Low complexity soft demapping

Information

  • Patent Grant
  • 7649952
  • Patent Number
    7,649,952
  • Date Filed
    Friday, July 1, 2005
    20 years ago
  • Date Issued
    Tuesday, January 19, 2010
    15 years ago
Abstract
A method of analyzing soft symbol information in a communication system that transmits multiple independent data streams is disclosed. The method includes setting a trellis structure using a fixed spatial delay constraint, calculating a joint probability between a targeted symbol and a set of observation samples either recursively or nonrecursively, and approximating a likelihood function for a given branch by a single probability density function with mean and variance computed based on available soft information on past symbols relative to the branch that is being currently considered.
Description
TECHNICAL FIELD

This invention relates to systems and methods for processing of high bandwidth over-the-air data transmission and reception.


BACKGROUND

With increased reliance of all individuals, whether at work or at play, on access to various rich data sources, and with an increased demand to access such rich data sources on-the-road or on-the-run, comes a need for higher data bandwidth in portable computing and communication devices. For instance, users of mobile computing devices—from laptop computers, to cellular telephones, to wristwatches—desire access to more and more data, such as audio, streaming video, and other data-rich applications. There is thus a demand for systems and techniques that can deliver greater wireless bandwidth.


Part of the necessary process of providing high-bandwidth systems is the ability to “locate” an incoming signal and to align with the signal so that transmitted data may be extracted and read from the signal. This process becomes more complex with high bit rate communications. Also, higher bandwidth is sometimes achieved by separating a data stream into multiple simultaneous transmissions through various multiplexing processes. When such an approach is taken, the data in each transmitted signal must be identified and read, and all of the separate data must then be joined back together in the proper order.


Multiple-input and multiple-output (MIMO) communication methods attract considerable attention because of their potential to achieve much higher capacity than the traditional single-input single-output (SISO) methods. While MIMO systems based on space-time coding can be used to improve link reliability (e.g., by providing redundant information paths), MIMO systems incorporating spatial-multiplexing are used mainly to achieve high spectral efficiency. MIMO systems employing orthogonal frequency division multiplexing (OFDM) can achieve high spectral efficiency in rich scattering environments such as indoor wireless local area networks.


MIMO-OFDM systems can effectively exploit frequency diversity of frequency selective channels as well as spatial diversity of uncorrelated parallel wireless links. Bit interleaved coded modulation (BICM) used in conjunction with MIMO-OFDM and spatial multiplexing (SM) is particularly effective in exploring both spatial diversity and frequency selectivity without significant design efforts, and is well-suited for achieving very high data rates. See G. Caire et al., “Bit-interleaved coded modulation,” IEEE Trans. Inform. Theory, vol. 44, no. 3, pp. 927-946, May, 1998; A. M. Tonello, “Space-time bit-interleaved coded modulation with an iterative decoding strategy,” Proc. of IEEE Vehicular Technology Conference, pp. 473-478, Boston, September, 2000; B. Lu, X. Wang & K. R. Narayanan, “LDPC-based space-time coded OFDM systems over correlated fading channels: performance analysis and receiver design,” IEEE Trans. on Commun., vol. 50, no. 1, pp. 74-88, January, 2002; D. Park and B. G Lee, “Design criteria and performance of space-frequency bit-interleaved coded modulations in frequency selective Rayleigh fading channels,” Journal of Commun. and Networks, vol. 5, no. 2, pp. 141-149, June, 2003. In addition to exploiting spatial diversity, MIMO-OFDM systems retain the same advantages as SISO-OFDM systems, namely, reduced equalization complexity for frequency selective channels and an ability to explore frequency diversity through coding.


However, like their SISO-OFDM counterparts, MIMO-OFDM systems can be sensitive to synchronization errors, especially the carrier frequency offset (CFO). A good synchronization scheme is generally necessary to make a MIMO-OFDM system practically viable. Numerous techniques have been suggested in the literature for SISO-OFDM frequency synchronization. However, extension to MIMO systems tends to be difficult. The literature on MIMO-OFDM synchronization is relatively scarce. A training-based method has been proposed that relies on the cyclic prefix and the orthogonal polyphase sequences that can be modulated directly. See A. N. Mody & G. L. Stuber, “Synchronization for MIMO OFDM systems,” in Globecom 2001, San Antonio, Tex., November, 2001.


Accurate channel estimation is also important in realizing the full performance potential of MIMO-OFDM systems. Channel estimation becomes a major challenge as the number of channel responses that need be characterized increases substantially, as the number of transmit and receive antennas increases. Previous works exist that identify desirable training patterns for estimating channel responses for MIMO systems. See, e.g., Y. (G.) Li, N. Seshadri, and S. Ariyavisitakul, “Channel estimation for OFDM systems with transmitter diversity in mobile wireless channels,” IEEE J. Select Areas Commun., vol. 17, pp. 461-471, March, 1999; Y. (G.) Li, L. J. Cimini, and N. R. Sollegberger, “Robust channels estimation for OFDM systems with rapid dispersive fading channels,” IEEE Trans. Commun., vol. 46, pp. 902-915, July, 1998; Y. (G.) Li, “Simplified channel estimation for OFDM systems with multiple transmit antennas,” IEEE Trans. Wireless Commun., vol. 1, pp. 67-75, January, 2002; X. Ma et al., “Optimal training for MIMO frequency-selective fading channels,” IEEE Trans. Wireless Commun., January, 2004. Other works also appear in this area. See, e.g., H. V Poor “An introduction to signal detection and estimation,” Spring-Verlag: New York, 1994.


There remains a need for systems and techniques that can provide extremely high wireless bandwidth in a reliable and cost-effective manner.


SUMMARY

This document explains processes and systems for soft demapping of received signals for wireless communication systems.


In one implementation, a method of analyzing soft symbol information in a communication system that transmits multiple independent data streams is disclosed. The method comprises setting a trellis structure using a fixed spatial delay constraint, calculating a joint probability between a targeted symbol and a set of observation samples either recursively or nonrecursively, and approximating a likelihood function for a given branch by a single probability density function with mean and variance computed based on available soft information on past symbols relative to the branch that is being currently considered.


The available soft information for the past symbols may be obtained through a posteriori probabilities computed during the current iteration. The mean and variance may be computed based on available soft information that depends on future symbols relative to the branch that is currently considered. Also, the available soft information for the future symbols may be obtained through a priori probabilities passed over from an outer decoder in a previous iteration stage.


In some implementations, the available soft information for a future symbol may be replaced by one or more hard decisions derived from observation samples during the current iteration. The available soft information for past symbols may also be obtained through past hard decisions. The number of past symbols and the number of future symbols used in the mean and variance calculations may be adjustable parameters with the values greater than or equal to zero. In addition, a likelihood function for a given branch may be approximated by a sum of multiple probability density functions with means and variances computed based on estimates of past and future symbols.


The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.





DESCRIPTION OF DRAWINGS


FIG. 1 is a reduced trellis for BPSK.



FIG. 2 is a flow chart showing a method of analyzing symbol information in a communication system that transmits multiple independent data streams.


Like reference symbols in the various drawings indicate like elements.





DETAILED DESCRIPTION

Soft demapping techniques may be used to improve the acquisition of high-bandwidth over-the-air signals, as described herein. Consider a 5×5 antenna configuration (5 transmit antennas and 5 receive antennas) as an example. After proper signal decomposition, the received signals can be written as:

z1=H11s1+n1z2=H22s2+H21s1+n2z3=H33s3+H32s2+H31s1+n3z4=H44s4+H43s3+H42s2+H41s1+n4z5=H55s5+H54s4+H53s3+H52s2+H51s1+ns  (1)

where zi is the received or observation signal at the i-th receive antenna, sj is the modulated symbol transmitted by the j-th transmit antenna, ni denotes the noise corrupting the i-th receive signal, and Hij represents the effective channel response of the communication link between the j-th transmit antenna and the i-th receive antenna. For an N×N antenna configuration, the observation signal at the j-th receive antenna is given by

zj=Hjjsj+Hj,j−1sj−1+ . . . +Hj1s1+nj, 1≦j≦N.  (23)


The techniques discussed here can be applied to cases in which there are a different number of receive antennas (i.e., more) than transmit antennas. Here, we discuss the N×N antenna configuration. The optimal soft detection is based on a trellis representation of the signals. For the multi-input multi-output (MIMO) system, the trellis varies spatially; the number of states at layer j is equal to Mj, where M is the size of the symbol constellation.


Low complexity soft detection of sj's is possible by adopting the approach used for the intersymbol interference channel detection method described in J. Moon & F. Rafiee Rad, “Pragmatic Turbo equalization via constrained-delay detection with soft decision feedback for severe ISI.”


In the suboptimal reduced trellis scheme of Moon & Rad, the soft information on symbol sj−τ is obtained by making use of z1j, the collection of observation samples z1 through zj. The soft information on symbol sj−τ, namely the a posteriori probability P(sj−τ/z1j), can be obtained once the joint probability density f(sj−τ,z1j) is evaluated. Following Moon & Rad, the state and state transition are defined respectively as














v
j





_

_



s

j
-
τ


j
-
1



,

j


>
_



τ
+
1











η
j





_

_



{


v
j

,

v

j
+
1



}


=

s

j
-
τ

j


,

j


>
_



τ
+
1









(
3
)







For 1≦j≦τ, we have a spatially varying trellis with the state at the j-th layer given by







v
j





_

_



s
1

j
-
1







(v1 is a dummy node, where all trellis paths originate). See FIG. 1 for the resulting trellis corresponding to BPSK, τ=2 and N=5. The joint probability density f(sj−τ,z1j) is obtained from the trellis as











f


(


s

j
-
τ


,

z
1
j


)


=





η
j



(

s

j
-
τ


)









f


(


η
j

,

z
1
j


)




,


1
+
τ



<
_


j


<
_



N
+
τ






(
4
)








where the sum is over all state transitions associated with the given sj−τ. In computing the joint probability density for the last symbols sN−τ+1 through SN using (4) (i.e., when N+1≦j≦N+τ, it is understood that ηN+mN and z1N+m=z1N whenever m>0. The joint probability density f(ηj,z1j), on the other hand, can be computed recursively (see Moon & Rad):











f


(


η
j

,

z
1
j


)


=


P


(

s
j

)




f


(



z
j

/

η
j


,

z
1

j
-
1



)








η

j
-
1




(

η
j

)









f


(


η

j
-
1


,

z
1

j
-
1



)





,

1


<
_


j


<
_


N





(
5
)








where the sum is over all ηj−1's connected to the given ηj, and Ση01)f(η0,z10) is initialized to 1.


While a state transition ηj is designed to collect only sj−τj, the observation zj does in general depend on all symbols s1 through sj. This issue can be resolved by writing the likelihood function l(ηj)=f(zjj,z1j−1) as follows:













l


(

η
j

)


=




s
1

j
-
τ
-
1









f


(


s
1

j
-
τ
-
1


,


z
j

/
η

,

z
1

j
-
1



)









=




s
1

j
-
τ
-
1






P


(



s
1

j
-
τ
-
1


/

η
j


,

z
1

j
-
1



)




f


(



z
j

/

s
1

j
-
τ
-
1



,

η
j

,

z
1

j
-
1



)










=




s
1

j
-
τ
-
1






P


(



s
1

j
-
τ
-
1


/

η
j


,

z
1

j
-
1



)




f


(


z
j

/

s
1
j


)











(
6
)








for τ+2≦j≦N. For 1≦j≦τ+1, we simply have l(ηj)=f(zj/s1j). See FIG. 1. It can be seen that the likelihood function is a weighted sum of Gaussian probability density functions (pdfs).


One effective way of reducing computation is to approximate this weighted linear sum of many Gaussian pdfs with a single Gaussian pdf. That is, we write l(ηj)≈N(μTjTj) for some mean μTj and variance σTj2. Following the approach of Moon & Rad, the “overall mean” μTj and the “overall variance” σTj2 can be obtained as










μ

T
j


=





i
=
0

τ








H

j
,

j
-
i





s

j
-
i




+




i
=

τ
+
1



j
-
1









H

j
,

j
-
i






s
_


j
-
i














(
7
)








σ

T
j

2

=


σ
2

+




i
=

τ
+
1



j
-
1












H

j
,

j
-
i





2



σ

j
-
i

2













(
8
)









for 1≦j≦N, where









s
_

l

=




s
l









P


(

s
l

)




s
l




,

σ
2






is the variance of additive noise and







σ
l
2

=




s
l









P


(

s
l

)









s
l

-


s
_

l




2

.








It is implied that sl=0 and σl=0 for l<1. The actual computation is done based on the updated a posteriori probabilities available from previous detection layers, i.e., with P(sl)←P(sl/z1l+τ) for 1≦l≦j−τ−1. Note that an underlying approximation is:







P


(



s
1

j
-
τ
-
1




/



η
j


,

z
1

j
-
1



)







i
=
1


j
-
τ
-
1









P


(


s
i



/



z
1

i
+
τ



)


.






Further Improvement in Performance/Complexity Tradeoff

The performance can be further improved by allowing a longer decision delay. However, increasing τ results in an exponential increase in complexity as the complexity of the proposed scheme is proportional to Mτ+1. Instead, the following approach allows a longer decision delay without increasing the computational load significantly. Consider the joint probability density f(sj−τ,z1j+λ) that can be obtained from the same trellis as











f


(


s

j
-
τ


,

z
1

j
+
λ



)


=





η
j



(

s

j
-
τ


)









f


(


η
j

,

z
1

j
+
λ



)




,


1
+
τ



<
_


j


<
_



N
+

τ
.







(
9
)







The decision delay is now τ+λ. As before, it is understood that ηN+mN and z1N+m=z1N whenever m>0. The joint probability density f(ηj,z1j+λ) can be computed recursively:











f


(


η
j

,

z
1

j
+
λ



)


=


P


(


s
j



/



z
j

j
+
λ
-
1



)




f


(



z

j
+
λ




/



η
j


,

z
1

j
+
λ
-
1



)








η

j
-
1




(

η
j

)









f


(


η

j
-
1


,

z
1

j
+
λ
-
1



)





,

1


<
_


j


<
_


N





(
10
)








where Ση01)f(η0,z10) is initialized to 1. The probability P(sj/zjj+λ−1) cannot be computed exactly, but can be approximated by the a priori probability, which will be updated at each iterative stage in the case of iterative demapping and decoding. The modified likelihood function l(ηj)=f(zj+λj,z1j+λ−1) is written as













l


(

η
j

)


=





s
1

j
-
τ
-
1


,

s

j
+
1


j
+
λ










f


(


s
1

j
-
τ
-
1


,

s

j
+
1


j
+
λ


,


z

j
+
λ




/



η
j


,

z
1

j
+
λ
-
1



)









=





s
1

j
-
τ
-
1


,

s

j
+
1


j
+
λ







P


(


s
1

j
-
τ
-
1


,


s

j
+
1


j
+
λ




/



η
j


,

z
1

j
+
λ
-
1



)




f


(



z

j
+
λ




/



s
1

j
-
τ
-
1



,

s

j
+
1


j
+
λ


,

η
j

,

z
1

j
+
λ
-
1



)










=





s
1

j
-
τ
-
1


,

s

j
+
1


j
+
λ







P


(


s
1

j
-
τ
-
1


,


s

j
+
1


j
+
λ




/



η
j


,

z
1

j
+
λ
-
1



)




f


(


z

j
+
λ




/



s
1

j
+
λ



)










=





s
1

j
-
τ
-
1


,

s

j
+
1


j
+
λ







P


(



s
1

j
-
τ
-
1




/



η
j


,

z
1

j
+
λ
-
1



)




P


(



s

j
+
1


j
+
λ




/



s
1
j


,

z
1

j
+
λ
-
1



)




f


(


z

j
+
λ




/



s
1

j
+
λ



)











(
11
)








which is also a weighted sum of Gaussian pdfs and so again approximated as l(ηj)≈N(μTjTj) for some overall mean μTj and variance σTj2 but now with modified expressions:










μ

T
j


=





i
=
1

λ








H

j
,

j
+
i






s
_


j
+
i




+




i
=
0

τ








H

j
,

j
-
i





s

j
-
i




+




i
=

τ
+
1



j
-
1









H

j
,

j
-
i






s
_


j
-
i









(
12
)







σ

T
j

2

=





i
=
1

λ







H

j
,

j
+
i





2



σ

j
+
i

2



+

σ
2

+




i
=

τ
+
1



j
-
1












H

j
,

j
-
i





2



σ

j
-
i

2








(
13
)








for 1≦j≦N. As before, we make an approximation









s
_

l






s
l









P


(


s
l



/



z
1

l
+
τ



)




s
l




,


σ
l
2






s
l









P


(


s
l



/



z
1

l
+
τ



)








s
l

-


s
_

l




2









for 1≦l≦j−τ−1 based on a posteriori probabilities available from the previous detection layer during the current iteration, while









s
_

l






s
l









P


(

s
l

)




s
l




,


σ
l
2






s
l









P


(

s
l

)








s
l

-


s
_

l




2









for j+1≦l≦j+λ based on a priori probabilities updated by the decoder during the previous iteration since a posteriori probabilities are not available for sl, j+1≦l≦j+λ. It is understood that here sl=0 and σl=0 for l<1 or l>N. The implied approximation here is that








P


(



s
1

j
-
τ
-
1




/



η
j


,

z
1

j
+
λ
-
1



)




P


(



s

j
+
1


j
+
λ




/



s
1
j


,

z
1

j
+
λ
-
1



)








i
=
1


j
-
τ
-
1









P


(


s
i



/



z
1

i
+
τ



)







l
=

j
+
1



j
+
λ









P


(

s
l

)


.








Note that the state is not defined when τ=0 (i.e., no trellis); in this case, the scheme simply reduces to essentially symbol-by-symbol detection even when λ>0. One desirable feature for τ=0 is that the simple near-optimal demapper geared to Gray mapping can be used that relies on separate processing of quadrature components of the observation signal. It is easy to extend (12) and (13) to the case of λ=N, so that when processing layer j the average effect of all symbols from j+1 through N is taken into account.


An Alternative Approach to Computing (5)

The joint pdf f(ηj,z1j) in (5) can also be computed non-recursively. That is, instead of accumulating the current-layer likelihood function f(zjj) onto the previous-layer pdf of f(ηj−1,z1j−1), we attempt to directly compute the likelihood function only based on the current (τ+1) layers, and add them anew each cycle. Treating the averaged soft decision sequence sl, 1≦l≦j−τ−1, as the correct past decision sequence, f(ηj,z1j) can be approximated by













f


(


η
j

,

z
1
j


)






f


(


η
j

,


z
1
j



/




s
_

1

j
-
τ
-
1




)








=



f


(


η
j

,

z

j
-
τ

j

,


z
1

j
-
τ
-
1




/




s
_

1

j
-
τ
-
1




)








=




P


(

η
j

)




f


(



z

j
-
τ

j



/



η
j


,


s
_

1

j
-
τ
-
1



)





f


(


z
1

j
-
τ
-
1




/




s
_

1

j
-
τ
-
1



)


.









(
14
)







The third term in the last expression in (14) is common to all ηj's and so can be treated as a normalization constant. Due to the fact that the observation samples zj,zj−1, . . . , zj−τ are independent when conditioned on the symbols sj,sj−1, . . . ,s1, (14) can be computed as










f


(


η
j

,

z
1
j


)


=

C





i
=
0

τ








P


(

s

j
-
i


)




f


(



z

j
-
i




/



η
j


,


s
_

1

j
-
τ
-
1



)









(
15
)








where C is the constant and f(zj−ij, s1j−τ−1), 0≦i≦τ, can be obtained as in (6)≈(8). Specifically,













f


(



z

j
-
i




/



η
j


,


s
_

1

j
-
τ
-
1



)


=



f


(



z

j
-
i




/



s

j
-
τ


j
-
i



,


s
_

1

j
-
τ
-
1



)












N


(


μ

T

j
-
i



,

σ

T

j
-
i




)









(
16
)








with the “overall mean” μTj−i and the “overall variance” σTj−i2 given by













μ

T

j
-
i



=







i
=

j
-
τ



j
-
i









H


j
-
i

,
i




s
i



+




i
=
1


j
-
τ
-
1









H


j
-
i

,
i





s
_

i











σ

T

j
-
i


2

=




σ
2

+




i
=
1


j
-
τ
-
1












H


j
-
i

,
i




2



σ
i
2











(
17
)








where si and σi2 are defined as in (7) and (8). This is for the case λ=0, but the approach can be extended to the case λ>0 with the application of the method summarized in (9)≈(13).


It has been shown by simulations that the two approaches to computing f(ηj,z1j)—by (5) and (15)—result in essentially the same performance. However, the use of the non-recursive computation specified in (15) suggests a further complexity reduction scheme. As seen in (15) and (16), the branch metrics f(zj−1/sj−τj−i, s1j−τ−1) are to be computed at τ+1 layers (τ≦i≦0) in each cycle (i.e., for each value of j, except at the boundary). At the τ+1 layer (i.e., for i=0), for example, f(zj/sj−τj, s1j−τ−1) must be computed for all Mτ+1 combinations of symbols in sj−τj. The required level of implementation complexity is very high when M is large, even for a small value of τ.


A complexity reduction is possible by considering only a subset of branches beyond the initial local layer (i.e., i=τ).


Take τ=1 as an example. The branch metrics at the initial local layer f(zj−1/sj−1, s1j−2) are computed as usual for all M symbols of sj−1. Then, when computing f(zj/sj−1j, s1j−2) for the next step, only M1 out of M symbols are considered for sj (but all M symbols are still considered for sj−1), resulting in M1×M computations rather than M2 computations.


Our simulation results for 64-QAM (M=64) and τ=1 indicate that this reduced complexity scheme with M1=1 results in only a small loss of performance. The resulting complexity is comparable to the canonical layer-by-layer cancellation/suppression method for VBLAST (P. W. Wolniansky et al., “V-blast: an architecture for realizing very high data rates over the rich-scattering wireless channel,” Proc. ISSUE'98, September 1998), but with large performance improvement. Different criteria are possible for selecting M1 symbols. In our simulation experience, one particular method that chooses M1 symbols based on the “nearest-neighbor” rule (i.e., choose the nearest M1 symbols from the observation sample after subtracting the effect of the other symbols affecting the observation) has been effective.



FIG. 2 is a flow chart showing a method of analyzing symbol information in a communication system that transmits multiple independent data streams. At box 202 of the process, a trellis structure is set using a fixed spatial delay constraint. At box 204, a joint probability is calculated between a targeted symbol and a set of observation samples. The computation may be performed recursively or nonrecursively. At box 206, a likelihood function is approximated for a given branch by a single probability density function. A mean and variance for the function are computed based on available soft information on past symbols relative to the branch that is being currently considered. The mean and variance can be computed based on available soft information that depends on future symbols relative to the branch that is currently considered. The available soft information for past symbols can be obtained through a posteriori probabilities computed during the current iteration, and can be obtained through past hard decisions. Available soft information for future symbols can be obtained through a priori probabilities passed over from an outer decoder in a previous iteration stage, and can be replaced by one or more hard decisions derived from observation samples during the current iteration. The number of past symbols and the number of future symbols used in the mean and variance calculations can be adjustable parameters with the values greater than or equal to zero. Also, a likelihood function for a given branch can be approximated by a sum of multiple probability density functions with means and variances computed based on estimates of past and future symbols.


Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, specially designed ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various implementations can include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device, and at least one output device.


These computer programs (also known as programs, software, software applications or code) include machine instructions for a programmable processor, and can be implemented in a high-level procedural and/or object-oriented programming language, and/or in assembly/machine language. As used herein, the term “machine-readable medium” refers to any computer program product, apparatus and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term “machine-readable signal” refers to any signal used to provide machine instructions and/or data to a programmable processor.


To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user and a keyboard and a pointing device (e.g., a mouse or a trackball) by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form, including acoustic, speech, or tactile input.


The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network (“LAN”), a wide area network (“WAN”), and the Internet.


The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.


The systems and techniques may be implemented in hardware, firmware, or software as part of the logical physical (PHY) layer under the ISO/OSI network model. The system may be included on a single chip with other components, such as a media access controller (MAC), and may be included with other PHY and MAC instantiations on a single chip for multiple port applications, such as on a switch or router. The techniques may allow for receipt and interpretation of multiple types of data, such as actual transmitted data packets, and also data such as auto negotiation and other link set-up and maintenance information. In a multi-speed or multi-protocol application, the system may be bypassed or otherwise avoided for lower-bandwidth transmission, such as if an auto negotiation process determines that incoming signals are part of a lower bandwidth (e.g., 802.11a, 802.11b, or 802.11g) signal.


A number of embodiments of the invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention. Accordingly, other embodiments are within the scope of the following claims.

Claims
  • 1. A computer-implemented method of analyzing soft symbol information in a communication system that transmits multiple independent data streams, comprising: setting a trellis structure using a fixed spatial delay constraint;calculating, using a processor, a joint probability density between a targeted symbol and a set of observation samples either recursively or nonrecursively; andapproximating, using the processor, a likelihood function for a given branch by a single probability density function with mean and variance computed based on available soft information on past symbols relative to the branch that is being currently considered.
  • 2. The method of claim 1, wherein the available soft information for the past symbols is obtained through a posteriori probabilities computed during current iteration.
  • 3. The method of claim 1, wherein the mean and variance are computed based on available soft information that depends on future symbols relative to the branch that is currently considered.
  • 4. The method of claim 3, wherein the available soft information for the future symbols is obtained through a priori probabilities passed over from an outer decoder in a previous iteration stage.
  • 5. The method of claim 3, wherein the available soft information for a future symbol is replaced by one or more hard decisions derived from observation samples during current iteration.
  • 6. The method of claim 1, wherein the available soft information for past symbols is obtained through past hard decisions.
  • 7. The method of claim 3, wherein the number of past symbols and the number of future symbols used in the mean and variance calculations are adjustable parameters with the values greater than or equal to zero.
  • 8. The method of claim 1, wherein the likelihood function for a given branch is approximated by a sum of multiple probability density functions with means and variances computed based on estimates of past and future symbols.
CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Application Nos. 60/584,594, filed Jul. 1, 2004; 60/584,701, filed Jul. 1, 2004; and 60/584,589, filed Jul. 1, 2004, and are hereby incorporated by reference in their entirety.

US Referenced Citations (12)
Number Name Date Kind
6480552 Tonello Nov 2002 B1
7009931 Ma et al. Mar 2006 B2
7068628 Li et al. Jun 2006 B2
7088782 Mody et al. Aug 2006 B2
7092457 Chugg et al. Aug 2006 B1
7116725 Ketchum et al. Oct 2006 B2
7120201 Huang et al. Oct 2006 B2
7120405 Rofougaran Oct 2006 B2
7123669 Ye et al. Oct 2006 B2
7123887 Kim et al. Oct 2006 B2
20030218973 Oprea et al. Nov 2003 A1
20050105505 Fishler et al. May 2005 A1
Provisional Applications (3)
Number Date Country
60584594 Jul 2004 US
60584701 Jul 2004 US
60584589 Jul 2004 US