN0−MInπ (8)
Multiplying by N0, switching signs, and dropping constant terms, we obtain the new, modified ML symbol metric μ(s):
μ(s)=β(s)−1∥r−ĥs∥2+MN0Inβ(s). (9)
In the modified ML symbol metric μ(s), the SED is now modified by β(s). In this manner, the modified ML symbol metric μ(s) accounts for the modulation effect on the covariance Rw of the effective noise w (and particularly on the channel estimation error) produced by the variation of the magnitude of the transmitted symbols.
The modified ML symbol metric μ(s) is used by the soft-value processor 42 to generate soft values for received symbols. More specifically, in some embodiments, given the received signal r and the channel estimate ĥ, the soft-value processor 42 searches over all symbol hypotheses. {tilde over (s)} in the modulation alphabet A for the symbol hypotheses. {tilde over (s)} that minimizes μ({tilde over (s)}). The best symbol hypotheses. {tilde over (s)} are denoted as a decided symbols or a symbol decision. The bits of the decided symbols are referred to as bit decisions or simply bits {circumflex over (b)}1 . . . {circumflex over (b)}k.
Note that for large processing gain G, the channel estimate ĥ converges to the true channel h, and the modified ML receiver described herein converges to the baseline, or conventional, ML receiver, as expected. This is evident from Equations (6) and (9) above. Specifically, as the processing gain G increases, β(s) converges to 1 and, as a result, the modified ML symbol metric μ(s) converges to the SED. Also note that, in general, the advantage of the modified ML soft-value generation scheme becomes more pronounced at lower SNR, where the channel estimate ĥ becomes noisier. Also, the advantage is more pronounced as the number M of repetitions grows.
Step 104 is more specifically illustrated in
The soft-value processor 42 of the wireless node generates a soft value for each bit {circumflex over (b)}i in {circumflex over (b)}1 . . . {circumflex over (b)}k based on a difference between a value μ({tilde over (s)}) for the i-th bit of the transmitted symbol and a value of the modified ML symbol metric μ(ŝ) for the symbol decision ŝ (step 304). More specifically, for each bit {circumflex over (b)}i in {circumflex over (b)}1 . . . {circumflex over (b)}k for the symbol decision {tilde over (s)}, the flipped value of the bit {circumflex over (b)}i is denoted as For each bit {circumflex over (b)}i in {circumflex over (b)}1 . . . bk for the symbol decision ŝ, the soft-value processor 42 searches a subset {hacek over (A)} of the modulation alphabet A containing all symbol hypotheses {tilde over (s)} whose bit at index i is equal to {hacek over (b)}i for a symbol {hacek over (s)} that maximizes μ({tilde over (s)}). In one embodiment, the soft value δ({circumflex over (b)}i) for each bit {circumflex over (b)}i in {circumflex over (b)}1 . . . {circumflex over (b)}k for the symbol decisions is then computed as:
δ({circumflex over (b)}i)=μ({hacek over (s)})−μ({circumflex over (s)}). (10)
Note that since {hacek over (A)} excludes ŝ, μ({hacek over (s)})≧μ(ŝ), and δ({circumflex over (b)}i)≧0. Using Equation (10), the soft value δ({circumflex over (b)}i) for each bit {circumflex over (b)}i is a value that represents a confidence in a separate bit decision. In other words, using Equation (10), the soft-value processor 42 outputs both a bit decision (i.e., 1 or 0) for each bit {circumflex over (b)}i and the soft value δ({circumflex over (b)}i) that represents a confidence of the bit decision for bit {circumflex over (b)}i.
In another embodiment, the soft value δ({circumflex over (b)}i) for each bit {circumflex over (b)}i in {circumflex over (b)}1 . . . bk for the symbol decisions represents both the bit decision and the confidence of the bit decision. More specifically, in one embodiment, the soft value δ({circumflex over (b)}i) for each bit {circumflex over (b)}i in {circumflex over (b)}1 . . . {circumflex over (b)}k, for the symbol decisions is computed as:
δ({circumflex over (b)}i)=(−1){circumflex over (b)}
where Equation (11) uses the convention that a positive value indicates a decision {circumflex over (b)}i=0 and a negative value indicates a bit decision {circumflex over (b)}i=1. Note that Equations (10) and (11) are good approximations of a Maximum a posteriori Probability (MAP) soft value, and are much simpler.
Thus far, the description has been general in that it applies to all types of modulation schemes. However, the complexity of the soft-value generation scheme can be significantly reduced for Gray-mapped N-QAM. In particular, the modulation alphabet A of N-QAM is of size N (i.e., 2k=N). Thus, using the soft-value generation scheme described above, the soft-value processor 42 computes N values for the modified ML symbol metric μ(s) (i.e., the soft-value processor 42 computes μ({tilde over (s)}) for each symbol hypothesis s in the modulation alphabet A). Note that these values can be reused when generating the soft value δ({circumflex over (b)}i) for each bit {circumflex over (b)}i in the symbol decision ŝ. Thus, the total computational complexity is given by:
The description below describes reduced complexity soft-value generation schemes for Gray-mapped N-QAM. As an example,
The amplitude of the symbol s is then given by:
|s(b0,b1,b2,b3)|2=1+4/5(b2+b3−1). (13)
With the specific expressions of s(b0,b1,b2,b3) and |s(b0,b1,b2,b3)|2, the modified ML symbol metric μ(s(b0, b1, b2, b3)) can be explicitly expanded as the following, which enables closed form minimization to avoid exhaustive search as required in the straightforward soft-value computation algorithm.
where x is the accumulated received signal:
x
√{square root over (2/5)}ĥHr (18)
and Re{x} and Im{x} are the real and imaginary parts of x.
In the following, the symbol metric function is denoted as minimized over all possible choices of b0, b1 as μ(s(*,*,b2,b3)):
For example, if Re{x}>0, then b0, =0 should be chosen to minimize μ(s(b0,b1,0,0)). If Re{x}<0, then b0, =1 should be chosen to minimize the symbol metric function μ(s(b0,b1,0,0)). Similarly, the value of b1 can be chosen according to whether Im{x} is positive or negative to minimize the symbol metric function μ(s(b0,b1, 0,0)).
The minimized symbol function over all possible choices of b0, b1 can be found to be:
The minimized symbol function over all possible choices of b0,b1,b2 can be computed as:
The minimized symbol function over all possible choices of b0,b1,b3 can be computed as:
The minimized symbol function over all possible choices of b0,b1,b2,b3 can be computed as:
The bit soft values of b2 and b3 can then be computed as
δ(b2)=μ(s(*,*,0,*))−μ(s(*,*,1,*)) (29)
δ(b3)=μ(s(*,*,*,0))μ(s(*,*,*,1)) (30)
We note that the symbol metric function minimized over b1 only is given by
It can then be concluded that, if Re{x}>0,
and if Re{x}<0,
To proceed, we define the sign function:
The bit soft values of b0, and b1 can then be computed as:
The total computation complexity of the soft-value generation scheme when searching across all symbol hypotheses {tilde over (s)} for the Gray-mapped 16-QAM is
In contrast, the total computation complexity of the fast soft-value generation process described above with respect to Equations (29), (30), (38), and (39) for the Gray-mapped 16-QAM is
Note that symbol metric calculation involves complex number multiplication and additions. Each symbol metric calculation is hence more complicated than a real number addition/subtraction.
While the example above focuses on Gray-mapped 16-QAM, the fast soft-value generation process described above can be utilized for N-QAM in general (e.g., 8-QAM, 16-QAM, 32-QAM, 64-QAM, 128-QAM, 256-QAM, etc.). In this regard,
The following acronyms are used throughout this disclosure.
Those skilled in the art will recognize improvements and modifications to the embodiments of the present disclosure. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.