1. Field of the Invention
This invention relates to communications systems, and more particularly to systems and methods for synchronizing digital bits in a data stream.
2. Description of Related Art
Typical digital communication systems involve using a transmitter to send a Abit stream to a receiver. The bit stream contains digital information that the receiver decodes and makes use of. In some communications systems, the digital information is extracted by first converting the analog representation of the bit stream to digital samples. Each sample represents the amplitude of the signal at the time of sampling. The digital samples may be analyzed for location of the bit transitions by detecting where the amplitude levels change.
Because of noise and other effects, the transitions may not be cleanly represented as digital samples. This is especially true in wireless communications systems having an air interface. Global Navigation Satellite Systems (GNSS) are especially sensitive because the GNSS signals are communicated between satellites above the earth's atmosphere and receivers on the earth's surface. In addition, the signal transmitted to the receiver is generated by the transmitter and therefore synchronized to the time base in the transmitter. Thus, the signal is not synchronized to the receiver's time base such that the location of the bit transitions in the receiver's time base cannot be assumed.
Several methods have been developed for detecting bit transitions in a stream of digital samples. Examples of such methods (from the realm of GNSS receivers) include:
Because the levels of C/N0 can vary and may reach very low levels, neither of the above methods is as reliable as desired. There is a need for methods and systems for obtaining improved bit transition detection.
In view of the above, examples of systems and methods for synchronizing a receiver of a bit stream to the bit stream include a correlator to remove the PN code modulation and to generate a stream of time sequence values (samples) from the received bits. A plurality of accumulators are included, each accumulator corresponding to an offset in a series of time intervals starting with a first time period. The accumulators add a number of values equal to a number of samples in a bit period. The values added by each accumulator is a set of values starting with the value at the offset corresponding to the accumulator. A plurality of magnitude calculators receives a sum from the corresponding accumulator and calculates a magnitude. A plurality of non-coherent summers are then used to add the magnitudes for each offset in each bit period for all of the received bits. The total sum in each non-coherent summer is then analyzed to find the highest value, such that the offset corresponding to the non-coherent summer with the highest value represents the location of the bit transition in the bit period.
Various advantages, aspects and novel features of the present invention, as well as details of an illustrated embodiment thereof, will be more fully understood from the following description and drawings.
Other systems, methods and features of the invention will be or will become apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims.
The invention can be better understood with reference to the following figures. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention. In the figures, like reference numerals designate corresponding parts throughout the different views.
In the following description of preferred embodiments, reference is made to the accompanying drawings that form a part hereof, and which show, by way of illustration, specific embodiments in which the invention may be practiced. Other embodiments may be utilized and structural changes may be made without departing form the scope of the present invention.
Typical GNSS receivers 115 are designed to receive a spread-spectrum radio signal encoded with a code called L1 band C/A (Coarse/Acquisition) transmitted by the GNSS satellites 110. The C/A code is a code of a PN (pseudorandom) noise sequence having a transmission signal rate (or chip rate) of 1.023 MHz and a code length of 1023 (i.e., 1 period=1 millisecond). The data bits are 20 milliseconds long and are synchronized to the code. One of the 1 ms periods in each 20 ms period is selected by the satellite as the beginning of the data period. The data bits and the PN code are summed, modulo 2, then modulated onto a carrier using Binary Phase Shift Keying (BPSK). The nominal carrier frequency is 1575.42 MHz.
The GNSS receiver initially assumes that its local bit rate clock, which is running at a 20 ms rate, is aligned with the received data bits. Using examples of embodiments consistent with the present invention, this assumption may be tested, any non-alignment may be determined and corrected, and the correction may be tested to ensure an accurate correction.
The analog front-end 120 receives the radio signal and demodulates the signal to yield an IF analog signal. The digitizer 160 converts the analog signal to a stream of digital samples representing the amplitude of the signal at each sample time. Each bit of the satellite signal has a 20 ms period. This results in a data transmission rate of 50 bps. The receiver 115 operates with a system of clocks that provide a time base that is not in synchronization with that of the received signal. Therefore, the bit edges cannot be assumed to be aligned exactly with the beginning of the 20 ms. periods. The bit synchronization processor 170 analyzes the digital samples against the 20 ms. clock cycles to locate the precise location of the start of each bit, or the bit transition. Once the bit transitions are located, the bit stream is analyzed for the desired information in the GNSS data processing system 192.
It should be understood that the process of bit synchronization may be performed either during, or after, the process of signal acquisition.
In a GNSS receiver, signal acquisition involves the search for signal energy over a multitude of PN code offsets, and a multitude of frequency offsets. This is typically visualized as a 2 dimensional search, with one dimension being frequency offset and the other dimension being code offset.
‘Frequency offset’ refers to the frequency difference between the received signal and a locally generated reference signal. Its magnitude is implementation dependent, but may be on the order of several KHz. The frequency dimension is commonly broken into discrete ‘bins’, using a digital Fourier transform technique.
‘Code offset’ refers to the degree of time synchronization between the received code and a locally generated code. The code dimension is also broken into discrete segments known as ‘taps’. The maximum length of the code dimension is 1 millisecond. Typical implementations may divide the code dimension into as many as 2046 taps.
If the bit synchronization process is to be performed during the signal acquisition process, then a third dimension is added to the two previously described. Each of the frequency bin/code tap combinations must be examined at each of (up to) 20 time offsets, each time offset corresponding to 1 millisecond, i.e., one complete cycle of the code. Resulting measures of signal strength (peaks) may be tagged with the frequency bin, code tap and millisecond offset to allow for further analysis.
If the bit synchronization process is performed after the signal acquisition is complete, then the number of frequency bins and code taps may be reduced dramatically, possibly as low as 1 bin and 1 tap. In addition, the sizes of the bins/taps may be reduced for enhanced performance. In this case also, the signal may be actively tracked by other receiver processes while the synchronization process is active.
The bit synchronization processor 170 in
In general, bit synchronization methods are dependent on the presence of bit transitions. The systems and methods described herein use that fact explicitly. For example, systems and methods consistent with the present invention include steps and functions that estimate the probability of bit transition. Accordingly, systems and methods consistent with the present invention advantageously require less time to achieve similar success (which may be measured by a probability of false alarm) at bit synchronization for a given signal strength as compared to other existing methods.
1. Bit Transition Detection
The bit transition detector 208 in
The bit transition detector 208 analyzes the bit stream using a finite sample of received bits. In one example embodiment, the finite sample size, may range from 50 to 200 bits. The sample size may vary. The actual size may depend on the number of bit transitions and/or signal strength. The correlator 220 receives the digital samples and correlates the samples in the time domain by removing the PN code. The correlator 220 outputs a time sequence of 1 ms. samples of complex data. Because the samples are in complex form, the data is generated in a stream of pairs of digital samples, I and Q values. A first millisecond period is defined as the location on the 20 ms bit period of each bit transition. However, because the received signal is not synchronized to the receiver's time base, the actual bit transition is likely not at the first millisecond period. The bit transition detector 208 determines which millisecond offset (“ms offset”) following the first millisecond period is the location of the actual bit transition.
One of ordinary skill in the art will appreciate that the example of
The I and Q values are summed in the 20 offset accumulators 230(1)-230(20), each offset accumulator 230 starting the summation at a different one of the millisecond offsets in a 20 ms. period, which is the bit period. The first offset accumulator 230(1) begins the summation at the first millisecond period (ms offset=0) and sums the samples at each of the following millisecond periods. The second offset accumulator 230(2) begins the summation at the next millisecond period after the first millisecond period (ms offset=1). The third offset accumulator 230(3) starts at a ms offset=2. The fourth offset accumulators 230(4) starts summing at a ms offset=3. Each of the following offset accumulators 230(5)-(20) start summing at each successive ms. offset. As stated above, the bit period, T, is 20 ms. and the bits are sampled at a sample time of S=1 ms. Therefore, one of the offset accumulators 230 will have summed up all the values in one exact bit period.
In each offset accumulator 230, a counter counts up to 20 as the samples are summed in the accumulators 230. After the 20th sample is added in the accumulator 230, the contents of the accumulators 230 are input to corresponding magnitude calculators 240. The magnitude calculators 240 calculate the magnitude of the sums in the accumulators 230 using the formula:
V=√{square root over (I2+Q2)}
One of ordinary skill in the art will appreciate that, since I and Q represent the signal amplitude, V is the magnitude of the voltage of the signal at that 20 ms. sample. In alternative embodiments, the power of the signal at each 20 ms. sample may be used instead. Differences in embodiments of systems and methods for detecting bit transition that uses power signals instead of voltage are described below with reference to
The magnitude calculators 240(1)-(20) output the magnitudes of the samples to a corresponding non-coherent summer 250(1)-(20), which performs an integration of the magnitudes over the finite sample of received bits at each ms offset in the 20 ms period. The non-coherent summer 250 containing the highest value, or the peak value, corresponds with the ms offset in the 20 ms period that is the location of the bit transition. However, if the C/N0 level is low, the detection of the bit transition may be in error. At the conclusion of the integration, the non-coherent summers 250(1)-(20) are analyzed by selecting a set of the highest values out of the 20 non-coherent summers and applying them to the bit synchronization analyzer 190. The bit synchronization analyzer 190 is described below in more detail with reference to
As shown in
As illustrated in
In each bit period, the magnitude for each ms offset is calculated and added to the non-coherent summer 250 corresponding to that ms offset. For example,
Similarly, a magnitude |V1| for the bit period N=1 is added to the second (1 ms offset) non-coherent summer 250(2) at arrow 430. A second magnitude |V1| calculated for the bit period N=2 at the 1 ms offset is being added to the second non-coherent summer 250(2) at arrow 432. The process continues for all of the bit periods in the sample (until N=40) as shown by arrow 434 in
The non-coherent summers 250(3)-(20) perform a similar process for the 3-20 ms offsets. The twentieth non-coherent summer 250(20) is shown in
The result of the integration by non-coherent summers 250(1)-(20) is the set of sums of magnitudes (SUM0-SUM19) 426, 436, 446. These sums of magnitudes may be plotted against their corresponding ms offsets.
The diagram in
The bit sync magnitude diagrams described above with reference to
2. Bit Synchronization Analysis
In one example of a bit synchronization analysis method consistent with the present invention, a set of the sums of magnitudes are analyzed as peak values at their corresponding offsets. As shown by the bit sync magnitude diagrams in
a. Peak Buffer
Given the peak buffer contents, a process may be used to determine if the smaller peaks correspond to the same FFT bin and code tap as the largest peak, before proceeding with bit sync determination. Peaks that do not correspond with the frequency bin and code tap of the main peak are discarded. The remaining peaks may be re-ordered and used in a bit synchronization analysis process.
Next, the remaining peaks in the peak buffer are checked to ensure that the size of the peak is inversely proportional to the “distance” from the main peak, measured by the difference in millisecond offset from the main peak, modulo 20. For example, the distance between PEAK7 and PEAK6 (or PEAK5), if they exist, should be either 1 millisecond or −1 millisecond. Similarly the distance between PEAK7 and PEAK4 (or PEAK3), if they exist, should be either 2 milliseconds or −2 milliseconds. Finally, the distance between PEAK7 and PEAK2 (or PEAK1), if they exist, should be either 3 milliseconds or −3 milliseconds. Any peaks which fail this test are marked as invalid.
b. Bit Synchronization Analysis Method Selection
In an example of embodiments consistent with the present invention, one or more of several bit synchronization analysis methods may be selected depending on the values in the peak buffer array. The peak buffer array may be analyzed to determine if the peak values stored in the array are valid peaks. The appropriate bit synchronization analysis method is then selected based on the number of valid peak values.
If the peak buffer contains at least 6 valid peaks in addition to the main peak, then the 6-point method is chosen. If the peak buffer contains fewer than 6, but at least 4, valid peaks in addition to the main peak, then the 4-point method is chosen. If the peak buffer contains fewer than 4, but at least 2 valid peaks in addition to the main peak, then the 2-point method is chosen. If the peak buffer contains fewer than 2 valid peaks in addition to the main peak, the process waits for more data.
If either the 4-point method or the 6-point method was chosen, but the C/No is less than 30 dB-Hz, then the 2-point method is chosen instead.
The analysis methods described below may include a check of the probability of bit transition to ensure that it is at least a certain level. The probability of bit transition is directly proportional to the slope of the sides of the triangles formed by the data values (see
The analysis method may also check the number of bit transitions in the bits processed to determine if an acceptable number of bit transitions has occurred. If too few bit transitions occurred, the location of bit transition may not have been accurately determined. The number of data bit transitions may be computed by using:
No. bit transitions=p_trans*T(elapsed)secs.*50 bps.
where p_trans is the probability of transition described above.
The number of bit transitions is then compared with a threshold to determine if the bit synchronization was accurately determined. The threshold depends on the C/N0 level and on which method of analysis is being used. This comparison may be done using a look-up table to obtain the threshold. Table 1 below is an example of a table that may be used for threshold levels of bit transitions in a sample of bits. If the number of bit transitions is greater than the threshold number of bit transitions, then the bit transition analysis method may be performed, or deemed to be based on an acceptable set of data. In Table 1 the notation “N/A” means “Not Applicable”.
c. 2 Points Method
An example of pseudo-code that implements a two point bit synchronization analysis method 810 is shown in
The two points method 810 then computes the number of data bit transitions that have been processed and looks up a threshold number from a look-up table as described above with reference to Table 1. If a sufficient number of bit transitions have been processed, the method declares success, otherwise it waits for more data. One of ordinary skill in the art will appreciate that the threshold need not be retrieved from a lookup table, but rather may be calculated using hardware and/or software computational devices.
d. 4 Points Method
An example of pseudo-code that implements the four points method is shown at 830 in
e. Six Points Method
An example of pseudo-code that implements the six point method 850 is shown in
The slopes of the right and left lines are used to determine an intercept for each of the right and left lines at 858. The intercepts and slopes are then used to calculate an intersection in a manner similar to that described above with reference to the four points method 830. The location of the intersection on the offsets time line is then compared with 0.5 to determine if it is close enough to the location of the peak value determined by the bit transition detection process.
f. Estimated Probability of False Alarms
In the flowchart in
DiffAVE=[diff1+diff2+(diff3+diff4)/2+(diff5+diff6)/3]/N,
Using the calculated value, DiffAVE, new peak values are calculated at step 940 for the peak one offset to the right of PEAK7 and one offset to the left of PEAK7. These new peak values represent peak values that would form a perfect triangle on a bit sync magnitude diagram. Therefore, the peak values at offsets opposite each other relative to the offset of the main peak should be the same. This ideal value for each peak value may be calculated using the calculated DiffAVE for the peaks one offset from PEAK7 as follows:
p_left—1=p_right—1=Peak7−DiffAVE
At decision block 950, the method determines if Peak3 and Peak4 are valid peaks, and if they are not, processing continues to step 980. If Peak 3 and Peak4 are valid, then at step 960, new values of the peak values two offsets from PEAK7 are calculated using:
p_left—2=p_right—2=Peak7−2*DiffAVE
At decision block 970, the method determines if Peak1 and Peak2 are valid peaks, and if they are not, processing continues to step 980. If Peak1 and Peak2 are valid, then at step 974, new values of the peak values 3 offsets to the right and left of the PEAK7 offsets are calculated using:
p_left—3=p_right—3=Peak7−3*DiffAVE
With peak values at the minor peaks now set at levels reflecting a “perfect triangle” below the main peak (Peak7), step 980 calculates Diff_Sum, the sum of the differences between the measured and the “perfect” data, using:
Diff_Sum=(right—1−p_right—1)+(right—2−p_right—2)+(right—3−P_right—3)+(left—1−p_left—1)+(left—2−p_left—2)+(left—3−p_left—3).
At step 982, the sum of the squares of the differences, Sum_sq, is computed using:
Sum_sq=(right—1−p_right—1)^2+(right—2−p_right—2)^2+right—3−p_right—3)^2+(left—1−p_left—1)^2+(left—2−p_left—2)^2+(left—3−p_left—3)^2.
Step 984 computes Std, the standard deviation of the data, using:
Std=SQRT((Sum_sq−(Diff_sum)2/N)/(N−1)).
Step 990 then computes a metric DiffAVE/Std, which is compared with a threshold, metric_threshold. If the computed DiffAVE/Std is less than a metric_threshold, then the bit transition detected may not be accurate. This result may be used to have the bit transition process continue. The metric_threshold may be precomputed to give a predicted probability of false alarms for the bit sync process.
One of ordinary skill in the art will appreciate that the methods and systems described herein may be implemented using one or more processors having memory resources available for storing program code and data. One skilled in the art will also appreciate that all or part of systems and methods consistent with the present invention may be stored on or read from other machine-readable media, for example, secondary storage devices such as hard disks, floppy disks, and CD-ROMs; a signal received from a network; or other forms of ROM or RAM either currently known or later developed.
The foregoing description of implementations has been presented for purposes of illustration and description. It is not exhaustive and does not limit the claimed inventions to the precise form disclosed. In particular, examples of the present invention have been described in the context of communication by GNSS satellites and receivers. One of ordinary skill in the art will appreciate that nothing limits the practice of examples of the present invention to the examples described or to GNSS systems. Bit synchronization issues arise in many forms of digital communication, many of which will find use of examples of this invention advantageous. Modifications and variations are possible in light of the above description or may be acquired from practicing the invention. For example, the described implementation includes software but the invention may be implemented as a combination of hardware and software or in hardware alone. Note also that the implementation may vary between systems. The claims and their equivalents define the scope of the invention.
This application is a continuation of U.S. patent application Ser. No. 11/553,983, filed Oct. 27, 2006, titled System and Method For Synchronizing Digital Bits In A Data Stream which claims priority to U.S. provisional Patent Application Ser. No. 60/818,371, titled “System and Method For Synchronizing Digital Bits in a Data Stream,” by Raman et al and filed on Jun. 30, 2006, which is herein incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4192003 | Brock et al. | Mar 1980 | A |
5179573 | Paradise | Jan 1993 | A |
5663734 | Krasner | Sep 1997 | A |
5663735 | Eshenbach | Sep 1997 | A |
5781150 | Norris | Jul 1998 | A |
5812087 | Krasner | Sep 1998 | A |
5825327 | Krasner | Oct 1998 | A |
5831574 | Krasner | Nov 1998 | A |
5841396 | Krasner | Nov 1998 | A |
5874914 | Krasner | Feb 1999 | A |
5884214 | Krasner | Mar 1999 | A |
5945944 | Krasner | Aug 1999 | A |
5999124 | Sheynblat | Dec 1999 | A |
6002363 | Krasner | Dec 1999 | A |
6016119 | Krasner | Jan 2000 | A |
6052081 | Krasner | Apr 2000 | A |
6061018 | Sheynblat | May 2000 | A |
6064336 | Krasner | May 2000 | A |
6104338 | Krasner | Aug 2000 | A |
6104340 | Krasner | Aug 2000 | A |
6107960 | Krasner | Aug 2000 | A |
6111540 | Krasner | Aug 2000 | A |
6131067 | Girerd | Oct 2000 | A |
6133871 | Krasner | Oct 2000 | A |
6133873 | Krasner | Oct 2000 | A |
6133874 | Krasner | Oct 2000 | A |
6150980 | Krasner | Nov 2000 | A |
6185427 | Krasner | Feb 2001 | B1 |
6208290 | Krasner | Mar 2001 | B1 |
6208291 | Krasner | Mar 2001 | B1 |
6215441 | Moeglein | Apr 2001 | B1 |
6215442 | Sheynblat | Apr 2001 | B1 |
6236354 | Krasner | May 2001 | B1 |
6239742 | Krasner | May 2001 | B1 |
6249542 | Kohli | Jun 2001 | B1 |
6259399 | Krasner | Jul 2001 | B1 |
6272430 | Krasner | Aug 2001 | B1 |
6289041 | Krasner | Sep 2001 | B1 |
6307504 | Sheynblat | Oct 2001 | B1 |
6313786 | Sheynblat | Nov 2001 | B1 |
6314308 | Sheynblat | Nov 2001 | B1 |
6377209 | Krasner | Apr 2002 | B1 |
6408196 | Sheynblat | Jun 2002 | B2 |
6411254 | Moeglein | Jun 2002 | B1 |
6411892 | Van Diggelen | Jun 2002 | B1 |
6417801 | Van Diggelen | Jul 2002 | B1 |
6421002 | Krasner | Jul 2002 | B2 |
6429814 | Van Diggelen | Aug 2002 | B1 |
6433731 | Sheynblat | Aug 2002 | B1 |
6453237 | Fuchs | Sep 2002 | B1 |
6484097 | Fuchs | Nov 2002 | B2 |
6487499 | Fuchs | Nov 2002 | B1 |
6510387 | Fuchs | Jan 2003 | B2 |
6542821 | Krasner | Apr 2003 | B2 |
6583757 | Krasner | Jun 2003 | B2 |
6597311 | Sheynblat | Jul 2003 | B2 |
6934322 | King | Aug 2005 | B2 |
7697591 | Copeland | Apr 2010 | B2 |
20040264554 | Harms | Dec 2004 | A1 |
20060222058 | Simic | Oct 2006 | A1 |
20060222129 | Hadzic | Oct 2006 | A1 |
Number | Date | Country |
---|---|---|
WO-0065751 | Nov 2000 | WO |
Entry |
---|
Marketing Material: Qualcomm CDMA Technologies—Integrated Solutions—MGP6200™ Multimode GPS Processor, 8 pgs, 2002. |
Marketing Material: uNav Microelectronics, uN9×18 Lower Power, High Performance GPS Receiver Chipset , 2 pgs, Jul. 2006. |
Marketing Material: Global Locate—Hammerhead II™, Single Chip AGPS Solution, 2 pgs. (2007). |
Marketing Material: uNav Microelectronics, uN9×18 Low Power, High Performance GPS Receiver Chipset/uN9X18 GPS Receiver Solution, 9 pgs, Jul. 2006. |
Marketing Material/White Paper: SnapTrack: A Qualcomm Company—SnapTrack's Wireless Assisted GPS™ (A-GPS) Solution Provides the Industry's Best Location System—Location Technologies for GSM, GPRS and WCDMA Networks (Qualcomm CDMA Technologies: Enabling the Future of Communications) (2003), 4 pgs. |
U.S. Appl. No. 11/553,983, Non Final Office Action mailed Sep. 29, 2009, 20 pgs. |
Number | Date | Country | |
---|---|---|---|
20120236973 A1 | Sep 2012 | US |
Number | Date | Country | |
---|---|---|---|
60818371 | Jun 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11553983 | Oct 2006 | US |
Child | 13349102 | US |