Wireless communication system having linear encoder

Information

  • Patent Grant
  • 7292647
  • Patent Number
    7,292,647
  • Date Filed
    Monday, April 21, 2003
    21 years ago
  • Date Issued
    Tuesday, November 6, 2007
    17 years ago
Abstract
In general, linear complex-field encoding techniques are proposed For example, transmitter of a wireless communication system includes an encoder and a modulator. The encoder linearly encodes a data stream to produce an encoded data stream. The modulator to produce an output waveform in accordance with the encoded data stream for transmission through a wireless channel. The modulator generates the output waveform as a multicarrier waveform having a set of subcarriers, e.g., an Orthogonal Frequency Division Multiplexing (OFDM) waveform. The encoder linearly encodes the data stream so that the subcarriers carry different linear combinations of information symbols of the data stream.
Description
TECHNICAL FIELD

The invention relates to communication systems and, more particularly, transmitters and receivers for use in wireless communication systems.


BACKGROUND

In wireless mobile communications, a channel that couples a transmitter to a receiver is often time-varying due to relative transmitter-receiver motion and multipath propagation. Such a time-variation is commonly referred to as fading, and may severely impair system performance. When a data rate for the system is high in relation to channel bandwidth, multipath propagation may become frequency-selective and cause intersymbol interference (ISI). By implementing Inverse Fast Fourier Transform (IFFT) at the transmitter and FFT at the receiver, Orthogonal Frequency Division Multiplexing (OFDM) converts an ISI channel into a set of parallel ISI-free subchannels with gains equal to the channel's frequency response values on the FFT grid. Each subchannel can be easily equalized by a single-tap equalizer using scalar division.


To avoid inter-block interference (IBI) between successive IFFT processed blocks, a cyclic prefix (CP) of length greater than or equal to the channel order is inserted per block at the transmitter and discarded at the receiver. In addition to suppressing IBI, the CP also converts linear convolution into cyclic convolution and thus facilitates diagonalization of an associated channel matrix.


Instead of having multipath diversity in the form of (superimposed) delayed and scaled replicas of the transmitted symbols as in the case of serial transmission, OFDM transfers the multipath diversity to the frequency domain in the form of (usually correlated) fading frequency response. Each OFDM subchannel has its gain being expressed as a linear combination of the dispersive channel taps. When the channel has nulls (deep fades) close to or on the FFT grid, reliable detection of the symbols carried by these faded subcarriers becomes difficult if not impossible.


Error-control codes are usually invoked before the IFFT processing to deal with the frequency-selective fading. These include convolutional codes, Trellis Coded Modulation (TCM) or coset codes, Turbo-codes, and block codes (e.g., Reed-Solomon or BCH). Such coded OFDM schemes often incur high complexity and/or large decoding delay. Some of these schemes also require Channel State Information (CSI) at the transmitter, which may be unrealistic or too costly to acquire in wireless applications where the channel is rapidly changing. Another approach to guaranteeing symbol detectability over ISI channels is to modify the OFDM setup: instead of introducing the CP, each IFFT-processed block can be zero padded (ZP) by at least as many zeros as the channel order.


SUMMARY

In general, techniques are described for robustifying multi-carrier wireless transmissions, e.g., OFDM, against random frequency-selective fading by introducing memory into the transmission with complex field (CF) encoding across the subcarriers. Specifically, instead of sending a different uncoded symbol per subcarrier, the techniques utilize different linear combinations of the information symbols on the subcarriers. These techniques generalize signal space diversity concepts to allow for redundant encoding. The CF block code described herein can also be viewed as a form of real-number or analog codes.


The encoder described herein is referred to as a “Linear Encoder (LE),”0 and the corresponding encoding process is called “linear encoding,” also abbreviated as LE when no confusions arise. The resulting CF coded OFDM will be called LE-OFDM. In one embodiment, the linear encoder is designed so that maximum diversity order can be guaranteed without an essential decrease in transmission rate.


By performing pairwise error probability analysis, we upper bound the diversity order of OFDM transmissions over random frequency-selective fading channels. The diversity order is directly related to a Hamming distance between the coded symbols. Moreover, the described LE can be designed to guarantee maximum diversity order irrespective of the information symbol constellation with minimum redundancy. In addition, the described LE codes are maximum distance separable (MDS) in the real or complex field, which generalizes the well-known MDS concept for Galois field (GF) codes. Two classes of LE codes are described that can achieve MDS and guarantee maximum diversity order: the Vandermonde class, which generalizes the Reed-Solomon codes to the real/complex field, and the Cosine class, which does not have a GF counterpart.


Several possible decoding options have been described, including ML, ZF, MMSE, DFE, and iterative detectors. Decision directed detectors may be used to strike a trade-off between complexity and performance.


In one embodiment, a wireless communication device comprises an encoder that linearly encodes a data stream to produce an encoded data stream, and a modulator to produce an output waveform in accordance with the encoded data stream for transmission through a wireless channel.


In another embodiment, a wireless communication device comprises a demodulator that receives a waveform carrying a linearly encoded transmission and produces a demodulated data stream, and a decoder that applies decodes the demodulated data and produce estimated data.


In another embodiment, a method comprises linearly encoded a data stream with to produce an encoded data stream, and outputting a waveform in accordance with the data stream for transmission through a wireless channel.


In another embodiment, a computer-readable medium comprises instructions to cause a programmable processor to linearly encode a data stream with to produce an encoded data stream, and output a waveform in accordance with the data stream for transmission through a wireless channel.


The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.





BRIEF DESCRIPTION OF DRAWINGS


FIG. 1 is a block diagram illustrating an exemplary wireless communication system in which a transmitter and receiver implement linear precoding techniques.



FIGS. 2A, 2B illustrate uncoded and GF-coded BPSK signals.



FIG. 3 illustrates an example format of a transmission block for CP-only transmissions by the transmitter of FIG. 1.



FIG. 4 illustrates an example format of a transmission block for ZP-only transmissions by the transmitter of FIG. 1.



FIG. 5 illustrates sphere decoding applied in one embodiment of the receiver of FIG. 1.



FIG. 6 illustrates an example portion of the receiver of FIG. 1.



FIG. 7 is factor graph representing an example linear encoding process.



FIGS. 8-10 are graphs that illustrate exemplary results of simulations of the described techniques.





DETAILED DESCRIPTION


FIG. 1 is a block diagram illustrating a telecommunication system 2 in which transmitter 4 communicates data to receiver 6 through wireless channel 8. Transmitter 4 transmits data to receiver 6 using one of a number of conventional multi-carrier transmission formats including Orthogonal Frequency Division Multiplexing (OFDM). OFDM has been adopted by many standards including digital audio and video broadcasting (DAB, DVB) in Europe and high-speed digital subscriber lines (DSL) in the United States. OFDM has also been proposed for local area mobile wireless broadband standards including IEEE802.11a, MMAC and HIPERLAN/2. In one embodiment, system 2 represents an LE-OFDM system having N subchannels.


In general, the techniques described herein robustify multi-carrier wireless transmissions, e.g., OFDM, against random frequency-selective fading by introducing memory into the transmission with complex field (CF) encoding across the subcarriers. In particular, transmitter 4 utilizes different linear combinations of the information symbols on the subcarriers. The techniques described herein may be applied to uplink and/or downlink transmissions, i.e., transmissions from a base station to a mobile device and vice versa. Consequently, transmitters 4 and receivers 6 may be any device configured to communicate using a multi-user wireless transmission including a cellular distribution station, a hub for a wireless local area network, a cellular phone, a laptop or handheld computing device, a personal digital assistant (PDA), and the like.


In the illustrated embodiment, transmitter 4 includes linear encoder 10 and an OFDM modulator 12. Receiver 6 includes OFDM demodulator 14 and equalizer 16. Due to CP-insertion at transmitter 44 and CP-removal at receiver 6, the dispersive channel 8 is represented as an N×N circulant matrix {tilde over (H)}, with [{tilde over (H)}]i,j=h((i−j)mod N), where h(·) denotes the impulse response of channel 8:









H
=

[








h


(
0
)




0










0



h


(
L
)








h


(
1
)










h


(
0
)




0

























































h


(
L
)







h


(
L
)





















0


0




0



h


(
L
)












0












0







0













h


(
0
)










































0




0










0



h


(
L
)













h


(
0
)









]





(
1
)








We assume the channel to be random FIR, consisting of no more than L+1 taps. The blocks within the dotted box represent a conventional uncoded OFDM system.


Let F denote the N×N FFT matrix with entries [F]n,k=(1/√{square root over (N)})exp(−j2πnk/N). Performing IFFT (postmultiplication with the matrix FH) at the transmitter and FFT (premultiplication with the matrix F) at the receiver diagonalizes the circulant matrix {tilde over (H)}. So, we obtain the parallel ISI-free model for the ith OFDM symbol as (see FIG. 1): xi=DHμii, where








D
H

:=


diag


[



H


(

j





0

)


.

H


(

j





2

π


1
N


)



,





,

H


(

j





2

π







N
-
1

N


)



]


=


F



H
~






F



,





with H(jω) denoting the channel frequency response at ω; and ηi=Fηi standing for the FFT-processed additive white Gaussian noise (AWGN).


In order to exploit the frequency-domain diversity in OFDM, our LE-OFDM design first linearly encodes (i.e., maps) the K≦N symbols of the ith block, siεcustom character, where custom character is the set of all possible vectors that si may belong to (e.g., the BPSK set {±1}K×1), by an N×K matrix ΘεCN×K and then multiplexes the coded symbols ui=ΘsiεCN×1 using conventional OFDM. In practice, the set custom character is always finite. But we allow it to be infinite in our performance analysis. The encoder Θ considered here does not depend on the OFDM symbol index i. Time-varying encoder may be useful for certain purposes (e.g., power loading), but they will not be pursued here. Hence, from now on, we will drop our OFDM symbol index i for brevity.


Notice that the matrix-vector multiplication used in defining u=Θs takes place in the complex field, rather than a Galois field. The matrix Θ can be naturally viewed as the generating matrix of a complex field block code. The codebook is defined as custom character:={Θs|sεcustom character}. By encoding a length-K vector to a length-N vector, some redundancy is introduced that we quantify by the rate of the code defined to be r=K/N, reminiscent of the GF block code rate definition. The set custom character is a subset of the CN×1 vector space. More specifically, custom character is a subset of the K dimensional subspace spanned by the columns of Θ. When custom character=ZK×1, the set custom character forms a lattice.


Combining the encoder with the diagonalized channel model, the ith received block after CP removal and FFT processing can be written as:

x=F{tilde over (x)}=F({tilde over (H)}FHΘs+ñ)=DHΘs+η.  (2)

We want to design Θ so that a large diversity order can be guaranteed irrespective of the constellation that the entries of si are drawn from, with a small amount of introduced redundancy.


We can conceptually view Θ together with the OFDM modulation FH as a combined N×K encoder {tilde over (Θ)}:=FHΘ, which in a sense blends the single-carrier and multicarrier notions. Indeed, by selecting Θ, hence {tilde over (Θ)}, the system in FIG. 1 can describe various single and multicarrier systems, some of them are provided shortly as special cases of our LE-OFDM. The received vector {tilde over (x)} is related to the information symbol vector s through the matrix product {tilde over (H)}Θ.


We define the Hamming distance δ(u, u′) between two vectors u and u′ as the number of non-zero entries in the vector uc=u−u′ and the minimum Hamming distance of the set custom character as δmin (custom character):=min{δ(u, u′)|u, uεcustom character}. When there is no confusion, we will simply use δmin for brevity. The minimum Euclidean distance between vectors in custom character is denoted as dmin(custom character) or simply dmin.


Because such encoding operates in the complex field, it does not increase the dimensionality of the signal space. This is to the contrasted to the GF encoding: the codeword set of a GF (n, k) code, when viewed as a real/complex vector, in general has a higher dimensionality (n) than does the original uncoded block of symbols (k). Exceptions include the repetition code, for which the codeword set has the same dimensionality as that of the input.


EXAMPLE 1

Consider the binary (3, 2) block code generated by the matrix










[







1


0


1




0


1


1







]

T




(
3
)








followed by BPSK constellation mapping (e.g., 0→−1 and 1→1). The codebook consists of 4 codewords

[−1 −1 −1]T, [1 −1 1]T, [−1 1 1]T, [1 1 −1]T.  (4)

These codewords span the R3×1 (or C3×1) space and therefore the codebook has dimension 3 in the real or complex field, as illustrated in FIG. 2.


In general, a (n, k) binary GF block code is capable of generating 2k codewords in an n-dimensional space Rn×1 or Cn×1. If we view the transmit signal design problem as packing spheres in the signal space (Shannon's point of view), an (n, k) GF block code followed by constellation mapping packs spheres in an n-dimensional space and thus has the potential to be better (larger sphere radius) than a k-dimensional packing. In our example above, if we normalize the codewords by a factor √{square root over (2/3)} so that the energy per bit Eb is one, the 4 codewords have mutual Euclidean distance √{square root over (8/3)}, larger than the minimum distance √{square root over (2)} of the uncoded BPSK signal set (±1,±1). This increase in minimum Euclidean distance leads to improved system performance in AWGN channels, at least for high signal to noise ratio (SNR). For fading channels, the minimum Hamming distance of the codebook dominates high SNR performance in the form of diversity gain (as will become clear later). The diversity gain achieved by the (3, 2) block code in the example is the minimum Hamming distance 2.


CF linear encoding on the other hand, does not increase signal dimension; i.e., we always have dim(U)≦dim(S). When Θ has full column rank K, dim(U)=dim(S), in which case the codewords span a K-dimensional subspace of the N-dimensional vector space CK×1. In terms of sphere packing, CF linear encoding does not yield a packing of dimension higher than K.


We have the following assertion about the minimum Euclidean distance.


Proposition 1 Suppose tr(ΘΘH)=K. If the entries of sεcustom character are drawn independently from a constellation custom character of minimum Euclidean distance of dmin (custom character) then the codewords in u:={Θs|sεcustom character} have minimum Euclidean distance no more than dmin(custom character).


Proof: Under the power constraint tr(ΘΘH)=K, at least one column of Θ will have norm no more than 1. Without loss of generality, suppose the first column has norm no more than 1. Consider sα=(α, 0, . . . , 0)T and sβ=(β, 0, . . . , 0)T, where α and β are two symbols from the constellation that are separated by dmin. The coded vectors uα=Θsα and uβ=Θsβ are then separated by a distance no more than dmin.


Due to Proposition 1, CF linear codes are not effective for improving performance for AWGN channels. But for fading channels, they may have an advantage over GF codes, because they are capable of producing codewords that have large Hamming distance.


EXAMPLE 2

The encoder










Θ
=




4
15


[







1


1


1




0.5



-
0.5



0.5







]

T


,




(
5
)








operating on BPSK signal set custom character={±1}2, produces 4 codewords of minimum Euclidean distance √{square root over (4/5)} and minimum Hamming distance 3. Compared with the GF code in Example 1, this real code has smaller Euclidean distance but larger Hamming distance. In addition, the CF coding scheme described herein differs from the GF block coding in that the entries of the LE output vector u usually belong to a larger, although still finite, alphabet set than do the entries of the input vector s.


Before exploring optimal designs of Θ, let us first look at some special cases of the LE-OFDM system.


By setting K=N and Θ=IN, we obtain the conventional uncoded OFDM model. In such a case, the one-tap linear equalizer matrix Γ=DH−1 yields ŝ=Γx=s+DH−1η, where the inverse exists when the channel has no nulls on the FFT grid. Under the assumption that ñ (hence η) is AWGN, such an equalizer followed by a minimum distance quantizer is optimum in the maximum-likelihood (ML) sense for a given channel when CSI has been acquired at the receiver. But when the channel has nulls on (or close to) the FFT grid ω−2πn/N, n=0, . . . , N−1, the matrix DH will be ill-conditioned and serious noise-amplification will emerge if we try to invert DH (the noise variance can become unbounded). Although events of channel nulls being close to the FFT grid have relatively low probability, their occurrence is known to have dominant impact on the average system performance especially at high SNR. Improving the performance of an uncoded transmission thus relies on robustifying the system against the occurrence of such low-probability but catastrophic events. If CSI is available at the transmitter, power and bit loading can be used and channel nulls can be avoided, such as in discrete multi-tone (DMT) systems.


If we choose K=N and Θ=F, then since FHF=IN, the IFFT FH reverses the encoding and the resulting system is a single-carrier block transmission with CP insertion (c.f., FIG. 3): {tilde over (x)}={tilde over (H)}s+{tilde over (η)}. The FFT at the receiver is no longer necessary.


Let K=N−L. We choose Θ to be an N×K truncated FFT matrix (the first K columns of F); i.e., [Θ]n,k=(1/√{square root over (N)}) exp(−j2πnk/N). It can be easily verified that FHΘ=[IK,0K×L]T:=Tzp, where 0K×L denotes a K×L all-zero matrix, and the subscript “zp” stands for zero-padding (ZP). The matrix Tzp simply pads zeros at the tail of s and the zero-padded block ũ=Tzps is transmitted. Notice that H:={tilde over (H)}FHΘ={tilde over (H)}Tzp is an N×K Toeplitz convolution matrix (the first K columns of {tilde over (H)}), which is always full rank. The symbols s can thus always be recovered from the received signal {tilde over (x)}=Hs+ñ (perfectly in the absence of noise) and no catastrophic channels exist in this case. The cyclic prefix in this case consists of L zeros, which, together with the L zeros from the encoding process, result in 2L consecutive zeros between two consecutive uncoded information blocks of length K. But only L zeros are needed in order to separate the information blocks. CP is therefore not necessary because the L zeros created by Θ already separate successive blocks.


ZP-only transmission is essentially a simple single-carrier block scheme. However, viewing it as a special case of the LE-OFDM design will allow us to apply the results about LE-OFDM and gain insights into its performance. It turns out that this special case is indeed very special: it achieves the best high-SNR performance among the LE-OFDM class.


To design linear encoder 10 with the goal of improving performance over uncoded OFDM, we utilize pair-wise error probability (PEP) analysis technique. For simplicity, we will first assume that

  • As1) The channel h:=[h(0), h(1), . . . , h(L)]T has independent and identically distributed (i.i.d.) zero-mean complex Gaussian taps (Rayleigh fading). The corresponding correlation matrix of h is Rh:=E[hhH]=αL2IL+1, where the constant αL:=1/(L+1).


Later on, we will relax this assumption to allow for correlated fading with possibly rank deficient autocorrelation matrix Rh.


We suppose ML detection with perfect CSI at the receiver and consider the probability P(s→s′|h), s, s′εcustom character that a vector s is transmitted but is erroneously decoded as s′≠s. We define the set of all possible error vectors custom charactere:={e:=s−s′|s.s′εcustom character, s≠s′}.


The PEP can be approximated using the Chernoff bound as:

P(s→s′|h)≦exp(−d2(y,y′)/4N0),  (6)

where N0/2 is the noise variance per dimension, y:=DHΘs, y′:=DHΘs′, and d(y,y′)=∥y−y′∥ is the Euclidean distance between y and y′.


Let us consider the N×(L+1) matrix V with entries [V]n,t=exp(−j2πnl/N), and use it to perform the N-point discrete Fourier transform Vh of h. Note that DH=diag(Vh); i.e., the diagonal entries of DH are those in vector Vh. Using the definitions e:=s−s′εcustom charactere, ue:=Θe, and De:=diag(ue), we can write y−y′=DHue=diag(Vh)ue. Furthermore, we can express the squared Euclidean distance d2(y,y′)=∥DHue2=∥DeVh∥2 as

d2(y,y′)=hHVHDeHDeVh:=hHAeh.  (7)


An upper bound to the average PEP can be obtained by averaging (6) with respect to the random channel h to obtain:











P


(

s


s



)







l
=
0

L







1

1
+


α
L




λ

e
,
l


/

(

4


N
0


)







,




(
8
)








where λe,0, λe,1, . . . , λe,L are the non-increasing eigen-values of the matrix Ae=VHDeHDeV.


If re is the rank of Ae, then λe,1≠0 if and only if 1ε[0,re−1]. Since 1+αLλe,1/(4N0)>λe,1/(4N0), it follows from (8) that










P


(

s


s



)






(

1

4


N
0



)


-

r
e







(




l
=
0



r
e

-
1





α
L



λ

e
,
l




)


-
1


.






(
9
)








We call re the diversity order, denoted as Gd,e, and (Πt=0re-1αLλe,l)1/re the coding advantage, denoted as Gc,e, for the symbol error vector e. The diversity order Gd,e determines the slope of the averaged (w.r.t. the random channel) PEP (between s and s′) as a function of the SNR at high SNR (N0→0). Correspondingly, Gc,e determines the shift of this PEP curve in SNR relative to a benchmark error rate curve of (¼N0)−re. When re=L+1, Ae is full rank, the product of eigen-values becomes the determinant of Ae and therefore the coding advantage is given by αL[det(Ae)]1/(L+1).


Since both Gd,e and Gd,c depend on the choice of e, we define the diversity order and coding advantages for our LE-OFDM system, respectively, as:











G
d

:=



min

e


e









G

d
,
e



=


min

e


e









rank


(

A
e

)





,






and






G
c


:=


min

e


e






G

c
,
e


.







(
10
)







We refer to diversity order herein to mean the asymptotic slope of the error probability versus SNR curve in a log-log scale. Often, “diversity” refers to “channel diversity,” i.e., roughly the degree of freedom of a given channel. To attain a certain diversity order (slope) on the error probability versus SNR curve, three conditions may be satisfied: i) Transmitter 4 is well-designed so that the information symbols are encoded with sufficient redundancy (enough diversification); ii) Channel 8 is capable of providing enough degrees of freedom; iii) Receiver 4 is well designed so as to sufficiently exploit the redundancy introduced at the transmitter.


Since the diversity order Gd determines how fast the symbol error probability drops as SNR increases, Gd is to be optimized first.


We have the following theorem.


Theorem 1 (Maximum Achievable Diversity Order): For a transmitted codeword set custom character with minimum Hamming distance δmin, over i.i.d. FIR Rayleigh fading channels of order L, the diversity order is min(δmin, L+1). Thus, the Maximum Achievable Diversity Order (MADO) of LE-OFDM transmissions is L+1 and in order to achieve MADO, we need δmin≧L+1.


Proof: Since matrix Ae=VHDeHDeV in (7) is the Gram matrix1 of DeV, the rank re of Ae is the same as the rank of DeV, which is min(δ(u, u′),L+1)≦L+1. Therefore, the diversity order of the system is








G
d

=



min

e


e





rank


(

A
c

)



=



min

e


e





min


[


δ


(

u
,

u



)


,

L
+
1


]



=


min


(


δ
min

,

L
+
1


)




L
+
1





,





and the equality is achieved when δmin≧L+1.


Theorem 1 is intuitively reasonable because the FIR Rayleigh fading channel offers us L+1 independent fading taps, which is the maximum possible number of independent replicas of the transmitted signal in the serial transmission mode. In order to achieve the MADO, any two codewords in custom character should be different by no less than L+1 entries.


The results in Theorem 1 can also be applied to GF-coded/interleaved OFDM systems provided that channel coding or interleaving is applied only within an OFDM symbol and not across successive OFDM symbols. The diversity is again the minimum of the minimum Hamming distance of the code and L+1. To see this, it suffices to view custom character as the codeword set of GF-coded blocks.


To achieve MADO, we need Ae to be full rank and thus positive definite for any eεcustom charactere. This is true if and only if hHAeh>0 for any h≠0εCL+1. Equation (7) shows that this is equivalent to d2(y, y′)=∥DHΘe∥2≠0, ∀eεcustom charactere, and ∀h≠0. The latter means that any two different transmitted vectors should result in different received vectors in the absence of noise, irrespective of the channel; in such cases, we call the symbols detectable or recoverable. The conditions for achieving MADO and channel-irrespective symbol detectability are summarized in the following theorem:


Theorem 2 (Symbol Detectability custom character MADO): Under the channel conditions of Theorem 1, the maximum diversity order is achieved if and only if symbol detectability is achieved; i.e., ∥DHΘc∥2≠0, ∀eεcustom charactere and ∀h≠0.


The result in Theorem 2 is somewhat surprising: it asserts the equivalence of a deterministic property of the code, namely symbol detectability in the absence of noise, with a statistical property, the diversity order. It can be explained though, by realizing that in random channels, the performance is mostly affected by the worst channels, despite their small realization probability. By guaranteeing detectability for any, and therefore the worst, channels, we are essentially improving the ensemble performance.


The symbol detectability condition in Theorem 2 should be checked against all pairs s and s′, which is usually not an easy task, especially when the underlying constellations are large and/or when the size K of s is large. But it is possible to identify sufficient conditions on Θ that guarantee symbol detectability and that are relatively easy to check. One such condition is provided by the following theorem.


Theorem 3 (Sufficient Condition for MADO): For i.i.d. FIR Rayleigh fading channels of order L, MADO is achieved when rank(DHΘ)=K, ∀h≠0, which is equivalent to the following condition: Any N−L rows of Θ span the C1×K space. The latter in turn implies that N−L≧K.


Proof: First of all, since Θ is of size N×K, it can not have rank greater than K. If MADO is not achieved, there exists at least one channel h and eεcustom charactere such that DHΘe=0 by Theorem 2, which means that rank(DHΘ)<K. So, MADO is achieved when DHΘ=K. Secondly, since the diagonal entries of DH represent frequency response of the channel h evaluated at the FFT frequencies, there can be at most L zeros on the diagonal of DH. In order that rank(DHΘ)=K, ∀h, it suffices to have any N−L rows of Θ span the C1×K space. On the other hand, when there is a set of N−L rows of Θ that are linearly dependent, we can find a channel that has zeros at frequencies corresponding to the remaining L rows. Such a channel will make rank(DHΘ)<K. This completes the proof.


The natural question that arises at this point is whether there exist LE matrices Θ that satisfy the conditions of Theorem 3. The following theorem constructively shows two classes of encoders that satisfy Theorem 3 and thus achieve MADO.


Theorem 4 (MADO-achieving encoders):


i) Vandermonde Encoders: Choose N points ρnεC, n=0, 1, . . . , N−1, such that ρm≠ρn, ∀n≠n. Let ρ:=[ρ0, ρ1, . . . , ρN-1]T. Then the Vandermonde encoder Θ(ρ)εCN×K defined by [Θ(ρ)]n,knk satisfies Theorem 3 and thus achieves MADO.


ii) Cosine Encoders: Choose N points φ0, φ1, . . . , φN-1εR, such that φm≠(2k+1)π and φm±φn≠2kπ, ∀m≠n, ∀kεZ. Let φ:=[φ0, φ1, . . . , φN-1]T. Then the real cosine encoder Θ(φ)εRN×K defined by








[

Θ


(
ϕ
)


]


n
,
k


=


cos


(

k
+

1
2


)




ϕ
n







satisfies Theorem 3 and thus achieves MADO.


Proof: We first prove that Vandermonde encoders in i) satisfy the conditions of Theorem 3. Any K rows of the matrix Θ(ρ) form a square Vandermonde matrix with distinct rows. Such a Vandermonde matrix is known to have a determinant different from 0. Therefore, any K rows of Θ(ρ) are linearly independent, which satisfies the conditions in Theorem 3.


To prove Part ii) of the theorem, we show that any K rows of the encoding matrix form a non-singular square matrix. Without loss of generality, we consider the matrix formed by the first K rows:










Θ
1

:=

[








cos


(


1
2



ϕ
0


)





cos


(


3
2



ϕ
0


)








cos


(




2

K

-
1

2



ϕ
0


)







cos


(


1
2



ϕ
1


)





cos


(


3
2



ϕ
1


)








cos


(




2

K

-
1

2



ϕ
1


)





















cos


(


1
2



ϕ

K
-
1



)





cos


(


3
2



ϕ

K
-
1



)








cos


(




2

K

-
1

2



ϕ

K
-
1



)









]





(
11
)







Let us evaluate the determinant det(Θ1). Define







z
n

:=


cos


(


1
2



ϕ
n


)


.






Using Chebyshev polynomials of the first kind









T
1



(
x
)


:=


cos


(

l






cos

-
1



x

)


=




i
=
0




l
/
2







(



l





2





i




)





x

1
-

2





i





(


x
2

-
1

)


i





,





each entry






cos


(




2

m

+
1

2



ϕ
n


)






of Θ1 is a polynomial T2m+1(zn) of order 2m+1 of some







z
n

=


cos


(


1
2



ϕ
n


)


.






The determinant det(Θ1) is therefore a polynomial in z0, . . . , zK-1 of order Σn=1K(2n−1)=K2. It is easy to see that when zn=0, or when zm=±zn, m≠n, Θ1 has an all-zero row, or, two rows that are either the same or the negative of each other. Therefore, zn, zm−zn, and zm+zn are all factors of det(Θ1). So, g(z0, z1, . . . , zK-1):=ΠnznΠm>n(zm2−zn2) is also a factor of det(Θ1). But g(z0, z1, . . . , zK-1) is of order K+K(K−1)=K2, which means that it is different from det(Θ1) by at most a constant. Using the leading coefficient4 2l-1 of T1(x), we obtain the constant as Πn=1K22n-l-1=2K(K-1); that is, det(Θ1)=2K(K-1)g(z0, z1, . . . , zK-1).


Since φm≠(2k+1)π and φm±φn≠2kπ, ∀m≠n, ∀kεZ, none of zn, zm−zn, and zm+zn can be zero. Therefore, det(Θ1)≠0 and Θ1 is non-singular. A similar argument can be applied to any K rows of the matrix, and the proof is complete.


Notice that up to now we have been assuming that the channel consists of i.i.d. zero-mean complex Gaussian taps. Such a model is well suited for studying average system performance in wireless fading channels, but is rather restrictive since the taps may be correlated. For correlated channels, we have the following result.


Theorem 5 (MADO of Correlated Rayleigh Channels): Let the channel h be zero-mean complex Gaussian with correlation matrix Rh. The maximum achievable diversity order equals the rank of Rh, which is achieved by any encoder that achieves MADO with i.i.d. Rayleigh channels. If Rh is full rank and MADO is achieved, then the coding advantage is different from the coding advantage in the i.i.d. case only by a constant








det

1

L
+
1





(

R
h

)


/


α
L

.





Proof: Let rh:=rank(Rh) and the eigen-value decomposition of Rh be










R
h

=




[




U
1




U
2




]



[




Λ
1



0




0



Λ
2




]




[




U
1
H






U
2
H




]


.





(
12
)








where U1 is (L+1)×rh, U2 is (L+1)×(L+1−rh), A1 is rh×rh full rank diagonal, and A2 is an (L+1−rh)×(L+1−rh) all-zero matrix. Define









h
~

1

:=


Λ
1

-

1
2





U
1
H


h


,







h
~

2

:=

U
2
H


,





and {tilde over (h)}:=[{tilde over (h)}1T {tilde over (h)}2T]T, where






Λ
1

-

1
2







is defined by








Λ
1

-

1
2





Λ
1

-

1
2




=


Λ
1

-
1


.






Since h2 has an autocorrelation matrix R{tilde over (h)}2=U2HRhU2=A2, all the entries of {tilde over (h)}2 are zero almost surely. We can therefore write









h
=



[





U
1



Λ
1

1
2






U
2




]



h
~


=


U
1



Λ
1

1
2





h
1

.







(
13
)








Since







R


h
~

1


=



Λ
1

-

1
2





U
1
H



R
h



U
1



Λ
1

-

1
2




=


I

r
h


.







the entries of {tilde over (h)}1, which are jointly Gaussian, are i.i.d.


Substituting (13) in (7), we obtain












d
2



(

y
,

y



)


=



h
H



A
e


h

=




h
~

1
H



Λ
1

1
2




U
1
H



A
e



U
1



Λ
1

1
2





h
~

1


:=



h
~

1
H




A
~

e




h
~

1





,




(
14
)








where








A
~

e

=


Λ
1

1
2




U
1
H



A
e



U
1



Λ
1

1
2








is an rh×rh matrix.


Following the same derivation as in (7)-(10), with Ae replaced by Ãe and h replaced by {tilde over (h)}1, we can obtain the diversity order and coding advantage for error event e as











G

d
,
e


=


rank


(


A
~

e

)


:=




r
~

e




r
h






and






G

c
,
e




=


(




l
=
0




r
~

e

-
1





λ
~


e
,
l



)


1
/


r
~

e






,




(
15
)








where {tilde over (λ)}e,l, l=1, . . . , rh, are the eigen-values of Ãe.


Where Θ is designed such that MADO is achieved with i.i.d. channels, Ae is full rank for any eεcustom charactere. Then Ae is positive definite Hermitian symmetric, which means that there exists an (L+1)×(L+1) matrix Be such that Ae=BeHBe. It follows that








A
~

e

=


Λ
1

1
2




U
1
H



B
e
H



B
e



U
1



Λ
1

1
2








is the Gram matrix of








B
e



U
1



Λ
1

1
2



,





and thus Ae has rank equal to








rank
(


B
e



U
1



Λ
1

1
2



)

=


rank
(


U
1



Λ
1

1
2



)

=

r
h



,





the MADO for this correlated channel.


When the MADO rh is achieved, the coding advantage in (15) for e becomes Gc,e=det(Ãe)1/rh. If in addition, Rh has full rank rh=L+1, then det(Ãe)1/rh=det(Ae)1/(L+1)det(Rh)1/(L+1), which means that in the full-rank correlated channel case, the full-diversity coding advantage is different from the coding advantage in the i.i.d. case only by a constant det(Rh)1/(L+1)L.


Theorem 5 asserts that the rank(Rh) is the MADO for LE-OFDM systems as well as for coded OFDM systems that do not code or interleave across OFDM symbols. Also, MADO-achieving transmissions through i.i.d. channels can achieve the MADO for correlated channels as well.


Coding advantage Gc is another parameter that needs to be optimized among the MADO-achieving encoders. Since for MADO-achieving encoders, coding advantage is given by Gc=mine≠0Gc,eL mine≠0det(Ae), we need to maximize the minimum determinant of Ae over all possible error sequences e, among the MADO-achieving encoders.


The following theorem asserts that ZP-only transmission is one of the coding advantage maximizers.


Theorem 6 (ZP-only: maximum coding advantage): Suppose the entries of s(i) are drawn independently from a finite constellation custom character with minimum distance of dmin(custom character). Then the maximum coding advantage of an LE-OFDM for i.i.d. Rayleigh fading channels under as1) is Gc,max−αLdmin2(custom character). The maximum coding advantage is achieved by ZP-only transmissions with any K.


In order to achieve high rate, we have adopted K=N−L and found two special classes of encoders that can achieve MADO in Theorem 4. The Vandermonde encoders are reminiscent of the parity check matrix of BCH codes, Reed-Solomon (RS) codes, and Goppa codes. It turns out that the MADO-achieving encoders and these codes are closely related.


Let us now take custom character=CK×1. We call the codeword set custom character that is generated by Θ of size N×K Maximum Distance Separable (MDS) if δmin(custom character)=N−K+1. The fact that N−K+1 is the maximum possible minimum Hamming distance of custom character is due to the Singleton bound. Although the Singleton bound was originally proposed and mostly known for Galois field codes, its proof can be easily generalized to real/complex field as well. In our case, it asserts that δmin≦N−K+1 when custom character=CK×1.


Notice that the assumption custom character=CK×T is usually not true in practice, because the entries of s are usually chosen from a finite-alphabet set, e.g., QPSK or QAM. But such an assumption greatly simplifies the system design task: once we can guarantee δmin=N−K+1 for custom character=CK×1, we can choose any constellation from other considerations without worrying about the diversity performance. However, for a finite constellation, i.e., when δ has finite cardinality, the result on δmin can be improved. In fact, it can be shown that even with a square and unitary K×K matrix Θ, it is possible to have δmin=K.


To satisfy the condition in Theorem 2 with the highest rate for a given N, we need K=N−L, and δmin=L+1=N−K+1. In other words, to achieve constellation-irrespective full-diversity with highest rate, we need the code to be MDS. According to our Theorem 4, such MDS encoders always exist for any N and K<N.


In the GF, there also exist MDS codes. Examples of GF MDS codes include single-parity-check coding, repetition coding, generalized RS coding, extended RS coding, doubly extended RS coding, algebraic-geometry codes constructed using an elliptic curve.


When a GF MDS code exists, we may use it to replace our CF linear code, and achieve the same (maximum) diversity order at the same rate. But such GF codes do not always exist for a given field and N, K. For F2, only trivial MDS codes exist. This means that it is impossible to construct, for example, binary (and thus simply decodeable) MDS codes that have δmin≧2, except for the repetition code. One other restriction of the GF MDS code is on the input and output alphabet. Although Reed-Solomon codes are the least restrictive among them in terms of the number of elements in the field, they are constrained on the code length and the alphabet size. Our linear encoders Θ, on the other hand, operate over the complex field with no restriction on the input symbol alphabet or the coded symbol alphabet.


We obtain analogous results on our complex field MDS codes for achieving MADO to known results for GF MDS codes.


Theorem 7 (Dual MDS code): For an MDS code generated by ΘεCN×K, the code generated by the matrix Θ is also MDS, where Θ is an N×(N−K) matrix such that ΘTΘ=0.


A generator Θ for an MDS code is called systematic if it is in the form [IK, P]T where P is a K×(N−K) matrix.


Theorem 8 (Systematic MDS code): A code generated by [I, P]T is MDS if and only if every square submatrix of P is nonsingular.


To construct systematic MDS codes using Theorem 8, the following two results can be useful:


i) Every square submatrix of a Vandermonde matrix with real, positive entries is nonsingular.


ii) A K×(N−K) matrix P is called a Cauchy matrix if its (i, j)th element [P]ij=1/(xi+yj) for some elements x1, x2, . . . , xK, y1, y2, . . . , yN-K, such that the xi's are distinct, the yj's are distinct, and xi+yj≠0 for all i, j. Any square submatrix of a Cauchy matrix is nonsingular.


Next, we discuss decoding options for our CF code. For this purpose, we restrict our attention to the case that custom character is a finite set, e.g., a finite constellation carved from (possibly sealed and shifted) ZK. This includes BPSK, QPSK, and QAM as special cases. Since the task of the receiver involves both channel equalization and decoding of the CF linear code, we will consider the combined task jointly and will use the words decoding, detection, and equalization interchangeably.


Maximum Likelihood Detection

To achieve MADO, LE-OFDM requires ML decoding. For the input output relationship in (2) and under the AWGN assumption, the minimum-distance detection rule becomes ML and can be formulated as follows:










s
^

=



arg





min


s








x
-


D
H


Θ





s




.






(
16
)







ML decoding of LE transmissions belongs to a general class of lattice decoding problems, as the matrix product DHΘ in (2) gives rise to a discrete subgroup (lattice) of the CN space under the vector addition operation. In its most general form, finding the optimum estimate in (16) requires searching over |custom character| vectors. For large block sizes and/or large constellations, it is practically impossible to perform exhaustive search since the complexity depends exponentially on the number of symbols in the block.


A relatively less complex ML search is possible with the sphere decoding (SD) algorithm (c.f., FIG. 5), which only searches coded vectors that are within a sphere centered at the received symbol x (c.f., (2)). Denote the QR decomposition of DHΘ as DHΘ=QR, where Q has size N×K and satisfies QHQ=IK×K, and R is an upper triangular K×K matrix. The problem in (16) then converts to the following equivalent problem











s
^

=



arg





min


s









Q
H


x

-

R





s






,




(
17
)








SD starts its search by looking only at vectors s such that

QHx−Rs∥<C,  (18)

where C is the search radius, a decoding parameter. Since R is upper triangular, in order to satisfy the inequality in (18), the last entry of s must satisfy |[R]K,K[s]K|<C, which reduces the search space if C is small. For one possible value of the last entry, possible candidates of the last-but-one entry are found and one candidate is taken. The process continues until a vector of s0 is found that satisfies (18). Then the search radius C is set equal to ∥QHx−Rs0∥ and a new search round is started. If no other vector is found inside the radius, then s0 is the ML solution. Otherwise, if s1 is found inside the sphere, the search radius is again reduced to ∥QHx−Rs1∥, and so on. If no s0 is ever found inside the initial sphere of radius C, then C is too small. In this case, either a decoding failure is declared or C is increased.


The complexity of the SD is polynomial in K, which is better than exponential but still too high for practical purposes. Indeed, it is not suitable for codes of block size greater than, say, 16. When the block size is small, the sphere decoder can be considered as an option to achieve the ML performance at manageable complexity.


In the special case of ZP-only transmissions, the received vector is given by {tilde over (x)}=Hs+ñ. Thanks to the zero-padding, the full convolution of the transmitted block s with the FIR channel is preserved and the channel is represented as the banded Toeplitz matrix H. In such a case, Viterbi decoding can be used at a complexity of custom character(QL) per symbol, where Q is the constellation size of the symbols in s.


Low-Complexity Linear Detection

Zero-forcing (ZF) and MMSE detectors (equalizers) offer low-complexity alternatives. The ZF and MMSE equalizers based on the input-output relationship (2) can be written as:

Gzf=(DHΘ)T and Gmmse=RsΘHDHHη2IN+DHΘRsΘHDHH)−1,

respectively, where (·)T denotes pseudo-inverse, ση2 is the variance of entries of noise η, and Rs is the autocorrelation matrix of s. Given the ZF and MMSE equalizers, they each require custom character(N×K) operations per K symbols. So per symbol, they require only custom character(N) operations. To obtain the ZF or MMSE equalizers, inversion of a N×N matrix is involved, which has complexity custom character(N3). However, the equalizers only needs to be recomputed when the channel changes.


Decision-Directed Detection

The ML detection schemes in general have high complexity, while the linear detectors may have decreased performance. The class of decision-directed detectors lies between these categories, both in terms of complexity and in terms of performance.


Decision-directed detectors capitalize on the finite alphabet property that is almost always available in practice. In the equalization scenario, they are more commonly known as Decision Feedback Equalizers (DFE). In a single-user block formulation, the DFE has a structure as shown in FIG. 6, where the feed-forward filter is represented as a matrix W and the feedback filter is presented as B. Since we can only feed back decisions in a casual fashion, B is usually chosen to be a strictly upper or lower triangular matrix with zero diagonal entries. Although the feedback loop is represented as a matrix, the operations happen in a serial fashion: the estimated symbols are fed back serially as their decisions are formed one by one. The matrices W and B can be designed according to ZF or MMSE criteria. When B is chonse to be triangular and the MSE between the block estimate before the decision device is minimized, the feed-forward and feedback filtering matrices can be found from the following equations:

Rs−1HDHHRη−1DHΘ=UHΛU,  (19)
W=URsΘHDHH(Rη+DHΘRsΘHDHH)−1, B=U−I,  (20)

where the R's denote autocorrelation matrices, (19) was obtained using Cholesky decomposition, and U is an upper triangular matrix with unit diagonal entries. Since the feed-forward and feedback filtering entails only matrix-vector multiplications, the complexity of such decision directed schemes is comparable to that of linear detectors. Because decision directed schemes capitalize on the finite-alphabet property of the information symbols, the performance is usually (much) better than linear detectors.


As an example, we list in the following table the approximate number of flops needed for different decoding schemes when K=14, L=2, N=16, and BPSK modulation is deployed; i.e., custom character={±1}K.












TABLE 1







Decoding Scheme
order of Flops/symbol









Exhaustive ML
>2K = 214 = 16.384



Sphere Decoding
≈800 (empirical)



ZF/MMSE
≈N = 16



Decision-Directed
≈N = 16



Viterbi for ZP-only
2L = 22 = 4










Iterative Detectors

Other possible decoding methods include iterative detectors, such as successive interference cancellation with iterative least squares (SIC-ILS), and multistage cancellations. These methods are similar to the illustrated DFE in the interference from symbols that are decided in a block is canceled before a decision on the current symbol is made. In SIC-ILS, least squares is used as the optimization criterion and at each step or iteration, the cost function (least-squares) will decrease or remain the same. In multistage cancellation, the MMSE criterion is often used such that MF is optimum after the interference is removed (supposing that the noise is white). The difference between a multistage cancellation scheme and the block DFE is that the DFE symbol decisions are made serially; and for each undecided symbol, only interference from symbols that have been decided is cancelled; while in multistage cancellation, all symbols are decided simultaneously and then their mutual interferences are removed in a parallel fashion.


As illustrated in FIG. 7, another embodiment may utilize for LEOFDM equalization an iterative “sum-product” decoding algorithm, which is also used in Turbo decoding. In particular, the coded system is represented using a factor graph, which describes the interdependence of the encoder input, the encode output, and the noise-corrupted coded symbols.


As a simple example, suppose the encoder takes a block of 3 symbols s:=[s0, s1, s2]T as input and linearly encodes them by a 4×3 matrix Θ to produce the coded symbols u:=[u0, u1, u2, u3]. After passing through the channel (OFDM modulation/demodulation), we obtain the channel output xi=H(εj2πi/4)ui, i=0, 1, 2, 3. The factor graph for such a coded system is shown in FIG. 7, where the LE is represented by linear constraints between the LE input symbols s and the LE output symbols u.


Parallel Encoding for Low Complexity Decoding

When the number of carriers N is very large (e.g., 1,024), it is desirable to keep the decoding complexity manageable. To achieve this we can split the encoder into several smaller encoders. Specifically, we can choose Θ=PΘ′, where P is a permutation matrix that interleaves the subcarriers, and Θ′ is a block diagonal matrix: Θ′=diag(Θ0, Θ1, . . . , ΘM-1). This is a essentially a form of coding for interleaved OFDM, except that the coding is done in complex domain here. The matrices Θm, m=0, . . . , M−1 are of smaller size than Θ and all of them can even be chosen to be identical. With such designed Θ, decoding s from the noisy DHΘs is equivalent to decoding M coded sub-vectors of smaller sizes and therefore the overall decoding complexity can be reduced considerably. Such a decomposition is particularly important when a high complexity decoder such as the sphere decoder is to be deployed.


The price paid for low decoding complexity is a decrease in transmission rate. When such parallel encoding is used, we should make sure that each of the Θm matrices can guarantee full diversity, which requires Θm to have L redundant rows. The overall Θ will then have ML redundant rows, which corresponds to an M-fold increase of the redundancy of a full single encoder of size N×K. If a fixed constellation is used for entries in s, then square Θm's can be used, which does not lead to loss of efficiency.



FIGS. 8-10 are graphs that illustrate exemplary results of simulations of the described techniques. In the illustrated results, we compare the proposed wireless communication techniques with existing coded OFDM systems that deploy existing GF block codes and convolutional codes. In all cases, BPSK constellation is used, and in Test Case 2 and 3, the binary encoded symbols are mapped to ±1's before OFDM modulation.


Test case 1 (Decoding of LE-OFDM): We first test the performance of different decoding algorithms. The LE-OFDM system has parameters K=14, N=16, L=2. The channel is i.i.d. Rayleigh and BER's for 200 random channel realizations according to As1) are averaged. FIG. 8 shows the performance of ZF, MMSE, DFE, and sphere decoding (ML) for LE-OFDM. We notice that at BER of 10−4 DFE performs about 2 dB better than the MMSE detectors, while at the same time it is only less than 1 dB inferior to the sphere decoder, which virtually achieves the ML decoding performance. The complexity of ZF, MMSE, DFE is all about N=16 flops per symbol, which is much less than the sphere decoding algorithm, which empirically needs about 800 flops per symbol in this case.


Test case 2 (Comparing LE-OFDM with BCH-coded OFDM): For demonstration and verification purposes, we first compare LE-OFDM with coded OFDM that relies on GF block coding. The channel is modeled as FIR with 5 i.i.d. Rayleigh distributed taps. In FIG. 9, we illustrate Bit Error Rate (BER) performance of CF coded OFDM with Vandermonde code of Theorem 4, and that of binary BCH-coded OFDM. The system parameters are K=26, N=31. The generating polynomial of the BCH code is g(D)=1+D2+D5. Since we can view this BCH as a rate 1 convolutional code with the same generator and with termination after 26 information symbols (i.e., the code ends at the all-zero state), we can use the Viterbi algorithm for soft-decision ML BCH decoding. For LE-OFDM, since the transmission is essentially a ZP-only single-carrier scheme, the Viterbi algorithm is also applicable for ML decoding.


Since the binary (26, 31) BCH code has minimum Hamming distance 3, it possesses a diversity order of 3, which is only half of the maximum possible (L+1=6) that LE-OFDM achieves with the same spectral efficiency. This explains the difference in their performance. We can see that when the optimum ML decoder is adopted by both receivers. LE-OFDM outperforms coded OFDM with BCH coding considerably. The slopes of the corresponding BER curves also confirm our theoretical results.


Test case 3 (Comparing LE-OFDM with convolutionally coded OFDM): In this test, we compare (see FIG. 10) our LE-OFDM system with convolutionally coded OFDM (with a rate ½ code punctured to rate ¾ followed by interleaving) that is deployed by the HiperLAN2 standard over the channels used in Test Case 2. The rate ½ mother code has its generator in octal form as (133, 171) and there are 64 states in its trellis. Every 3rd bit from the first branch and every second bit from the second branch of the mother code are punctured to obtain the rate ¾ code, which results in a code whose weight enumerating function is 8W5+31W6+160W7+ . . . . So the free distance is 5, which means that the achieved diversity is 5, less than the diversity order 6 achieved by LE-OFDM.


The parameters are K=36, N=48. We use two parallel truncated DCT encoders; that is, Θ=I2×2custom characterΘ0, where custom character denotes Kronecker product, and Θ0 is a 24×18 encoder obtained by taking the first 18 columns of a 24×24 DCT matrix. With ML decoding, LE-OFDM performs about 2 dB better than convolutionally coded OFDM. From the ML performance curves in FIG. 10, LE-OFDM seems to achieve a larger coding advantage than the punctured convolutional code we used.


Surprisingly, even with linear MMSE equalization, the performance of LE-OFDM is better than coded OFDM for SNR values less than 12 dB. The complexity of ML decoding for LE-OFDM is quite high in the order of 1,000 flops per symbol. But the ZF and MMSE decoders have comparable or even lower complexity than the Viterbi decoder for the convolutional code.


The complexity of LE-OFDM can be dramatically reduced using the parallel encoding method with square encoders. It is also possible to combine CF coding with conventional GF coding, in which case only small square encoders of size 2×2 or 4×4 are necessary to achieve near optimum performance.


Various embodiments of the invention have been described. The described techniques can be embodied in a variety of receivers and transmitters including base stations, cell phones, laptop computers, handheld computing devices, personal digital assistants (PDA's), and the like. The devices may include a digital signal processor (DSP), field programmable gate array (FPGA), application specific integrated circuit (ASIC) or similar hardware, firmware and/or software for implementing the techniques. If implemented in software, a computer readable medium may store computer readable instructions, i.e., program code, that can be executed by a processor or DSP to carry out one of more of the techniques described above. For example, the computer readable medium may comprise random access memory (RAM), read-only memory (ROM), non-volatile random access memory (NVRAM), electrically erasable programmable read-only memory (EEPROM), flash memory, or the like. The computer readable medium may comprise computer readable instructions that when executed in a wireless communication device, cause the wireless communication device to carry out one or more of the techniques described herein. These and other embodiments are within the scope of the following claims.

Claims
  • 1. A wireless communication device comprising: an encoder that applies a linear transformation to a stream of information bearing symbols selected from a constellation having a finite alphabet to produce a stream of precoded symbols that are complex numbers and are not restricted by the constellation of the information bearing symbols; anda modulator to produce an output waveform in accordance with the stream of precoded symbols for transmission through a wireless channel.
  • 2. The wireless communication device of claim 1, wherein the modulator generates the output waveform as a multicarrier waveform having a set of subcarriers, and the encoder encodes the stream of information bearing symbols so that the subcarriers carry different linear combinations of the information symbols.
  • 3. The wireless communication device of claim 1, wherein the encoder applies the linear transformation by applying a unitary matrix to the information bearing symbols.
  • 4. A wireless communication device comprising: an encoder that applies a matrix to linearly transform blocks of K information bearing symbols selected from a constellation having a finite alphabet to produce blocks of N precoded symbols that are complex numbers and are not restricted to the constellation of the information bearing symbols; anda modulator that generates a multicarrier waveform having a set of subcarriers, where N is the number of subcarriers of the multi-carrier waveform and K is less than or equal to N.
  • 5. The wireless communication device of claim 4, wherein the linear encoder has a code rate r=K/N.
  • 6. The wireless communication device of claim 4, wherein the linear encoder applies a matrix of size N×K to blocks of K information bearing symbols to produce blocks of N precoded symbols.
  • 7. A wireless communication device, comprising: an encoder that applies a matrix to linearly transform blocks of K information bearing symbols selected from a constellation having a finite alphabet to produce blocks of N precoded symbols that are complex numbers and are not restricted by the constellation of the information bearing symbols; anda modulator that generates a multicarrier waveform having a set of subcarriers for transmission over a wireless channel,wherein N is the number of subcarriers and K is less than or equal to N, andwherein the size of the matrix is selected as a function of an order L of the wireless channel, and the number K of symbols per block is selected as a function of the channel order L.
  • 8. The wireless communication device of claim 7, wherein K is selected so that K≦N−L.
  • 9. The wireless communication device of claim 7, wherein K is selected so that K=N−L.
  • 10. The wireless communication device of claim 6, wherein the linear encoder applies the matrix to perform a vector multiplication on the blocks of K information bearing symbols to produce blocks of N precoded symbols, and applies each block of N precoded symbols across the N subcarriers.
  • 11. The wireless communication device of claim 1, wherein the wireless communication device comprises one of a base station and a mobile device.
  • 12. A wireless communication device comprising: an encoder that applies a plurality of M matrices to linearly transform a stream of information bearing symbols selected from a constellation having a finite alphabet to produce a stream of precoded symbols that are complex numbers and are not restricted by the constellation of the information bearing symbols; anda modulator to produce an output waveform in accordance with the stream of precoded symbols for transmission through a wireless channel,where the matrices are identical and collectively have M*L redundant rows, where L represents an order of the channel.
  • 13. A wireless communication device comprising: a demodulator that receives a waveform carrying a encoded transmission and produces a demodulated data stream, wherein the encoded data stream was produced by applying a linear transformation to a stream of information bearing symbols selected from a constellation having a finite alphabet to produce a stream of precoded symbols that are complex numbers and are not restricted by the constellation of the information bearing symbols; anda decoder that decodes the demodulated data to produce estimated data.
  • 14. The wireless communication device of claim 13, wherein the decoder applies one of maximum-likelihood detection, zero-force (ZF) detection, minimum mean squared error (MMSE) detection, decision-directed detection, iterative detection, to decode the demodulated data.
  • 15. The wireless communication device of claim 13, wherein the wireless communication device comprises one of a base station and a mobile device.
  • 16. A method comprising: applying a linear transformation to a stream of information bearing symbols selected from a constellation having a finite alphabet to produce a stream of precoded symbols that are complex numbers and are not restricted by the constellation of the information bearing symbols; andoutputting a waveform in accordance with the stream of precoded symbols for transmission through a wireless channel.
  • 17. The method of claim 16, wherein outputting the waveform comprises: outputting the output waveform as a multicarrier waveform having a set of subcarriers; andencoding the stream of information bearing symbols so that the subcarriers carry different linear combinations of information symbols.
  • 18. The method of claim 16, wherein applying the linear transformation to the stream of information bearing symbols comprises applying a unitary matrix to the stream of information bearing symbols.
  • 19. A method comprising: applying a matrix to linearly transform blocks of K information bearing symbols that are selected from a constellation having a finite alphabet to produce blocks of N precoded symbols that are complex numbers and are not restricted by the constellation of the information bearing symbols, andoutputting a multicarrier waveform having a set of subcarriers in accordance with the stream of precoded symbols for transmission through a wireless channel,where N is the number of subcarriers, and K is less than or equal to N.
  • 20. The method of claim 19, wherein applying the linear transformation comprises applying the linear transformation to blocks of K information bearing symbols to produce blocks of N precoded symbols at a code rate r=K/N.
  • 21. The method of claim 19, wherein applying the linear transformation comprises applying a matrix of size N×K to the blocks of information bearing symbols.
  • 22. The method of claim 19, further comprising selecting the number of symbols per block K as a function of an order of the channel.
  • 23. The method of claim 19, further comprising selecting the number of symbols per block so that K≦N−L, wherein L represents an order of the channel.
  • 24. The method of claim 19, further comprising selecting the number of symbols per block so that K=N−L, where L represents an order of the channel.
  • 25. The method of claim 19, wherein applying the linear transformation comprises applying a matrix to perform a vector multiplication on the blocks of K information bearing symbols to produce blocks of N precoded symbols.
  • 26. A method comprising: applying a plurality of M matrices to linearly transform a stream of information bearing symbols selected from a constellation having a finite alphabet, wherein the M matrices linearly transform the stream of information bearing symbols to produce a stream of precoded symbols that are complex numbers and are not restricted by the constellation of the information bearing symbols; andoutputting a waveform in accordance with the stream of precoded symbols for transmission through a wireless channel,where the matrices are identical and have M*L redundant rows and, where L represents an order of the channel.
  • 27. A computer-readable medium comprising instructions to cause a programmable processor to: apply a linear transformation to a stream of information bearing symbols selected from a constellation having a finite alphabet to produce a stream of precoded symbols that are complex numbers and are not restricted by the constellation of the information bearing symbols; andoutput waveform in accordance with the stream of precoded symbols for transmission through a wireless channel.
  • 28. The computer-readable medium of claim 27, further comprising instructions to cause the programmable processor to: output the output waveform as a multicarrier waveform having a set of subcarriers; andencode the stream of information bearing symbols so that the subcarriers carry different linear combinations of information symbols.
Parent Case Info

This application claims priority from U.S. Provisional Application Ser. No. 60/374,886, filed Apr. 22, 2002, U.S. Provisional Application Ser. No. 60/374,935, filed Apr. 22, 2002, U.S. Provisional Application Ser. No. 60/374,934, filed Apr. 22, 2002, U.S. Provisional Application Ser. No. 60/374,981, filed Apr. 22, 2002, U.S. Provisional Application Ser. No. 60/374,933, filed Apr. 22, 2002, the entire contents of which are incorporated herein by reference.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

This invention was made with Government support under Contract No. ECS-9979443, awarded by the National Science Foundation, and Contract No. DAAG55-98-1-0336 (University of Virginia Subcontract No. 5-25127) awarded by the U.S. Army. The Government may have certain rights in this invention.

US Referenced Citations (12)
Number Name Date Kind
6188717 Kaiser et al. Feb 2001 B1
6351499 Paulraj et al. Feb 2002 B1
6442214 Boleskei et al. Aug 2002 B1
6452981 Raleigh et al. Sep 2002 B1
6614861 Terry et al. Sep 2003 B1
6865237 Boariu et al. Mar 2005 B1
6891897 Bevan et al. May 2005 B1
6898248 Elgamal et al. May 2005 B1
6956815 Chiodini Oct 2005 B2
20020163892 Hassibi et al. Nov 2002 A1
20020167962 Kowalski Nov 2002 A1
20040146014 Hammons, Jr. et al. Jul 2004 A1
Provisional Applications (5)
Number Date Country
60374981 Apr 2002 US
60374886 Apr 2002 US
60374935 Apr 2002 US
60374934 Apr 2002 US
60374933 Apr 2002 US