The present invention is directed to the determination of channel amplitude in a communication system. In addition, the present invention is directed to the construction of interference vectors for use in creating an interference canceled signal. More particularly, the present invention is directed to channel amplitude estimation and interference vector construction using complimentary methods and/or structures.
Wireless communication systems should provide for a large number of secure (or private) communication channels within their allotted frequency space. In order to achieve these goals, spread spectrum systems have been developed. In a spread spectrum type system, spreading codes are used that allow multiple channels to occupy the same frequency range. In order to successfully demodulate a channel, the spreading code and covering code used in connection with the channel must be known. When a demodulation processor is tracking a particular single path, signal paths associated with other transmitters appear to that processor as noise.
In order to provide for reliable communications, spread spectrum systems typically track multiple signal paths in connection with establishing and maintaining a communication channel between a pair of end points. The different signal paths may result from redundant signals that are provided by additional base stations and base station sectors, or from reflected or multipath versions of signals. In a typical receiver, a number (e.g., 4-6) demodulation processors or fingers are provided, and each of these fingers is assigned to track a different signal path. In order to obtain information regarding the different signal paths that are available to a receiver, a searcher demodulation processor or finger is provided. In a typical receiver, the searcher finger detects and identifies signals by pseudo-random number (PN) code offsets and signal strength. Because signal paths other than the signal paths being tracked appear as noise to a demodulation processor, the signal to noise ratio with respect to a tracked or desired signal path can be low, which can result in a communication channel with poor quality and reliability. In particular, signals from sources that are in close proximity to the receiver can drown out signals from sources that are farther away from the receiver. Accordingly, because of this “near-far” problem, signal diversity is limited. In addition to leaving communication channels more vulnerable to interruption, relatively weak signals that might otherwise be available to a receiver may lie beneath the noise floor created by other relatively strong signals.
The encoded channels broadcast by a base station generally do not interfere with one another due to the orthogonality of the covering Walsh codes or the quasi-orthogonality of the covering quasi-orthogonal functions (QOF). However, a spread spectrum communication system, such as a direct sequence, code division multiple access (DS-CDMA) system is still subject to two forms of multiple access interference on the forward link. Co-channel interference consists of multipath copies of signal paths that are delayed in time with respect to a signal path of interest. Such signals can cause interference because the orthogonality of the Walsh covering codes is lost whenever a time offset exists between two codes. Specifically, when aligned, Walsh codes form an orthogonal basis, but there may be high cross correlations when they are not aligned. Cross channel interference occurs when a combination of transmissions from more than one base station sector or base station are received at the RF front end simultaneously. Each base station sector is distinguished by a unique PN short code offset. However, the sequence has minimal, but non-zero cross-correlation properties. This manifests itself as cross-correlation interference between signals originating from different base station sectors. As a result, a signal transmitted from another base station that is received at a much greater power level is capable of masking the signal of interest due to the non-zero cross-correlation of the short code and the unaligned Walsh codes.
Methods for removing interfering signal paths from received signal streams have been developed. For example, interference cancellation is a feature incorporated into many spread spectrum receivers designed for CDMA systems, such as the cdma2000 and W-CDMA standards for wireless communications. In particular, interference cancellation receivers are a class of spread spectrum communication system receivers that have the capability to remove or reduce the interference from an interfering source or sources. Most methods of interference cancellation require the estimation of channels in the interfering signal source. Accordingly, the identity of valid channels within a signal path and the amplitudes of those channels must be estimated. Other methods, which utilize projection based methods for interference calculation require the construction of an interference vector to represent the direction of the interference from active channels within an interfering signal source, but not necessarily the amplitude of those channels.
Spread spectrum communication systems were initially developed using symbols of a single length. For example, IS-95 systems use a 64 chip symbol length. However, more recent communication standards, such as cdma2000, have introduced shorter length codes (supplemental channels) that coexist with longer codes. For example, to facilitate high-speed data transmissions, communication systems that allow symbols that are as short as four chips long for data transmission, while at the same time allowing channels utilizing symbols that are 64 chips long or more for voice communications have been developed. The use of symbols of different lengths within a single communication system has complicated the task of identifying active channels in a signal path. In addition, because the use of shorter length codes invalidates certain families of longer length codes, existing methods for identifying active channels can be inefficient when applied to systems supporting the use of multiple symbol lengths.
The fast Walsh transform is a known method for efficiently calculating the amplitudes of multiple channels within a signal path. In particular, the fast Walsh transform method can be used to calculate the amplitudes of channels that are covered using an orthogonal family of codes known as Walsh codes. However, conventional methods for applying the fast Walsh transform process have not been capable of efficiently estimating channels in connection with communication systems that support multiple symbol lengths. In addition, conventional methods have been incapable of efficiently constructing an interference vector for interference cancellation.
The present invention is directed to solving these and other problems and disadvantages of the prior art. According to an embodiment of the present invention, a fast Walsh transform is applied to amplitude information concerning an interfering signal path. In particular, the amplitude information is at a resolution corresponding to each chip of data received in connection with tracking an interfering or potentially interfering signal paths. The amplitude data is then processed using a fast Walsh transform. The data may be passed through one or more fast Walsh transform levels to identify active channels. In particular, after processing of the data at a Walsh level corresponding to a valid symbol length for data transmitted by the interfering signal path, the amplitude of each element in the set of data for that stage is compared to a threshold value. If the magnitude of an element is greater than the threshold value, that element is replaced with a zero before the data set is subjected to a next stage of processing using the fast Walsh transform. Accordingly, the present invention provides a method and apparatus by which the presence and amplitude of valid channels within a signal path produced in connection with a communication system supporting multiple valid symbol lengths can be determined.
In accordance with another embodiment of the present invention, the results of performing a fast Walsh transform at each Walsh level corresponding to a valid symbol length are applied in forming a vector for use in creating an interference canceled signal stream. Accordingly, in an embodiment of the present invention, the results of performing a fast Walsh transform at a level corresponding to a valid channel symbol length are compared to a threshold value. Individual elements of the results at that level having a magnitude that is less than the threshold are replaced by a zero, while the amplitudes of elements that exceed the threshold are left unaltered. The results of this comparison may be stored in a register. For each register containing threshold data for use in constructing an interference vector, fast Walsh transform processing is applied. In particular, each set of data is passed through a number of fast Walsh transform levels corresponding to the level from which the magnitude data was originally obtained, resulting in the creation of an interference vector. In accordance with another embodiment of the present invention, where multiple symbol lengths are supported, interference vectors formed using data from fast Walsh transform levels corresponding to valid symbol lengths are combined to form a composite interference vector. In accordance with an embodiment of the present invention, a composite interference vector is found by combining scaled interference vectors corresponding to each valid signal length. In accordance with a further embodiment of the present invention, the scaling is performed to normalize the energies within the individual interference vectors.
In accordance with another embodiment of the present invention, the fast Walsh transform processes used in connection with channel estimation and interference vector construction are implemented using shared hardware components. That is, the same components used in connection with estimating channel amplitudes can be used for constructing interference vectors.
With reference now to
The RF front end 104 down samples the radio frequency signal and separates the signal into a complex base band signal or raw signal stream 112 with in phase (I) and quadrature (Q) components. It will be recognized by those skilled in the art that the processing depicted and described in connection with the present disclosure includes both the I and Q channels, even when only one connection or signal path is depicted.
The raw signal stream 112 collected by the receiver 100 and down converted from the RF front end 104 is provided to a searcher finger 116. The searcher finger functions to scan the signal stream 112 for individually identifiable signal paths and/or multipaths. In particular, the searcher finger 116 operates to determine the path number or pseudo-random number (PN) code offset associated with each identifiable signal path. As noted above, the PN code identifies the signal path as being associated with a particular base station or base station sector. In code division multiple access (CDMA) systems, the PN code sequence is referred to as the short code.
The searcher finger 116 reports the signal paths that have been identified to a controller 120. The controller 120 may use the information provided from the searcher finger 116 to determine which signal paths to acquire and track. In general, the number of signal paths that a receiver 100 can be directed to track is limited by the number of demodulation fingers 124 provided as part of the receiver 100. In assigning a demodulation finger 124 to acquire and track a signal path, the controller 120 may provide information regarding the PN code offset, any additional time offset and the observed signal strength for the assigned signal path. In
As shown in
The cancellation controller 128 includes a number of modules. In particular, when the cancellation controller 128 determines that a signal path should be canceled, the PN code corresponding to that signal path, and the I and Q data in which the signal path is present, are fed into the quadrature phase shift key (QPSK) despreading module 132. After despreading, the carrier phase is recovered in the carrier phase recovery module 136. Carrier phase recovery may be made using a variety of methods. For example, carrier phase recovery may be performed as described in U.S. Pat. No. 7,068,706, filed Oct. 15, 2003, entitled “System and Method for Adjusting Phase”, and U.S. Provisional Patent Application Ser. No. 60/418,188, entitled “Carrier Phase Recovery Circuit,” filed Oct. 15, 2002, assigned to the assignee of the present invention, the entire disclosures of which are incorporated herein by reference. The PN stripped and phase stripped data stream obtained after carrier phase recovery is then provided to the channel estimation/interference vector generation module 140. The channel estimation/interference vector generation module 140 determines the amplitude of active channels in the signal paths to be cancelled, and produces an interference vector that may be provided to a cancellation operation module 144. The cancellation operation module 144 uses the interference vector provided by the channel estimation/interference vector generation module 140 to remove the identified interfering signal path from a signal stream or streams 148 provided to one or more demodulation fingers 124. A demodulation finger 124 receiving the interference canceled signal may then demodulate data transmitted by a channel of a desired signal path.
As illustrated in
With reference now to
Accordingly, as illustrated, stage one 204 includes a number of fast Walsh transform steps 212. In the exemplary embodiment illustrated in
Initially, the despread carrier phase recovered received signal is passed through the first fast Walsh transform step 212a. In the present example, the described fast Walsh transform steps are performed on a set of data comprising an amplitude or magnitude for each chip within a segment of data having a length equal to the longest valid symbol length. Accordingly, in the present example, each fast Walsh transform step 212 is performed on a set of data containing 64 different magnitudes.
As can be appreciated by one of skill in the art, the first fast Walsh transform step comprises 64 addition or subtraction operations. More specifically, the first fast Walsh transform step 212a comprises adding the first element a1 to the second element a2 to obtain a new first element, subtracting the second element a2 from the first element a1 to obtain a new second element, adding the third element a3 to the fourth element a4, to obtain a new third element, subtracting the fourth element a4 from the third element a3 to obtain a new fourth element, and so on, until all 64 elements within the set have been processed and 64 new values calculated. In the present example, the communication system does not support symbols that are less than four chips long. Accordingly, the results of performing the first fast Walsh transform step or circuit 212a are passed directly to the second fast Walsh transform step 212b
As can also be appreciated by one of skill in the art, in the second fast Walsh transform step 212b, there are also 64 additions or subtractions. The calculations included in the second fast Walsh transform step 212b are performed on the 64 magnitudes or elements resulting from the first Walsh transform step 212a. In particular, the first element a1 is added to the third element a3 to obtain a new first element, the third element a3 is subtracted from the first element a1 to obtain a new second element, the second element a2 is added to the fourth element a4 to obtain a new third element, the fourth element a4 is subtracted from the second element a2 to obtain a new fourth element, and so on, until each element within the set has been included in one addition, and one subtraction calculation as part of the second fast Walsh transform stage 212b and a new value has been calculated for each included element.
In the present example, the communication system supports symbols having a length as short as four chips. The minimum length of a valid symbol used in connection with a communication system is known from the standards, and therefore is typically preconfigured for a given receiver 100. Alternatively, such information may be provided by a base station or other network component in communication with a receiver 100. Because in the present example symbols as short as four chips can be used by a channel, and because any such channels can be determined after two fast Walsh transform steps, the magnitudes obtained following the two fast Walsh transform steps are considered. In particular, each element within the set of calculated values or magnitudes is compared to a threshold value in a first comparator or comparison block 220a. The threshold against which channel strengths are tested in connection with channel determination may be equal to or derived from a magnitude of a channel that is known to be present as part of the interfering signal paths. For example, the average magnitude of a received channel that, according to the applicable standards is always present in a signal path may be used to set the threshold value. The threshold may also be set to a preselected value or to a fixed value if a criteria for the magnitude for a channel that is present is developed.
Following the comparison, magnitudes within the set of values that are found to be equal to or greater than (or, alternatively, greater than) the threshold magnitude are stored in a first memory block 224a. Zero values are entered or stored in the first memory block 224a for those elements that are less than (or, alternatively, not greater than) the threshold magnitude. The values (i.e., channel amplitudes) stored in first memory block 224a are related to an active channel or channels using symbols that are four chips long to transmit data. Furthermore, as described herein, the values stored in the memory blocks 224 provided as part of stage one 204 of the channel estimation/interference vector generation module 140 comprise an interference vector precursor, and will be used in stage two 208 to calculate the interference vector. The elements or channel amplitudes determined in the first comparison block 220a to be lower than (or, alternatively, less than or equal to) the threshold are stored in memory block 228 as a channel estimate. Zero values are entered or stored in memory block 228 for those elements that are equal to or greater than (or, alternatively, greater than) the threshold magnitude. Accordingly, as will be appreciated from the present disclosure, the channel estimation/interference vector generation module 140 will be prevented from creating interference vectors for invalid, longer length channels. That is, an interference vector would not be created that includes or accounts for channels using four longer length symbols that are invalidated by the use of a shorter length (e.g., four chip) symbol.
The values comprising stored magnitudes or zero values following the first comparison step 220a stored in memory 228 are then provided to the third fast Walsh transform step 212c. As can be appreciated by one of skill in the art, as part of the third fast Walsh transform step 212c, the first element a1 is added to the fifth element a5 to obtain a new first element, the fifth element a5 is subtracted from the first element a1 to obtain a new second element, the second element a2 is added to the sixth element a6 to obtain a new third element, the sixth element a6 is subtracted from the second element a2 to obtain a new fourth element, and so on, until each of the magnitudes within the set have been included in one addition and one subtraction operation and a new magnitude has been calculated for each element.
The results of the third fast Walsh transform step 212c are then compared to the threshold at a second comparison step 220b. Each magnitude within the results of the third fast Walsh transform that is greater than or equal to the threshold as stored in a second memory block 224b. Zero values are stored in memory block 224b for those elements (i.e., those magnitudes) having a magnitude that is not greater than or equal to the threshold. Element magnitudes that are less than the threshold are stored in the memory block 228, and zero values are stored in the memory block 228 for elements having a magnitude that is greater than the threshold. The value stored in the memory block 228 after the second comparison step 220b may replace the element magnitudes or values stored in the memory block 228 following the previous or first comparison step 228.
The values comprising stored magnitudes or zero values following the second comparison step 220b are then provided to the fourth fast Walsh transform step 212d. As can be appreciated by one of skill in the art, as part of the fourth fast Walsh transform step 212d, the first element a1 is added to the ninth element a9 to obtain a new first element, the ninth element a9 is subtracted from the first element a1 to obtain a new second element, the second element a2 is added to the tenth element a10 to obtain a new third element, the tenth element a10 is subtracted from the second element a2 to obtain a new fourth element, and so on, until each of the magnitudes within the set have been included in one addition and one subtraction operation and a new magnitude has been calculated for each element.
The results of the fourth fast Walsh transform step 212d are then compared to the threshold at a third comparison step 220c. Each magnitude that is greater than or equal to the threshold is stored in a third memory block 224c. Zero values are stored in memory block 224c for those elements having a magnitude that is not greater than or equal to the threshold. Element magnitudes that are less than the threshold are stored in the memory block 228, and zero values are stored in the memory block 228 for elements having a magnitude that is greater than the threshold. The values stored in the memory block 228 after the third comparison step 220c may replace the element magnitudes or values stored in the memory block 228 following the second comparison step 220b.
The values stored in the memory block 228 following the fourth fast Walsh transform step 212d and the third comparison step 224c are then provided to the fifth fast Walsh transform step 212e for processing. As can be appreciated by one of skill in the art, the fifth fast Walsh transform step 212e, comprises adding the first element a1 to the seventeenth element a17 to obtain a new first element, subtracting the seventeenth element a17 from the first element a1 to obtain a new second element, adding the second element a2 to the eighteenth element a18 to obtain a new third element, subtracting the eighteenth element a18 from the second element a2 to obtain a new fourth element, and so on, until each of the elements has been included in one addition and one subtraction operation, and a new magnitude has been calculated for each of the elements.
The results of performing the fifth fast Walsh transform step 212e are then compared to the threshold value in a fourth comparison step 220d. Elements with amplitudes that are equal to or greater than the threshold are stored in memory block 224d, while amplitudes for elements that are lower than the threshold are changed to zero in memory block 224d. The values of element amplitudes that are less than the threshold are stored in memory block 228, while elements having amplitudes that are equal to or exceed the threshold are stored in the memory block 228 with a value of zero.
The values stored in memory block 228 following the fifth fast Walsh transform step 212e and the fourth comparison step 220d are then provided to the sixth fast Walsh transform step 212f for processing. As can be appreciated by one of skill in the art, the sixth fast Walsh transform step 212f comprises adding the first element a1 to the thirty-third element a33 to obtain a new first element, subtracting the thirty-third element a33 from the first element a1 to obtain a new second element, adding the second element a2 to the thirty-fourth element a34 to obtain a new third element, subtracting the thirty-forth element a34 from the second element a2 to obtain a new fourth element, and so on, until each of the elements has been included in one addition and one subtraction operation, and a new magnitude has been calculated for each of the elements.
The results of performing the sixth fast Walsh transform step 212f are then compared to the threshold in a fifth comparison step 220e. In accordance with the embodiment illustrated in
Following the completion of the channel determination steps included as part of stage one 204, amplitude information collected in connection with valid channels can be selectively provided to stage two 208 for construction of a composite interference vector 216. In particular, a multiplexer 230 may provide channel amplitude data from a selected one of the memory blocks 224, 228. The amplitude data is then processed using the number of fast Walsh transform steps corresponding to the level from which the amplitude information was obtained.
Accordingly, the amplitude information with respect to the magnitudes stored in the first memory block 224a are provided to first fast Walsh transform step or circuit 212a′ and second fast Walsh transform step 212b′. The first 212a′ and second 212b′ fast Walsh transform steps may be performed using the same componentry as was used in connection with performing the first fast Walsh transform step 212a and second fast Walsh transform step 212b as part of the stage one 204 processing. Because the data stored in block 224a is related to channels using symbols of length four, that data is only processed by fast Walsh transform steps one 212a′ and two 212b′. The results obtained after the second fast Walsh transform step 212b′ has been performed on the data from memory block 224a is stored as interference vector one (IV1) 228a, for example in first memory block 224a.
The multiplexer 230 may next be operated to provide the magnitudes stored in the second memory 224b to the second stage 208. The set of magnitudes or values stored in the second memory 224b were passed through three steps or levels of fast Walsh processing 212. Accordingly, in stage two 208 these values will be passed through three fast Walsh transform steps: fast Walsh transform step one 212a′, fast Walsh transform step two 212b′, and fast Walsh transform step three 212c′. The results obtained after performing the third step of fast Walsh processing 212c′ may then be stored as interference vector two (IV2) 232b, for example in the second memory block 224b.
The data stored in memory block 224c is processed by passing that data through four fast Walsh transform steps 212a′-d′. The results of that processing are stored as interference vector 3 (IV3) 232c, for example in memory 224c.
Data stored in memory block 224d is processed by passing that data through five fast Walsh transform sets 212a′-e′. The results of that processing are stored as interference vector 4 (IV4) 232d, for example in memory block 224d.
The data that was stored in memory block 228 following the sixth step of fast Walsh transform processing 212f and the fifth comparison step 220e may then be provided to the second stage 208 by the multiplexer 230. The data is passed through six fast Walsh transform steps 212a′-f′, and stored, for example in memory 228 as interference vector 5 (IV5) 232e.
The individual interference vectors 232a-e may then be added in summation block 236 to form the composite interference vector 216. In accordance with the embodiment of the present invention, each of the interference vectors 232 is scaled. In particular, each interference vector 232 is multiplied by a value such that the amount of energy represented by the set of magnitudes included in each of the interference vectors 232 is normalized. Accordingly, the first interference vector 232a may be multiplied by sixteen to obtain a first scaled interference vector, the second interference vector 232b is multiplied by eight to obtain a second scaled interference vector, the third interference vector 232c is multiplied by four to obtain a third scaled interference vector, the fourth interference vector 232d is multiplied by two to obtain a fourth scaled interference vector, and the fifth interference vector 232e is multiplied by one obtain a fifth scaled interference vector. These scaled interference vectors are then added together to obtain the composite interference vector 216.
As can be appreciated from the description provided herein, various processes are repeated in stages one 204 and two 208. Such processes may use or share the same hardware components and/or processing modules. Furthermore, the various stages can share hardware elements and/or processing modules. In particular, the hardware and/or processing modules used in connection with implementing the fast Walsh transform steps 212 as part of stage one 204 processing can also be used in connection with the fast Walsh transform steps 212′ completed in connection with stage two 208 processing. Furthermore, as described above, various memory blocks and registers 224, 228 can be used in connection with both stage one 204 and stage two 208.
With reference now to
A single element from each of the multiplexers 304, 308 is provided at a corresponding output 316 or 320 in response to a select signal 324. In general, the select signal 324 is generated by the channel estimation/interference vector generation module 140, or by some other modular aspect of the cancellation controller 128, to provide the proper pair of elements at the outputs 316, 320. The outputs 316, 320 of the multiplexers 304, 308 are provided to an adder—subtractor 324. The adder—subtractor comprises an adder that provides a first output 328 comprising a value resulting from the addition of the value output by the first multiplexer 304 on output line 316, and the value output by the second multiplexer 308 on input line 320. The adder—subtractor 324 additionally includes a subtractor that provides as an output the subtraction of the value provided by the second multiplexer 308 from the value provided by the first multiplexer 308 on second output line 332.
In accordance with an embodiment for use in connection with a communication system having a maximum symbol length of 64 chips, four fast Walsh transform circuits 300 may be used to obtain a complete set of 64 transform values. The results of the addition and subtraction operations available at the outputs 328, 332 may then be further processed by additional fast Walsh transform steps, and/or compared to a threshold as described elsewhere herein.
With reference now to
With reference now to
Following channel estimation, channel determination and threshold comparison is performed (step 508). Channel determination and threshold comparison 508 includes determining whether a particular channel is actually present in the signal paths. As described herein, channel determination includes a step of comparing a received magnitude for a channel with a threshold value. Various algorithms may be used for determining the threshold. A channel that is known to be always present in a signal path, as provided by the applicable standards, is usually chosen for determining the threshold. For example, in a CDMA 2000 receiver, the average magnitude of the synchronization channel (averaged over an arbitrary number of symbols) may be used to determine the threshold.
According to the present invention, following channel determination, interference vector construction is performed (step 512). Furthermore, the present invention provides for the construction of a composite interference vector. The composite interference vector may be constructed as described in U.S. Provisional Patent Application No. 60/331,480, entitled “Construction of an Interference Matrix for a Coded Signal Processing Engine,” filed Nov. 16, 2001, the entire disclosure of which is incorporated herein by reference.
With reference now to
If the Walsh level under consideration does have valid channel data, a determination is next made as to whether the magnitude of any valid channel (i.e., the magnitudes of any of the elements in the set under consideration) is greater than a threshold value (step 620). If any valid channel is determined to have a magnitude greater than the threshold, those channel magnitudes or amplitudes are stored (step 624). After storing channel amplitudes greater than the threshold (step 624), or after determining that no valid channels are greater than the threshold, a determination is made as to whether any valid channels have a magnitude that is less than the threshold (step 628). The magnitude of any valid channels that is less than the threshold is stored (step 632). After storing the amplitudes of any channels that are less than the threshold, or after determining that there are no valid channels with a magnitude that is less than the threshold, a determination is made as to whether there are any more Walsh steps to be performed (636). In general, the total number of Walsh steps to be performed is determined by the maximum valid symbol length used in connection with the applicable communication system. For example, for a communication system in which a maximum valid symbol length is 64 chips, 6 fast Walsh transform steps must be performed to complete channel determination. Accordingly, if Walsh steps remain to be performed, the Walsh step is incremented (step 640). The channel amplitudes that are less than the threshold are then read into the next Walsh step (step 644) and the process returns to step 608. As can be appreciated from the description provided herein, the magnitude of channels that were determined to exceed the threshold may be set to zero at step 644 in connection with the next fast Walsh transform step. If no more Walsh transform steps remain to be performed, the system proceeds to interference vector construction (step 640) (see
With reference now to
If at step 716 it is determined that j is equal to zero, the results of the Walsh step or steps that were performed on the channel amplitudes under consideration are stored (step 724). For example, the results may be stored in a memory block as an interference vector 232. At step 728, a determination is made as to whether additional sets of channel amplitudes remain to be processed. If remaining sets of channel amplitudes remain to be processed, the next set of amplitudes stored for interference vector construction is obtained (step 732) and the process returns to step 704. If no additional sets of channel amplitudes remain to be processed, the process ends (step 736).
With reference now to
At step 812, a determination is made as to whether there are additional interference vectors for which a coefficient remains to be calculated. If there are additional interference vectors, the next interference vector is obtained (step 816) and the process returns to step 804. If a coefficient has been calculated for all of the interference vectors, each interference vector is multiplied by the corresponding coefficient, and the resulting products are added to obtain a composite interference vector (step 820). The composite interference vector may then be applied to a signal stream, to create an interference cancel signal stream.
As can be appreciated by one of skill in the art, the various comparison steps generally result in a selected one of two possible events occurring. At various points in the description, a first action is described as being taken if a value under consideration is equal to or greater than a threshold value, and a second action is taken if the value under consideration is less than the threshold value. However, as a matter of design choice, the first event could be taken if the value under consideration is found to be greater than the threshold, and the second event could be taken if the value under consideration is found to be less than or equal to the threshold. That is, either a first or a second result is obtained from the comparison, which determines an action or event to be taken with respect to the element, if any.
Although the description provided herein has discussed exemplary communication systems having a maximum symbol length of 64 chips and a minimum symbol length of 4 chips, it should be appreciated that the present invention is not limited to use with such systems. In particular, the present invention may be applied to any spread spectrum communication system for which channel estimation is desired. For example, a communication system that supported symbol lengths of up to 128 chips could be accommodated by an additional fast Walsh transform step and an additional memory register. Furthermore, the present invention may be applied to any communication system for which the generation of interference vectors and/or a composite interference vector for interference cancellation purposes is desired.
As can be appreciated by one of skill in the art, aspects of the present invention may be implemented in various forms. For instance, the present invention may be implemented by hard or soft programming code running on a suitable processor having access to memory. Furthermore, the present invention may be implemented as an application specific integrated circuit (ASIC), or a field programmable gate array (FPGA). Furthermore, aspects of the present invention may be implemented using hard coded or dedicated logic circuits. For example, as described herein, multiplexers, adders, subtractors, comparators, memory and/or memory registers may be implemented in accordance with the present invention using discrete and/or integrated circuit components.
In addition, the present invention is not limited to voice communication systems. For example, embodiments of the present invention may be applied to any multiple channel system, including radio locating systems, such as the global positioning system (GPS), multi-media communications, and data transmission systems.
The foregoing discussion of the invention has been presented for purposes of illustration and description. Further, the description is not intended to limit the invention to the form disclosed herein. Consequently, variations and modifications commensurate with the above teachings, within the skill and knowledge of the relevant art, are within the scope of the present invention. The embodiments described hereinabove are further intended to explain the best mode presently known of practicing the invention and to enable others skilled in the art to utilize the invention in such or in other embodiments and with various modifications required by their particular application or use of the invention. It is intended that the appended claims be construed to include the alternative embodiments to the extent permitted by the prior art.
This application claims the benefit of U.S. Provisional Application No. 60/418,187, entitled “Method for Channel Amplitude Estimation and Interference Vector Construction,” filed Oct. 15, 2002, the entire disclosure of which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
3742201 | Groginsky | Jun 1973 | A |
4088955 | Baghdady | May 1978 | A |
4309769 | Taylor, Jr. | Jan 1982 | A |
4359738 | Lewis | Nov 1982 | A |
4601046 | Halpern | Jul 1986 | A |
4665401 | Garrard et al. | May 1987 | A |
4670885 | Parl et al. | Jun 1987 | A |
4713794 | Byington et al. | Dec 1987 | A |
4780885 | Paul et al. | Oct 1988 | A |
4856025 | Takai | Aug 1989 | A |
4893316 | Janc et al. | Jan 1990 | A |
4922506 | McCallister et al. | May 1990 | A |
4933639 | Barker | Jun 1990 | A |
4965732 | Roy, III et al. | Oct 1990 | A |
5017929 | Tsuda | May 1991 | A |
5099493 | Zeger et al. | Mar 1992 | A |
5105435 | Stilwell | Apr 1992 | A |
5109390 | Gilhousen et al. | Apr 1992 | A |
5119401 | Tsujimoto | Jun 1992 | A |
5136296 | Roettger et al. | Aug 1992 | A |
5151919 | Dent | Sep 1992 | A |
5218359 | Minamisono | Jun 1993 | A |
5218619 | Dent | Jun 1993 | A |
5220687 | Ichikawa et al. | Jun 1993 | A |
5224122 | Bruckert | Jun 1993 | A |
5237586 | Bottomley | Aug 1993 | A |
5263191 | Dickerson | Nov 1993 | A |
5280472 | Gilhousen et al. | Jan 1994 | A |
5305349 | Dent | Apr 1994 | A |
5325394 | Bruckert | Jun 1994 | A |
5343493 | Karimullah | Aug 1994 | A |
5343496 | Honig et al. | Aug 1994 | A |
5347535 | Karasawa et al. | Sep 1994 | A |
5353302 | Bi | Oct 1994 | A |
5377183 | Dent | Dec 1994 | A |
5386202 | Cochran et al. | Jan 1995 | A |
5390207 | Fenton et al. | Feb 1995 | A |
5394110 | Mizoguchi | Feb 1995 | A |
5396256 | Chiba et al. | Mar 1995 | A |
5437055 | Wheatley, III | Jul 1995 | A |
5440265 | Cochran et al. | Aug 1995 | A |
5448600 | Lucas | Sep 1995 | A |
5481570 | Winters | Jan 1996 | A |
5506865 | Weaver, Jr. | Apr 1996 | A |
5513176 | Dean et al. | Apr 1996 | A |
5533011 | Dean et al. | Jul 1996 | A |
5553098 | Cochran et al. | Sep 1996 | A |
5602833 | Zehavi | Feb 1997 | A |
5644592 | Divsalar | Jul 1997 | A |
5736964 | Ghosh et al. | Apr 1998 | A |
5787130 | Kotzin et al. | Jul 1998 | A |
5844521 | Stephens et al. | Dec 1998 | A |
5859613 | Otto | Jan 1999 | A |
5872540 | Casabona | Feb 1999 | A |
5872776 | Yang | Feb 1999 | A |
5894500 | Bruckert et al. | Apr 1999 | A |
5926761 | Reed et al. | Jul 1999 | A |
5930229 | Yoshida et al. | Jul 1999 | A |
5953369 | Suzuki | Sep 1999 | A |
5978413 | Bender | Nov 1999 | A |
5995499 | Hottinen et al. | Nov 1999 | A |
6002727 | Uesugi | Dec 1999 | A |
6014373 | Schilling et al. | Jan 2000 | A |
6018317 | Dogan et al. | Jan 2000 | A |
6032056 | Reudink | Feb 2000 | A |
6088383 | Suzuki et al. | Jul 2000 | A |
6101385 | Monte et al. | Aug 2000 | A |
6104712 | Robert et al. | Aug 2000 | A |
6115409 | Upadhyay et al. | Sep 2000 | A |
6127973 | Choi et al. | Oct 2000 | A |
6131013 | Bergstrom et al. | Oct 2000 | A |
6137788 | Sawahashi et al. | Oct 2000 | A |
6141332 | Lavaen | Oct 2000 | A |
6154443 | Huang et al. | Nov 2000 | A |
6157685 | Tanaka et al. | Dec 2000 | A |
6157842 | Kaisson et al. | Dec 2000 | A |
6157847 | Buehrer et al. | Dec 2000 | A |
6163696 | Bi et al. | Dec 2000 | A |
6166690 | Lin et al. | Dec 2000 | A |
6172969 | Kawakami et al. | Jan 2001 | B1 |
6173008 | Lee | Jan 2001 | B1 |
6175587 | Madhow et al. | Jan 2001 | B1 |
6192067 | Toda et al. | Feb 2001 | B1 |
6201799 | Huang et al. | Mar 2001 | B1 |
6215812 | Young et al. | Apr 2001 | B1 |
6219376 | Zhodzishsky et al. | Apr 2001 | B1 |
6222828 | Ohlson et al. | Apr 2001 | B1 |
6230180 | Mohamed | May 2001 | B1 |
6233229 | Ranta et al. | May 2001 | B1 |
6233459 | Sullivan et al. | May 2001 | B1 |
6240124 | Wiedeman et al. | May 2001 | B1 |
6252535 | Kober et al. | Jun 2001 | B1 |
6256336 | Rademacher et al. | Jul 2001 | B1 |
6259688 | Schilling et al. | Jul 2001 | B1 |
6263208 | Chang et al. | Jul 2001 | B1 |
6266529 | Chheda | Jul 2001 | B1 |
6275186 | Kong | Aug 2001 | B1 |
6278726 | Mesecher et al. | Aug 2001 | B1 |
6282231 | Norman et al. | Aug 2001 | B1 |
6282233 | Yoshida | Aug 2001 | B1 |
6285316 | Nir et al. | Sep 2001 | B1 |
6285319 | Rose | Sep 2001 | B1 |
6285861 | Bonaccorso et al. | Sep 2001 | B1 |
6295311 | Sun | Sep 2001 | B1 |
6301289 | Bejjani et al. | Oct 2001 | B1 |
6304618 | Hafeez et al. | Oct 2001 | B1 |
6308072 | Labedz et al. | Oct 2001 | B1 |
6310704 | Dogan et al. | Oct 2001 | B1 |
6317453 | Chang | Nov 2001 | B1 |
6321090 | Soliman | Nov 2001 | B1 |
6324159 | Mennekens et al. | Nov 2001 | B1 |
6327471 | Song | Dec 2001 | B1 |
6330460 | Wong et al. | Dec 2001 | B1 |
6333947 | van Heeswyk et al. | Dec 2001 | B1 |
6351235 | Stilp | Feb 2002 | B1 |
6351642 | Corbett et al. | Feb 2002 | B1 |
6359874 | Dent | Mar 2002 | B1 |
6362760 | Kober et al. | Mar 2002 | B2 |
6363104 | Bottomley | Mar 2002 | B1 |
6377636 | Paulraj et al. | Apr 2002 | B1 |
6380879 | Kober et al. | Apr 2002 | B2 |
6385264 | Terasawa | May 2002 | B1 |
6396804 | Odenwalder | May 2002 | B2 |
6404760 | Holtzman et al. | Jun 2002 | B1 |
6430216 | Kober et al. | Aug 2002 | B1 |
6459693 | Park et al. | Oct 2002 | B1 |
6501788 | Wang | Dec 2002 | B1 |
6515980 | Bottomley | Feb 2003 | B1 |
6570909 | Kansakoski | May 2003 | B1 |
6574270 | Madkour | Jun 2003 | B1 |
6580771 | Kenney | Jun 2003 | B2 |
6584115 | Suzuki | Jun 2003 | B1 |
6590888 | Ohshima | Jul 2003 | B1 |
6668011 | Li et al. | Dec 2003 | B1 |
6680727 | Butler | Jan 2004 | B2 |
6798737 | Dabak | Sep 2004 | B1 |
6801565 | Bottomley | Oct 2004 | B1 |
20010003443 | Velazquez et al. | Jun 2001 | A1 |
20010020912 | Naruse et al. | Sep 2001 | A1 |
20010021646 | Antonucci et al. | Sep 2001 | A1 |
20010046266 | Rakib et al. | Nov 2001 | A1 |
20020001299 | Petch et al. | Jan 2002 | A1 |
20020051433 | Affes et al. | May 2002 | A1 |
20020172173 | Schilling et al. | Nov 2002 | A1 |
20020176488 | Kober et al. | Nov 2002 | A1 |
20020191676 | O'Hagan | Dec 2002 | A1 |
20030053526 | Reznik | Mar 2003 | A1 |
Number | Date | Country |
---|---|---|
4201439 | Jul 1993 | DE |
4326843 | Feb 1995 | DE |
4343959 | Jun 1995 | DE |
0558910 | Jan 1993 | EP |
0610989 | Jan 1994 | EP |
2280575 | Feb 1995 | GB |
2000-13360 | Jan 2000 | JP |
WO 9312590 | Jun 1995 | WO |
Number | Date | Country | |
---|---|---|---|
20040098433 A1 | May 2004 | US |
Number | Date | Country | |
---|---|---|---|
60418187 | Oct 2002 | US |