The present invention pertains to the field of communications. More particularly, the present invention relates to identifying sources of interference.
Communication networks are common. Most communication networks experience degradation in transmitted signals. This degradation may be from signal loss directly, such as smearing of the signal through the medium, loss of signal strength, etc. Another source of degradation is noise. Noise may be wideband, narrowband, Gaussian, colored, etc. Another source of signal degradation may be from other signals. Often this type of degradation or interference is called crosstalk (also cross-talk).
Crosstalk refers to the case signals become superimposed upon each other. The signals may be superimposed by electromagnetic (inductive) and/or electrostatic (capacitive) coupling in wireline networks. Signals from adjacent transmitters may also be superimposed over the air in wireless networks. Also, signals from adjacent frequency bands or wavelengths may be superimposed in cable and optical networks respectively. Crosstalk may come from a variety of physical sources and/or properties, such as bundles of twisted pairs that may be capacitively coupled. In bundles of wires, crosstalk may be reduced by the use of shielded cables or increasing the distance between the signal carrying lines. In wireless and optical networks, crosstalk may be reduced by increasing the transmitter and wavelength spacing respectively. Shielded cables are more expensive than twisted pair and so this results in increased cost. Increasing the distance between conductors would result in an increased cable bundle size that may present a space problem. Similarly, increasing the distance between transmitters or wavelengths in wireless and optical networks reduces the system's capacity. Thus, signal crosstalk is a problem because it degrades communications. For this reason, the accurate characterization of the interfering sources may be useful in the analysis, diagnosis and ultimately mitigation of the interference.
A method and apparatus for identification of interference sources are disclosed. Other features of the present invention will be apparent from the accompanying drawings and from the detailed description that follows.
The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
A method and apparatus for identifying interference sources are described. For purposes of discussing and illustrating the invention, several examples will be given in the context of a wireline communication system, such as DSL. However, one skilled in the art will recognize and appreciate that interference, for example, crosstalk is a problem in wired and wireless communications and that the techniques disclosed are applicable in these areas as well.
In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be evident, however, to one skilled in the art that the present invention may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that logical, mechanical, electrical, and other changes may be made without departing from the scope of the present invention.
Some portions of the detailed descriptions that follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of acts leading to a desired result. The acts are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The present invention can be implemented by an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general-purpose computer, selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method. For example, any of the methods according to the present invention can be implemented in hard-wired circuitry, by programming a general-purpose processor or by any combination of hardware and software. One of skill in the art will immediately appreciate that the invention can be practiced with computer system configurations other than those described below, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, DSP devices, network PCs, minicomputers, mainframe computers, and the like. The invention can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. The required structure for a variety of these systems will appear from the description below.
The methods of the invention may be implemented using computer software. If written in a programming language conforming to a recognized standard, sequences of instructions designed to implement the methods can be compiled for execution on a variety of hardware platforms and for interface to a variety of operating systems. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein. Furthermore, it is common in the art to speak of software, in one form or another (e.g., program, procedure, application . . . ), as taking an action or causing a result. Such expressions are merely a shorthand way of saying that execution of the software by a computer causes the processor of the computer to perform an action or produce a result.
It is to be understood that various terms and techniques are used by those knowledgeable in the art to describe communications, protocols, applications, implementations, mechanisms, etc. One such technique is the description of an implementation of a technique in terms of an algorithm or mathematical expression. That is, while the technique may be, for example, implemented as executing code on a computer, the expression of that technique may be more aptly and succinctly conveyed and communicated as a formula, algorithm, or mathematical expression. Thus, one skilled in the art would recognize a block denoting A+B=C as an additive function whose implementation in hardware and/or software would take two inputs (A and B) and produce a summation output (C). Thus, the use of formula, algorithm, or mathematical expression as descriptions is to be understood as having a physical embodiment in at least hardware and/or software (such as a computer system in which the techniques of the present invention may be practiced as well as implemented as an embodiment).
A machine-readable medium is understood to include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine-readable medium includes read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.); etc.
Overview of General Communication Network
The present invention is applicable to a variety of communication systems, for example: wireline, wireless, cable, and optical.
For illustration purposes and in order not to obscure the present invention, an example of a communication system that may implement the present invention, in one embodiment, is given in the area of DSL communication systems. As such, the following discussion, including
Overview of DSL Example
DSL is to be understood to refer to a variety of Digital Subscriber Line (DSL) standards that, even now, are evolving. Each DSL standard will be referred to as a DSL service type. At the present time, DSL service types include, but are not limited to, ADSL, SDSL, HDSL, and VDSL (Asymmetrical, Symmetrical, High speed, and Very high speed DSL respectively).
For example,
In order to illustrate the present invention, as mentioned above, the use in an DSL system will be described and discussed, however as also mentioned above, one is to understand that one of ordinary skill in the art will recognize that the techniques presented are not limited to DSL and may be used in all manner of communication both wired and wireless.
Description of Received Signal
In order to fully describe the present invention techniques, details relating to the signal received at the input of the modem will be described. While one skilled in the art will consider this a review, it affords the reader use of a consistent terminology and symbol usage for denoting aspects of the invention. The structure of the received signal is depicted in
To facilitate the description of the invention, we will focus our explanation on a specific type of disturbers. In particular, we will concentrate on pulse amplitude modulation (PAM) crosstalk disturbers. However, it will be clear to one skilled in the art that the same procedure can be applied to other crosstalk sources and is not limited to any particular modulation technique. Crosstalk sources such as quadrature amplitude modulation (QAM), carrierless amplitude and phase modulation (CAP), etc, or any mixture of modulations may also be analyzed through the same procedure.
The received signal y(t) generally consists of a large number of components contributed from various sources of signal and interference.
y(t)=ymain(t)+ydist(t)ydist(t)=ypam(t)+v(t) (1)
where the signal ydist(t) contains the contribution of all the possible disturbers. We will refer to this signal as the aggregated disturbance signal. The aggregated disturbance signal can be decomposed into two terms: Ypam(t) contains the contribution of the PAM signals only, and v(t) represents the unmodeled noise.
Of particular interest is the signal ypam(t) which contains the disturber signals which we wish to characterize. Assume that there are J PAM disturbers that are explicitly modeled in the received signal. Then
and each individual PAM signal is
where sj(k) represents the transmitted PAM sequence of the j-th disturber through an overall co-channel impulse response hj(t) and with symbol period Tj. Finally, the received signal sampled at a sampling rate Ts is
where
The noise signal has little structure and is the simplest of the three components to describe. The sampled noise signal
v(n)=v(t)|t=nT, (6)
may be modeled as additive Gaussian noise the color of which is characterized by the power spectral density of the signal v(t). In other cases, the noise term can model other interfering signals that will not be actively characterized like impulsive noise, AM radio interference etc.
Last, but not least, the main signal ymain(n) may be present in the received signal. If the service type on the main line is the same as the service type on the disturber lines, then the main signal will have an identical description with the one given above for each disturber signal. If the service type on the main line is for example an ADSL service, then the main signal will employ DMT modulation and its description will be different (for details on the description of a DMT main signal see co-pending patent application Ser. No. 09/710,579 titled “Method and Apparatus for Mitigation of Disturbers in Communication systems” assigned to the assignee herein and filed on even date herewith. In several cases the receiving modem may be able to force the modem transmitting on the same line to silence through the use of an appropriate command. In that situation there is no main signal component in the received signal and ymain(n)=0. In any case, the main signal does not play an important role in the disturber characterization process and its exact description is not required in the current context to understand the present invention. In fact, the main signal is removed from the received signal before the identification proceeds as described next.
Signal Characterization Procedure
Now that the received signal has been described, an overview of the steps that occur during identification time will be discussed. There are four main steps:
Detection of service types present is a technique that determines the frequency regions with significant disturber energy. Since there are a large number of possible baud rates that may impair the main line, it is not realistically feasible at this time to try each single rate in order to determine if a service type is present or not. Therefore, an initial coarse selection of the possible frequency regions containing disturber energy accelerates the entire identification process. The outcome of this process is a collection of data rates which contribute disturber energy to the received signal.
Each data rate determined from the above process represents a possible disturber service type present in the transmission. However, several disturbers may correspond to the same service type and/or data rate. Once the possible disturber data rates and/or service types are determined, the accurate baud rate and co-channel estimation steps are repeated for each identified service type.
Note that due to oscillator differences, the actual timing signal used by the disturber generation may not be synchronized with the main channel timing signal. For example, crystal oscillators are known to differ from the nominal frequency by as much as 100 parts per million. However, in order to obtain accurate co-channel estimation, we estimate the difference between the actual PAM baud rate and the nominal one. This is done during the baud rate estimation step.
The next step during identification is the detection of the service types present 604 in the signal. Next is a sequence of three major steps that may be related for each service type present 610. The first step in the three major steps is that of a baud rate estimation 606, followed by the second step, a setup of the co-channel identification procedure 607, and the third step is an initial co-channel identification 608 using symbols embedded in the signal that are known a priori. The result after step 608 is an initial model of the co-channel. If more service types remain unprocessed, then for each service type present 610 the steps 606, 607, and 608 are repeated. When all service types present have been processed the result is a list of models 612. This list of models 612 may be used to create, construct, modify, and/or design a compensation system. Alternatively, the list of models may be used to analyze the crosstalk disturbance of a particular communication channel.
The list of models 612 can be further refined during a final co-channel estimation 614. Finally, when dealing with long observation periods, time varying co-channels, etc., a parameter adaptation procedure 616 may be advantageous to implement.
Next, we will describe parts of the identification process in more detail.
Service Type Identification and Baud Rate Estimation
Existing baud rate estimation techniques for single disturbers use nonlinearities to obtain a periodic signal with a period that is the desired baud rate, and then use a Phase Lock Loop (PLL) to track small differences. However these techniques require good SNR levels in order to detect small phase errors, and they cannot be applied when several signals with similar baud rates and energy levels are present at the same time. To circumvent some of these problems, the present invention exploits the cyclostationary properties of the disturbers and performs a search in the frequency domain. The resulting technique is accurate and may be implemented in an efficient form.
To start the description of the procedure, let us rewrite Equation (1) that describes the aggregated disturbance as follows:
In this equation, the index j goes through the set of service types, l indexes among all the disturbers from the j-th type, sjl(k) is the sequence of symbols sent by the l-th disturber of type j. Similarly, Tjl is the baud rate, and hjk(.) is the co-channel for the l-th disturber of type j.
Note that the actual baud rate Tjl may have an offset with respect to the j-th nominal frequency. This offset is determined by the characteristics of the local oscillator in the disturber transmitter. The local oscillator at the disturber transmitter determines the actual baud rate of a particular disturber, as well as its timing signal. In general, the local oscillator has a constant unknown offset with respect to its nominal frequency that can cause maximum frequency errors of 100 parts-per-million. The maximum allowable frequency offset for a particular disturber type is specified in the corresponding service type standard. If the observation time is short enough, it is possible to neglect instantaneous phase errors of the timing signal due to frequency drift with time and other random effects. The use of a short segment is advantageous from an implementation perspective, and under these conditions we may assume that the only source of phase error is a constant frequency offset with respect to the nominal frequency. The issue of timing signal tracking for longer periods is considered in a later section below.
Notice that the received disturber signal is a mixture of transmitted signals of different baud rates. In several applications, the nominal frequencies of the disturbers may be unknown. Even when several disturbers of the same nominal frequency are present, the actual individual baud rates may be different due to the differences among the local oscillators in the disturber transmitters.
It is also important to observe that the co-channels hi(.) may have comparable energy levels. Therefore, some of the individual disturbers in the received mixture may have similar levels of total energy. This implies that in general, the signal to noise ratio (SNR) of any given disturber computed as the ratio between total signal energy for the said disturber and total noise and interference energy may be very poor and traditional baud rate estimation techniques may fail in this situation. An alternative approach is to perform a precise search in the frequency domain using a Fast Fourier Transform (FFT).
To assist the reader in understanding, we will first analyze the case of baud rate estimation when a single disturber is present. Let T be its corresponding baud rate. The technique described in this section is based on the cyclostationary properties of the signal in Equation (7). For that, we estimate the correlation of the signal ypam(n). Let r (n, τ) be the time varying autocorrelation of ypam(n) as follows
r(n, τ)=E[ypam(n)ypam(n+τ)] (8)
It is possible to demonstrate that r (n, 0) is a periodic signal with period T. Then, the baud rate T can be recovered as the period of r(n, 0). Let us denote by r(n) an instantaneous estimate of r(n, 0), i.e.,
r(n)=(ydist(n))2 (9)
Then it can be shown that the Fourier transform of r(n) converges to the Fourier transform of r(n, 0) as n goes to infinity. Hence, r(n) can be used to estimate the period T.
In the case where multiple disturbers are present, if the disturbers are independent one from the others, and the co-channels are different, r(n) will contain the sum of processes with periodic components. Therefore a careful search for the periodic components of r(n) will yield the desired answer. One possible technique to perform this search is to use a fast Fourier transform (FFT). In order to reduce the complexity of the overall technique without reducing the accuracy of the estimation, we will select candidate frequency regions to perform the searches. It is possible to improve the resolution of an FFT along a certain frequency region by “zooming in” the desired frequency region. For example, if the desired frequency region is centered at f0 and has a bandwidth W then it is possible to modulate r(n) by the nominal frequency f0. and the resulting signal is rm(n)
rm(n)=r(n)ej2πf
After removing the high frequency components from rm(n), the resulting signal is a baseband signal
rb(n)=rm(n)*hLP(n) (11)
where hLP(n) is a low pass filter with cutoff frequency f0/2.
It is possible to reduce the bandwidth of rb(n) to be equal to W by using a cascade of lowpass and decimator filters. For example, if we let L be the decimating factor and hLP1 the lowpass filter corresponding to the first decimating filter then, the output after the first decimation is as follows
Notice that the bandwidth of rbs1(n) has been reduced by a factor L. By applying a cascade of low pass and decimator filters, it is possible to reduce the bandwidth of the signal rb(n) to W, the bandwidth of the desired frequency region. Then a simple FFT analysis allows us to obtain all the harmonic components of the signal in the frequency range [−W, +WM]. It is clear that this frequency range corresponds to the frequency range [f0−W, f0+W].
From the discussion above, the election of the frequency search regions can be seen to be an area of practical concern. The nominal frequency f0 is a characteristic of the disturber type and it is specified by the service type standard (SDSL, ISDN, etc.) that defines each particular disturber type. On the other hand, the bandwidth W is determined by the accuracy of the local oscillator, also specified in the applicable standard. If we let N be the number of possible disturber types present in the mixture of Equation (1), and assume that for each disturber type the standard specifies fi possible nominal frequencies, then the set F defined as
F={f0,ji, j=1, . . . ni, i=1 . . . N}
is the set of all possible nominal frequencies. When this set is a reduced set of frequencies, then it is possible to specify a reduced set of intervals |f0,ji−Wi, f0,ji+Wi|.
However, in certain applications of the present invention, the set F may be very large or even unknown. In these cases, an a priori specification of the search regions is unfeasible. Nonetheless, it is always possible to perform a coarse initial search to determine the main frequency regions (as illustrated at step 604 in
In order to characterize a particular disturber it is important not only to determine its baud rate but also its alphabet, frame length, etc. This particular characterization is known as service type identification. Once the service type of each disturber has been determined, it is possible to use the known features of each standard to perform co-channel identification. For example, most DSL standards specify a sequence of synchronization symbols that are sent periodically by the central office. The time elapsed between two consecutive synchronization sequences is known as a frame of data. The frame length and the synchronization sequence used by each particular standard may be known a priori. As it will be explained later, the sequence of known symbols is used as a training sequence during the co-channel identification step. It is clear that any sequence of symbols known a priori can be used in this procedure. In particular we will describe the procedure using the synchronization symbols embedded in the disturber signal.
In the discussion of the present invention, so far, we have described use of the coarse frequency estimation step as a means to determine the service type of the disturbers that are present. It will be clear to one skilled in the art that an alternative approach is to use known symbols to perform service type identification. Please note that either of these approaches, and others, may complement or supplement one another. An advantage of doing service type identification by using baud rate estimation is that it requires using only a small segment of data, thereby eliminating distortion of the data introduced by phase errors of the timing signals.
Initial Co-Channel Identification
Referring to
sjl(k)=sjs(k)+sjlr(k) (13)
The first subsequence srjl(k) corresponds to the random data: the second subsequence, ssj(k) corresponds to the known symbols for service type j. Both sequences are orthogonal, as shown in
To illustrate the use of known symbols in co-channel identification, let us assume that the disturbance signal is re-sampled at a fraction 1/Pj of the baud rate so that
For each service type, we may implement the system shown in
n=0, . . . nfj (15)
In order to determine the presence or absence of the known sequence of symbols, the design of a matched filter uses the sequence of known symbols, ssj(0) . . . ssj(Mj−1), convolved with the pulse-shaping filter of the j-th PAM disturber pj(n) as an approximation to the actual co-channel.
Then,
When j-th type is present in the mixture of disturbers (ydist(nTs)), the output of the j-th matched filter has a peak. Peak detection is done using an appropriately selected threshold. The value of n corresponding to the peak matches to the position of the center of the sequence of known symbols in the averaged frame of data. The peak detection module generates two important outputs. The first one is the position of the synchronization sequence within the frame of data, which is obtained by observing the index n at which a peak is detected. The second output is the number of disturbers of the same type that are present at the same time. This output is obtained by counting the number of peaks detected in the averaged frame.
Notice that as was mentioned before, it is possible to use the system described in
Once the co-channel identification setup is completed, the averaged frame described in Equation (15), the total number of disturbers, and the position of the synchronization sequences are passed to the initial co-channel identification step (block 608 in
To illustrate the identification procedure, we decompose the averaged data (yjave(k)) into three terms:
yjave(n)=yid
where
y
id
(n)=ssj(n)*hj(n)
wj(n)=yisi
The first term in Equation (18), yid
We will use the sequence of known symbols ssj(0) . . . ssj(Mj−1) as the input to the system. To decrease the influence of the random disturber symbols, we estimate the position in the frame of data of the starting time for the sequence of known symbols. Let Kj be this position, and Lj be the length of the j-th co-channel. Then, the identification problem is to minimize the following cost function among a selected family of models Π.
The sequence of known symbols is in general very short. For example, in the case of HDSL services, only 7 symbols out of 2351 are used for synchronization purposes. Therefore, one cannot assume to have perfect input excitation from this class of signals. This also implies that the model order of the models in HI cannot be chosen arbitrarily large.
To reduce the high frequency noise, both inputs and outputs may be filtered using a lowpass as shown in
Several disturbers of the same type may be treated jointly when the starting position of their synchronization sequences are close together. In this case, the summation as in ĥj above is extended as follows
An effective solution for this identification problem is to consider Π as a family of multiple-input-single-output (MISO) models. Then, standard MISO system identification techniques can be applied to this equation ({ĥjl, . . . , ĥjN}).
So far, we have assumed that in order to synchronize the samples in the averaged frame, we resample the data using the baud rate estimation. However, when more than one disturber of the same type is present this is not possible. Since each disturber transmitter may use different oscillators, the actual baud rates of disturbers of the same type may differ by small amounts. When the synchronization sequences of these disturbers are fired closely together in the data frame, the contribution of the different disturbers cannot be separated, and a MISO system needs to be identified. If the data is not resampled at the exact baud rate of a certain disturber, its pulse will be smeared in the average frames. Since we know the difference between the resampling rate and the actual baud rate, it is possible to account for this effect in the identification process.
For the understanding of the reader, we will present the technique for co-channel identification for the case that a single disturber is present in the mixture of disturbers ydist(n). This result will be extended later to the case of multiple disturbers present in ydist(n). Let T be the baud rate and h(n) the co-channel impulse response corresponding to the single disturber present in Ydist(n). In this case, Equation (7) can be re-written as follows,
Using linear interpolation, we express h(nTs−kT) as follows:
In general, using a 21 order interpolation, h(nTs−IT) has the following expression:
where ΔT=T, −T. Notice that in Equation (22), s(k) is a scalar. Moreover, the vector qΔT (n) introduced in Equation (24) is independent of k. Thus, qΔT (n) can be factored out of the convolution summation in Equation (22) as follows
For simplicity, we will develop the procedure for h(.) being an finite impulse response (FIR) channel. However, it is straightforward to extend the results from these notes to an infinite impulse response (IIR) model. Let L be the length of the co-channel, and H a 2l+L vector constructed from the impulse response h(kT) as follows
Then, Equation (25) can be rewritten as follows
where Il refers to the l-by-l identity matrix. Now suppose that the data frame is nf symbols long. Moreover, suppose that N.nf symbols have been collected. Then, using Equation (27), we compute the averaged frame of data as follows
The matrix s(n) introduced in Equation (28) contains the known symbols and the random data, i.e.,
s(n)=ss(n)+sr(n) (29)
In Equation (29), ss(n) is formed from the sequence of known symbols, and sr(n) is obtained from the random data. Notice that the sequence ss(n) is zero before the first known symbol has been sent, and after the last known symbol has been sent. Therefore, the structure of ss(n) depends on the location of the known sequence within the data frame.
We can separate the two components of s(n) to emphasize the averaging action. Lumping together the noise term and the contribution of the random data in a single term 1E, we rewrite Equation (28) as follows:
Equation (30) can now be used to obtain an FIR model for h(.).
In order to obtain an IIR model, we need to include the contribution of past output values in Equation (30). Notice that the interpolation process from Equation (24) can be associated to the moving average (MA) portion of an IIR model. Thus, a similar process can be applied to the autoregressive (AR) portion of the IIR model. In general, an m-th order IIR model is expressed as follows
y(k)−a1y(k−1)− . . . −amy(k−m)=b0s
(k)+b1
In Equation (31), s(k) is the input and y(k) is the output of the system. Let A be the matrix formed as in Equation (26) using the coefficients a1, . . . , am. Similarly, we can form the matrix B using the MA coefficients b 0, . . . ,b m. Finally, we denote by ypast (k) the vector formed as in Equation (27) using past output values. Then, Equation (30) can be re-written as follows:
In this case, Equation (32) is the one used to perform co-channel identification.
We will now discuss the case of multiple disturbers. If several disturbers fire their synchronization sequences close together, then we use MISO techniques to obtain the estimates of the co-channel.
When multiple disturbers are present, it is straightforward to pose Equation (30) or (32) as a multiple input single output system (MISO)
Notice that in this case the matrix Qj(n) is different for each disturber because it depends on the location of each synchronization sequence. Co-channel estimates are obtained by using standard MISO identification techniques to Equation (33).
The disturber signal ydist(n) in Equation (1) has been described so far as a mixture of disturber signals plus additive color noise. The purpose of the co-channel identification procedure is to describe the structure of the disturber signal. So far we have described how to describe the mixture of disturbers. The remaining component of the disturber structure is the residual noise term v(t) in Equation (1). To complete the description of the disturber structure, we obtain a description of the random signal v(t). We will consider that v(t) is a zero-mean Gaussian random process. The power spectral density of this signal can be computed using the prediction error obtained from the co-channel models previously identified. An example of such computation is described in U.S. patent application Ser. No. 09/523,065, filed Mar. 10, 2000, entitled Method for Automated System Identification, to C. Galarza, D. Hernandez, and M. Erickson, and assigned to the assignee herein. In some applications, it maybe necessary to compute the noise model when only one disturber co-channel is considered at a time. The noise models obtained with this procedure are important for successive disturber cancellation. For an explanation, see copending patent application Ser. No. 09/710,579 titled “Method and Apparatus for Mitigation of Disturbers in Communication Systems” assigned to the assignee herein and filed on even date herewith.
Also in some applications, it is useful to compute uncertainty bounds for the co-channel models obtained previously. These bounds are a measure of the identification error due to incorrect model structure, finite number of data points, and measurement noise, among other factors. It will be appreciated that modeling errors is well known by a person of ordinary skills in the art and thus further details of this topic will not be described. One embodiment of the computation of the uncertainty bounds has been described in detail in U.S. patent application Ser. No. 09/345,640, filed Jun. 30, 1999, titled “Model Error Bounds for Identification of Stochastic Models for Control Design”, assigned to Voyan Technology Corporation of Santa Clara, Calif.
Final Co-Channel Estimation
After some initial estimates for the co-channel impulse responses are obtained via the method described above, further estimation accuracy may be achieved by employing a data-aided identification procedure described next. This is performed in block number 614 in
One alternative approach is to utilize the batch algorithm approach that will be described next. To simplify the explanation, the algorithm is described for one type of disturber modulation only, namely pulse amplitude modulation (PAM). However, the general architecture may be applied to other modulation techniques such as quadrature amplitude modulation (QAM), carrierless amplitude and phase modulation (CAP), etc.
The technique utilizing the identification algorithm is illustrated in
For explanation purposes, assume that an initial estimate of the co-channel impulse response, h0, is provided. Then, using this initial model, we design a PAM receiver to detect the symbols in the aggregate disturbance. When several disturbers are present in the mixture signal ydist(n), then the PAM receiver may be designed as a joint receiver, a successive receiver, or a parallel one. In any case, the PAM receiver can be selected from the well known variety of standard PAM receivers such as linear equalizers followed by a decision device, a decision feedback equalizer, a Viterbi algorithm, etc. The selection of the receiver structure depends on the signal to noise ratio of the received signal, the amount of computational resources available, etc.
The output of the PAM receiver is used as the estimated input in a batch identification algorithm. Similarly, the output corresponds to the aggregate disturbance appropriately delayed by δ. The batch identification may be a system identification algorithm as is well known to those in the art. A batch identification algorithm is illustrated in
If we let h1 be the co-channel impulse response obtained using the batch algorithm, then once the batch identification algorithm is completed, the switch in
Note that if several disturbers are present, this strategy may be combined with a successive interference cancellation algorithm to successively obtained models for the co-channels of the different disturbers.
A second alternative for implementing block 614 in
Parameter Adaptation
An initial assumption for initial co-channel identification relied upon an observation time short enough to neglect instantaneous phase errors of the timing signal due to frequency drift or other random effects. Thus, the initial identification results relied upon the baud rate being known and fixed. In some applications, it is important to track the changes of the co-channel impulse response during an extended period of time. In those cases, baud rate drift and random effects will affect the performance of the particular application over long time periods.
According to ITU-T recommendation G.810 “Definitions and terminology for synchronization networks”, 08/96, the instantaneous phase of a timing signal is represented as
Φ(t)=Φ0+δ(t)+φ(t)
where Φ0 represents the initial phase offset, 8(t) is related to frequency deviation and drift, and φ(t) corresponds to the random phase deviation including both clock jitter and wander. For the second term in the above equation, the combined effect of frequency deviation and drift could be on the order of 60 ppm (parts-per-million). Variations caused δ(t) and φ(t) pose a serious problem to several applications that require a long time observation period. Thus, the timing issue must be addressed in order for these applications to work effectively. This is accomplished in block 616 of
What the present invention presents is a data-aided adaptive channel tracking technique to address this issue. In particular, we will describe the procedure illustrated in
The tracking procedure can be summarized as follows:
After the training time 1520 is completed, the next step is identification 1530 of possible crosstalk sources. Within the identification 1530, may be tasks such as detection of service types present 1532, baud-rate estimation 1534, setup of co-channel estimation 1536 and initial co-channel estimation 1538. After identification 1530 of possible crosstalk sources has been completed, the next step is system design 1540. The system design 1540, may include, for example, such tasks as compensator design 1546, and a final co-channel estimation 1548. For an example of compensator design see co-pending patent application Ser. No. 091710.579 titled “Method and Apparatus for Mitigation of Disturbers in Communication Systems” assigned to the assignee herein and filed on even date herewith.
When system design 1540 of compensation is completed and deployed, the DSL modem may be used for customer-initiated communications at transmission time 1550.
Transmission time 1550, also sometimes referred to as showtime, may include, compensation deployment 1554 and parameter adaptation 1556. For an example of compensation deployment see co-pending patent application Ser. No. 09/710,579 titled “Method and Apparatus for Mitigation of Disturbers in Communication Systems” assigned to the assignee herein and filed on even date herewith.
Part of the modem parameter adaptation 1556 may be accomplished via the channel tracking procedures described in the current invention. Finally, if the modem is turned off we have an end 1560 the operation. The present invention discloses techniques that are applicable to various blocks of
Note that while the operations of
Thus, a method and apparatus for identification of interference, such as crosstalk sources, and their coupling channels are disclosed. Although the present invention has been described with reference to specific exemplary embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the invention as set forth in the claims. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
This application claims the benefit of the filing date of the following Provisional U.S. Patent Applications: “IMPROVEMENTS IN EQUALIZATION AND DETECTION FOR SPLITTERLESS MODEM OPERATIONS”, application Ser. No. 60/165,244, filed Nov. 11, 1999;“CROSS-TALK REDUCTION IN MULTI-LINE DIGITAL COMMUNICATION SYSTEMS”, application Ser. No. 60/164,972, filed Nov. 11, 1999;“CROSS-TALK REDUCTION IN MULTI-LINE DIGITAL COMMUNICATION SYSTEMS”, application Ser. No. 60/170,005, filed Dec. 9, 1999;“FIXED-POINT CONTROLLER IMPLEMENTATION”, application Ser. No. 60/164,974, filed Nov. 11, 1999;“USE OF UNCERTAINTY IN PHYSICAL LAYER SIGNAL PROCESSING IN COMMUNICATIONS”, application Ser. No. 60/165,399, filed Nov. 11, 1999;“CROSS-TALK REDUCTION AND COMPENSATION”, application Ser. No. 60/186,701, filed Mar. 3, 2000;“SEMI-BLIND IDENTIFICATION OF CROSS-TALK TRANSFER FUNCTIONS”, application Ser. No. 60/215,543; filed Jun. 30, 2000;“BLIND IDENTIFICATION OF CROSS-TALK TRANSFER FUNCTIONS”, application Ser. No. 60/215,451, filed Jun. 30, 2000; and“FOREIGN xDSL SERVICE TYPE DETECTION WITHIN A SHARED CABLE BINDER”, application Ser. No. 60/215,510, filed Jun. 30, 2000.
Number | Name | Date | Kind |
---|---|---|---|
3814868 | Bradley | Jun 1974 | A |
4649505 | Zinser, Jr. et al. | Mar 1987 | A |
4669113 | Ash et al. | May 1987 | A |
4669505 | Nelson et al. | Jun 1987 | A |
4715064 | Claessen | Dec 1987 | A |
4760596 | Agrawal et al. | Jul 1988 | A |
4987569 | Ling et al. | Jan 1991 | A |
5063351 | Goldthorp et al. | Nov 1991 | A |
5157690 | Buttle | Oct 1992 | A |
5226041 | Waclawsky et al. | Jul 1993 | A |
5319636 | Long et al. | Jun 1994 | A |
5329547 | Ling | Jul 1994 | A |
5343461 | Barton et al. | Aug 1994 | A |
5406552 | Long et al. | Apr 1995 | A |
5483551 | Huang et al. | Jan 1996 | A |
5502644 | Hamilton et al. | Mar 1996 | A |
5521971 | Key et al. | May 1996 | A |
5548222 | Jensen et al. | Aug 1996 | A |
5761614 | Leitch et al. | Jun 1998 | A |
5848151 | Boudy | Dec 1998 | A |
5862157 | Bessios | Jan 1999 | A |
5880959 | Shah et al. | Mar 1999 | A |
5887032 | Cioffi | Mar 1999 | A |
5926538 | Deryugin et al. | Jul 1999 | A |
5929896 | Goodman et al. | Jul 1999 | A |
5995566 | Rickard et al. | Nov 1999 | A |
6055297 | Terry | Apr 2000 | A |
6091713 | Lechleider et al. | Jul 2000 | A |
6144710 | Chen et al. | Nov 2000 | A |
6160790 | Bremer | Dec 2000 | A |
6161209 | Moher | Dec 2000 | A |
6172970 | Ling et al. | Jan 2001 | B1 |
6195594 | Shah et al. | Feb 2001 | B1 |
6230062 | Shah | May 2001 | B1 |
6249762 | Kirsteins et al. | Jun 2001 | B1 |
6317495 | Gaikwad et al. | Nov 2001 | B1 |
6377636 | Paulraj et al. | Apr 2002 | B1 |
6418175 | Pukkila et al. | Jul 2002 | B1 |
6434233 | Bjarnason et al. | Aug 2002 | B1 |
6442495 | Fleming-Dahl | Aug 2002 | B1 |
6519291 | Dagdeviren et al. | Feb 2003 | B1 |
6553075 | McGhee et al. | Apr 2003 | B1 |
6674815 | Zangi | Jan 2004 | B2 |
Number | Date | Country |
---|---|---|
9852312 | Nov 1998 | EP |
9852312 | Nov 1998 | EP |
0917314 | May 1999 | EP |
0917314 | Oct 2001 | EP |
Number | Date | Country | |
---|---|---|---|
60215543 | Jun 2000 | US | |
60215451 | Jun 2000 | US | |
60215510 | Jun 2000 | US | |
60186701 | Mar 2000 | US | |
60170005 | Dec 1999 | US | |
60165244 | Nov 1999 | US | |
60164972 | Nov 1999 | US | |
60164974 | Nov 1999 | US | |
60165399 | Nov 1999 | US |