The present invention relates generally to digital subscriber line (DSL) technology, and specifically to a method for improving data transmission in a discrete multi tone (DMT)-based communication system.
It is well known that some current modems operating in accordance with G.992.1 and G.992.2 standards implement a transmitter with an Inverse Discrete Fourier Transform (IDFT) size greater than the one specified by the standards. These modems may implement the transmitter in either the upstream or downstream direction, or both. There are many reasons that may influence this decision. For example, for an upstream channel the standard IDFT size is 64 points. However, an IDFT size greater than 64 points may be justified for two reasons. The first reason is hardware symmetry with the downstream channel, since the downstream channel requires a larger Discrete Fourier Transform (DFT). The second reason is ease of implementation of different Annexes of the G.992.1 and G.992.2 standards with the same data path.
It is well know that Asymmetric Digital Subscriber Loop (ADSL) systems suffer from some performance degradation whenever there is a mismatch between the transmitter IDFT and receiver DFT sizes. This is particular true on short loops where the channel is Inter-Symbol Interference (ISI)—Inter-Channel Interference (ICI) dominated, as the DFT/IDFT size mismatch increases the ISI-ICI effects. Laboratory tests show that if the transmitter uses an IDFT other than that suggested by the standard on short loops, data rate penalties of approximately 25 to 30% are experienced.
However, if the transmitter IDFT size is known a priori, that is before training the receiver equalizer, the receiver DFT could possibly be changed to match the size of the transmit IFFT. This allows the performance to be optimized regardless of the IDFT size used by the transmitter. However, this solution has two potential problems. The first problem is the IDFT size may simply not be known a priori. The problem particularly applies to G.992.1 and G.992.2 modems, while new G.dmt-bis and G.lite-bis standards have G.hs codepoints defined for exchanging information about the transmitter IDFT. The second problem is the receiver may not be able to change the DFT size on the fly due to “Millions of Instructions per Second” (MIPS) or hardware limitations.
Thus there is a need for a system and method for allowing the transmitter to use an IDFT having a size different to that specified in the standard, while reducing data rate penalties. It is an object of the present invention to obviate or mitigate at least some of the above-mentioned disadvantages.
In accordance with an aspect of the present invention, there is provided a circuit and method for reducing the effect of having potentially different sizes for an Inverse Discrete Fourier Transform (IDFT) at a transmitter and a Discrete Fourier Transform (DFT) at a receiver in a telecommunications system without requiring a change in the DFT's size. The method includes following steps. The first step includes determining whether the IDFT size is greater than, equal to, or less than the DFT size. The second step includes selecting a target impulse response length from a predefined set of impulse response lengths in accordance with a result the previous step. The third step includes training an equalizer at the receiver to the target impulse response length. The circuit includes hardware and software for implementing the method.
It is an advantage of the present invention that the transmitter can use an IDFT having a size different to that specified in the standard without requiring a priori knowledge of the transmitter size IDFT or requiring the DFT size to change.
Embodiments of the present invention will now be described by way of example only with reference to the following drawings in which:
a is a sample DMT symbol;
b is an upsampled version of the DMT symbol illustrated in
c is a sample impulse response;
For convenience, like numerals in the description refer to like structures in the drawings. In the present embodiment, the IDFT is implemented using an Inverse Fast Fourier Transform (IFFT) and the DFT is implemented using a Fast Fourier Transform (FFT). Other implementations will be apparent to a person skilled in the art.
Referring to
In the transmitter 101, for every DMT symbol period, a set of N1 Quadrature Amplitude Modification (QAM) symbols is used to modulate a set of N1 tones. For simplicity, N1 is referred to as the size of the IFFT even though the actual size is 2*N1, including the conjugate pairs for each carrier. This is achieved by feeding the QAM symbols cli, where l=0, 1, . . . , N1−1, to the IFFT input, and where the index i indicates the DMT symbol period.
Each QAM symbol cli carries bl bits, where bl is referred to as the bit allocation table and l=0, 1, . . . , N1−1. Further, each QAM symbol cli is scaled by a fine gain gl, where l=0, 1, . . . , N1−1, before being processed by the IFFT 102. These fine gains are used to change the transmit power in each tone individually. In order for the transmission signal to be real, complex Hermitian symmetry has to be met among the transmit QAM symbols cli. That is, cli=c*Nl−li. At the IFFT output, the CP is added to the DMT symbol, or transmit frame, which is then further conditioned by the transmitter's front end, including the digital filters 106a, D/A converter 108, analog filters 110a and line driver 112, before being transmitted on the line. At the receiver side, the receiver's front end processes the received signal using analog filtering 110b, A/D conversion 116 and digital filtering 106b. The TDEQ 118 then partially equalizes the signal at the output of the receiver front end. After the CP has been stripped off, an FFT is performed on the receiver frame. At the FFT output, a per-tone single tap Frequency Domain Equalizer (FDEQ) 124 completes the equalization of the signal, and a set of slicers 126 finally retrieves the transmitted QAM symbols cli.
The size N2 of the receiver FFT 122 can, in general, be different than the size N1 of the transmitter IFFT 102. Similarly to the IFFT, the actual size of the FFT is 2*N2, including the conjugate pairs for each carrier. It will be apparent that the factor of two can be dropped from both the size of the IFFT and the size of the FFT for the purpose of the present discussion as they will be compared as a ratio. While it is always possible to choose a value for N2 that is greater than N1, N2 can be less than N1 only if the number of tones that carry data is less than N1/2. Note also, that if the values for N2 and N1 are not equal, the clocks at which the IFFT and FFT run, fs1 and fS2 respectively, are also different. Particularly, in order to have the same carrier spacing at the transmitter and the receiver, the following relationship should be met:
Accordingly, the number of samples added in the transmitter and removed in the receiver as a CP varies in accordance with
Cp1/Cp2=fs1/fs2 (2)
where Cp1 and Cp2 are the number of samples corresponding to the cyclic prefix in the transmitter and the receiver respectively.
The following description examines the situations for which N1 is a multiple of N2, representing an over-sampled IFFT, and N2 is a multiple of N1, representing an under-sampled IFFT. It is possible, but unlikely, that N1 is not an integer multiple of N2 and vice versa. This is because the standard specifies DSL bands as having power-of-two number of carriers and because the most efficient algorithms to implement a DFT/IDFT (including FFT) are powers of two. That being said, it is believed the analysis as follows is applicable to cases where the ratio of N1 to N2, or vice versa, is non-integer.
Referring to
fs/fs1=M1 (3)
and
fs/fs2=M2 (4)
where M1 and M2 are integers. Yet further, the transmit and receive digital filters including the TDEQ, can be up-sampled to the same clock frequency and their resulting impulse responses can be convolved with hchan(k), for a filter 202 with an overall channel impulse response h(k). As a result, DMT symbols from the transmitter are upsampled by M1, once the CP has been added, from the sampling frequency fs1 of the transmitter IFFT 204 to the sampling frequency fs of the filter 202. Similarly, at the receiver, the DMT symbols are downsampled by M2 before removing the CP, from the sampling frequency fs of the filter 202 to the sampling frequency fs2 of the receiver FFT 206.
Under-Sampled Case
From equations (3) and (4), it can be seen that M1 and M2 are inversely proportional to fs1 and fs2, respectively. Thus, for the case of an under-sampled IFFT, the sampling frequency fs1 of the IFFT is less than sampling frequency fs2 of the FFT, and M1 is greater than M2. As a result, Ml can be expressed as M1=M×M2, where M is an integer that corresponds to the ratio between the FFT and IFFT sizes. Thus, in the present embodiment, the FFT is M times larger than the IFFT. Also, from equations (2), (3), and (4), it can be seen that
Cp2/Cp1=M (5)
Thus, the model 200 illustrated in
For the model 300 illustrated in
Referring to
As illustrated in
At the receiver, Cp2 samples are removed from received signal z(k). For the first DMT symbol, the cyclic prefix Cp2 is removed for k=−Cp2, . . . , −1. The following N2 samples, that is for k=0, . . . , N2−1, represent the first DMT symbol itself. For the second DMT symbol, the cyclic prefix Cp2 is removed for the following Cp2 samples, that is for k=N2, . . . , N2+Cp2−1. This process for removing the CP is repeated periodically every N2 received samples. Therefore, in order to be ISI-ICI free, the first transient of z(k) should be confined to the time window where the first CP is removed, while the last transient of z(k) should be confined to the time window where the second CP is removed. Mathematically, these limitations are represented as follows.
For the initial transient, the lower bound of k is −MCp1. The lower bound of k for the cyclic prefix for the first DMT symbol is −Cp2. Thus, to ensure that the initial transient is within the cyclic prefix, as desired, the lower bound of the initial transient should be at least equivalent to the lower bound for the cyclic prefix, or
MCp1>−Cp2−1 (6)
Since, from equation (5), Cp2=MCp1, equation (6) can-be rewritten as Cp2<Cp2+1, which is always true.
Similarly, for the initial transient, the upper bound of k is −MCp1−M+L−1. The upper bound of k for the cyclic prefix for the first DMT symbol is −1. Thus, to ensure that the initial transient is with the cyclic prefix, as desired, the upper bound of the initial transient should be at most equivalent to the upper bound for the cyclic prefix, or
MCp1−M+L−1<0 (7)
Equation (7) can be rewritten as −MCp1−M+L<−1, which can be rewritten as L≦MCp1+M. From equation (5), the previous equation can be rewritten as L≦Cp2+M.
For the final transient, the lower bound of k is M(N1−1)+M. The lower bound of k for the cyclic prefix for the second DMT symbol is N2. Thus, to ensure that the initial transient is within the cyclic prefix, as desired, the lower bound of the initial transient should be at least equivalent to the lower bound for the cyclic prefix, or
M(N1−1)+M>N2−1 (8)
Equation (8) can be rewritten as MN1−M+M>N2−1, which can be rewritten as MN1>N2−1. Since N2=MN1, the equation can be rewritten as N2>N2−1, which is always true.
Similarly, for the final transient, the upper bound of k is M(N1−1)+L−1. The upper bound of k for the cyclic prefix for the second DMT symbol is N2+Cp2−1. Thus, to ensure that the initial transient is with the cyclic prefix, as desired, the upper bound of the initial transient should be at most equivalent to the upper bound for the cyclic prefix, or
M(N1−1)+L−1<N2+Cp2 (9)
Equation (9) can be rewritten as M(N1−1)+L−1<MN1+MCp1, which can be rewritten as L≦MCp1+M. From equation (5), the previous equation becomes L≦=Cp2+M.
Thus, the conclusion from both the first and final transients is that for an under-sampled IFFT, the ISI-ICI free condition is guaranteed if the length of the total channel impulse response g(k) is less than the CP length at the receiver side plus the ratio between the FFT and IFFT sizes. It should also be noted that the impulse response g(k) also corresponds to the shortened impulse response of the channel, as it matches to the convolution between the TDEQ and the channel impulse response at the FFT clock frequency. Therefore, in order to achieve the desired channel impulse response g(k), when training the TDEQ the target impulse response length can be set to Cp2+M.
Over-Sampled Case
In the over-sampled case, M2 can be expressed as M2=M×M1 where M is an integer that also corresponds to the ratio between the IFFT and FFT sizes. Thus, in the present embodiment, the IFFT is M times larger than the FFT. Also, the relationship between the cyclic prefix Cp1 of the transmitter and the cyclic prefix Cp2 of the receiver can be expressed as
Cp1/Cp2=M (10)
Similarly to the under-sampled case, the model 200 illustrated in
As in the previous embodiment, for the model 500 illustrated in
As illustrated in
By resorting to a similar argument as in the previous embodiment, it can be seen that the initial and final transients of the signal z(k) when transmitting only one DMT symbol around the time origin take place for −Cp1≦k≦−Cp1−1+L−1 and for N1≦k≦N1−1+L−1. Further, the steady state-like signal occurs for 0≦k≦N1−1. However, the signal z(k) is downsampled by a factor of M to yield q(k), from which Cp2 samples of cyclic prefix are removed. Therefore, the steady state-like signal for q(k) occurs for 0≦k≦N1/M−1/M=N2−1/M. Since N2−1/M is not an integer, the upper bound of the interval becomes N2−1, as expected, since the FFT 504 at the receiver needs N2 samples for each DMT symbols. For the transient duration, the following constraints apply.
For the initial transient, the lower bound of k is −Cp1/M. The lower bound of k for the cyclic prefix for the first DMT symbol is −Cp2. Thus, to ensure that the initial transient is within the cyclic prefix, as desired, the lower bound of the initial transient should be at least equivalent to the lower bound for the cyclic prefix, or
Cp1/M>−Cp2−1 (11)
Since Cp1/Cp2=M, the equation can be rewritten as Cp2<Cp2+1, which is always true.
Similarly, for the initial transient, the upper bound of k is (−Cp1−1+L−1)/M. The upper bound of k for the cyclic prefix for the first DMT symbol is −1. Thus, to ensure that the initial transient is with the cyclic prefix, as desired, the upper bound of the initial transient should be at most equivalent to the upper bound for the cyclic prefix, or
(−Cp1−1+L−1)/M<0 (12)
The equation can be rewritten as L<Cp1+2, which can be rewritten as L≦Cp1+1.
For the final transient, the lower bound of k is N1/M. The lower bound of k for the cyclic prefix for the second DMT symbol is N2. Thus, to ensure that the initial transient is within the cyclic prefix, as desired, the lower bound of the initial transient should be at least equivalent to the lower bound for the cyclic prefix, or
N1/M>N2−1 (13)
Similarly, for the final transient, the upper bound of k is ((N1−1)+L−1)/M. The upper bound of k for the cyclic prefix for the second DMT symbol is N2+Cp2−1. Thus, to ensure that the initial transient is with the cyclic prefix, as desired, the upper bound of the initial transient must be at most equivalent to the upper bound for the cyclic prefix, or
(N1+L−2)/M<N2+Cp2 (14)
Since N1=MN2 and Cp1=MCp2, the equation can be rewritten as N1+L−2<N1+Cp1, which can be rewritten as L<Cp1+2, which can further be rewritten as L≦Cp1+1.
Thus, the conclusion from both the first and final transients is for an over-sampled IFFT, the ISI-ICI free condition is guaranteed if the length of the total channel impulse response g(k) is less than the CP length at the transmitter side plus one. It should also be noted that the impulse response g(k) also corresponds to the shortened impulse response of the channel, as it matches to the convolution between the TDEQ and the channel impulse response at the FFT clock frequency. Therefore, in order to achieve the desired channel impulse response g(k), when training the TDEQ the target impulse response length can be set to Cp1+1.
For yet a further embodiment, a situation is illustrated for an over-sampled IFFT where the channel impulse response is advanced by D samples at the IFFT clock frequency. The same steps performed above are repeated, and the results are provided as follows.
For the initial transient, from the lower bound it can be determined that (Cp1+D)/M<Cp2+1. This equation can be rewritten as Cp1+D<Cp1+M which is true for all cases where D<M.
From the upper bound it can be determined that (−Cp1−1−D+1+L−1)/M<0. This equation can be rewritten as −Cp1−D+L−1<0, or L<Cp1+D+1, which is met if L<Cp1+1.
For the final transient, from the lower bound it can be determined that (N1−D)/M>N2−1, which can be rewritten as N1−D>N1−M, which is true for all D<M.
From the upper bound it can be determined that (N1+L−D+1−2)/M<N2+Cp2. This equation can be rewritten as N1+L−D−1,+Cp1, or, L<Cp1+D+1, which is met if L<Cp1+1.
Therefore, the ISI-ICI free condition is met even when the channel impulse response g(k) is advanced by up to M−1 samples. This result shows that there is not just one optimum frame alignment when the transmitter IFFT is over-sampled. Given the above results, it is easy to envision that when in the presence of the channel impulse response g(k) that is not time strictly time limited, one of the frame alignments as per above would result in the least ISI-ICI interference, or best capacity.
Application
If the transmitter IFFT size is known a priori, then the results of the previous sections can simply be applied at the receiver for improving performance. For the case where N1=N2, the best equalization technique is to train the TDEQ and the FDEQ with the length of the target impulse response equal to Cp1+1, which is equal to Cp2+1. If, however, N1 is less than N2 then the best strategy is to train the TDEQ and the FDEQ with a target impulse response with length Cp2+M. Lastly, if N1 is greater than N2, then the best strategy is to train the TDEQ and the FDEQ with a target impulse response with length Cp1+1. For this case, the performance can be further improved by searching for an optimum frame alignment between [0, (M−1)/fs1].
However, if the IFFT size is not known, a technique referred to herein as a “blind technique” is used to estimate the optimum equalization strategy. It is assumed that the receiver desires to use a fixed FFT size and does not know the transmitter IFFT size. The IFFT can be either equal, lesser (under-sampled IFFT) or greater (over-sampled IFFT) than the receiver FFT size. Given that M is typically a small number, less than four (4) in most of the cases, the following procedure optimizes the transmission.
A set of TDEQ pairs and FDEQ pairs is trained, each with different target impulse response length, that is Cp1+1, Cp2+1, Cp2+2, . . . , Cp2+Mmax, where Mmax is a maximum expected value for M. Typically the value for Mmax is programmable. During a Channel Analysis portion of the modem's initialization, each TDEQ/FDEQ pair of the set is applied and a quick per-bin signal to noise ratio (SNR) estimate is performed. For the TDEQ/FDEQ pair trained with target impulse response Cp1+1, a set of per-bin SNR estimates is also performed, each for a different time advance in the interval [0, (M−1)/fs1]. This interval can be quantized such that only a few values need to be tried. The time advance is applied, for example, by reducing the delay of a tap delay line in the modem front end at a clock frequency higher then the FFT clock frequency. The ratio of this clock frequency and fs2 determine the granularity of the search. Lastly, the total per bin SNR estimates are compared and the one with the highest geometric average is selected together with the associated TDEQ/FDEQ pair and time advance value.
Therefore, the process provides an improved equalization strategy for ADSL receivers when in the presence of transmitters with an IFFT size that potentially may not match the FFT size at the receiver. The proposed techniques involve minor modifications to the equalizer's training algorithm and allow use of a fixed size FFT at the receiver. The performance improvements that result have to shown to be quite significant.
Although the invention has been described with reference to certain specific embodiments, various modifications thereof will be apparent to those skilled in the art without departing from the spirit and scope of the invention as outlined in the claims appended hereto.
Number | Date | Country | Kind |
---|---|---|---|
2375823 | Mar 2002 | CA | national |
Number | Name | Date | Kind |
---|---|---|---|
5606575 | Williams | Feb 1997 | A |
5666383 | Huang et al. | Sep 1997 | A |
6247035 | Hellberg | Jun 2001 | B1 |
6404806 | Ginesi et al. | Jun 2002 | B1 |
6456654 | Ginesi et al. | Sep 2002 | B1 |
6535552 | Pessoa | Mar 2003 | B1 |
6744821 | Van Acker et al. | Jun 2004 | B1 |
6754261 | Liu et al. | Jun 2004 | B1 |
6834079 | Strait et al. | Dec 2004 | B1 |
6990062 | Greaves et al. | Jan 2006 | B2 |
20020057734 | Sandberg et al. | May 2002 | A1 |
Number | Date | Country | |
---|---|---|---|
20040004936 A1 | Jan 2004 | US |