Null deepening for an adaptive antenna based communication station

Abstract
A method and apparatus is described for modifying a smart antenna processing strategy determined from a set of signals received at an array of antenna elements of a wireless station, such as a set of weights for processing received antenna signals or forming a set of antenna signals for transmission. The method and apparatus uses the signatures of one or more interferers to produce a modified processing strategy that improves the nulling to the one or more interferers in that, when the modified strategy is applied on the downlink, the transmit signal strength in the direction of the one or more interferers is decreased, and, when the modified strategy is applied on the uplink, the sensitivity to signals from the direction of the one or more interferers is decreased.
Description
FIELD OF INVENTION

This invention relates to the field of wireless communication systems, and more specifically, to a method and apparatus for decreasing the transmitted power aimed at an interferer during transmission or the sensitivity to signals transmitted from the interferer during reception in order for a communications station to communicate to or from one or more remote subscriber units, the communication station having an adaptive antenna array and adaptive smart antenna processing.


BACKGROUND TO THE INVENTION

Adaptive smart antenna processing may be used in a communication station (e.g., a base station) equipped with multiple antennas to either reject interference when communicating from a subscriber unit to the communication station (i.e., on the uplink) or to deliver power in a spatially or spatio-temporally selective manner when communicating from the communication station to a subscriber unit (i.e., on the downlink). With smart antenna communication systems that use linear spatial processing for the adaptive smart antenna processing, during uplink communications, one applies amplitude and phase adjustments, typically but not necessarily in baseband to each of the signals received at the antenna array elements to select (i.e., preferentially receive) the signals of interest while minimizing any signals or noise not of interest—that is, the interference. Such baseband amplitude and phase adjustment can be described by a complex valued weight, the receive weight, and the receive weights for all elements of the array can be described by a complex valued vector, the receive weight vector. Similarly, the downlink signal is processed by adjusting the amplitude and phase of the baseband signals that are transmitted by each of the antennas of the antenna array. Such amplitude and phase control can be described by a complex valued weight, the transmit weight, and the weights for all elements of the array by a complex valued vector, the transmit weight vector. In some systems, the receive (and/or transmit) weights include temporal processing, and in such cases, the receive (and/or transmit) weights may be functions of frequency and applied in the frequency domain or, equivalently, functions of time applied as convolution kernels. Alternatively, each convolution kernel, if for sampled signals, may itself be described by a set of complex numbers, so that the vector of convolution kernels may be re-written as a complex values weight vector, which, for the case of there being M antennas and each kernel having K entries, would be a vector of KM entries.


Many methods are known for performing interference rejection or selective power delivery. Examples include least-squares beamforming and zero-forcing beamforming. Selective power delivery must balance competing goals. In general, the power delivered to one remote user cannot be simultaneously maximized while the power delivered to another remote user is minimized. More generally, if several remote users require power minimization (i.e., nulling), the relative power delivered to each must be traded off. This tradeoff can be based on a number of factors. For example, for a given interferer (which might be a co-channel user), a deeper null (i.e., decreased transmitted power aimed at an interferer during transmission or decreased sensitivity to signals transmitted from the interferer during reception) may be requited for a remote user co-participating in the spatial channel established at the base station than for a remote user communicating with a different base station.


A disadvantage of known methods, such as least-squares and zero-forcing, is their inability to flexibly perform this tradeoff. Zero-forcing methods attempt to direct perfect nulls towards all interferers, regardless of the power delivered to the desired remote user. Least-squares methods minimize a cost function which, when the uplink strategies are used to determine downlink strategies, on the downlink directs strongest nulls to remote users who were received most strongly on the uplink. Neither zero-forcing nor least-squares behavior may be appropriate for some systems.


A particular case where least-squares nulling behavior is undesirable occurs when subscriber units are subject to the “near/far problem.” In the near/far problem, one subscriber unit, say one denoted SU1, is far from the base station while a second subscriber unit, say one denoted SU2, is close. When the downlink weight vector, denoted w1, is computed for SU1, signals from SU2 are seen as interference and a null is formed towards SU2. The depth of the null in the direction of SU2 is limited by noise and other factors, including the possibility that the transmitted powers of subscriber units are adjusted such that equal power levels are received by the base station. If high power is used to reach SU1 during base station transmit, then excessive signal levels leaking “through” in the imperfect null can disturb SU2. A deeper null towards SU2 is therefore desirable.


A disadvantage of zero-forcing methods is the need for the base station to have complete knowledge of all remote user and interferer spatial signatures (or spatio-temporal signatures). The receive spatial signature and the receive spatio-temporal signature characterizes how the base station array receives signals from a particular subscriber unit in the absence of any interference or other subscriber units. The transmit spatial signature and the transinit spatio-temporal signature of a particular remote user characterizes how the remote user receives signals from the base station in the absence of any interference. See U.S. Pat. No. 5,592,490 entitled SPECTRALLY EFFICIENT HIGH CAPACITY WIRELESS COMMUNICATION SYSTEMS, to Barratt et al., assigned to the assignee of the present invention and incorporated herein by reference, and U.S. Pat. No. 5,828,658 entitled SPECTRALLY EFFICIENT HIGH CAPACITY WIRELESS COMMUNICATION SYSTEMS WITH SPATIO-TEMPORAL PROCESSING, to Ottersten et al., also assigned to the assignee of the present invention and incorporated herein by reference, for spatial processing and spatio-temporal processing methods that use spatial and spatio-temporal signatures. Note that because a signature may be a spatial signature or a spatio-temporal signature, depending on whether the smart antenna processing is spatial or spatio-temporal, the term signature will be used herein, and whether the signature is spatial or spatio-temporal will depend on whether the processing is spatial or spatio-temporal, and whether the signature is a transmit or a receive signature will depend on the context, and which signature will be clear to those of ordinary skill in the art from the context.


Determining all spatial signatures of all remote users and all interferers may often be impossible to carry out accurately if any of the interferers are weak or have a signal structure that is a priori unknown, or because of computational power limitations.


In the uplink direction, increasing the depth of a null (i.e, decreasing sensitivity to signals received from a particular interferer) is desirable when the uplink strategy, for example the uplink weight vector, computed from a previous burst is used in predictive mode, e.g., for new data. When uplink remote users are executing power control, for example to control received power at the base station or to reduce transmit power during periods of voice or data inactivity, their uplink power may vary widely from burst to burst. Similar effects occur in fading environments. Thus, if a least-squares approach is used, the null depth obtained from a strategy computed for the previous burst may be inappropriate for the current burst.


Thus there is a need in the art for a flexible method for directing precise and deep nulls on the uplink or downlink direction. There also is a need in the art for a method and apparatus for estimating one or more signatures in the direction of one or more interferers to use, for example, for such null deepening. There also is a need for a method for using a signature estimate of an interferer for directing precise and deep nulls in the direction of the interferer. There also is a need in the art for a method for directing precise and deep nulls in the direction of one or more interferers while substantially maintaining the other nulling and gain-patterns of a provided adaptive smart antenna processing strategy.


SUMMARY

An advantage of the present invention is that it provides a flexible method for directing precise and deep nulls (i.e., decreasing the transmitted power aimed at an interferer during transmission or decreasing the sensitivity to signals transmitted from the interferer during reception) on the uplink or downlink direction.


Another advantage of the present invention is that it provides a method and apparatus for estimating one or more signatures in the direction of one or more interferers.


Another advantage of the present invention is that it provides a method for using a signature estimate of an interferer for directing precise and deep nulls in the direction of the interferer.


Another advantage of the present invention is that it provides a method for directing precise and deep nulls in the direction of one or more interferers while substantially maintaining the other nulling and gain patterns of a provided adaptive smart antenna processing strategy.


Another advantage of the present invention is that it provides a null deepening method that essentially requires only an estimate signature of any interferer to deepen the null to that interferer, without needing a full set of signatures, and in particular, without needing the signature of the desired remote user.


One aspect of the invention is a method for determining, in a communication station using multiple antennas, improved uplink or downlink processing strategies, for example in the form of uplink or downlink weights for linear mart antenna processing, for which one or more nulls have a controlled depth. The method can be applied as a modification to a variety of known techniques for uplink and downlink strategy computation. The method needs as side information only the signatures of those remote users to which controlled nulls are to be directed. Other nulls in the array pattern, for which no signature estimates may be available, are substantially preserved. Another aspect of the invention includes estimating the required signatures. Another aspect of the invention modifies existing uplink and downing strategy computation methods by injecting into the received signal sequence a synthetic signal whose signature equals that of the estimated remote user direction, and whose power is proportional to the desired null depth.


To overcome the limitations on null depth imposed by having a limited number of array samples, in an improved version of the invention, the signatures in the directions to be nulled are estimated by combining measurements over several bursts. An aspect of the invention identifies a particular type of signature estimation technique that combines favorably with the synthetic signal-injection method.




BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be more fully understood from the description of the preferred embodiments of the invention, which, however, should not be taken to limit the invention to any specific embodiment but are for purposes of explanation and to provide a better understanding of the inventive apparatus and method. The preferred embodiments may be better understood with reference to the following figures:



FIG. 1 is a functional block diagram of a multi-antenna transceiver system which includes elements suitable for implementing the method of the present invention;



FIG. 2 is a more detailed block diagram of a transceiver that includes a signal processor capable of executing a set of instructions for implementing the method of the present invention;



FIG. 3 is a block diagram showing a strategy computation method and apparatus having as input a set of input signal data and a reference signal for the set of input data;



FIG. 4 is a block diagram illustrating a reference signal generator that may be used in any of the embodiments of the invention;



FIG. 5 is a block diagram illustrating a strategy computation method and apparatus that uses estimates of one or more characteristic features of a set of signal data;



FIG. 6 is a block diagram illustrating some of the signal processing operations applied to received data when implementing an embodiment of the inventive method using the strategy computation of FIG. 3;



FIG. 7 is a block diagram illustrating some of the signal processing operations applied to received data when implementing an embodiment of the inventive method for is deepening more than one null;



FIG. 8 is a block diagram illustrating some of the signal processing operations applied to received data when implementing an embodiment of the inventive method using the strategy computation of FIG. 5 with the characteristic feature being the covariance;



FIG. 9 is a block diagram illustrating some of the signal processing operations applied to received data when implementing yet another embodiment of the inventive method using a noise-plus-interference covariance estimator;



FIG. 10 is a block diagram showing the signal injection based embodiment of the inventive method applied to a non-linear processing strategy;



FIG. 11 is a block diagram showing generalized combining method with the signal injection embodiment of the inventive method applied to a processing strategy;



FIG. 12 is a block diagram showing using a signal injection embodiment of the inventive method applied to a processing strategy generator to generate parameters that are then used to process downlink data;



FIG. 13 is a block diagram showing a covariance modification embodiment of the of the inventive method applied to a covariance based processing strategy generator which uses a reference signal, primary data, and a covariance estimator;



FIG. 14 is a block diagram showing an alternate embodiment of the combining of the input signal covariance estimate and interferer signature covariance estimate;


FIG. 15 is a block diagram showing a covariance modification embodiment of the lo of the inventive method applied to a covariance based processing strategy generator which uses a reference signal, primary data, and a noise-plus-interference covariance estimator; and



FIG. 16 is a plot of the performance obtained by using aspects of the invention in a simulated environment.




DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Adaptive Smart-Antenna Processing


The invention is directed to a processing method for altering the transmit or receive weights used by a communication station'to define a transmitted signal or to process a received signal in order to deepen or otherwise manipulate the depth of a null formed to mitigate the effects of one or more known interferers. The interferer may or may not be another remote user sharing the same communication channel with the same base station. The invention may be implemented in a communication station that includes a receiver, an array of antennas and means for adaptive smart antenna processing of received signals. The invention may also be implemented in a communication station that includes a transmitter, an array of antennas, and means for adaptive smart antenna processing of transmitted signals. In a preferred embodiment, the communication station includes a transceiver and the capability of implementing both uplink and downlink adaptive smart antenna processing.


When receiving a signal from a subscriber (remote) unit, the signals received by each of the antenna array elements are combined by the adaptive smart antenna processing elements to provide an estimate of a signal received from that subscriber unit. In the preferred embodiment, the smart antenna processing comprises linear spatial processing, wherein each of the complex-valued (i.e., including in-phase I and quadrature Q components) signals received from the antenna elements is weighted in amplitude and phase by a weighting factor and the weighted signals are then summed to provide the signal estimate. The adaptive smart antenna processing scheme (i.e., the strategy) can then be described by a set of complex valued weights, one for each of the antenna elements. These complex valued weights can be described as a single complex valued vector of M elements, where M is the number of antenna elements. Thus, in the linear case, the smart antenna processing is designed to determine a set of weights such that the sum of the products of the weights times the antenna element signals provides an estimate of the remote user's transmitted signal which satisfies some prescribed “estimation quality” measure.


This representation of the adaptive smart antenna processing can be extended to include spatio-temporal processing, where the signal at each antenna element, rather than being weighted in amplitude and phase, is filtered by a complex valued filter, typically for purposes of time equalization. In such a method, each filter can be described by a complex-valued transfer function or convolving function. The adaptive smart antenna processing of all elements can then be described by a complex valued M-vector of M complex valued convolving functions.


Several methods are known for determining the weighting vectors to be applied when processing received signals. These include methods that determine the directions of arrival of signals from subscriber units, and methods that use the spatial or spatio-temporal characteristics of subscriber units, for example, the spatial or spatio-temporal signatures. See for example U.S. Pat. Nos. 5,515,378 and 5,642,353, entitled “SPATIAL DIVISION MULTIPLE ACCESS WIRELESS COMMUNICATION SYSTEMS”, to Roy, et al., assigned to the assignee of the present invention and the contents of which are incorporated herein by reference, for methods that use directions of arrival. See also the above-referenced U.S. Pat. Nos. 5,592,490 and 5,828,658 for methods that use spatial and spatio-temporal signatures.


“Blind” methods determine the weights from the signals themselves, but without resorting to a priori knowledge such as training signals or silent periods, that is, without determining what weights can best estimate a known symbol sequence (or in the case of the period silence, the absence of a known sequence). Such blind methods typically use some known characteristic of the signal transmitted by the subscriber unit to determine the best receive weights to use by constraining the estimated signal to have this property, and hence are sometimes referred to as property restoral methods.


Property restoral methods in turn can be classified into two groups. Simple property restoral methods restore one or more properties of the signal without completely reconstructing the modulated received signal, for example by demodulating and then re-modulating. More complex restoral methods typically rely upon reconstruction of the received signal.


Property restoral methods determine a signal (a “reference signal”) that is constrained to the required property and then determine a set of weights corresponding to the reference signal, such that if the reference signal was transmitted by a remote user, the signals at the antenna elements of the receiving array would be acceptably “close” to the signals actually received. One example of a simple restoral method is the constant modulus (CM) method, which is applicable to communication systems that use a modulation scheme having a constant modulus, including, for example phase modulation (PM), frequency modulation (FM), phase shift keying (PSK) and frequency shift keying (FSK). The CM method has also been shown to be applicable to non-CM signals. Other partial property restoral techniques include techniques that restore the spectral properties of the signal, such as the signal's spectral self-coherence.


“Decision directed” (DD) methods construct a reference signal by making symbol decisions (e.g., demodulating) the received signal. Such decision directed methods use the fact that the modulation scheme of the transmitted subscriber unit signal is known, and then determine a signal (a “reference signal”) that is constrained to have the characteristics of the required modulation scheme. In such a case, the reference signal production process includes making symbol decisions. Weights are determined that produce a reference signal, that if transmitted by a remote user, would produce signals at the antenna elements of the array that are acceptably “close” to the signals actually received. See, for example, U.S. patent application Ser. No. 08/29,390, entitled “METHOD & APPARATUS FOR DECISION DIRECTED DEMODULATION USING ANTENNA ARRAYS & SPATIAL PROCESSING” to Barratt, et al., and Ser. No. 09/153,110, entitled “METHOD FOR REFERENCE SIGNAL GENERATION IN THE PRESENCE OF FREQUENCY OFFSETS IN A COMMUNICATION STATION WITH SPATIAL PROCESSING” to Petrus, et al., both of which are assigned to the assignee of the present invention and the contents of which are incorporated herein by reference, for descriptions of systems that use decision directed weight determination methods.


As previously mentioned, weight determining schemes also are known that use training data, that is, data whose symbols are known a priori. The training data (possibly with a timing offset or frequency offset, or both applied) is then used as a reference signal to determine the smart antenna processing strategy (e.g., the weights). Therefore, reference signal based methods include the case in which the reference signal includes training data, the case in which the reference signal includes a signal constrained to have some property of the transmitted signal, and the case in which the reference signal includes constructing a signal based on making symbol decisions.


Non-linear uplink and downlink processing strategies also are known. In the uplink direction, such methods typically include demodulation and act to determine an estimate of the symbols transmitted by a desired remote user from the set of signals received at the antenna elements of the communication station. One known example of such a processing scheme is based on a Viterbi algorithm using branch metrics. In this regard, it is noted that the present invention is not limited to linear spatial and spatio-temporal processing methods that include weight determining, but also is equally applicable to non-linear methods such as those based on Viterbi algorithms and branch metrics, which may not necessarily include determining weights.


In theory, adaptive smart antenna processing permits more than one communication link to exist in a single “conventional” communication channel so long as the subscriber units that share the conventional channel can be spatially (or spatio-temporally) resolved. A conventional channel includes a frequency channel in a frequency division multiple access (FDMA) system, a time slot in a time division multiple access (TDMA) system (which usually also includes FDMA, so the conventional channel is a time and frequency slot), and a code in a code division multiple access (CDMA) system. The conventional channel is then said to be divided into one or more “spatial” channels, and when more than one spatial channel exists per conventional channel, the multiplexing is called space division multiple access (SDMA). SDMA is used herein to include the possibility of adaptive smart antenna processing, both with one and with more than one spatial channel per conventional channel.


Base Station Architecture


The preferred embodiment of the inventive method and apparatus is implemented in a communication receiver, in particular, a Personal Handyphone System (PHS)-based antenna-array communication station (transceiver) such as that shown in FIG. 1, with M antenna elements in the antenna array. The PHS standard is described, for example, in the Association of Radio Industries and Businesses (ARIB, Japan) Preliminary Standard, Version 2, RCR STD-28 and variations are described in Technical Standards of the PHS Memorandum of Understanding Group (PHS MoU—see http://www.phsmou.or.jp). The preferred embodiments of the present invention may be implemented in two versions of the communication station of FIG. 1, one aimed at low-mobility PHS system, with M=4, and another, aimed at a wireless local loop (WLL) system, with a variable number, with typically M=12.


While systems having some elements similar to that shown in FIG. 1 may be prior art, a system such as that of FIG. 1 with elements 131 and 133 capable of implementing the inventive method is not prior art. Note that the present invention is in no way restricted to using the PHS air interface or to TDMA systems, but may be utilized as part of any communication receiver that includes adaptive smart antenna processing means, including CDMA systems using the IS-95 air interface and systems that use the common GSM air interface.


In the system of FIG. 1, a transmit/receive (“TR”) switch 107 is connected between an M-antenna array 103 and both transmit electronics 113 (including one or more transmit signal processors 119 and M transmitters 120), and receive electronics 121 (including M receivers 122 and one or more receive signal processors 123). Switch 107 is used to selectively connect one or more elements of antenna array 103 to the transmit electronics 113 when in the transmit mode and to receive electronics 121 when in the receive mode. Two possible implementations of switch 107 are as a frequency duplexer in a frequency division duplex (FDD) system, and as a time switch in a time division duplex (TDD) system.


The PHS form of the preferred embodiment of the present invention uses TDD. The transmitters 120 and receivers 122 may be implemented using analog electronics, digital electronics, or a combination of the two. The preferred embodiment of receivers 122 generate digitized signals that are fed to signal processor or processors 123. Signal processors 119 and 123 incorporate software and/or hardware for implementing the inventive method and may be static (always the same processing stages), dynamic (changing processing depending on desired directivity), or smart (changing processing depending on received signals). In the preferred embodiments of the invention, processors 119 and 123 are adaptive. Signal processors 119 and 123 may be the same DSP device or DSP devices with different programming for the reception and transmission, or different DSP devices, or different devices for some functions, and the same for others. Elements 131 and 133 are for implementing the method of the present invention for downlink and uplink processing, respectively, in this embodiment, and include programming instructions for implementing the processing methods.


Note that while FIG. 1 shows a transceiver in which the same antenna elements are used for both reception and transmission, it should be clear that separate antennas for receiving and transmitting may also be used, and that antennas capable of only receiving or only transmitting or both receiving and transmitting may be used with adaptive smart antenna processing.


The PHS system is an 8 slot time division multiple access (TDMA) system with true time division duplex (TDD). Thus, the 8 timeslots are divided into 4 transmit (TX) timeslots and 4 receive (RX) timeslots. This implies that for any particular channel, the receive frequency is the same as the transmit frequency. It also implies reciprocity, i.e., the propagation path for both the downlink (from base station to users' remote terminals) and the uplink (from users' remote terminals to base station) is identical, assuming minimal motion of the subscriber unit between receive timeslots and transmit timeslots. The frequency band of the PHS system used in the preferred embodiment is 1895-1918.1 MHz. Each of the 8 timeslots is 625 microseconds long. The PHS system includes a dedicated frequency and timeslot for a control channel on which call initialization takes place. Once a link is established, the call is handed to a service channel for regular communications. Communication occurs in any channel at the rate of 32 kbits per second (kbps), a rate termed the “full rate”. Less than full fate communication is also possible, and the details of how to modify the embodiments described herein to incorporate less than full rate communication would be clear to those of ordinary skill in the art.


In the PHS used in the preferred embodiment, a burst is defined as the finite duration RF signal that is transmitted or received over the air during a single timeslot. A group is defined as one set of 4 TX and 4 RX timeslots. A group always begins with the first TX timeslot, and its time duration is 8×0.625=5 msec.


The PHS system uses (π/4 differential quaternary (or quadrature) phase shift keying (π/4 DQPSK) modulation for the baseband signal. The baud rate is 192 kbaud. There are thus 192,000 symbols per second.



FIG. 2 is a more detailed block diagram of a transceiver that includes a signal processor capable of executing a set of instructions for implementing the method of the present invention. This is the version of the FIG. 1 system suitable for use in a low-mobility PHS system. In FIG. 2, a plurality of M antennas 103 are used, where M=4. More or fewer antenna elements may be used. The outputs of the antennas are connected to a duplexer switch 107, which in this TDD system is a time switch. When receiving, the antenna outputs are connected via switch 107 to a receiver 205, and are mixed down in analog by RF receiver modules 205 from the carrier frequency (around 1.9 GHz) to an intermediate frequency (“IF”). This signal is then digitized (sampled) by analog to digital converters (“ADCs”) 209. The result is then down converted digitally by digital downconverter 213 to produce a four-times oversampled complex valued (in phase I and quadrature Q) sampled signal. Thus, elements 205, 209 and 213 correspond to elements that might be found in receiver 122 of FIG. 1. For each of the M receive timeslots, the M downconverted outputs from the M antennas are fed to a digital signal processor (DSP) device 217 (hereinafter “timeslot processor”) for further processing. In the preferred embodiment, commercial DSP devices are used as timeslot processors, one per receive timeslot per spatial channel.


The timeslot processors 217 perform several functions, which may include the following: received signal power monitoring, frequency offset estimation/correction and timing offset estimation/correction, smart antenna processing (including determining receive weights for each antenna element to determine a signal from a particular remote user, in accordance with the present invention), and demodulation of the determined signal. The version of the uplink processing method of the invention as implemented in each timeslot processor 217 in the embodiment of FIG. 2 is shown as block-241.


The output of the timeslot processor 217 is a demodulated data burst for each of the M receive timeslots. This data is sent to host DSP processor 231 whose main function is to control all elements of the system and interface with the higher level processing (i.e., processing which deals with what signals are required for communications in the different control and service communication channels defined in the PHS communication protocol). In the preferred embodiment, host DSP 231 is a commercial DSP device. In one implementation of the present invention, timeslot processors 217 send the determined receive weights to host DSP 231. Note that if desired, the receive weights may also be determined by software specifically implemented in host DSP 231.


RF controller 233 interfaces with the RF transmit elements, shown as block 245 and also produces a number of timing signals that are used by both the transmit elements and the modem. RF controller 233 receives its timing parameters and other settings for each burst from host DSP 231.


Transmit controller/modulator 237 receives transmit data from host DSP 231. Transmit controller 237 uses this data to produce analog IF outputs which are sent to RF transmitter (TX) modules 245. The specific operations performed by transmit controller/modulator 237 include: converting data bits into a complex valued (π/4 DQPSK) modulated signal; up-converting to an intermediate frequency (IF); weighting by complex valued transmit weights obtained from host DSP 231; and, converting the signals to be transmitted using digital to analog converters (“DACs”) to form analog transmit waveforms which are provided to transmit modules 245.


The downlink processing method of the invention is implemented in the embodiment of FIG. 2 in host DSP 231, and is shown as block 243. In alternate versions, the downlink processing method is implemented in the timeslot processors 217 and in another version, it is implemented in transmit controller/modulator 237.


Transmit modules 245 upconvert the signals to the transmission frequency and amplify the signals. The amplified transmission signal outputs are coupled to the M antennas 103 via duplexer/time switch 107.


In describing the inventive methods, the following notation is used. Given M antenna elements (M=4 in one implementation, and 12 in another embodiment), let z1(t), z2(t), . . . , zM(t) be the complex valued responses (that is, with in-phase I and quadrature Q components) of the first, second, . . . , M'th antenna elements, respectively, after down-conversion, that is, in baseband, and after sampling (four-times oversampling in the preferred embodiment). In the above notation, but not necessarily required for the present invention, t is discrete. These M time-sampled quantities can be represented by a single M-vector z(t) with the i'th row of z(t) being zi(t). For each burst, a finite number of samples, say N, is collected, so that z1(t), z2(t), . . . , zM(t) can each be represented as a N-row vector and z(t) can be represented by a M by N matrix Z. In much of the detailed description presented hereinafter, such details of incorporating a finite number of samples are assumed known, and how to include these details would be clear to those of ordinary skill in the art.


Assume signals are transmitted to the base station from Ns remote users all operating on the same (conventional) channel. In particular, assume that one of these, a particular subscriber unit of interest, transmits a signal s(t). Linear adaptive smart antenna processing, which is used in the preferred embodiment of the invention, includes taking a particular combination of the I values and the Q values of the received antenna element signals z1(t), z2(t), . . . , zM(t) in order to extract an estimate of the transmitted signal s(t). Such complex valued weights may be represented by the receive weight vector for this particular subscriber unit, denoted by a complex valued weight vector wr, with ith element wri. The estimate of the transmitted signal from the remote unit may then be represented as:
s(t)=i=1Mwrizi(t)=wrHz(t)(1)

where w′ri is the complex conjugate of wri and wrH is the Hermitian transpose (that is, the transpose and complex conjugate) of receive weight vector wr. Eq. 1 is called a copy signal operation, and the signal estimate s(t) thus obtained is called a copy signal.


The spatial processing described by Eq. 1 may be re-written in vector form for the case of N samples of M-vector signals z(t) and N samples of the transmitted signal s(t) being estimated. In such a case, let s be a (1 by N) row vector of the N samples of s(t). The copy signal operation of Eq. 1 may then be re-written as s=wrHZ.


In embodiments which include spatio-temporal processing, each element in the receive weight vector is a function of time, so that the weight vector may be denoted as wr(t), with ith element wri(t). The estimate of the signal may then be expressed as:
s(t)=i=1Mwri(t)*zi(t)(2)

where the operator “*” represents the convolution operation. Spatio-temporal processing may combine time equalization with spatial processing, and is particularly useful for wideband signals. Forming the estimate of the signal using spatio-temporal processing may equivalently be carried out in the frequency (Fourier transform) domain. Denoting the frequency domain representations of s(t), zi(t), and wri(t) by S(k), Zi(k), and Wi(k), respectively, where k is the discrete frequency value:
S(k)=i=1MWri(k)Zi(k).(3)


With spatio temporal processing, the convolution operation of Equation (2) is usually finite and when performed on sampled data, equivalent to combining the spatial 25 processing with time equalization using a time-domain equalizer with a finite number of equalizer taps. That is, each of the wri(t) has a finite number of values of t and equivalently, in the frequency domain, each of the Wi(k) has a finite number of k values. If the length of the convolving functions wri(t) is K, then rather than determining a complex valued M-weight vector wr, one determines a complex valued M by K matrix Wr whose columns are the K values of wr(t).


Alternatively, a spatial weight determining method can be modified for spatio-temporal processing according to a weight matrix by re-expressing the problem in terms of matrices and vectors of different sizes. As throughout this description, let M be the number of antenna elements, and N be the number of samples. Let K be the number of time equalizer taps per antenna element. Each row vector of N samples of the (M by N) received signal matrix Z can be rewritten as K rows of shifted versions of the first row to produce a received signal matrix Z of size (MK by N), which when pre-multiplied by the Hermitian transpose of a weight vector of size (MK by 1), produces an estimated received signal row vector of N samples. The spatio-temporal problem can thus be re-expressed as a weight vector determining problem.


For example, for covariance based methods, the weight vector is a “long” weight vector of size (MK by 1), the covariance matrix Rzz=ZZH is a matrix of size (MK by MK), and the correlation of the antenna signals Z with some signal represented by a (1 by N) row vector s is rzs=ZsH, a long vector of size (MK by 1). Rearranging terms in the “long” weight vector provides the required (M by K) weight matrix.


A downlink (i.e., transmit) processing strategy using adaptive smart antenna processing includes transmitting a signal, denoted in the finite sampled case by a (1 by N) vector s, from the communication station to a particular remote user by forming a set of antenna signals (typically, but not necessarily in baseband). Linear smart antenna processing determines the antenna signals as:

Z=wts,

where wt is the downlink (or transmit) weight vector. When SDMA is used to transmit to several remote users on the same (conventional) channel, the sum of wti for different signals si aimed at different remote users is formed, to be transmitted by the M antenna elements.


Note that a downlink strategy, for example including determining the downlink weights wt, may be implemented by basing it on an uplink strategy, for example uplink weights, together with calibration data. In this situation, the calibration accounts for differences in the receive and transmit electronic paths for the different antenna elements. The downlink strategy may also be found from the uplink strategy by using the transmit spatial signatures of the remote users, or by other known methods. Again, the weight vector formulation may be used for both linear spatial processing and linear spatio-temporal processing.


Consider a communications station communicating with Ns remote users on any channel. On the uplink, for an M antenna system, the M received signals at the base station can be stacked into an (M by 1) received signal vector z(t) which may be modeled as
z(t)=i=1Nsaisi(t)+v(t),(4)

where t is time, which in the preferred embodiment is discrete, si(t), i=1, . . . , Ns, denotes the signal (preferably in baseband) at time t transmitted by the ith of Ns remote users, a is the spatial (or spatio-temporal) signature (a complex valued M-vector) of the ith remote co-channel user, and v(t) denotes additive noise (which may include other interfering signals, viewed as noise for any remote user). Note that the signature of any user is the signal received at the M antenna elements in the absence of noise and the absence of any other interfering users when the user transmits a unit impulse signal (see above referenced above-referenced U.S. Pat. Nos. 5,592,490 and 5,828,658). In matrix form the above signal model can be represented as

z(t)=As(t)+v(t).  (5)

where

A=[a1a2 . . . aNs], and s1(t)=[s1(t)s2(t) . . . sNs(t)]T.  (6)

with the superscript T denoting the matrix transpose.


Processing Strategy Computation Methods


The preferred embodiment of the invention improves a method for computing an uplink or downlink processing strategy that uses as inputs the received antenna signal data and typically a reference signal, and that takes into account the interference environment present in the received antenna signal data for interference mitigation. The improvement is to deepen or otherwise modify the null depth the strategy provides for mitigating the effects of any one or more known interferers. As would be known to those in the art, interference mitigating strategy determining methods explicitly or implicitly use one or more characteristic features of the received antenna data. Depending on the known strategy computation method, the input signal data may be explicitly reduced to one or more particular characteristic feature that the known method explicitly uses for its computation. For example, for methods that use the spatial or spatio-temporal covariance matrix of the input, the data may be reduced to the spatial or spatio-temporal covariance matrix of the data. Other methods may be based on other properties and in such cases the input signal data may be reduced to the particular feature or property which the known strategy method utilizes. Yet other methods, while implicitly dependent on some property (e.g., spatio-temporal covariance) of the received signal, do not require explicit estimation of the property such as the covariance.


Since some of the discussion below applies for both receive and transmit strategy, the “r” or “t” subscripts are omitted in such quantities as the weight vectors w. Such subscripts may be used explicitly to identify uplink or downlink processing, and their addition will be clear from the context to those of ordinary skill in the art.


Let Z be the matrix of received antenna array signals, preferably but not necessarily in baseband. Let s1 be a (1 by N1) reference signal vector of N1 samples. A reference signal s1, may be a known training sequence, or, in decision directed methods, a signal constructed to have the same known modulation structure as the signal transmitted by the subscriber unit, or for property restoral methods, a signal that is constrained to have the required property.


The invention may be applied to deepen the nulls resulting from uplink or downlink strategies determined with any strategy computation method. Thus, in all of the embodiments of the invention to be described herein, a known strategy (e.g., weight) determining process is used that computes an uplink or a downlink strategy based on received signal inputs Z from the antenna array elements. Many such methods also use reference signal, denoted s1 determined for the remote user signal of interest from the received signal data Z. Such a strategy determining method is shown in FIG. 3, which is marked prior-art, but is only prior art without the modifications described herein. The reference signal is typically extracted from a set Z of received data as shown in FIG. 4. FIG. 5 is one case of the system of FIG. 3 wherein the method explicitly uses as an input at least one of the characteristic features of the set of received signal data Z, so in FIG. 5, the set of input data is further operated upon to obtain one or more characteristic features (e.g., the covariance, the principal components of the covariance matrix, a particular feature of the data, etc.) of the data, which is then explicitly used in the known strategy (e.g., weight) determining-method.


One example of a weight determining method that has the structure shown in FIG. 5 is the well known least squares (MSE) technique computes the uplink or downlink weights by solving the minimization problem:

w=argminw∥wHZ−s12=(Rzz)−1rzs=(ZZH)−1Zs1H,  (7A)

where Rzz=ZZH is the spatial (or spatio-temporal) covariance matrix of the antenna signals, ∥ ∥ denotes the vector norm, and rzs=Zs1H is the cross correlation between the antenna signals and the reference signal. The method of Eq. (7A) is called the minimum mean squared error (MMSE) method herein, and uses the covariance Rzz of the input signal data as the characteristic feature for weight determining. Thus, calculation of the weights according to Eq. (7A) requires having data corresponding to the signals received at the antenna elements and a reference signal. In practice, this typically entails identifying the reference signal data and extracting it from a data burst, forming the covariance matrix for the received signals in the data burst, forming the cross correlation term, and solving for the weights.


In practice, for example in a mobile PHS, because of limited computational power, only a small number of the 960 samples making up a received signal burst are used to determine Rzz−1. In addition, the samples are determined at the baud points rather than being oversampled. Using only a small number of samples to determine weights may cause what is called “overtraining” herein: the weights performing well on the data containing the reference signal but not on new data, i.e., while the weights extract the desired signal energy and reject interference, the weights may perform poorly on new data. An improvement to the least squares technique which can assist in this situation, includes a process termed “diagonal loading” (see, for example, B. L. Carlson: “Covariance matrix estimation errors and diagonal loading in adaptive arrays,” IEEE Transactions on Aerospace and Electronic Systems, vol. 24, no. 4, July 1988), by which a diagonal adjustment is added as follows:

w=(ZZH+γI)−1Zs1H,  (7B)

where γ is a small adjustable factor used to improve the performance of the least squares solution by reducing sensitivity to statistical fluctuations in Z.


The methods described by Eq. (7B) also is of the structure shown in FIG. 5, again with the characteristic feature being the spatial (or spatio-temporal) covariance Rzz=ZZH. Other uplink processing methods are known that use the noise-plus-interference covariance matrix, denoted Rvv, rather than the noise-plus-interference-plus-signal covariance matrix Rzz. Such methods include some noise plus interference covariance estimator which uses the received data (containing the signal plus interference plus noise) and the reference signal for the desired user to determine Rvv.


The invention includes two main aspects: (i) modifying the uplink or downlink strategy to realize an improved null, and (ii) accurately estimating the signature in the direction where a modified (e.g., deeper) null is desired followed by null deepening based on the estimate.


Null depth is generally limited by two effects. The first effect is the “natural” null depth of the uplink or downlink strategy. For example, when the signatures of the remote user and interferer are highly correlated, when the interferer power is not too strong, and when the signal-to-noise ratio (SNR) is modest, an uplink strategy based on maximizing the signal-to-interference-plus-noise ratio (SINR) will not direct particularly deep nulls towards the interferer. One aim of the present invention is to deepen the nulls formed under these conditions.


While a preferred embodiment is described in detail for deepening a null based on known or estimated signatures towards which the nulls are to be deepened, various embodiments are possible. They include using: synthetic signal injection, synthetic signal injection only for the “noise plus interference” estimation block, low-rank update of the noise plus interference estimate, and strategy orthogonalization. In the latter case, the uplink weights for two remote users that share a spatial channel are combined to construct weights with improved nulling performance, while again substantially preserving the rest of the null and gain pattern. These embodiments are detailed hereinunder.


The described methods for null deepening use a known or estimated signature. Known signature estimation methods such as simple (e.g., maximum likelihood) signature estimation of the interfering remote user may not produce a sufficiently accurate signature estimate for effective null deepening in the direction of the interfering remote user. This is because the estimate may suffer from contamination by the signal of the remote user to which delivered power is maximized. In the preferred embodiment, the method used includes joint signature estimation using the reference signals of both the remote user and any interferer(s). Geometric methods based, for example, on angle of arrival, may alternatively be used to estimate signatures which then are used for null deepening according to any of the signature-based null deepening embodiments described herein.


Another effect that limits null depth is the accuracy to which signatures or covariance matrices are estimated, which in turn is limited by the number of samples, the SNR of the remote user whose signature is to be estimated, and the power of other remote co-channel users. An additional aspect of the present invention is improving the signature estimate by combining data gathered over several bursts with reference signals of multiple remote users computed over the same bursts. This aspect of the invention is motivated by the recognition that the signature estimate of the interfering remote user must be accurate to a degree. To improve the null depth of a least-squares solution over a single burst, for example, the signature estimate typically may need be based on estimates derived from several bursts.


Null Deepening


Using the invention can deepen null towards one remote user or more than one users based on knowledge of the signatures of the one or more users. The signatures may be known or estimated, and one aspect of the invention is a method for estimating the signatures applicable to null deepening. For best performance, the signature estimate should be substantially free of contamination from signals to which beams are directed. The invention uses the signature (known or estimated) of one or more known interferers to modify a known strategy or known strategy determining method to produce a modified strategy with improved null deepening. The knowledge of the signatures may be, for example, from historical signature records.


For the description below, the desired remote user is denoted SUi, and the weight vector for communicating with SUi is denoted by wi. When communicating with SUi, all is other users, denoted SUj where j is not i, are interferers, and the signature for such interferers are denoted aj, where j is not i.


The Signal Injection Method


A first embodiment of the invention applicable to one null-deepening based on the known or estimated signature of one interferer denoted SUj with signature (estimate) aj is shown in FIG. 6. A signal formed from the estimated or known interferer signal is scaled and added to the received signal data Z before determining the strategy, that is, modified received signals described by

{circumflex over (Z)}=Z+αjâjssynth,

with αj a tunable scale factor for any interferer j. ssynth is any signal that has the same temporal structure as a typical communication waveform used in the system, or preferably, a temporal structure that would be identified by the particular strategy computation method as not that of the user. For example, for a constant modulus property restoral method, using a non-constant modulus structure for ssynth ensures that the strategy computation method recognizes this as an interferer. In the preferred embodiment, however, ssynth comprises N random noise samples. In another embodiment, this is a constant signal, that is, the signal [1 1 . . . 1]. The scale factor of for any interferer j can be set to a large fixed, value to force a deep accurate null towards that undesired subscriber unit signature. The modified input signal {circumflex over (Z)} is then applied to any strategy determining scheme, including the ones shown in FIG. 3 and FIG. 5.


A generalization of this embodiment, called “signal injection” herein is illustrated in FIG. 7. Here, nulls are directed to several interferers denoted SUj where j is not i. Signals are formed from the estimated (or known) signatures of the undesired subscriber units, then are scaled and added to received signal data Z before determining the strategy, that is, modified received signals described by:
Z=Z+jiαja^jssynth_j,(8)

with αj a tunable scale factor for any interferer j, are used in place of Z and applied to the strategy determining method, say that of FIG. 3 or that of FIG. 5. for processing SUi signals. The scale factor αj for any interferer j can be set to a large fixed value to force a deep accurate null towards each undesired subscriber unit signature. Each of the Ssynthj is any signal that has the same temporal structure as a typical communication waveform used in the system and that would be recognized a non signal of interest, and Ssynthj for any interferer j must be non-collinear with any Ssynthj for any other interferer j′. Again, in the preferred embodiment, each Ssynthj is a set of random samples, with the sets for two distinct interferers being statistically independent.


An improved embodiment makes αj a function of the relative power levels: transmitted to SUi and jth subscriber units, or to any similar measure derived from received signal strengths, thus forming deep nulls in a controlled way only where needed. That is, the nulls are strong where strong nulls are needed and weak where such strong nulls are not needed. Thus forming weak nulls where allowable would reserve degrees of freedom for use elsewhere, for example to null additional noise sources.


The parameter setting method is described in more detail later in this document.



FIG. 8 shows an embodiment of the signal injection method for the case of null-deepering for one interferer for a covariance based strategy determining method. FIG. 9 shows an embodiment of the signal injection method for the case of null-deepening for one interferer for an interference-plus-noise covariance based strategy determining method.



FIG. 10 is a block diagram showing an embodiment of the inventive method applied to a non-linear strategy generator, where the strategy generator includes a demodulation stage. This may be a Viterbi-algorithm-based decoder which operates based on branch metrics, for example. The invention is shown supplying a modified noise-plus-interference covariance to a demodulator, with the modification based on the signal injection method. The resulting strategy is then applied to some new input data. The demodulator, in this case, may be a Viterbi-algorithm based demodulator in which covariance information is, used to “whiten” (i.e., decorrelate) the input data, in this case the new input data. In an alternative, the reference data might also be used to estimate the channel, and provided in the form needed for the Viterbi-method in the demodulator.


Note that while the signal injection methods preferably involve adding a fraction of the “synthetic” signal generated from the one or more known or estimated interferer signatures, other, non-additive, methods of combining also are within the scope of the present invention. This is shown in FIG. 11. For example, one method for combining includes performing a matrix factorization of the input data and the synthetic data into factors, and then combining the resulting factors to form a combined signal. The factorization may be a generalized singular value decomposition.



FIG. 12 is a block diagram showing a general application of the inventive method as used to process data in the downlink data. As shown in FIG. 12, an uplink strategy generator (e.g., a weight determining method) is based on a reference signal (obtained from the primary data) and a set of data. In accordance with the present invention, the data input to the strategy generator is a combination of the input data and a signal generated from one or more known or estimated interferer signatures. The output of the strategy generator is a set of parameters which is used in the processing of the downlink data. In the linear spatial processing case, the parameters may be a set of weights. Note that the parameters produced by the strategy generator may be combined with calibration data to produce the required downlink strategy parameters for processing of downlink data.


Strategy Orthogonalization Method.


According to this implementation, for the ith remote user, a strategy (e.g., a weight vector ŵi) is determined that is orthogonal to the to'estimated (or known) interferer signature(s) aj. Moreover, the strategy is determined from the strategy (e.g., a weight vector wi) for the desired user-SUi and the strategy (e.g., a weight vector wj) used to communicate with the interferer j. The strategies for the user and interferer, respectively, for example weight vectors wi and wj, respectively, may be obtained using some known strategy determining method, for example that of FIG. 3 or FIG. 5 (including using Eq. (7A) or Eq. (7B)).


In the linear strategy case, assume a linear strategy wi (spatial or spatio-temporal) exists for receiving from or transmitting to a desired remote user, say the ith, and another linear strategy wj for receiving from or transmitting to an interferer, say the jth users, where j≠i, where wi and wj have substantially the same null and gain patterns, except of course that wi nulls the interferer and wj nulls the desired remote user i because when communicating with the interferer, the remote user is an interferer. According to this embodiment of the invention, the improved strategy is

ŵi=wiαjwj,  (9)

where the scalar tunable factor αj is chosen to make ŵi orthogonal to the interferer signature aj. That is, αj is chosen so that ajHwi=0. This is obtained with

αj=−ajHwi/ajHwj.


A generalization when one has a number of interferers to which nulls are to be deepened is, given a strategy wi to a desired user i, and several weight vectors wj, j≠i for interferers, then the strategy (i.e., weight vector) to use is
w^i=wi+jiαjwj,

where the αj are chosen to ensure that the modified strategy ŵi is orthogonal to the interferer signatures aj, j≠i.


Another particular orthogonalization implementation that modifies the strategy wi to be orthogonal to all known interferer signatures is,
w^i=wi-j1γja^j,

where factor γj is chosen to make ŵi orthogonal to all the interferer signatures aj, j≠i. The factors γj may be computed using Gram-Schmidt orthogonalization, which in the case of a single interferer j leads to
γj=wiHa^ja^j2.

A disadvantage of the this forced signature orthogonalization method, however, is that it may disturb nulls which were formed towards “coherent” noise sources (e.g., from neighboring cells in a cellular system) or towards other incoherent interferers, and may have an effect on the “main lobe” towards the desired SU. Therefore, the preferred strategy orthogonalization method is that of Eq. (9) or its extension to multiple interferers.


Covariance Modification


A third embodiment is applicable to strategy determining methods that use an estimate of the spatial or spatio-temporal covariance (including the interference-plus-noise covariance) determined from the input signal (and possible a reference signal) to determine the strategy. The methods of Eqs. (7A) and (7B) so use the covariance to determine a weight vector. One embodiment of the invention adds some information from the interferer signatures to data used by the covariance estimator of the known weight determining method. For example, if the known weight computation method of Eq. (7B) is used, according to this embodiment of the invention, the weights to use are determined as:
w^=(ZZH+γI+jiαjajajH)-1ZsiH,(10)

where Z is the received data, and αj again a tunable scale factor for any interferer j, set as described above for the signal injection method.


Many modifications are possible within the scope of the invention. In general, any uplink (i.e., receive) processing method which takes as input a spatial covariance matrix Rzz=ZH computed from input data Z can be modified by altering the spatial covariance matrix Rzz to incorporate the effects of the interferers towards which the nulls are desired to be deepened, the modification being:
R~zz=(ZZH+jiαjajajH).(11)

Note that in the preferred embodiment, the weight determining method to which the invention is applied takes as input a spatial covariance matrix Rzz and a reference signal cross correlation rzs=ZsiH.



FIG. 13 shows one version of this embodiment. The weight strategy computation method is one that uses covariances to determine spatial (or spatio-temporal) weights. These weights might be uplink weights, or may be downlink weights. The known scheme is modified using an aspect of the present invention to determine weights that include interference mitigation based on signature data on known interferers. The computation required includes estimating the known interferer spatial signatures when such spatial signature estimates are unavailable, and also estimating the covariarnce of those signature estimates and adding a tunable fraction of these interferer covariances to the covariance estimate determined from the received data.


Other covariance matrix modifications also are possible within the scope of the invention. In yet another alternative shown in FIG. 14, rather than the combining of the interferer data being by adding part of the interferer covariance matrix to the input signal covariance matrix, other methods of combining could be used. For example, the method for combining may includes performing a matrix factorization of the input data and of the signatures into factors, and then combining the resulting factors by one of several methods to form a combined covariance matrix.


This embodiment can also be applied to processing methods that use the noise-plus-interference covariance matrix, denoted Rvv, rather than the noise-plus-interference-plus-signal covariance matrix Rzz. Such methods include some noise plus interference covariance estimator which uses the received data (containing the signal plus interference plus noise) and the reference signal for the desired user to determine Rvv. An embodiment of the invention used in such a method is shown in FIG. 15, which shows one embodiment of the method of the invention applied to such Rvv-based techniques, with Rvv substituted for Rzz. That is, for Rvv obtained from the signal data, a modification
R~zz=(Rvv+jiαjajajH).(12)

is made, where again the parameters aj are tunable, and preferable determined from power control as described hereinbelow.


Setting the Tunable Parameters


Many strategies for selecting the parameters αj are possible within the scope of the invention, and some possible strategies are now described.


Strategy 1 (applied, for example, to Signal Injection)


Recalling that according to the signal injection embodiment, after obtaining precise signature estimates âj (or knowing the signatures) of the interferers, given a strategy computation method for determining the strategy for user i from the received signal Z (and possible a reference signal for user i), from the received signal Z is modified to

{circumflex over (Z)}=Z+Σj≠iαjâjssynth j

where ssynthj is an artificially synthesized signal for the jth interferer. According to a first parameter determining strategy, the parameter αj is a large constant chosen to be sufficiently large to ensure that the carrier to interference ratio (CIR) in the modified received signal {circumflex over (Z)} is small. In this case, the base station is forced to place a deep null towards the jth subscriber unit, where j≠i, for a strategy to the ith user. The carrier to interference ratio is easily estimated as the ratio of what is indicated by the received signal strength indicator (RSSI) typically available at a receiver to the interferer power, which is being controlled by a large value of the parameter.


It is interesting to note that for an interference mitigating strategy computation method that uses a reference signal for interference mitigating, such as those of Eq. (7A) and (7B), in the limit when αj→∞, the transmit weight for the ith user is orthogonal to âj.


For the covariance modification method, note that the covariance of an input signal includes terms from each of the constituent signals in the input received signal Z. A practical covariance estimate may include cross terms, so approximately includes terms from each of the constituent signals in the input received. The covariance modification changes the interference constituents reflected in the covariance estimate. According to this strategy 1 when applied to the covariance modification method, the adjustable parameter for any interferer is selected to be a number sufficiently large to ensure that the carrier to interference ratio reflected by the modified covariance estimate is small.


Strategy 2 (applied, for example, to Signal Injection)


This strategy uses some knowledge of the transmitted power towards or from each subscriber unit. On the downlink, this information is usually readily available in a typical base station in the downlink power control unit. According to this parameter tuning strategy; the parameters αj are chosen in such a way that the power distribution of the constituent signals in {circumflex over (Z)} is inversely proportional to the distribution of the downlink power that the base station transmits towards the subscriber units.


In order to find exact formulas for αj, one notes that the received signal Z may be modeled as

Z=aisij≠iajsj+v,  (13)

where v is (non-co-channel) interference plus noise, ai and si are the signature of and transmitted signal from the remote user of interest, and the aj and sj are the signatures of and transmitted signals, respectively, of the interferers, where j≠i. Recalling that according to the signal injection embodiment, after obtaining precise signature estimates âj (or knowing the signatures) of the interferers, the received signal Z is modified to

{circumflex over (Z)}+Z+Σj≠iαjâjssynthj

where ssynthj is an artificially synthesized signal for the jth interferer. Combining the model of Eq. (13) with the signal injection to give the following equation for the is modified received signal:

{circumflex over (Z)}=aisij≠i(ajsjjâjssynthj)+n.

Assuming that the signals sj and ssynthj are uncorrelated, the average powers of the constituent signals in {circumflex over (Z)} due to the desired user i and the jth interferer, j≠i, are given by ∥ai2σi2 and {∥aj2σj2+|αj|2∥âj2σ2synthj}, respectively, where σj2 denotes the average power of signal sj and σ2synthj denotes the average power of the synthesized signal. Note that the constituent due to the jth interferer is a function of tunable parameter αj.


Denote by Pj the power of the downlink signal that the base station transmits towards the jth remote user. The design objective of strategy can be expressed as follows:


Choose the tunable parameters αj so that the ratio of the average powers of the remote user i and each co-channel interferer j is the same as the ratio of the powers used to transmit to the interferer j and the remote user i. By using the approximation ∥aj∥≈∥âj∥,
αj2=1σsynth_j2(Pia^i2Pja^j2σi2-σj2).


By adding the constraint that αj must be a positive real number, it follows that, when Pi∥âi2σi2>Pj∥âj2σj2,
αj=1σsynth_jPia^i2Pja^j2σi2-σj2.


When Pi∥âi2σi2≦Pj∥âj2σj2, then there is no need for null deepening, and therefore a value of zero is used for αj.


In many systems, the remote user signals have approximately the same average power (σijsynth), so that a simplified power based strategy sets the tunable parameters αj as a functions of the ratio of the power used to transmit to the remote user to the power for transmission to the remote user, and the ratio of the square of the vector norms of the remote user and the interferer. Mathematically, when Pi∥âi2>Pj∥âj2,
αj=Pia^i2Pja^j2-1.


Again, when Pi∥âi2≦Pj∥âj2, there is no need for null deepening, which is equivalent to a value of zero being used for αj.


Note that when applied to the covariance modification method, according to this strategy 2, the adjustable parameter for any interferer is selected to approximately maintain the same ratio of interferer power to remote user signal power reflected in the constituent parts of the modified covariance as the ratio of respective interferer power to remote user transmit power used to transmit to the respective interferer and the remote user, respectively.


Strategy 3 (Applied, for Example, to Covariance Modification)


In addition to the tunable parameter setting method described above using the signal injection method as an illustrative example, another feature of the invention is determining exactly the parameter setting for an amount of null depth required in null deepening when using the any of the inventive null deepening methods.


For sake of simplicity of notation, we'll consider the case where there are two dominant co-channel users (e.g., two spatial channels), users i and j. The method can be easily extended to more users. The covariance modification method and the strategy orthogonalization method will be considered as examples.


In the linear strategy case, assume a modified linear strategy ŵi (spatial or spatio-temporal) exists for receiving from or transmitting to a desired remote user, say the ith, with an interferer j and using parameter αj to obtain the “null deepened” strategy ŵi. Similarly, assume that another modified linear strategy ŵj exists for receiving from or transmitting to an interferer, say the jth user, where j≠i, the modification using parameter αj, with ŵi and ŵj have substantially the same null and gain patterns, except of course that wi nulls the interferer and wj nulls the desired remote user i because when communicating with the interferer, the remote user is an interferer.


According to this third strategy, applicable to the case of the strategy applied in the downlink, the parameters αi and αj are chosen to minimize total transmit power, subject to the constraints that the signal quality experienced by each co-channel user (e.g., i and j) in the set including the particular remote user of interest and at least one of the one or more interferers present, meets or exceeds some prescribed quality of service. Several measures of signal quality may be used, and the signal-to-interference-plus-noise ratio (SINR) is preferably used. Using the model of Eq. (13) that

Z=aisi+ajsj+v,

where v is the interference (other than user j) and noise, and assuming a modified linear strategy ŵi and ŵj for remote users i and j, respectively, estimates of the SINR of the two co-channel users are
SINRi=w^iHai2w^iHaj2+σi2andSINRj=w^jHaj2w^jHai2+σj2.

Therefore, determining the parameters αi and αj that minimize the total transmit power subject to the SINR being above some threshold SINRthresh is solving

arg min i, αj}{∥ŵi2+∥ŵj2}

subject to

SINRi≧SINRthresh and SINRj≧SINRthresh,

where ŵi and ŵj are the strategies for user i and j respectively after applying null deepening with parameters αi and αj using any of the inventive null deepening method embodiments.


As an example, consider the covariance modification embodiment decribed by Eq. (11) applied to the weight computation method described by Eq. (7A). To determine the parameter αi, we first apply the well known matrix inversion lemma to the combination of Eq. (7A) and Eq. (11) to obtain an expression for wi in terms of the quantities Rzz−1, rzsi=ZsiH, αi, αj, ai, and aj. In particular,
w^i=Rzz-1rzsi-αj2Rzz-1ajajHRzz-1rzsj1+αj2ajRzz-1ajH.


Note that except for αi, and αj, all of the quantities in this expression and in the constraint expressions for SINRi and SINRj can either be readily estimated (σi2, σj2 ai, and aj.) or else are already computed (Rzz−1, rzsi, and rzsj). Hence, the SINRi and SINRj constraint equations can be written as
l=02m=02cl,mi(αi2)l(αj2)m0(14A)

where the constants icl,m are defined in terms of σi2, σj2 ai, aj, Rzz−1, rzsi, rzsj, and SINRthresh.


Similarly, the total power cost function P={∥{tilde over (w)}i2+∥{tilde over (w)}j2} can be expressed as
P=di,1(αi2)2+di,2αj2+di,3di,4(αi2)2+di,5αi2+1+dj(αj2)2+dj,2αj2+dj,3dj,4(αj2)2+di,5αj2+1.(14B)


Eqs. (14A) and (14B) constitute a constrained nonlinear optimization problem in αi2 and αj2, and can be solved numerically using any of many known nonlinear constrained optimization techniques, as would be clear to one of ordinary skill in the art. In practice, one interferer tends to dominate among co-channel users, namely the user farthest away. Applying null-deepening to this dominant interferer alone accrues most of the gains. In this case, the optimization problem is considerably simplified, since there is then only a single variable, αj2 over which the solution needs to be optimized. The constraints are then quadratic in αj2.


Note the above description of parameter setting methods is not meant to be limiting. It would be clear to those in the art that many other alternate parameter setting strategies are possible for the invention.


Improved Signature Estimation


The interferer signatures to use in any of the above embodiments may be known signatures, for example, from known records. If the signatures are not known, the signatures maybe estimated using any method, including those now described.


Consider two subscriber units, denoted SUi and SUj, respectively. When communicating with SUi, for example, SUj is an interferer. The null deepening methods described above all require known or estimated signatures of the known interferers. An improved method for estimating signatures applicable to null deepening is now described.


When the received signals are sampled, say with N samples, the base station computes the weight for the ith remote user. Many-methods are possible for the weight computation, including by the methods described by Eqs. (7A) and (7B). That is, the weight to use for the ith remote may be determined by

wi=argminw∥wHZ−si2=(Rzz)−1rzsi=(ZZH)−1ZsiH,

or in an improved version, by

wi=(ZZH+γI)−1ZsiH,

where si is an estimate, for example the reference signal for the ith transmitted signal, and i=1, 2, . . . , Ns, the number of co-channel users. Note that the quantity rzsi=ZsiH is computed at the base station for each remote user i in order to form weights to determine each of the signal estimates si. This observation motivates one known method of estimating the signature of the ith remote user, which under the assumption of white noise, gives the maximum-likelihood (MLE) estimate when there is only a single subscriber unit. That estimate is

ãi=ZsiH(sisiH)−1,  (15)

where si is the reference signal for the ith remote user. The (sisiH)−1 term is a scalar factor used for normalizing the signature.


When other remote users share the same channel, the spatial signature estimate of Eq. (15) is contaminated by cross correlations between signatures. This may be seen by combining the model of Eq. (4) with Eq. (15), to obtain
ZsiH=aisisiH+j1ajsjsjH+VsiHwherematrixVisV=[v(1)v(2)v(N)].(16)

The second term of Eq. (16) is implicitly assumed to be zero in the prior-art signature estimation method described by Eq. (15), but this assumption is inaccurate for short data sequences as encountered in practical systems, such as in the wireless local loop (WLL) system base station and the mobile PHS base station in which the method of present invention is implemented.


Another method for signature estimation takes these cross-correlation terms into account. Let S is the matrix with the Ns reference signals as the rows. That is,
S=[s1s2sNs].


Let A be a matrix having the Ns signature values as columns. That is, A=[a1 a2 . . . aNs]. Then the MLE solution is

Â=arg minA||Z−AS||2=ZSH(SSH)-1   (17)

where  is the matrix having the signatures estimates as columns,

Â=[â1 â2 . . . âNs].  (18)

See for example, A. Lee Swindlehurst, S. Daas, J. Yang: “Analysis of a Decision Directed Beamformer, IEEE Trans. on Sig. Proc. Vol. 43, No. 12, pp. 29202927, December, 1995.


For Ns=2 remote users, the estimates of Eq. (17) can be expressed as
a^1=Zs1Hs22-s2H(s2s1H)s12s22-s1s2H2and(19)a^2=Zs2Hs12-s1H(s1s2H)s12s22-s1s2H2,(20)

respectively.


While the estimator of Eq. (17) gives an accurate signature estimate, it is computationally complex. The third signature estimation method described herein is an iterative method which is computationally simpler than that of Eq. (17) but provides for a more accurate estimate than that of Eq. (15).


The method is first described for the case that the base station is (or is assumed to lo be) handling two spatial channels (i.e., two remote users communicating with the base station on the same carrier and in the same time slot), or that there is one spatial channel and a known interferer. The signature estimate for the second remote user (the interferer) can then be computed as follows:

    • Step 1: Compute the an estimate (if a1 using any known method, for example, that of Eq. (15):

      ã1=Zs1H(s1s1H)−1  (21)
    •  where s1 is the reference signal for SU1.
    • Step 2: Subtract from the received signal an estimate of the contribution of the first remote user:

      {tilde over (Z)}=A−ã1s1,  (22)
    • Step 3: Compute the improved estimate of a2 using the received signal with the first user estimated contribution removed:

      â2{tilde over (Z)}s2H(s2s2H)−1,  (23)
    •  where s2 is a reference signal obtained for the second remote user. That is, one needs to have a reference signal for the interferer towards which one is directing the null.


Since the correction term subtracted from Z in Eq. (22) is itself an approximation, iteratively repeating Eqs. (22) and (23) may improve the estimate further. For the case in which Eq. (15) is used in step 1 above, substituting Eqs. (21) and (22) into Eq. (23), one obtains
a^2=Z[I-s1H(s1s1H)-1s1]s2H(s2s2H)-1=Zs2Hs12-s1H(s1s2H)s12s22.(24)

Eqs. (24) and (20) differ only by a constant, so the recursive method in this case converges to the MLE solution (within a scale factor) in one iteration.


This recursive method can be extended to incorporate an arbitrary number of remote users. A method for Ns=3 is as follows. To estimate the signature for some additional remote user, denoted SU3, with three remote users Ns=3:

    • Step 1: Compute ã2 using any known method, for example the method of Eq. (21) (applied however to SU2).
    • Step 2: Form the decorrelated estimate which removes the SU2 contribution

      ã2={tilde over (Z)}s2H(s2s2H)−1,  (25),
    •  where {tilde over (Z)} is given in Eq. (22), but applied for SU2.
    • Step 3: Iterate the estimate of a1 with the value of ã2 just found,

      ã11=(Z−ã2s2)s1H(s1s1H)−1.  (26)
    • Step 4: Compute the estimate of the desired SU3 signature,

      â3=(Z−ã11s1−ã2s2)s3H(s3s3H)−1,  (27)
    •  where s3 is a reference signal for the user SU3.


Estimation of signatures for two remote users, SU1 and SU2, with Ns=3 results from appropriately changing the indices in this procedure.


A generalization of the iterative method is as follows for the general case of Ns signatures to be estimated:

    • Step 1: Assume some initial estimates. For example, assume the starting values are those given by Eq. (15), i.e., ãi=ZsiH(sisiH) for i=1, . . . , Ns.
    • Step 2: Obtain an estimate for each signature, while keeping the values of the remaining Ns−1 signatures to be the most recently determined estimate values, each of these fixed most recently determined estimate values initially being the initial value from step 1, and later being either the values determined when this Step 2 was previously applies to another signature in the same iteration, or, for those signatures for which no estimate has yet been obtained during the current iteration, the estimate from the most recent previous iteration. Denoting the jth user's estimate by âj, this jth signature estimate is obtained as the solution to

      âj=arg minaj||Z−AS||2,
    •  while the other Ns−1 values are so fixed, where again A=[a1 a2: . . . aNs]. Repeat this procedure for all j=1, 2, . . . , Ns, replacing the value at which any signature estimate is fixed to be the most recently obtained estimate value.
    • Step 3: Repeat Step 2 iteratively until convergence is reached.


To further improve signature estimation, in another aspect of this invention, each desired signature estimate âj is singular value decomposition-averaged (SVD-averaged) over successive signal streams (i.e., bursts) to reduce the contribution of the noise-related error term in Eq. (15). One method of performing SVD averaging comprises stacking up the signatures to be combined as the columns of a matrix, then performing the SVD of the resulting matrix. The SVD averaged value is then taken as the left singular vector corresponding to the largest principal value. An alternate SVD-averaging embodiment uses a weighted moving window (last few signatures) SVD average which favors recent data. Other combining methods also may be used.


To see how having a better signature estimate improves the null deepening, consider the case of two users, user SUi and user SUj, with SUi being the desired user and SUj the interferer, and let

âj=aj+μai

be the estimate of the interference signature aj, where ε is the estimation error orthogonal to ai, the signature of user SUi, and (μai) is the estimation error in the direction of ai.


The null deepening methods described herein direct a null in the direction of âj and a gain in the direction of ai. Thus, if we want a good null in the direction of aj, we must have both μ very small, and a good null in the direction of ε (even if ε is comparatively large). One case for which the term μ may be undesirably large occurs when the desired remote user signal is present in the received data and when the signature aj is estimated using Eq. (15), i.e., using cross-correlation with the reference signal sj. A smaller value of μ allows a deep null to be directed in the direction of ai. The term μ can be greatly reduced by estimating the interferer signature âj using Eq. (17) for joint maximum likelihood estimation on the reference signals corresponding to both the remote user and the interferer, or by using the iterative method. In each case, a deep null may then be directed in the direction of âj.


Results of Simulations


To see how having a better signature estimate-improves the null deepening, consider the case of two users, user SUi and user SUj, with SUi being the desired user and SUj the interferer, and let

âj=aj+e

be the estimate of the interference signature aj, where e is the estimation error.


Assume also that for the purpose of this performance analysis, the received signal may be modeled as

Z=aisi+ajsj+v,

where v represents temporally white noise and interference.


For the signature estimation method described in Eq. (15) and for the improved method described in Eq. (17), the signature error covariance E[e eH] is, up to a constant of proportionality, approximately equal to E[v vH]+μai aiH, where for the method of Eq. (15), μ is proportional to the SNR of SUi and for the method of Eq. (17), μ is nearly zero.


In one embodiment of the invention, a weight {tilde over (w)}i is computed that is close to the MMSE weight wi such that {tilde over (w)}i is nearly orthogonal to âj. Thus,

0={tilde over (w)}iHãj={tilde over (w)}iH{tilde over (w)}iaj+{tilde over (w)}iHe.

If we choose to measure null depth by the expected squared dot product

ND=E[|{tilde over (w)}iHaj|2],

then the null depth approaches zero (the depth of a perfect null) if
E[w~iHe2]=E[w~iHE[eeH]w~i]E[w~iHE[vvH]w~i]+μE[w~iHaiaiHw~i]

also approaches zero. The term E[{tilde over (w)}iH E[v vH] {tilde over (w)}i] n the right hand side of the above equation tends to be small for any interference-mitigating weight {tilde over (w)}i (e.g., for a weight determined using a reference signal of the desired user signal, such as the methods of Eq. (7A) or Eq. (7B)). The μE[{tilde over (w)}iHai aiH{tilde over (w)}i] term, however, is small only if μ is small, because the weight {tilde over (w)}i delivers power towards the signature ai of the desired user SUi. Thus the method of Eq. (17) for signature estimation—which has μ close to zero—will often yield improved null depth compared to the method of Eq. (15).


Simulations were used to evaluate the performance of several embodiments of the present invention.


The uplink signal was formed by adding three equal-power simulated subscriber unit signals, each consisting of 50 symbol-spaced samples of a randomly generated π/4 DQPSK baseband waveform. The simulation used a 12-element antenna array for both transmission and reception. Uplink spatial signatures were drawn randomly and uniformly from the complex 12-sphere; uplink and downlink signatures were assumed equal. Additive white Gaussian noise was added to the uplink signal to set the received SNR equal to 12 dB, where SNR is measured at the output of an ideal interference-free linear beamformer.


Performance was computed by Monte-Carlo averaging over 1000 independent to runs.


Signature estimation was performed using both the single-user maximum-likelihood method of Eq. (15) and the two-user maximum-likelihood method of Eq. (17).


Signatures were averaged using SVD averaging over Navgs=1, 2, 4, 8, and 16 bursts.


The accuracy of signature estimation was evaluated using the dot product
c=a^jHaja^jaj.


Three nulling strategies were computed: the baseline MMSE strategy of Eq. (7A), a null-deepened strategy computed using signal injection method with αj=1000, and a null deepening strategy using weight orthogonalization. Null depth was measured by the expected dot product
ND=w^jHajw^jaj.

The simulated received data used to compute the signature estimate was reused to compute the null-deepened strategy.


The null depth NDMMSE of the baseline prior-art MMSE method was compared to the null depths NDsiginj and NDsiginj of the inventive signal injection and inventive orthogonalization methods, respectively, using the quantities

dBsiginj=20 log10(NDMMSE/NDsiginj),

and

dBorthog=20 log10(NDMMSE/NDorthog),


respectively. Median results over 1000 nuns are tabulated below.

Navgsc (eq 15)c (eq 17)dBsig_injdBorthog10.97920.98690.86 dB0.78 dB20.98960.99303.80 dB3.94 dB40.99420.99656.76 dB6.75 dB80.99710.99849.94 dB9.93 dB160.99870.999212.5 dB12.6 dB


As can be seen from the table, the results were almost identical for the two embodiments of the invention. Also, as can be seen from the table and from FIG. 16, doubling the number of bursts over which the signature estimate is averaged increases the null depth improvement by roughly 3 dB.


The simulations also confirmed that the depth of the null directed towards the second interferer (i.e., the interferer towards which no deepening was performed and no signature estimation carried out) was not significantly affected by the signal injection method or orthogonalization embodiments of the inventive method.


Other Embodiments

In another embodiment, an explicit signature estimate is not needed, and instead the uplink weights for two co-spatial remote users are combined to construct weights with improved nulling performance, while again substantially preserving the rest of the null and gain pattern.


Note that the apparatus and method of the present invention does not need to explicitly identify any new interferer waveforms. Note also that the various embodiments of the invention can be used for smart antenna processing on the downlink, or for smart antenna processing on the uplink. That is, the embodiments can be used on the downlink for smart antenna processing signals that are received at the antenna elements of an antenna array which is part of a wireless receiver, or on the uplink for smart antenna processing a signal to be transmitted to form signals for transmission by the antenna elements of an antenna array which is part of a wireless transmitter. In general, the term “wireless station” therefore may be used for: (i) a receiver having an array of antenna elements; (ii) a transmitter having an array of antenna elements; or (iii) a transceiver having an array of antenna elements for both reception and transmission.


Several aspects of the invention described herein were described implemented as programs run on one or more DSP devices. Given sufficient economic incentive, DSP functionality, including DSP programs, may be incorporated into special purpose hardware, for example as part of an application specific integrated circuit (ASIC) or as part of a very large scale integrated circuit (VLSI). DSP functionality may also be met by other processors, for example a general purpose microprocessor. In addition, a DSP device running a program may be converted into a special purpose piece of hardware. Thus, the terms processor, digital signal processor, DSP, and DSP device as used herein include these equivalent alternatives.


The terms and expressions which have been used herein are used as terms of description and not of limitation, and there is no intention in the use of such terms and expressions of excluding equivalents of the features shown and described, or portions thereof, it being recognized that various modifications are possible within the scope of the invention claimed.

Claims
  • 1-55. (canceled)
  • 56. A subscriber device comprising: a processor of the subscriber device to compute an antenna processing strategy for a remote unit, the computation based at least in part on received signal data; and circuitry of the subscriber device coupled with the processor, the circuitry to incorporate interferer signature data relating to one or more interferers with the received signal data to modify the processing strategy by reducing one or both of antenna transmit signal strength in, and sensitivity of the antenna to signals from, one or more interferers.
  • 57. The subscriber device of claim 56, further comprising electronics to communicate with the remote unit using a communication channel selected from frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA).
  • 58. The subscriber device of claim 56, further comprising electronics to communicate with the remote unit using one or more conventional communication channels, wherein at least one of the one or more conventional communication channels includes one or more spatial channels.
  • 59. The subscriber device of claim 56, wherein the circuitry to incorporate the interferer signature data relating to each interferer further comprises a combiner coupled with the processor to provide a combination of the received signal data and the signature data, the processor to compute a modified antenna processing strategy based, at least in part, on the combination.
  • 60. The subscriber device of claim 59, wherein to provide a combination of the received signal data and the signature data further comprises the circuitry to modify one or more characteristic features of the received signal data with an estimate of the one or more characteristic features in the signature data.
  • 61. The subscriber device of claim 59, wherein the signature data comprises a known signature for the one or more interferers.
  • 62. The subscriber device of claim 59, wherein to incorporate interferer signature data further comprises: a signature estimator circuit coupled with the circuitry to estimate the signature of one or more of the interferers; and the processor to modify the antenna processing strategy by incorporating the estimate as the interferer signature data.
  • 63. The subscriber device of claim 59, wherein to compute an antenna processing strategy comprises the processor to generate a set of weights to apply during processing for the remote unit, and wherein to modify the processing strategy comprises the circuitry to adjust the set of weights.
  • 64. A subscriber device comprising: a processor of the subscriber device to compute an antenna processing strategy from a set of signals received by an antenna array to apply to received signals to determine an estimate of a signal transmitted by a remote unit, or to apply to transmit a signal for transmission to the remote unit with the antenna array; and a mechanism of the subscriber device to modify the computed antenna processing strategy by incorporating interferer signature data for each of one or more interferers, each interferer characterized by a signature, the interferer signature data related to the signature of each of the interferers, wherein the modified antenna processing strategy, if a downlink strategy, decreases a transmit signal strength in a direction of the one or more interferers, and, if an uplink strategy, decreases a sensitivity to signals from a direction of the one or more interferers.
  • 65. The subscriber device of claim 64, further comprising electronics to communicate with the remote unit using a communication channel selected from frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA).
  • 66. The subscriber device of claim 64, further comprising electronics to communicate with the remote unit using one or more conventional communication channels, wherein at least one of the one or more conventional communication channels includes one or more spatial channels.
  • 67. The subscriber device of claim 64, further comprising a signature estimation processor to estimate the signature of at least one of the one or more interferers to form the interferer signature data for the respective interferer.
  • 68. The subscriber device of claim 64, wherein the interferer signature data for at least one of the one or more interferers includes a known signature for the respective interferer.
  • 69. The subscriber device of claim 64, wherein the processor is to determine a linear antenna strategy by a set of weights, and wherein the mechanism modifies the set of weights.
  • 70. A method comprising: computing an antenna processing strategy for a remote unit, based at least in part on a received signal data; and modifying the antenna processing strategy by incorporating signature data relating to one or more interferers with the received signal data to reduce one or both of antenna transmit signal strength in, and sensitivity of the antenna to signals from, the one or more interferers.
  • 71. The method of claim 70, performed by a subscriber device.
  • 72. The method of claim 70, further comprising communicating with the remote unit using a communication channel selected from frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA).
  • 73. The method of claim 70, further comprising communicating with the remote unit using one or more conventional communication channels, wherein at least one of the one or more conventional communication channels includes one or more spatial channels.
  • 74. The method of claim 70, wherein incorporating signature data relating to one or more interferers comprises: combining the received signal data and the signature data; and computing a modified processing strategy based, at least in part, on the combination.
  • 75. The method of claim 74, wherein combining the received signal data and the signature data further comprises modifying one or more characteristic features of the received signal data with an estimate of the one or more characteristic features in the signature data.
  • 76. The method of claim 75, wherein the estimate includes a selectable parameter.
  • 77. The method of claim 75, wherein the estimate of the one or more characteristic features of the received signal data comprises an estimate of the covariance of the received signal data.
  • 78. The method of claim 70, wherein the signature data comprises a known signature for the one or more interferers.
  • 79. The method of claim 70, wherein modifying the antenna processing strategy by incorporating signature data further comprises: estimating the signature of one or more of the interferers; and modifying the antenna processing strategy by incorporating the estimate as the interferer signature data.
  • 80. The method of claim 70, wherein computing and modifying an antenna processing strategy comprises generating and modifying a set of weights to apply during processing for the remote unit.
  • 81. An article comprising a machine-accessible medium to provide content to cause one or more subscriber devices to: compute an antenna processing strategy for a remote unit, based at least in part on received signal data; and modify the antenna processing strategy by incorporating signature data relating to one or more interferers with the received signal data to reduce one or both of antenna transmit signal strength in, and sensitivity of the antenna to signals from, one or more interferers.
  • 82. The article of claim 81, wherein incorporating signature data relating to each of one or more interferers comprises the one or more electronic systems to: combine the received signal data and the signature data; and compute a modified processing strategy based, at least in part, on the combination.
  • 83. The article of claim 81, wherein to modify the antenna processing strategy by incorporating signature data further comprises the one or more electronic systems to: estimate the signature of one or more of the interferers; and modify the antenna processing strategy by incorporating the estimate as the interferer signature data.
  • 84. The article of claim 81, wherein to compute and to modify an antenna processing strategy comprises the one or more electronic systems to generate and to adjust a set of weights to apply during processing for the remote unit.
Continuations (1)
Number Date Country
Parent 09336933 Jun 1999 US
Child 11523971 Sep 2006 US