Maximum likelihood detection of MPSK bursts with inserted reference symbols

Information

  • Patent Grant
  • 5940446
  • Patent Number
    5,940,446
  • Date Filed
    Monday, April 28, 1997
    28 years ago
  • Date Issued
    Tuesday, August 17, 1999
    26 years ago
Abstract
A fast algorithm for performing maximum likelihood detection of data symbols transmitted as phases of a carrier signal.
Description

BACKGROUND OF THE INVENTION
This invention relates generally to the transmission and detection of digital data using analog signals, and more particularly the invention relates to the detection of phase shift keying (PSK) encoded digital data.
The phase of a carrier signal can be used to encode digital data for transmission. The number of bits represented by a carrier phase symbol depends on the number of phases M of the carrier in an MPSK data burst.
A prior art approach to the detection of data symbols consists of using a phase locked loop to lock to the reference symbols and then detecting the data symbols using the phase reference out of the loop. A related approach is to use both reference symbols and remodulated data symbols to obtain a loop phase reference. These approaches are well known.
Another approach is to form a phase reference using a filtering operation on the reference symbols, often called pilot symbol aided demodulation. This approach is essentially the same as the phase locked loop approach in the sense that the phase locked loop also performs a filtering operation.
The present invention is concerned with maximum likelihood detection of data symbols in an MPSK data burst.





SUMMARY AND DESCRIPTION OF THE DRAWING
The present invention presents a fast algorithm to perform maximum likelihood detection of data symbols.
The FIGURE of the drawing illustrates a flow diagram of one embodiment in implementing the invention





First consider a specific problem which however has all the essential features of the general problem. Consider that N data symbols s.sub.1, s.sub.2, . . . S.sub.N are transmitted at times 1, 2, . . . N, and that a reference symbol S.sub.N+1 is transmitted at time N+1. All N+1 symbols are MPSK symbols, that is, for k=1, . . . N, s.sub.k =e.sup.j.phi.k, where .phi.k is a uniformly distributed random phase taking values in {0,2 .pi./M, . . . 2 .pi.(M-1)/M}, and for k=N+1, reference symbol S.sub.N+1 is the MPSK symbol e.sup.j0 =1. The N+1 symbols are transmitted over an AWGN channel with unknown phase, modeled by the equation:
r=se.sup.j.theta. +n. 1)
where r, s, and n are N+1 length sequences whose k.sup.th components are r.sub.k, s.sub.k, and n.sub.k, respectively, k=1, . . . N+1. Further, n is the noise sequence of independent noise samples, r is the received sequence, and .phi. is an unknown channel phase, assumed uniformly distributed on (-.pi.,.pi.!.
We now give the maximum likelihood decision rule to recover the data s.sub.1, . . . s.sub.N. For the moment, first consider the problem where we want to recover s=s.sub.1, . . . s.sub.N+1, where s.sub.N+1 is assumed to be unknown. We know that the maximum likelihood rule to recover s is the s which maximizes p(r.vertline.s). From previous work, we know that this is equivalent to finding the s which maximizes .eta.(s), where: ##EQU1## In general, there are M solutions to (2). The M solutions only differ by the fact that any two solutions are a phase shift of one another by some multiple of 2 .pi./M modulo 2 .pi./M. Now return to the original problem which is to recover the data s.sub.1, . . . s.sub.N. The maximum likelihood estimate of s.sub.1, . . . s.sub.N must be the first N components of the unique one of the M solutions of (2) whose s.sub.N+1 component is e.sup.j0 =1.
An algorithm to maximize (2) when all S.sub.k, k=1, . . . N+1 are unknown and differentially encoded is given in K. Mackenthun Jr., "A fast algorithm for multiple-symbol differential detection of MPSK", IEEE Trans. Commun., vol 42, no. 2/3/4, pp. 1471-1474, February/March/April 1994. Therefore to find the maximum likelihood estimate of s.sub.1, . . . s.sub.N when s.sub.N+1 is a reference symbol, we only need to modify the algorithm for the case when s.sub.N+1 is known.
The modified algorithm to find the maximum likelihood estimate s.sub.1, . . . s.sub.N of s.sub.1, . . . s.sub.N is as follows. Let .PHI. be the phase vector .PHI.=(.phi..sub.1, . . . .phi..sub.N+1), where all .phi..sub.k can take arbitrary values, including .phi..sub.N+1. If .vertline.r.sub.k .vertline.=0, arbitrary choice of s.sub.k will maximize (2). Therefore, we may assume with no loss in generality that .vertline.r.sub.k .vertline.>0, k=1, . . . N. For a complex number .gamma., let arg�.gamma.! be the angle of .gamma..
Let .PHI.=(.phi..sub.1, . . . .phi..sub.N+1) be the unique .PHI. for which:
arg{r.sub.k e.sup.-j.phi.k !.epsilon.�0,2 .pi./M),
for k=1 . . . N+1.
Define z.sub.k by:
z.sub.k =r.sub.k e.sup.-j.theta.k. 3)
For each k, k=1, . . . N+1, calculate arg�z.sub.k !. List the values arg�z.sub.k ! in order, from largest to smallest. Define the function k(i) as giving the subscript k of z.sub.k for the i.sup.th list position, i=1, . . . N+1. Thus, we have: ##EQU2## For i=1, . . . N+1, let:
g.sub.i z.sub.k(i). 5)
For i satisfying N+1.ltoreq.2(N+1), define:
g.sub.i =e.sup.-j2 .pi./M g.sub.i-(N+1). 6)
Calculate: ##EQU3## and select the largest.
Suppose the largest magnitude in (7) occurs for q=q'. We now find the phase vector .PHI. corresponding to q=q'. Using (3), (5), and (6), with i in the range of q'.ltoreq.i.ltoreq.q'+N, we have: ##EQU4## The evaluation of (8) and (9) gives elements .phi..sub.k(l),l=1, . . . N+1, in order of subscript value k(l), we form the sequence .phi..sub.1, .phi..sub.2, . . . .phi..sub.N+1, which is the vector .PHI.. The maximum likelihood estimate of s.sub.1, . . . s.sub.N is now given by s.sub.k =e.sup.-j.phi.k, k=1, . . . N, where .phi..sub.k =.phi..sub.k -.phi..sub.N+1, k=1, . . . N.
As discussed in Mackenthun supra, algorithm complexity is essentially the complexity of sorting to obtain (4), which is (N+1)log(N+1) operations.
We now expand the specific problem considered earlier to a more general problem. Suppose that N data symbols are transmitted followed by L reference symbols s.sub.N+1, . . . s.sub.N+L, where s.sub.k =e.sup.j0 =1 for k=N+1, . . . N+L, and assume the definition of channel model (1) is expanded so that r, s, and n are N+L length sequences. Then in place of (2) we have: ##EQU5## However, note that (10) can be rewritten as: ##EQU6## where r'.sub.N+1 =r.sub.N+1 +r.sub.N+2 + . . . r.sub.N+L. But we can apply the previous modified algorithm exactly to (11) and thereby obtain a maximum likelihood estimate of the first N data symbols.
Now suppose the L reference symbols can take values other than e.sup.j0. Since the reference symbols are known to the receiver, we can remodulate them to e.sup.j0 and then obtain a result in the form (11), and apply the previous algorithm. Finally, suppose the L reference symbols are scattered throughout the data. It is clear that we can still obtain a result in the form (11) and apply the previous algorithm.
If desired, sorting can be avoided at the expense of an increase in complexity in the following way. Fix j, j.epsilon.{1, . . . N+1}. For k=1, . . . N+1, form r.sub.j *r.sub.k, and let g.sub.j,k be the remodulation of r.sub.j *r.sub.k such that g.sub.j,k .epsilon.{0,2 .pi./M}. Now note that the set in (7) is the same as the set: ##EQU7## Thus, sorting has been eliminated but forming the above set requires (N+1).sup.2 complex multiplications.
The drawing illustrates a flow diagram of the described embodiment in implementing the algorithm for maximum likelihood detection of the MPSK data bursts.
While the invention has been described with reference to a specific embodiment, the description is illustrative of the invention and is not to be construed as limiting the invention. Various modifications and applications may occur to those skilled in the art without departing from the true spirit and scope of the invention as defined by the appended claims.
Claims
  • 1. A method of maximum likelihood detection of data symbols in an MPSK data burst comprising the steps of:
  • (a) identifying N MPSK data symbols s.sub.1, s.sub.2, . . . s.sub.N at times 1,2, . . . N along with L reference symbols S.sub.N+1 . . . S.sub.N+L at time N+1, where s.sub.k =e.sup.j.phi.k for k=1, . . . N, and .phi.k is uniformly distributed random phase taking value in {0,2 .pi..vertline.M, . . . 2 .pi.(M-1).vertline.M}, and for k=N+1 up to k=N+L reference symbol S.sub.k is an MPSK symbol e.sup.j0 =1;
  • (b) transmitting said N MPSK symbols and L reference symbols over an AWGN channel with unknown phase and modeled as r=se.sup.j.phi. +n, where r, s, and n are N+L length sequences whose k.sup.th components are r.sub.k, s.sub.k, and n.sub.k k=1, . . . N+L; and
  • (c) finding S.sub.1, . . . S.sub.N which maximizes: ##EQU8## where r'.sub.N+1 =r.sub.N+1 +r.sub.N+2 . . . r.sub.N+L, and L=number of reference symbols.
  • 2. The method as defined by claim 1, wherein step (c) includes:
  • (c1) defining .PHI. as the phase vector .PHI.=(.phi..sub.1, . . . .phi..sub.N+1), and .vertline.r.sub.k .vertline.>0, k=1, . . . N, and for a complex number of .gamma., let arg�.gamma.! be the angle of .gamma.;
  • (c2) let .PHI.=(.phi..sub.1, . . . .phi..sub.N+1) be the unique .PHI. for which
  • arg�r.sub.k e.sup.-j.phi.k !.epsilon.�0,2 .pi./M),
  • for k=1, . . . N+1 and
  • z.sub.k =r.sub.k e.sup.-j.theta.k ;
  • (c3) for each k, k=1, . . . N+1, calculate arg(z.sub.k), and list values in order, from largest to smallest;
  • (c4) define a function k(i) as giving a subscript k of z.sub.k for the i.sup.th list position, i=1, . . . N+1 whereby: ##EQU9## (c5) for i=1, . . . N+1, let
  • g.sub.i =z.sub.k(i),
  • and
  • for i satisfying N+1<i.ltoreq.2(N+1), define:
  • g.sub.i =e.sup.-j2 .pi./M g.sub.i-(N+1) ;
  • and
  • (c6) calculate: ##EQU10## (c7) select the largest value in step (c6).
  • 3. The method as defined by claim 2, wherein the largest value in step (c7) occurs for q=q', and further including the steps of:
  • (d) finding a phase vector .PHI. corresponding to q=q' as follows: ##EQU11##
  • 4. The method as defined by claim 3, wherein step (d) includes arranging elements .phi..sub.k(l), l=1, . . . N+1, in order of subscript value k(l), and forming the sequence .phi..sub.1, .phi..sub.2, . . . .phi..sub.N+1, as the vector .phi., the maximum likelihood sequence s.sub.1, . . . s.sub.N being s.sub.k =e.sup.-j.phi.k, k=1, . . . N, where .phi..sub.k =.phi..sub.k -.phi..sub.N+1, k=1, . . . N.
  • 5. The method as defined by claim 4, wherein N data symbols are transmitted followed by L reference symbols s.sub.N+1, . . . s.sub.N+L, where s.sub.k =e.sup.j0 =1 for k=N+1, . . . N+L, and r, s, and n are N+L length sequences.
  • 6. The method as defined by claim 5, wherein j is fixed, j.epsilon.{1, . . . N+1} and for k=1, . . . N+1, form r.sub.j *r.sub.k, and let g.sub.j,k be the remodulation of r.sub.j *r.sub.k such that g.sub.j,k .epsilon.{0,2 .pi./M} and step c6) becomes:
US Referenced Citations (4)
Number Name Date Kind
5619167 Adachi Apr 1997
5684832 Adachi et al. Nov 1997
5706313 Blasiak et al. Jan 1998
5732114 Thebault et al. Mar 1998
Non-Patent Literature Citations (3)
Entry
Divsalar, D., Simon, M.K., "Multiple-Symbol Differential Detection of MPSK," IEEE Transactions on Communications, vol. 38, No. 3, Mar. 1990.
Mackenthun, K.M., Jr., "A Fast Algorithm for Multiple-Symbol Differential Detection of MPSK," IEEE Transactions on Communications, vol. 42, No. 2/3/4, Feb./Mar./Apr. 1994.
Moher, M.L., "TCMP-A Modulation and Coding Strategy for Rician Fading Channels," IEEE Journal on Selected Areas in Communications, vol. 7, No. 9, Dec. 1989.