• 沒有找到結果。

Chapter 4 Simulation Results

4.2 Performance – Bit Error Rate

In our discussion, correlations between transmit antennas and receive antennas are assumed independent, and each transmit and receive antenna pair has the same channel model. In the BER simulations, indoor channel model [28] is adopted, because both EWC 802.11n and 802.11a assume similar indoor wireless applications, and the simulated channel is generated by a hand-written program using Jake’s model. Besides, the correlation between any of the two taps of the models is small. As shown before, a simulated packet consists of the preamble part and 6 data symbols. In our simulation, perfect channel state information (CSI) is assumed.

The first simulated channel, as listed in Table 4.3, is measured in a typical old office environment where partitions are often made of bricks. The longest tap has a delay of 127ns, which is about 2.5 samples for 802.11a system. The delay is so small that a very large coherent bandwidth is expected.

Table 4.3 Indoor channel model [28] with short delays, office environment Tap

No.

Delay (ns)

Power (dB)

Amplitude Distribution

Doppler Spectrum

1 0 0 Rayleigh Classical/Flat

2 36 -5 Rayleigh Classical/Flat

3 84 -13 Rayleigh Classical/Flat

4 127 -19 Rayleigh Classical/Flat

Figure 4.4 shows performances of various techniques, where 2x2 means that there are 2 transmit and 2 receive antennas. ML denotes ML detection, BLAST denotes V-BLAST detection, Shen’s denote Shen’s method, Li’s denotes Li’s method [22] in section 3.2, improved Li’s denotes our improved Li’s method in section 3.2, ML1 denotes L=1 in section 3.1.1, ML2 denotes L=2 in section 3.1.1, ML3 denote L=3 in section 3.1.1, ML4 denote L=4 in section, ML_ext denote the new extended method (detect two values) at a time in section 3.1.2. In Figure 4.5, 2x3 means that there are 2 transmit and 3 receive antennas, similarly for Figure 4.6. ML1 to ML4 are compared separately in Figure 4.13.

It is obvious that the proposed method (L=1) Nt =Nr, has better performance than V-BLAST, with little increase in complexity. And in the figures there is no performance difference between V-BLAST algorithms and comparison algorithms. The condition is also observed in Figure 4.5 and Figure 4.6. Figure 4.7, 4.8, and 4.9 are for the case of 3 transmitter antennas 3, 4, and 5 receiver antennas, respectively.

In each figure the performance of the V-BLAST, Shen’s method, Li’s method, and our improved Li’s method are the same. The reasons are that algorithm of the Li’s method in section 2.3.3.2.1 [21] channel response H are the same in Step 1 and Step 2.

The difference is just the part of data detection is recomputed, but H are the same. And in [21] the approach is fit to use in ideal detection and cancellation. When the error propagation exists the performance of every detected layer are very close. Hence Li’s method has no effect in enhancing performance here. The performances of Shen and Li’s and our improved Li’s method are the same. And its reason and Li’s method are the same.

Figure 4.4 BER performance versus SNR of various detection techniques (2x2), office environment

Figure 4.5 BER performance versus SNR of various detection techniques (2x3), office environment

Figure 4.6 BER performance versus SNR of various detection techniques (2x4), office environment

Figure 4.7 BER performance versus SNR of various detection techniques (3x3), office environment

Figure 4.8 BER performance versus SNR of various detection techniques (3x4), office environment

Figure 4.9 BER performance versus SNR of various detection techniques (3x5), office environment

Figure 4.10 BER performance versus SNR of various detection techniques (4x4), office environment

Figure 4.11 BER performance versus SNR of various detection techniques (4x5), office environment

Figure 4.12 BER performance versus SNR of various detection techniques (4x6), office environment

Figure 4.13 BER performance versus SNR of our various detection techniques and V-BLAST (4x4), office environment

Figure 4.14 BER performance versus SNR of our various detection techniques and V-BLAST (4x5), office environment

Figure 4.15 BER performance versus SNR of the proposed detection techniques and V-BLAST (4x6), office environment

The second simulated channel is measured in an airport representing a typical large hall area. The channel has a few very long delay paths which indicate bad channel conditions and is harmful to communication. After simulation, the results in large hall are similar to results in office environment.

Table 4.4 Indoor channel model [28], large hall environment Tap

No.

Delay (ns)

Power (dB)

Amplitude Distribution

Doppler Spectrum

1 0 0 Rayleigh Classical

2 174 -8 Rayleigh Classical

3 274 -15 Rayleigh Classical

4 560 -18 Rayleigh Classical

Figure 4.16 BER performance versus SNR of various detection techniques (2x2), large hall environment

Figure 4.17 BER performance versus SNR of various detection techniques (2x3), large hall environment

Figure 4.18 BER performance versus SNR of various detection techniques (2x4), large hall environment

Figure 4.19 BER performance versus SNR of various detection techniques (3x3), large hall environment

Figure 4.20 BER performance versus SNR of various detection techniques (3x4), large hall environment

Figure 4.21 BER performance versus SNR of various detection techniques (3x5), large hall environment

Figure 4.22 BER performance versus SNR of various detection techniques (4x4), large hall environment

Figure 4.23 BER performance versus SNR of various detection techniques (4x5), large hall environment

Figure 4.24 BER performance versus SNR of various detection techniques (4x6), large hall environment

Figure 4.25 BER performance versus SNR of the proposed detection techniques and V-BLAST (4x4), large hall environment

Figure 4.26 BER performance versus SNR of the proposed detection techniques and V-BLAST (4x5), large hall environment

Figure 4.27 BER performance versus SNR of the proposed detection techniques and V-BLAST (4x6), large hall environment

Chapter 5 Conclusion

In this thesis, many algorithms based on V-BLAST are introduced and simulated, and new algorithms for MIMO OFDM detection are proposed, followed by their investigations and verifications in terms of complexity and BER performance by testing EWC 802.11n systems. Although ML algorithm results in the best performance, it demands the highest computation cost. Therefore, we combine ML and V-BLAST methods, and reduce the complexity of ML detection by utilizing known detected values.

Since designs of detection methods are trade-off problems between cost and performance, complexity and performance analysis helps a lot to decide a suitable design.

In complexity analysis, the proposed methods (L=1) is roughly equal to V-BLAST method but its performance is better than V-BLAST method. Usually a detected layer will produce error and propagate to the following layers. The proposed methods have the better performance and less error propagation problem than other algorithm compare in the simulation. Testing 802.16e is considered as future work. It is also future work to reduce the complexity of pseudoinverse.

Bibliography

[1] T.Ojanpera and R. Prasad, “An overview of wireless broadband communications,”

IEEE Commun. Mag. Vol.35, No. 1, pp. 28-34, Jan 1997.

[2] C. L.Ng, K. B. Letaief, and R.D. Murch, “Antenna diversity combing and finite-tap decision feedback equalization for high-speed data transmission,” IEEE Journal on Selected Areas in Communication, Vol. 16, No.8, pp. 1367-1375, Qct. 1998.

[3] B. Yang, K .B. Latief, R. S. Cheng, and Z. Cao, “Channel estimation for OFDM transmission in multipath fading channels based on parameter channel modeling,”

IEEE Transactions on Communications, Vol. 49, No. 3, March 2001.

[4] W. K. Wang, R. S. Cheng, K. B. Latief, and R. D. Murch, “Adaptive antennas at the mobile and base station in an OFDM/TDMA systems,” IEEE Transactions on Communications, Vol. 49, No.1, Jan. 2001.

[5] C. Y. Yue, R. S. Cheng, K. B. Letaief, and R. D. Murch, “Multiuser OFDM with subcarrier, bit, and power allocation,” IEEE Journal on Selected Areas in Communications, Vol. 17, No. 10, pp. 1747-1758, October 1999.

[6] G. J. Foschini and M. J. Cans, “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Personal Communications, Vol.

6, NO. 3, pp. 311-335, 1998.

[7] G. G. Raleigh and J. M. Cioffi, “Spatio-temporal coding for wireless communi-cation,” IEEE Trans. Communications, Vol. 46, No. 3, pp. 357-366, March 1998.

[8] G. J. Foschini, “Layered space-time architecture for wireless communication in a fading environment when using multiple antennas,” Bell laboratories Technical Journul, Vol. 1, No. 2, pp. 41-59, 1996.

[9] P. W. Wolniansky, G. J. Foschini, G. D. Golden, R. A. Valenzuela, “V-BLAST an architecture for realizing very high data rates over the rich-scattering wireless channel,” Invited paper; Proc. ISSSE-98, Pisa, Italy, 1998.

[10] N. Boubaker, K. B. Letaief, and R. D. Murch, “A layered space-time coded wideband OFDM architecture for dispersive wireless links,” Computers and Communications, 2001, Proceedings, Page(s): 518 – 523, July 2001

[11] http://www.enhancedwirelessconsortium.org/home

[12] IEEE Std 802.11a-1999, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999 edition.

[13] N. Boubaker, K. B. Letaief, R. D. Murch, “A low complexity multicarrier BLAST architecture for realizing high data rates over dispersive fading channels,” VTC 2001 Spring, IEEE VTS 53rd Volume 2, Page(s): 800 - 804 vol.2, 6-9 May 2001.

[14] Y. Li, J.C. Chuang and N.R. Sollenberger, “Transmitter diversity for OFDM systems and its impact high rate data wireless networks,” IEEE Journal on Selected Areas in Communications, Vol. 17, NO. 7, pp. 1233-1243, July 1999.

[15] S.B. Bulumulla, S.A. Kassam and S.S. Venkatesh, “An adaptive diversity receiver for OFDM in fading channels,” IEEE Conference on Communications 88, Proc. 1998, Vol. 3, pp. 1325-1329.

[16] G. Yi and K. B. Letaief, “Performance evaluation and analysis of space-time coding in unequalized multipath fading links,” IEEE Transactions on Communications, Vol.

48, pp. 1778-1782, Nov. 2000.

[17] J.J. Wang and Ta-Sung Lee, “Applications of dynamic subcarrier allocation and adaptive modulation in multiuser MIMO-OFDM systems” Master thesis, Institute of Communication Engineering, Hsinchu, Taiwan, National Chiao Tung University, 2004.

[18] G.Y. Lin and S.G. Chen, “On signal Detection of MIMO OFDM Systems” Master thesis, Institute of Electronics College of Electrical Engineering, Hsinchu, Taiwan, National Chiao Tung University, 2004.

[19] C. Shen, H. Zhuang, L. Dai, S. Zhou, and Y. Yao, “Performance Improvement of V-BLAST through an Iterative Approach,” Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings , Vol. 3, pp. 2553 - 2557,Sept. 2003.

[20] Q. Liu, and L. Yang, “A simplified method for V-BLAST detection in MIMO OFDM communication,” Communications, 2004 and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings. The 2004 Joint Conference of the 10th Asia-Pacific Conference on Volume 1, 29 Aug.-1 Sept.

2004 Page(s): 30 - 33 vol.1.

[21]D. Li, L. Cai, and H. Yang, “New iterative detection algorithm for V-BLAST,”IEEE Conference on Vehicular Technology Conference, Vol. 4, pp. 2444 - 2448,Sept. 2004.

[22] J. Akhtar “Enhanced detection for zero-forced V-BLAST,” IEEE Conference on Vehicular Technology Conference, Vol. 2, pp. 848 - 852,May 2004.

[23] S. Baro, G. Bauch, A Pavlic, and A. Semmler, “Improving BLAST performance using space-time block codes and turbo decoding,” IEEE Conference on Global Telecommunications,Vol. 2, pp. 1067 - 1071, Nov. 2000.

[24] G.D. Golden, C.J Foschini, R.A. Valenzuela, and P.W. Wolniansky, “Detection algorithm and inital laboratory results using V-BLAST space-time communication architecture,” Electronics Letters, Vol. 35, pp. 14-16, Jan. 1999

[25] T.Q. Duong, E.K. Hong, and S.Y. Lee, “Effect of the Modified Channel Matrix on the MMSE V-BLAST System Performance” IEEE Conference on Wireless And Mobile Computing, Networking And Communications, Vol. 1, pp. 133-136, Jan.

2005

[26] T. Xiaofeng, C.Elena, Y. Zhuizhuan, Q. Haiyan and Z. Ping “New detection algorithm of V-BLAST space-time code,” IEEE Conference on Vehicular Technology Conference, Vol. 4, pp. 2421 - 2423, Oct. 2001.

[27] I.N. Herstein and D.J. Winter, Matrix Theory and Linear Algebra, 1st ed, Macmillan Publishing Co. 1988

[28] X. Zhao, J. Kivinen, and P. Vainnikainen, “Tapped delay line channel models at 5.3 GHz in indoor environments,” Vehicular Technology Conference, 2000. IEEE VTS-Fall VTC 2000. 52nd Volume 1, 24-28 Sept. 2000 Page(s): 1 – 5 vol.1.

相關文件