Iterative Timing Recovery
|
|
- Dinah Valerie Cannon
- 5 years ago
- Views:
Transcription
1 Iterative Timing Recovery John R. Barry School of Electrical and Computer Engineering, Georgia Tech Atlanta, Georgia U.S.A. 0
2 Outline Timing Recovery Tutorial Problem statement TED: M&M, LMS, S-curves PLL Iterative Timing Recovery Motivation (powerful FEC) 3-way strategy Per-survivor strategy Performance comparison 1
3 The Timing Recovery Problem Receiver expects the k-th pulse to arrive at time kt: 0 T 2T 3T 4T 5T τ 4 Instead, the k-th pulse arrives at time kt + τ k. Notation: τ k is offset of k-th pulse. 2
4 Sampling Best sampling times are {kt + τ k }. r( t ) kt + τˆ k to digital detector TIMING RECOVERY Estimate {τ k } 3
5 Timing Offset Models CONSTANT τ k = τ 0 τ k TIME FREQUENCY OFFSET τ k+1 = τ k + T τ k TIME RANDOM WALK τ k+1 = τ k + N (0, σ w 2 ) τ k TIME RANDOM WALK + FREQUENCY OFFSET τ k+1 = τ k + N ( T, σ w 2 ) 4
6 The PR4 Model and Notation TIMING OFFSETS AWGN a k d k τ g(t) r( t ) = k d k g(t kt τ k ) 1 D 2 {±1} {0, ±2} SINC FUNCTION + AWGN 2T 0 2T 4T Define: d k = a k a k 2 {0, ±2} = 3-level PR4 symbol dˆ k = receiver s estimate of d k τ k = timing offset τˆ k = receiver s estimate of τ k ε k = τ k τˆ k estimate error, with std σ ε. εˆ k = receiver s estimate of ε k 5
7 ML Estimate: Trained, Constant Offset The ML estimate τˆ minimizes J( τ a) = r( t ) d i g(t it τ) dt. i 2 Exhaustive search: Try all values for τ, pick one that best represents r( t ) in MMSE sense. J 2T T 0 T 2T τˆ 6
8 ANIMATION 1 7
9 Achieves Cramer-Rao Bound r(kt + τˆ ) = d i g(kt it + τˆ τ) + n i k = s k ( ε ) + n k, where ε = τ τˆ is the estimation error. The CRB on the variance of the estimation error: σ ε T 2 σ 2 1 3σ = N E sk ( ε) 2 π 2 N ε 8
10 Implementation J 2T T 0 T 2T τˆ Gradient search: i + 1 = i µ τˆ τˆ J(τ a) τ = τ τˆi Direct calculation 1 of gradient: -- J(τ a) = r( t )g (t it τ)dt 2 τ i d i = i d i r i. Remarks: Susceptible to local minima initialize carefully. Block processing. Requires training. 9
11 Conventional Timing Recovery After each sample: Step 1. Estimate residual error, using a timing-error detector (TED) Step 2. Update τˆ, using a phase-locked loop (PLL) r( t ) r k kt + τˆ k VITERBI PLL UPDATE εˆ k T.E.D. dˆ k {0, ±2} DETECTOR d k TRAINING 10
12 LMS Timing Recovery MMSE cost function: E r k d k 2 k-th sample, r k = r(kt + k ) τˆ what we want it to be LMS approach: τˆ k + 1 = τˆ k + µ εˆ k where = εˆk r k d k. τˆ 2 τˆ = τˆk 11
13 LMS TED 1 But: -- r k d k = (r k d k ) d i g(kt it + τ) 2 τˆ = τˆ τˆ i 2 τˆ τˆk = (r k d k ) d i g (kt it + τˆ τ) = (r k d k ) d i p ( ε k ) i k i where p ( ε k ) n = g(nt ε): τ i 0 12
14 From LMS to Mueller & Müller 0 εˆk (r k d k )(d k 1 d k + 1 ) + smaller terms = r k d k 1 r k d k + 1 d k d k 1 + d k d k + 1 Independent of τ Delay second term and eliminate last two: εˆk r k d k 1 r k 1 d k Mueller & Müller (M&M) TED 13
15 0.5T S Curves 0 0.5T 0 0.5T 0.5T TIMING ERROR, ε 14 ^ ε = ε TRAINED M&M, LMS AVERAGE TED OUTPUT, E[ε ε] ^ SNR = 2 σ 2 = 10 db
16 0.5T LMS is Noisier 0 0.5T 0 0.5T 0.5T TIMING ERROR, ε 15 ^ ε = ε TRAINED M&M TRAINED LMS AVERAGE TED OUTPUT, E[ε ε] ^ ONE STD SNR = 2 σ 2 = 10 db
17 An Interpretation of M&M Consider the complex signal r( t ) + jr(t T). Its noiseless trajectory: It passes through {0, ±2, ±2 ± 2j, ±2j} at times {kt + τ}. More often than not, in a counterclockwise direction. 16
18 ANIMATION 2 17
19 Sampling Late by 20% R k = r k + jr k 1 D k = d k + jd k 1 θ The angle between R k and D k predicts timing error: θ sinθ = Im R*D r k d k 1 r k 1 d k M&M. RD 18
20 Decision-Directed TED Replace training by decisions { dˆ k } εˆ k r k dˆ k 1 r k 1 dˆ k. Instantaneous decisions: Hard: Round r k to nearest symbol. Soft: 2sinh( 2r dˆ k= E[d k r k ] = k σ 2 ) : cosh( 2r k σ 2 ) e 2 + σ2 dˆ db 10 db 5 db r 19
21 0.5T 0 0.5T 0 0.5T 0.5T TIMING ERROR, ε 20 TRAINED M&M, LMS HARD M&M SOFT M&M AVERAGE TED OUTPUT, E[ε ε] ^ SNR = 2 σ 2 = 10 db
22 0.5T ^ AVERAGE TED OUTPUT, E[ε ε] 0 HARD SOFT 0.5T 0.5T 0 0.5T TIMING ERROR, ε SNR = 2 σ 2 = 10 db 21
23 Reliability versus Delay Three places to get decisions: r( t ) r k = r(kt + τˆ k ) TRELLIS EQUALIZER DECODER kt + τˆ k z D PLL UPDATE εˆ k T.E.D. r k D A B τˆk 1 = + α + τˆk εˆk d k D C Inherent trade-off: reliability versus delay. to get more reliable decisions requires more decoding delay D delay decreases agility to timing variations 22
24 Decision Delay Degrades Performance 5.5 RMS TIMING JITTER σ ε T (%) TRAINED M&M 1st-ORDER PLL E b N 0 = 8 db σ w T = 0.5% D = PLL GAIN, α D = 15 D = 10 D = 5 D = 0 23
25 The Instantaneous-vs-Reliable Trade-Off JITTER σ ε T 7% 6% 5% DELAY-100, PERFECT DECISIONS 4% 3% 2% 1% SNR (db) DELAY-20, PERFECT DECISIONS INSTANTANEOUS BUT UNRELIABLE DECISIONS Parameters Averaged over 40,000 bits random walk σ w T = 0.5% 1st-order M&M PLL α optimized for SNR = 10 db Delay α opt Reliability becomes more important at low SNR. 24
26 Linearized Analysis Assume εˆk = ε k + independent noise = τ k τˆ k + n k 1st order PLL, τˆ k + 1 = τˆ k + α(τ k τˆ k + n k ), is a linear system: τ k NOISE 1-st order LPF αz ( 1 α)z 1 τˆk α Ex: Random walk w k WHITE z 1 τ k WHITE 1-st order LPF αz ( 1 α)z 1 + τˆk derive optimal α to minimize σ2 ε ε k 25
27 The PLL Update 1st-order PLL: τˆ k + 1 = τˆ k + α εˆ k Already introduced using LMS Easily motivated intuitively: if εˆ k is accurate, α = 1 corrects in one step Smaller α attenuates noise at cost of slower response 2nd-order PLL: τˆ k + 1 = τˆ k + αεˆ k + β εˆ n k n = Accumulate TED output to anticipate trends P+I control Closed-loop system is second-order LPF Faster response Zero steady-state error for frequency offset 0 0 TIME 26
28 Equivalent Views of PLL Analysis: Sample at {kt + τˆ k }, where Implementation: τˆ k + 1 = τˆ k + α εˆ k + β εˆ n, εˆ k is estimate of timing error at time k. k n = A D VCO Accumulation implicit in VCO β α z 1 LOOP FILTER εˆk TED PHASE DETECTOR 27
29 Iterative Timing Recovery Motivation Powerful codes low SNR timing recovery is difficult traditional PLL approach ignores presence of code Key Questions How can timing recovery exploit code? What performance gains can be expected? Is it practical? 28
30 A Canonical Example Simplest possible channel model: {±1} alphabet, ideal ISI-free pulse shape constant timing offset τ AWGN. Add a rate-1 3 turbo code with {±1} alphabet: Rate-1 3 Turbo Code m 2048 bits S RANDOM INTERLEAVER π 1 D D D 2 1 D D D 2 mux a g(t τ) 0% xsbw AWGN r( t ) = i a i g(t it τ) + AWGN Problem: Recover message in face of unknown noise, timing offset 29
31 Iterative ML Timing Recovery The ML estimator with training minimizes: J( τ a) = r( t ) a i g(t it τ) dt i 2 Without training, the ML estimator minimizes E a [J( τ a)]. An EM-like approach: τˆ TIMING ESTIMATOR SYMBOL ESTIMATOR { ã k } Useful in concept, but overstates complexity. For example, the timing estimator might itself be iterative: τˆ i + 1 = τˆ i µj ( τˆ i { ã ). i } 30
32 A Reduced-Complexity Approach Collapse three loops to a single loop. τˆ Initialize 0 Iterate for i = 0, 1, 2, decode component 1 decode component 2 update timing estimate, i + 1 = i µj ( i { }) interpolate end τˆ τˆ τˆ ã i As a benchmark, an iterative receiver that ignores the presence of FEC will ( i) replace the pair of decoders by ã k = tanh (( r( kt + τˆi )) σ 2 ). 31
33 Results 5% 4% 3% Parameters RMS TIMING ERROR, σ ε T τ = 0.123T, AWGN channel Rate-1 3 Turbo Code K = 2048 message bits N = 6150 coded bits S = 16 random interleaver, length inner per outer iteration Averaged over 180 trials σ ε 2 = E[( ) 2 ] τˆ τ 2% 1% 0.5% 0.4% 0.3% EXPLOIT FEC Trained ML, Cramer-Rao Bound IGNORE FEC 4 db 0.2% E b N 0 (db) 32
34 New Model: Random Walk and ISI Equivalent equalized readback waveform: r(t) = k a k h(t kt τ k ) + AWGN. System diagram: m k LDPC ENCODE c k TIMING OFFSET 1 a k 1 D 2 τ PRECODER PR4 h(t) AWGN r(t) Rate-8 9 (4095, 3640) irregular LDPC code with node-degree distribution polynomials: h(t) = g sinc (t) g sinc (t 2T) 2T 0 2T 4T λ ( x) = x x x x 7 bit ρ ( x) = x x 30 check 33
35 Conventional Turbo Equalizer + PLL PR trellis r(t) r k BCJR kt + τˆk apriori + PLL + BIT NODES CHECK NODES λ k = LLR(c k ) final decisions 34
36 Performance of Conventional Approach 1 WORD-ERROR RATE σ w T = 1% (α = 0.055) σ w T = 0.5% (α = 0.04) KNOWN TIMING Parameters Known Timing: 10 5 Conventional: 25 5 max words SNR per bit (db) Big penalty as σ w T increases: cycle slips. 35
37 Cycle-Slip Example T ESTIMATE OF TIMING OFFSET ( ) τˆk 0 T CYCLE SLIP ACTUAL τ k ESTIMATE τˆk T Parameters SNR bit = 5.0 db σ w T = 1.0% α = T TIME k (in bit periods) 36
38 Nested Loops Iterate between PLL and turbo equalizer, which in turn iterates between BCJR and LDPC decoder, which in turn iterates between bit nodes and check nodes. { τˆk } TURBO EQUALIZER { LLR( c k )} LDPC DECODER r(t) PLL BCJR EQ BIT NODES CHECK NODES { LLR( c k )} { LLR( d k )} 37
39 A Decoder-Centric View FROM BCJR PLL & RESAMPLE & BCJR BIT NODES CHECK NODES 38
40 Iterative Timing Recovery and TEQ r(t) kt + τˆk r k INTERPOLATE BCJR apriori + PLL + BIT NODES CHECK NODES PLL d k λ k final decisions 39
41 Automatic Cycle-Slip Correction Iterative receiver automatically corrects for cycle slips: ESTIMATE OF TIMING OFFSET ( ) τˆk T 0 T ACTUAL τ N = T Parameters 1.5T SNR bit = 5.0 db σ w T = 1.0% α = N 5 iterations TIME k (in bit periods) 40
42 3 Approaches to Timing Recovery Conventional: 3-Way Iterative Timing Recovery: TURBO EQ TIMING RECOVERY EQ DECODE EQUALIZATION TIMING RECOVERY & SAMPLING Per-Survivor Iterative Timing Recovery: DECODER PS-BCJR DECODER 41
43 Per-Survivor Processing [Raheli, Polydoros, Tzou 91-95] A general framework for estimating Markov process with unknown parameters and independent noise Basic idea: Add a separate estimator to each survivor of Viterbi algorithm Has been applied to channel identification, adaptive sequence detection, carrier recovery Application to timing recovery [Kovintaveat et al., ISCAS 2003]: Start with traditional Viterbi algorithm on PR trellis Run a separate PLL on each survivor, based on its decision history Motivations: ➊ PLL is fully trained whenever correct path is chosen! ➋ Can avoid decision delay altogether 42
44 Per-Survivor BCJR? Motivation: Exploit PSP concept in iterative receiver: PS-BCJR DECODER Problem: BCJR algorithm has no survivors. Proposal: Add depth-one survivor for purposes of timing recovery only. The result is PS-BCJR Start with traditional BCJR algorithm on PR trellis Embed timing-recovery process inside Run multiple PLL s in parallel, one for each survivor 43
45 PS-BCJR Branch Metric Key: Each node p {0,1,2,3} in trellis at time k has its own τ k (p), an estimate of the timing offset τ k. r k (p) = r k (kt + τ k (p)), corresponding sample The branch metrics depend on samples of the starting state: 0 [, ] 1 [+, ] τ k (0) τ k (1) γ k (2,1) = exp{ r k (2) d (2,1) 2 (2σ 2 ) + a (2,1) λ k a 2} 2 [,+] τ k (2) 3 [+,+] τ k (3) 44
46 Per-Survivor BCJR: Forward Recursion Associate with each node p {0,1,2,3} at time k the following: forward metric α k ( p ) predecessor π k ( p ) forward timing offset estimate τ k ( p ) α k+1 (1) = = 66 π k+1 (1) = argmax 0,2 {7 3, 9 5} = 2 τ k+1 (1) = τ k ( 2 ) + µ(r k (2)d ( π k (2),2) r k 1 (π k (2))d (2,1) ) r(kt + τ k (2)) r((k 1)T + τ k 1 (π k (2))) Notation complicated, but idea is simple: update blue node timing using M&M PLL driven by the samples & inputs corresponding to blue branches. 45
47 Backward Recursion Associate with each node p {0,1,2,3} at time k the following backward metric β k ( p ) successor σ k ( p ) backward timing offset estimate τ k b (p) β k (1) = = 26 σ k (1) = argmax 2,3 {8 1, 9 2} = 3 τ b b k (1) = τ k+1 (3) + µ(r k+1 (σ k+1 (3))d (1,3) r k (3)d ( 3,σ k+1 (3)) ) r((k+1)t + τ b k+2(σk+1 (3))) r(kt + τ b k+1 (3)) Again, update blue node timing using backward M&M PLL driven by samples & inputs corresponding to blue branches
48 Compare Forward/Backward Timing Backward timing estimates can exploit knowledge of forward estimates. Option 1: Ignore forward estimates during backward pass. Option 2: Average backward with forward estimate whenever they differ by more than some threshold (say 0.1T) in absolute value. 47
49 New Encoder PRECODER m k 1 D D 3 D 4 1 D D 4 PUNCTURE π S-RANDOM INTERLEAVER (s = 16) c k 1 1 D 2 a k RATE-8 9 LENGTH 4095 RSC ENCODER 48
50 Compare 3 Systems Conventional: TURBO EQ 3-Way Iterative Timing Recovery: Complexity = #IT (PLL + BCJR + DEC) TIMING RECOVERY EQ DECODE EQUALIZATION TIMING RECOVERY & SAMPLING Per-Survivor Iterative Timing Recovery: Complexity = #IT (8 PLL + BCJR + DEC) DECODER PSP-BCJR DECODER 49
51 Moderate Random Walk (σ w T = 0.5%) SNR PER BIT, E b N 0 (db) 50 CONVENTIONAL TIMING RECOVERY ITERATION 3-WAY ITERATIVE TIMING RECOVERY BER (50, 100) PS (50) (TRAINED PLL) (KNOWN TIMING)
52 Severe Random Walk (σ w T = 1%) BER SNR PER BIT, E b N 0 (db) 51
53 Example: PSP Corrects Quickly 2.5T σ w T = 1% 2T TIMING Time (in bit ESTIMATE periods) 1.5T T 0.5T ACTUALActual τ τ 5 PSP 5 PSP 2 2 PSP PSP 1 NON-PSP, 50 ITERATIONS ITERATIVE I CTR (50) TIMING RECOVERY 0.5T TIME Timing (in BIT Estimate PERIODS) 52
54 Convergence Rate: (σ w T = 1%) 1 CONVENTIONAL SECTOR-ERROR RATE ITERATIVE 3-WAY ITERATIVE PS (TRAINED PLL) σ w T = 1% E b N 0 = 5 db (KNOWN TIMING) NUMBER OF ITERATIONS 53
55 How Long do Cycle Slips Persist? Pr[ SLIP AT ITERATION k SLIP ] ITERATIVE PS σ w T = 1% E b N 0 = 5 db ITERATIVE 3-WAY NUMBER OF ITERATIONS, k 54
56 Summary Powerful codes permit low SNR conventional strategies fail exploiting code is critical Problem is solvable We described two strategies for iterative timing recovery Embed timing recovery inside turbo equalizer Automatically corrects for cycle slips Challenges remaining complexity close gap to known timing 55
Timing Recovery at Low SNR Cramer-Rao bound, and outperforming the PLL
T F T I G E O R G A I N S T I T U T E O H E O F E A L P R O G R ESS S A N D 1 8 8 5 S E R V L O G Y I C E E C H N O Timing Recovery at Low SNR Cramer-Rao bound, and outperforming the PLL Aravind R. Nayak
More informationChapter 7: Channel coding:convolutional codes
Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication
More informationNAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR. Sp ' 00
NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR Sp ' 00 May 3 OPEN BOOK exam (students are permitted to bring in textbooks, handwritten notes, lecture notes
More informationDigital Communications
Digital Communications Chapter 8: Trellis and Graph Based Codes Saeedeh Moloudi May 7, 2014 Outline 1 Introduction 2 Convolutional Codes 3 Decoding of Convolutional Codes 4 Turbo Codes May 7, 2014 Proakis-Salehi
More information2D Coding and Iterative Detection Schemes
2D Coding and Iterative Detection Schemes J. A. O Sullivan, N. Singla, Y. Wu, and R. S. Indeck Washington University Magnetics and Information Science Center Nanoimprinting and Switching of Patterned Media
More information6.451 Principles of Digital Communication II Wednesday, May 4, 2005 MIT, Spring 2005 Handout #22. Problem Set 9 Solutions
6.45 Principles of Digital Communication II Wednesda, Ma 4, 25 MIT, Spring 25 Hand #22 Problem Set 9 Solutions Problem 8.3 (revised) (BCJR (sum-product) decoding of SPC codes) As shown in Problem 6.4 or
More informationRADIO SYSTEMS ETIN15. Lecture no: Equalization. Ove Edfors, Department of Electrical and Information Technology
RADIO SYSTEMS ETIN15 Lecture no: 8 Equalization Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se Contents Inter-symbol interference Linear equalizers Decision-feedback
More informationSoft-Output Decision-Feedback Equalization with a Priori Information
Soft-Output Decision-Feedback Equalization with a Priori Information Renato R. opes and John R. Barry School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 333-5
More informationData Detection for Controlled ISI. h(nt) = 1 for n=0,1 and zero otherwise.
Data Detection for Controlled ISI *Symbol by symbol suboptimum detection For the duobinary signal pulse h(nt) = 1 for n=0,1 and zero otherwise. The samples at the output of the receiving filter(demodulator)
More informationInformation Theoretic Imaging
Information Theoretic Imaging WU Faculty: J. A. O Sullivan WU Doctoral Student: Naveen Singla Boeing Engineer: James Meany First Year Focus: Imaging for Data Storage Image Reconstruction Data Retrieval
More informationTrellis-based Detection Techniques
Chapter 2 Trellis-based Detection Techniques 2.1 Introduction In this chapter, we provide the reader with a brief introduction to the main detection techniques which will be relevant for the low-density
More informationOptimal Placement of Training Symbols for Frequency Acquisition: A Cramér-Rao Bound Approach
1 Optimal Placement of Training Symbols for Frequency Acquisition: A Cramér-Rao Bound Approach Aravind R. Nayak, Member, IEEE, John R. Barry, Senior Member, IEEE, and Steven W. McLaughlin, Senior Member,
More informationCode design: Computer search
Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator
More informationDecision-Point Signal to Noise Ratio (SNR)
Decision-Point Signal to Noise Ratio (SNR) Receiver Decision ^ SNR E E e y z Matched Filter Bound error signal at input to decision device Performance upper-bound on ISI channels Achieved on memoryless
More informationSoft-Output Trellis Waveform Coding
Soft-Output Trellis Waveform Coding Tariq Haddad and Abbas Yongaçoḡlu School of Information Technology and Engineering, University of Ottawa Ottawa, Ontario, K1N 6N5, Canada Fax: +1 (613) 562 5175 thaddad@site.uottawa.ca
More informationResidual Versus Suppressed-Carrier Coherent Communications
TDA Progress Report -7 November 5, 996 Residual Versus Suppressed-Carrier Coherent Communications M. K. Simon and S. Million Communications and Systems Research Section This article addresses the issue
More informationSignal Processing for Digital Data Storage (11)
Outline Signal Processing for Digital Data Storage (11) Assist.Prof. Piya Kovintavewat, Ph.D. Data Storage Technology Research Unit Nahon Pathom Rajabhat University Partial-Response Maximum-Lielihood (PRML)
More informationCoherentDetectionof OFDM
Telematics Lab IITK p. 1/50 CoherentDetectionof OFDM Indo-UK Advanced Technology Centre Supported by DST-EPSRC K Vasudevan Associate Professor vasu@iitk.ac.in Telematics Lab Department of EE Indian Institute
More informationBASICS OF DETECTION AND ESTIMATION THEORY
BASICS OF DETECTION AND ESTIMATION THEORY 83050E/158 In this chapter we discuss how the transmitted symbols are detected optimally from a noisy received signal (observation). Based on these results, optimal
More informationCHAPTER 8 Viterbi Decoding of Convolutional Codes
MIT 6.02 DRAFT Lecture Notes Fall 2011 (Last update: October 9, 2011) Comments, questions or bug reports? Please contact hari at mit.edu CHAPTER 8 Viterbi Decoding of Convolutional Codes This chapter describes
More informationCode-aided ML joint delay estimation and frame synchronization
Code-aided ML joint delay estimation and frame synchronization Henk Wymeersch and Marc Moeneclaey Digital Communications Research Group Dept. of Telecommunications and Information Processing Ghent University,
More informationRalf Koetter, Andrew C. Singer, and Michael Tüchler
Ralf Koetter, Andrew C. Singer, and Michael Tüchler Capitalizing on the tremendous performance gains of turbo codes and the turbo decoding algorithm, turbo equalization is an iterative equalization and
More informationIterative Timing Recovery for Magnetic Recording Channels with Low Signal-to-Noise Ratio. Aravind R. Nayak
Iterative Timing Recovery for Magnetic Recording Channels with Low Signal-to-Noise Ratio A Thesis Presented to The Academic Faculty by Aravind R. Nayak In Partial Fulfillment of the Requirements for the
More informationApproximate Minimum Bit-Error Rate Multiuser Detection
Approximate Minimum Bit-Error Rate Multiuser Detection Chen-Chu Yeh, Renato R. opes, and John R. Barry School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 30332-0250
More informationUNIVERSITÀ DEGLI STUDI DI PARMA
UNIVERSITÀ DEGLI STUDI DI PARMA DIPARTIMENTO DI INGEGNERIA DELL INFORMAZIONE Dottorato di Ricerca in Tecnologie dell Informazione XX Ciclo Dario Fertonani LOW-COMPLEXITY ITERATIVE RECEIVERS Dissertazione
More informationa) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics.
Digital Modulation and Coding Tutorial-1 1. Consider the signal set shown below in Fig.1 a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics. b) What is the minimum Euclidean
More informationECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)
ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling
More informationJoint Iterative Decoding of LDPC Codes and Channels with Memory
Joint Iterative Decoding of LDPC Codes and Channels with Memory Henry D. Pfister and Paul H. Siegel University of California, San Diego 3 rd Int l Symposium on Turbo Codes September 1, 2003 Outline Channels
More informationIntroduction to Convolutional Codes, Part 1
Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes
More informationModern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009
Modern Coding Theory Daniel J. Costello, Jr. Coding Research Group Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556 2009 School of Information Theory Northwestern University
More information1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g
Exercise Generator polynomials of a convolutional code, given in binary form, are g 0, g 2 0 ja g 3. a) Sketch the encoding circuit. b) Sketch the state diagram. c) Find the transfer function TD. d) What
More informationTurbo Codes for Deep-Space Communications
TDA Progress Report 42-120 February 15, 1995 Turbo Codes for Deep-Space Communications D. Divsalar and F. Pollara Communications Systems Research Section Turbo codes were recently proposed by Berrou, Glavieux,
More informationState-of-the-Art Channel Coding
Institut für State-of-the-Art Channel Coding Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/
More informationBinary Convolutional Codes
Binary Convolutional Codes A convolutional code has memory over a short block length. This memory results in encoded output symbols that depend not only on the present input, but also on past inputs. An
More informationDecoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift
Decoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift Ching-Yao Su Directed by: Prof. Po-Ning Chen Department of Communications Engineering, National Chiao-Tung University July
More informationEE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design
Chapter 4 Receiver Design Chapter 4 Receiver Design Probability of Bit Error Pages 124-149 149 Probability of Bit Error The low pass filtered and sampled PAM signal results in an expression for the probability
More informationUtilizing Correct Prior Probability Calculation to Improve Performance of Low-Density Parity- Check Codes in the Presence of Burst Noise
Utah State University DigitalCommons@USU All Graduate Theses and Dissertations Graduate Studies 5-2012 Utilizing Correct Prior Probability Calculation to Improve Performance of Low-Density Parity- Check
More informationPerformance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels
Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering
More informationInterleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong
Interleave Division Multiple Access Li Ping, Department of Electronic Engineering City University of Hong Kong 1 Outline! Introduction! IDMA! Chip-by-chip multiuser detection! Analysis and optimization!
More informationNew reduced state space BCJR algorithms for the ISI channel
New reduced state space BCJR algorithms for the ISI channel Anderson, John B; Prlja, Adnan; Rusek, Fredrik Published in: Proceedings, International Symp. on Information Theory 2009 Link to publication
More informationAsymptotic Capacity Bounds for Magnetic Recording. Raman Venkataramani Seagate Technology (Joint work with Dieter Arnold)
Asymptotic Capacity Bounds for Magnetic Recording Raman Venkataramani Seagate Technology (Joint work with Dieter Arnold) Outline Problem Statement Signal and Noise Models for Magnetic Recording Capacity
More informationSimplified Implementation of the MAP Decoder. Shouvik Ganguly. ECE 259B Final Project Presentation
Simplified Implementation of the MAP Decoder Shouvik Ganguly ECE 259B Final Project Presentation Introduction : MAP Decoder û k = arg max i {0,1} Pr[u k = i R N 1 ] LAPPR Λ k = log Pr[u k = 1 R N 1 ] Pr[u
More informationEqualization. Contents. John Barry. October 5, 2015
Equalization John Barry October 5, 205 School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332-0250 barry@ece.gatech.edu Contents Motivation 2 2 Models and Metrics
More informationEE290C Spring Motivation. Lecture 6: Link Performance Analysis. Elad Alon Dept. of EECS. Does eqn. above predict everything? EE290C Lecture 5 2
EE29C Spring 2 Lecture 6: Link Performance Analysis Elad Alon Dept. of EECS Motivation V in, ampl Voff BER = 2 erfc 2σ noise Does eqn. above predict everything? EE29C Lecture 5 2 Traditional Approach Borrowed
More informationFactor Graphs and Message Passing Algorithms Part 1: Introduction
Factor Graphs and Message Passing Algorithms Part 1: Introduction Hans-Andrea Loeliger December 2007 1 The Two Basic Problems 1. Marginalization: Compute f k (x k ) f(x 1,..., x n ) x 1,..., x n except
More informationSingle-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes
Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi kurkoski@ice.uec.ac.jp Dept. of Information and Communications Engineering
More informationThe Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks
The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks Gerald Matz Institute of Telecommunications Vienna University of Technology institute of telecommunications Acknowledgements
More informationEE4601 Communication Systems
EE4601 Communication Systems Week 13 Linear Zero Forcing Equalization 0 c 2012, Georgia Institute of Technology (lect13 1) Equalization The cascade of the transmit filter g(t), channel c(t), receiver filter
More informationJoint Channel Estimation and Co-Channel Interference Mitigation in Wireless Networks Using Belief Propagation
Joint Channel Estimation and Co-Channel Interference Mitigation in Wireless Networks Using Belief Propagation Yan Zhu, Dongning Guo and Michael L. Honig Northwestern University May. 21, 2008 Y. Zhu, D.
More informationTurbo Codes. Manjunatha. P. Professor Dept. of ECE. June 29, J.N.N. College of Engineering, Shimoga.
Turbo Codes Manjunatha. P manjup.jnnce@gmail.com Professor Dept. of ECE J.N.N. College of Engineering, Shimoga June 29, 2013 [1, 2, 3, 4, 5, 6] Note: Slides are prepared to use in class room purpose, may
More informationRANDOM DISCRETE MEASURE OF THE PHASE POSTERIOR PDF IN TURBO SYNCHRONIZATION
RANDOM DISCRETE MEASURE OF THE PHASE POSTERIOR PDF IN TURBO SYNCHRONIZATION Nicolas Paul, Didier Le Ruyet, Tanya Bertozzi * Michel Terre Electronique et Communications, CNAM, 292 rue Saint Martin, 75141
More informationMessage-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras
Message-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras e-mail: hari_jethanandani@yahoo.com Abstract Low-density parity-check (LDPC) codes are discussed
More informationLECTURE 16 AND 17. Digital signaling on frequency selective fading channels. Notes Prepared by: Abhishek Sood
ECE559:WIRELESS COMMUNICATION TECHNOLOGIES LECTURE 16 AND 17 Digital signaling on frequency selective fading channels 1 OUTLINE Notes Prepared by: Abhishek Sood In section 2 we discuss the receiver design
More informationLow-density parity-check (LDPC) codes
Low-density parity-check (LDPC) codes Performance similar to turbo codes Do not require long interleaver to achieve good performance Better block error performance Error floor occurs at lower BER Decoding
More informationDigital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10
Digital Band-pass Modulation PROF. MICHAEL TSAI 211/11/1 Band-pass Signal Representation a t g t General form: 2πf c t + φ t g t = a t cos 2πf c t + φ t Envelope Phase Envelope is always non-negative,
More informationCommunication by Regression: Sparse Superposition Codes
Communication by Regression: Sparse Superposition Codes Department of Statistics, Yale University Coauthors: Antony Joseph and Sanghee Cho February 21, 2013, University of Texas Channel Communication Set-up
More informationLecture 4 : Introduction to Low-density Parity-check Codes
Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were
More informationAPPLICATIONS. Quantum Communications
SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction
More informationDigital Communications
Digital Communications Chapter 5 Carrier and Symbol Synchronization Po-Ning Chen, Professor Institute of Communications Engineering National Chiao-Tung University, Taiwan Digital Communications Ver 218.7.26
More informationPunctured Convolutional Codes Revisited: the Exact State Diagram and Its Implications
Punctured Convolutional Codes Revisited: the Exact State iagram and Its Implications Jing Li Tiffany) Erozan Kurtas epartment of Electrical and Computer Engineering Seagate Research Lehigh University Bethlehem
More informationOPTIMAL FINITE ALPHABET SOURCES OVER PARTIAL RESPONSE CHANNELS. A Thesis DEEPAK KUMAR
OPTIMAL FINITE ALPHABET SOURCES OVER PARTIAL RESPONSE CHANNELS A Thesis by DEEPAK KUMAR Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for
More informationAn Introduction to Low Density Parity Check (LDPC) Codes
An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,
More informationSIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land
SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:
More informationCoding and Detection for Multi-track Digital Data Storage
Coding and Detection for Multi-track Digital Data Storage Tom Conway ECE Dept, University of Limerick, Ireland thomas.conway@ul.ie 1 Outline Multi-track Digital Data Storage Detection Coding Performance
More informationIntroduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.
Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information
More informationTurbo Codes for xdsl modems
Turbo Codes for xdsl modems Juan Alberto Torres, Ph. D. VOCAL Technologies, Ltd. (http://www.vocal.com) John James Audubon Parkway Buffalo, NY 14228, USA Phone: +1 716 688 4675 Fax: +1 716 639 0713 Email:
More informationTHE EFFECT OF PUNCTURING ON THE CONVOLUTIONAL TURBO-CODES PERFORMANCES
THE EFFECT OF PUNCTURING ON THE CONVOLUTIONAL TURBO-COES PERFORMANCES Horia BALTA 1, Lucian TRIFINA, Anca RUSINARU 1 Electronics and Telecommunications Faculty, Bd. V. Parvan, 1900 Timisoara, ROMANIA,
More informationUnequal Error Protection Turbo Codes
Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 Unequal Error Protection Turbo Codes
More informationRevision of Lecture 4
Revision of Lecture 4 We have discussed all basic components of MODEM Pulse shaping Tx/Rx filter pair Modulator/demodulator Bits map symbols Discussions assume ideal channel, and for dispersive channel
More informationConvolutional Codes ddd, Houshou Chen. May 28, 2012
Representation I, II Representation III, IV trellis of Viterbi decoding Turbo codes Convolutional Codes ddd, Houshou Chen Department of Electrical Engineering National Chung Hsing University Taichung,
More informationLow-density parity-check codes
Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,
More informationOne-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information
One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information ZOU Sheng and Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan University of
More informationA REDUCED COMPLEXITY TWO-DIMENSIONAL BCJR DETECTOR FOR HOLOGRAPHIC DATA STORAGE SYSTEMS WITH PIXEL MISALIGNMENT
A REDUCED COMPLEXITY TWO-DIMENSIONAL BCJR DETECTOR FOR HOLOGRAPHIC DATA STORAGE SYSTEMS WITH PIXEL MISALIGNMENT 1 S. Iman Mossavat, 2 J.W.M.Bergmans 1 iman@nus.edu.sg 1 National University of Singapore,
More informationSynchronization Techniques for Burst-Mode Continuous Phase Modulation
Synchronization Techniques for Burst-Mode Continuous Phase Modulation By Seyed Mohammad Ehsan Hosseini Submitted to the graduate degree program in the Department of Electrical Engineering & Computer Science
More informationPerformance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference
TMO Progress Report 4-139 November 15, 1999 Performance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference M. K. Simon 1 The bit-error probability performance
More informationGEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems
GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems Aids Allowed: 2 8 1/2 X11 crib sheets, calculator DATE: Tuesday
More informationEs e j4φ +4N n. 16 KE s /N 0. σ 2ˆφ4 1 γ s. p(φ e )= exp 1 ( 2πσ φ b cos N 2 φ e 0
Problem 6.15 : he received signal-plus-noise vector at the output of the matched filter may be represented as (see (5-2-63) for example) : r n = E s e j(θn φ) + N n where θ n =0,π/2,π,3π/2 for QPSK, and
More informationNew Puncturing Pattern for Bad Interleavers in Turbo-Codes
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 2, November 2009, 351-358 UDK: 621.391.7:004.052.4 New Puncturing Pattern for Bad Interleavers in Turbo-Codes Abdelmounaim Moulay Lakhdar 1, Malika
More informationEstimation of the Capacity of Multipath Infrared Channels
Estimation of the Capacity of Multipath Infrared Channels Jeffrey B. Carruthers Department of Electrical and Computer Engineering Boston University jbc@bu.edu Sachin Padma Department of Electrical and
More informationExpectation propagation for signal detection in flat-fading channels
Expectation propagation for signal detection in flat-fading channels Yuan Qi MIT Media Lab Cambridge, MA, 02139 USA yuanqi@media.mit.edu Thomas Minka CMU Statistics Department Pittsburgh, PA 15213 USA
More informationThe Sorted-QR Chase Detector for Multiple-Input Multiple-Output Channels
The Sorted-QR Chase Detector for Multiple-Input Multiple-Output Channels Deric W. Waters and John R. Barry School of ECE Georgia Institute of Technology Atlanta, GA 30332-0250 USA {deric, barry}@ece.gatech.edu
More informationChannel Coding and Interleaving
Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.
More informationDirect-Sequence Spread-Spectrum
Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.
More informationImproved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection
Improved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection Manish Mandloi, Mohammed Azahar Hussain and Vimal Bhatia Discipline of Electrical Engineering,
More informationEE5713 : Advanced Digital Communications
EE5713 : Advanced Digital Communications Week 12, 13: Inter Symbol Interference (ISI) Nyquist Criteria for ISI Pulse Shaping and Raised-Cosine Filter Eye Pattern Equalization (On Board) 20-May-15 Muhammad
More informationChapter 10. Timing Recovery. March 12, 2008
Chapter 10 Timing Recovery March 12, 2008 b[n] coder bit/ symbol transmit filter, pt(t) Modulator Channel, c(t) noise interference form other users LNA/ AGC Demodulator receive/matched filter, p R(t) sampler
More informationRapport technique #INRS-EMT Exact Expression for the BER of Rectangular QAM with Arbitrary Constellation Mapping
Rapport technique #INRS-EMT-010-0604 Exact Expression for the BER of Rectangular QAM with Arbitrary Constellation Mapping Leszek Szczeciński, Cristian González, Sonia Aïssa Institut National de la Recherche
More informationJOINT ITERATIVE DETECTION AND DECODING IN THE PRESENCE OF PHASE NOISE AND FREQUENCY OFFSET
JOINT ITERATIVE DETECTION AND DECODING IN THE PRESENCE OF PHASE NOISE AND FREQUENCY OFFSET Alan Barbieri, Giulio Colavolpe and Giuseppe Caire Università di Parma Institut Eurecom Dipartimento di Ingegneria
More informationNew Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding
1 New Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding Alireza Kenarsari-Anhari, Student Member, IEEE, and Lutz Lampe, Senior Member, IEEE Abstract Bit-interleaved
More informationA t super-channel. trellis code and the channel. inner X t. Y t. S t-1. S t. S t+1. stages into. group two. one stage P 12 / 0,-2 P 21 / 0,2
Capacity Approaching Signal Constellations for Channels with Memory Λ Aleksandar Kav»cić, Xiao Ma, Michael Mitzenmacher, and Nedeljko Varnica Division of Engineering and Applied Sciences Harvard University
More informationBlind phase/frequency synchronization with low-precision ADC: a Bayesian approach
Blind phase/frequency synchronization with low-precision ADC: a Bayesian approach Aseem Wadhwa, Upamanyu Madhow Department of ECE, UCSB 1/26 Modern Communication Receiver Architecture Analog Digital TX
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationLDPC Codes. Slides originally from I. Land p.1
Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to
More informationCompression methods: the 1 st generation
Compression methods: the 1 st generation 1998-2017 Josef Pelikán CGG MFF UK Praha pepca@cgg.mff.cuni.cz http://cgg.mff.cuni.cz/~pepca/ Still1g 2017 Josef Pelikán, http://cgg.mff.cuni.cz/~pepca 1 / 32 Basic
More informationTracking of Spread Spectrum Signals
Chapter 7 Tracking of Spread Spectrum Signals 7. Introduction As discussed in the last chapter, there are two parts to the synchronization process. The first stage is often termed acquisition and typically
More informationChannel Estimation with Low-Precision Analog-to-Digital Conversion
Channel Estimation with Low-Precision Analog-to-Digital Conversion Onkar Dabeer School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai India Email: onkar@tcs.tifr.res.in
More informationMotivation for CDR: Deserializer (1)
Motivation for CDR: Deserializer (1) Input data 1:2 DMUX 1:2 DMUX channel 1:2 DMUX Input clock 2 2 If input data were accompanied by a well-synchronized clock, deserialization could be done directly. EECS
More informationThe Viterbi Algorithm EECS 869: Error Control Coding Fall 2009
1 Bacground Material 1.1 Organization of the Trellis The Viterbi Algorithm EECS 869: Error Control Coding Fall 2009 The Viterbi algorithm (VA) processes the (noisy) output sequence from a state machine
More informationError Correction and Trellis Coding
Advanced Signal Processing Winter Term 2001/2002 Digital Subscriber Lines (xdsl): Broadband Communication over Twisted Wire Pairs Error Correction and Trellis Coding Thomas Brandtner brandt@sbox.tugraz.at
More informationMultiuser Detection. Summary for EECS Graduate Seminar in Communications. Benjamin Vigoda
Multiuser Detection Summary for 6.975 EECS Graduate Seminar in Communications Benjamin Vigoda The multiuser detection problem applies when we are sending data on the uplink channel from a handset to a
More information