• 沒有找到結果。

Sequence Designs for Interference Mitigation in Multi-Cell Networks

N/A
N/A
Protected

Academic year: 2021

Share "Sequence Designs for Interference Mitigation in Multi-Cell Networks"

Copied!
13
0
0

加載中.... (立即查看全文)

全文

(1)

Sequence Designs for Interference Mitigation in

Multi-Cell Networks

Ying-Che Hung, Sheng-Yuan Peng, and Shang-Ho (Lawrence) Tsai, Senior Member, IEEE

Abstract—We propose a training sequence that can be used

at the handshaking stage for multi-cell networks. The proposed sequence is theoretically proved to enjoy several nice properties including constant amplitude, zero autocorrelation, and orthog-onality in multipath channels. Moreover, the analytical results show that the proposed sequence can greatly reduce the multi-cell interference (MCI) induced by carrier frequency offset (CFO) to a negligible level. Therefore, the CFO estimation algorithms de-signed for single-user or single-cell environments can be slightly modified, and applied in multi-cell environments; an example is given for showing how to modify the estimation algorithms. Consequently, the computational complexity can be dramatically reduced. Simulation results show that the proposed sequences and the CFO estimation algorithms outperform conventional schemes in multi-cell environments.

Index Terms—Sequence designs, multi-cell interference (MCI),

synchronization, OFDM, CFO estimation.

I. INTRODUCTION

R

ECENTLY, OFDM based two-tier cell networks, which consist of a conventional macrocell cellular network overlaid with small cells access points (FAPs), attract ex-tensive research attention due to their enhanced capacity and improved coverage, see e.g., [1]-[3]. In many cases, different cells may appear in the same frequency band to increase user capacity and data capacity. One example is to deploy multiple cells in a band and use spatial multiplexing to avoid multi-cell and multi-user interference [4]-[6]. Another example is in cooperative networks [7]-[9], where one user may receive and combine the signals from several cells to increase data capacity. However, in both examples, multi-cell interference (MCI) appears at the early handshaking stage and degrades the performance of cell ID (identity) detection, synchronization, and channel estimation. More specifically, in the first example, spatial multiplexing may be applied after the handshaking stage because it needs channel information. In the second example, the user needs to detect cell IDs first, and then determine proper cells to cooperate. Thus, how to attain a smooth handshaking under the appearance of MCI is an important issue.

One way is via mitigating the MCI. There are several interference mitigation methods including power control and

Manuscript received April 22, 2013; revised September 3, 2013; accepted November 5, 2013. The associate editor coordinating the review of this paper and approving it for publication was S. Bhashyam.

This work is supported by the National Science Council (NSC), Taiwan, R.O.C. Cooperative Agreement No. 99-2221-E-009-100-MY3 and 102-2221-E009-017-MY3.

The authors are with the Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan (e-mail: yingjhe.ece95g@g2.nctu.edu.tw, shanghot@alumni.usc.edu).

Digital Object Identifier 10.1109/TWC.2013.120413.130703

spectrum allocation [10]-[13]. For instance, the optimal de-centralized spectrum allocation technology was proposed in [10], and a distributed cell power control mechanism to achieve higher signal-to-interference plus noise ratio (SINR) was proposed in [11]. The pricing strategies for power control in multi-cell wireless data networks was analyzed in [12].

Another solution may be via properly designing the training sequences that are also used as the cell IDs. Good training sequences are expected to have several properties including constant amplitude, zero autocorrelation and orthogonality. For instance, the Zadoff-Chu (ZC) sequences used in 3GPP-LTE (Long Term Evolution) have such nice properties [14]. However, the ZC sequences may not be suitable for multi-cell environments, because their orthogonality is destroyed in multipath channel environments, and this results in MCI. Also, when carrier frequency offset (CFO) appears, the induced MCI becomes serious. On the other hand, several multi-user interference (MUI-) free sequences have been proposed in [15]-[17]. Those sequences are shown to have interference-free property when there is no CFO, and have negligible interfer-ence when CFO appears. The sequinterfer-ences in [17] attain a better PAPR (peak-to-average power ratio) performance than that in [15] and [16]. Although those sequences are interference free, they do not have the zero-autocorrelation property because the sequences are initially designed for MC-CDMA systems. From the discussion above, if we can find the sequences that enjoy constant amplitude, zero autocorrelation, and orthog-onality in multipath channel environments, the handshaking procedure would be smooth in multi-cell networks. As a result, low-complexity cell ID detection, synchronization and CFO estimation algorithms designed for single-user or single-cell environments can be slightly modified and applied in multi-cell environments [18]-[26]. This motives us to design the sequences that have the mentioned nice properties.

In this paper, we propose training sequences for multi-cell environments. The proposed sequences enjoy the properties of constant amplitude, zero autocorrelation, and orthogonality in multipath channels both in time and frequency domains. The proposed sequences are inspired by the ZC sequences and the Gold code. We notice that Gold code has good orthogonality and the ZC sequences have the mentioned properties. By using similar procedures of generating the ZC sequences and the Gold code, the proposed sequences preserve the nice properties of these two sequences. More specifically, we select two ZC sequences and use similar shift-and-combine method for generating the proposed sequence. In addition, we theoret-ically prove that the proposed sequences can indeed achieve the mentioned properties. Moreover, we analyze the induced MCI when CFO appears, and find the MCI is negligible

(2)

CP & P/S IDFT CP & P/S IDFT CP & P/S IDFT

M

M

M

M

M

M

CP P/S

M

M

Fig. 1. The block diagram of a OFDM based multi-cell system.

in CFO environments. Furthermore, we take the single-cell CFO estimation algorithm in [19] as an example, and show how to modify it in multi-cell environments. As a result, the computational complexity for CFO and channel estimation can be greatly reduced thanks to the mitigation of MCI. Simulation results show that the analytical results are accurate, and the proposed sequences as well as the CFO estimation algorithms greatly outperform conventional schemes in multi-cell environments.

This paper is organized as follows: Sec. II describes the system model. In Sec. III, the generation of the proposed sequences and the analysis including autocorrelation and orthogonality are introduced. We analyze the MCI of the proposed sequences under multipath and CFO environments in Sec. IV, and propose the CFO estimation algorithm for multi-cell environments in Sec. V. Simulation results and conclusion are given in Secs. VI and VII, respectively.

Notations. All vectors are in lowercase boldface and

ma-trices are in uppercase boldface. (·)T, (·)∗, and (·)H denote the transpose, complex conjugate, and conjugate transpose of matrix. ((· ))N and|·| represent the module of N and absolute value, respectively. angle(·) denotes the phase. ILis the L×L identity matrix. P(n)∈ RN×N denotes a permutation matrix obtained by cyclically down shifting the row of an identity matrix IN by n elements. diag(·) is a diagonal matrix which puts vector on the main diagonal.

II. SYSTEMMODEL AND PROBLEM FORMULATION

A block diagram describing OFDM-based multi-cell cell search structure is illustrated in Fig. 1. Assume there are I cells in the same frequency band and each cell is assigned a unique synchronization sequence wi= (wi[0] · · · wi[N −1])T, 0 ≤ i ≤ I − 1. The synchronization sequence wiis converted to dithrough inverse DFT (IDFT) operation, i.e., di= FHwi, where F is the N × N DFT matrix with the kth row and the

nth column being [F]kn = 1Ne−j2πNkn. Assume there is a

user attempting to connect to one of these I cells. For this user, the time-domain received signal after removing cyclic prefix (CP) is represented as r = I−1  i=0 ΦiHidi+ n, (1) where Φi= diag  ej2π NNgi . . . ej2πN(N+Ng−1)i  is the CFO matrix with Ng being the CP length and i being the CFO between this user and the ith cell. n ∈ CN×1 is the noise vector and Hi is an N× N circulant matrix given by

Hi= P(0)hi P(1)hi · · · P(N−1)hi , where hi = [hTi 01×N−L]T and hi ∈ CL×1 are the channel of the ith cell, with distributionCN (0, 1). Since the circulant matrix Hican be diagonalized using DFT and IDFT matrices,

i.e., Hi = FHΛiF, where Λi = diag(λi), and λi is the frequency response of the ith channel expressed asλi= Fhi. We can rewrite (1) as r = I−1  i=0 ΦiFHΩiFhi+ n, (2)

where Ωi= diag(wi). Our objective is to find a suitable cell for this user to connect, and complete the CFO estimation in the multi-cell environment. Thus it is important for this user to distinguish the signals between the targeted cell and the interfering cells. The targeted cell is chosen if it has the maximum matched value. Without loss of generality, assume the jth cell is the targeted cell. The matched result can be expressed as dHj r = dHj I−1  i=0 ΦiFHΩiFhi+ n  = ⎧ ⎪ ⎪ ⎨ ⎪ ⎪ ⎩d H j ΦjFHΩjFhj   desired signal + I−1  i=0,i=j dHj ΦiFHΩiFhi   MCIj←i +dH j n ⎫ ⎪ ⎪ ⎬ ⎪ ⎪ ⎭ . (3) The proposed sequence is to be used for cell detection under the environments with time and frequency offsets. In 3GPP-LTE systems, the sequence for symbol timing, cell sector detection and CFO estimation is the primary synchronization sequence (PSS) [24],[25]. It is worth to point out that the PSS is designed for single cell environment. Thus, if it is used in multi-cell environments, the estimation performance degrades due to multi-cell interference (MCI). More specifically, from (3), the matched value is polluted by the MCI induced by multipath channels and CFO effects, and therefore it degrades the synchronization performance. One method to mitigate the MCI is to design the synchronization sequences that are robust to multipath channels and CFO effects. However, the PSS in LTE standard suffers from the MCI due to its weak orthogonality in time-domain. In order to mitigate the MCI as well as to preserve the utility of PSS, we propose a set of synchronization sequences which can simultaneously achieve good orthogonality and autocorrelation property. The proposed sequences can be used for cell detection under the multi-cell environments with frequency offsets.

III. PROPOSEDSYNCHRONIZATIONSEQUENCE

The proposed sequence is motivated by the PSS applied in 3GPP-LTE systems and the idea of generating Gold sequence.

(3)

We briefly introduce the PSS. In [1], the PSS pu is generated by the Zadoff-Chu (ZC) sequence of length 63, i.e.,

pu[k] =  e−jπ 63uk(k+1), k = 0, 1, ..., 30 e−jπ 63u(k+1)(k+2), k = 31, 32, ..., 61,

where u = {25, 29, 34} is the root of the ZC sequence [14]. PSS has the properties of constant amplitude and zero autocor-relation (CAZAC) in both frequency domain and time domain. PSS is used for symbol timing, CFO estimation and cell sector detection [22]-[25]. In 3GPP-LTE systems, OFDMA scheme is adopted and one cell is camped in one specific frequency band. However, the cells in two-tier networks may occupy the same frequency band. As a result, using the PSS degrades the synchronization performance due to the MCI arisen from the lack of sequence orthogonality.

A. Proposed sequence design

To mitigate the MCI as well as to preserve the CAZAC property, we refer to the concept for generating the Gold sequence. Since ZC sequence has CAZAC property; while Gold sequences have good orthogonality, one intuition to generate a set of sequences that can preserve both properties is to combine the generation of these two kinds of sequences. More specifically, the proposed sequences are generated by combining two ZC sequences with different roots u1 and

u2. The proposed sequences can be collected to form a matrix W = [w0, w1, . . . , wN−1], where wi ∈ CN×1 is the synchronization sequence and is the combination of two ZC sequences x and y, 0 ≤ i ≤ N − 1. Each column in W is generated by the following formula

wi= YP(i)X, (4)

where Y = diag(y) and X = diag(x). For example, the proposed sequences for length N = 4 are expressed as

W =

⎛ ⎜ ⎜ ⎝

y[0]x[0] y[0]x[3] y[0]x[2] y[0]x[1] y[1]x[1] y[1]x[0] y[1]x[3] y[1]x[2] y[2]x[2] y[2]x[1] y[2]x[0] y[2]x[3] y[3]x[3] y[3]x[2] y[3]x[1] y[3]x[0]

⎞ ⎟ ⎟ ⎠ . It is noted that the entry of the proposed sequences can be summarized as wi[k] = e−jNπαi[k], (5) where αi[k] =  u1(k − i)2+ u2k2, if N is even. u1(k − i)(k − i + 1) + u2k(k + 1), if N is odd. (6) We show that the proposed sequence has good autocorrela-tion property and orthogonality, which can greatly simplify the computational complexity for CFO estimation and cell detection. Note that some of the proposed sequences are the cyclically shifted versions of the others, and this may lead to misjudgement because integer CFO may result in a cyclic shift of the proposed sequences in the frequency domain. Therefore, we analyze the cyclic property of the proposed sequences and propose a low-complexity method to identify the non-cyclically shifted sequences. The benefit of the method becomes more pronounced when N grows large.

B. Autocorrelation property of the proposed sequences

In order to estimate the CFO and symbol timing, it is ex-pected that the proposed sequences have zero autocorrelation in time domain. The following two lemmas and one theorem show that the proposed sequences have such property.

Lemma 1 The ZC sequence has the following property: x[(( k − i ))N] = x[k − i].

Proof: Please see Appendix A.

Lemma 2 The proposed sequence defined in (4) has the following property:

wi[(( k − n ))N] = wi[k − n], 1 ≤ n ≤ N − 1.

Proof: Please see Appendix B.

Theorem 1 If the sum of the root indices u1+ u2 and N

are coprime, the proposed sequence has zero autocorrelation in both time and frequency domains.

Proof: From (4), the frequency and time domain

represen-tations of the ith column in W are expressed as wiand FHwi, respectively. In time domain, zero autocorrelation means



FHwiHFHP(n)wi= 0, for 1≤ n ≤ N − 1. (7) Since FFH= IN the proof for time domain is similar to that for frequency domain. Therefore, we consider the analysis in frequency domain for simplicity. (7) can be rewritten as

N−1 k=0

w∗

i[k]wi[(( k − n ))N] = 0, for 1 ≤ n ≤ N − 1. (8) If u1+ u2and N are coprime, from Lemma 2, the left hand side of (8) can be rewritten as

N−1 k=0 w∗ i[k]wi[k − n] = N−1 k=0 ejπ Nαi[k]e−jNπαi[k−n] =N−1 k=0 ejπ N(αi[k]−αi[k−n]). (9) If N is even, αi[k] − αi[k − n] = −n2(u1+ u2) − 2niu1+ 2kn(u1+ u2). Extracting the term irrelevant to k yields

N−1 k=0 ejπ N(αi[k]−αi[k−n])= β1 N−1 k=0 ej2π Nkn(u1+u2), (10)

where β1 = e−jNπ[n2(u1+u2)+2niu1]. If u1 + u2 and N are

coprime, N−1k=0 ej2πNkn(u1+u2) = 0, for 1 ≤ n ≤ N − 1.

Similarly, it can also be shown that if N is odd and u1+ u2 and N are coprime, the term in (9) is equal to zero. Therefore, the proposed sequence has zero autocorrelation if u1+ u2and

N are coprime.

C. Orthogonality of the Proposed Sequences

Like CDMA systems which use different orthogonal (or nearly orthogonal) spreading codes to distinguish different users, sequence orthogonality is an important property for cell detection in two-tier networks. We show the sequence orthogonality in the following theorem.

(4)

Theorem 2 If the root index u1 and N are coprime, the proposed sequences are mutually orthogonal in both time and frequency domains.

Proof: To prove Thm. 2 is equivalent to proving wHi wj = 0, and FH

wiHFHwjH = 0, where i, j are the column indices of W, i = j. Since FFH= IN, the analysis for time domain is similar to that for frequency domain. Therefore we analyze the orthogonality in frequency domain. We can rewrite

wHi wj= 0 as N−1

k=0

w∗

i[k]wj[k] = 0, 0 ≤ i, j ≤ N − 1, i = j. (11) The left hand side of (11) can be expressed as

N−1 k=0 ejπ Nαi[k]e−jNπαj[k]= N−1 k=0 ejπ N(αi[k]−αj[k]). (12) If N is even, αi[k] − αj[k] = u1(i2− j2) − 2ku1(i − j). By extracting the term irrelevant to k, (12) can be rewritten as

β2N−1

k=0

e−j2π

Nku1(i−j), (13)

where β2= ejNπu1(i2−j2). Since 0 ≤ i − j ≤ N − 1, if u1and

N are coprime, the termN−1k=0 e−j2π

Nku1(i−j) = 0. Similarly,

if N is odd, we can also prove that (11) holds if u1 and N are coprime, and this completes the proof.

D. Cyclic shift analysis of the proposed sequences

In previous sections, we have proven that the proposed sequences can simultaneously achieve zero autocorrelation and mutually orthogonal if u1 + u2 and u1 are prime to

N. To estimate integer CFO [27],[28], the sequences should

be designed so that none of them is the cyclically shifted version of others. For instance, if one sequences is a cyclic shifted version of another, the user cannot distinguish the two cells because he/she does not know whether the cyclic shift is caused by inter CFO or it is the sequence from another cell. Hence, we need to refine the proposed sequences so that they are not the cyclically shifted versions of the others. In this subsection, we analyze the cyclic shift property of the columns in W, and propose a fast algorithm to determine which columns in W are non-cyclically shifted. Using this method, column by column search can be avoided and this can save a lot of computational complexity, especially when the size of W is large. The procedure is as follows: First, we show that every column in W have a symmetric point, that is, the column is cyclically symmetric at this symmetric point. Then we prove that if two columns in W have the same value at the symmetric points, these two columns are cyclically shifted to each other. Based on this cyclically symmetric property, we propose a low-complexity fast search method to find non-cyclically shifted columns in W.

Without loss of generality for practical implementations, let the sequence length N = 2s, s ≥ 2. One setting that can meet the conditions in Thms. 1 and 2 is as the following proposition:

Proposition 1 The root indices u1and u2for generating the

proposed sequences can be



u1= 2a + 1, a = 0, 1, 2, ..., N − 1

u2= 2b, b = 1, 2, ..., N − 1. (14)

Lemma 3 If W is generated by setting u1 and u2 be that

in Proposition 1, there exists positive integers Δ and g which satisfy 2[(u1+ u2)Δ − u1] = gN. Moreover, Δ is an odd number and can be expressed as Δ = 2p + 1, where p is given by

p =

gN

4 − b

2a + 2b + 1. (15)

Proof: 2[(u1+ u2)Δ − u1] = gN can be reformulated as (u1+ u2)Δ −gN2 = u1. (16) Since u1+ u2,−gN2 and u1 are integers, (16) belongs to the Diophantine equation [29]. Moreover, u1+ u2 is odd from Proposition 1; while gN2 is even due to N ≥ 4. Thus, the greatest common divisor (GCD) of u1+u2and−gN2 is 1, and is able to divide u1. Therefore, (16) exists an integer solution (Δ0, g0) and all the possible solutions can be obtained by

Δ = Δ0−gN2 t, g = g0− (u1+ u2)t, t ∈ Z. From (16), it is clear that the solution (Δ, g) has the same parity since (u1+ u2) > u1. Therefore, 2[(u1+ u2)Δ − u1] =

gN exists positive integer solution (Δ, g) if t is properly

determined. On the other hand, according to Proposition 1, 2[(u1+ u2)Δ − u1] = gN can be rewritten as

2[(2a + 2b + 1)Δ − (2a + 1)] = gN. (17) Since (2a +2b +1) and (2a +1) are odd numbers and N ≥ 4, Δ must be an odd number and can be expressed as Δ = 2p+1. From (17), p can be expressed as that in (15).

Theorem 3 For the ith column in W, there always exists a symmetric point k = iΔ, i.e.,

wi[(( iΔ + f ))N] = wi[(( iΔ − f ))N], for 1 ≤ f ≤ N − 1. (18)

Proof: From Lemma 2, wi[(( iΔ + f ))N] in (18) can be expressed as

wi[iΔ + f] = e−jNπαi[iΔ+f]

= e−jπ

N(u1[(iΔ−i)−f]2+u2(iΔ−f)2+4fi[(u1+u2)Δ−u1]). (19)

According to Lemma 3, the Δ in 4fi[(u1+u2)Δ−u1] satisfies 4fi[(u1+ u2)Δ − u1] = 2figN, f, i ∈ Z, g ∈ N. Therefore, wi[(( iΔ + f ))N] can be expressed as

wi[iΔ + f] = e−j

π

N(u1[(iΔ−i)−f]2+u2(iΔ−f)2)e−j2πNfigN

= wi[iΔ − f]e−j2πfig= wi[iΔ − f] = wi[(( iΔ − f ))N]. (20) Note that the value of the symmetric point can be obtained by letting f = 0, i.e.,

(5)

where αi[iΔ] = u1(iΔ − i)2+ u2(iΔ)2.

Lemma 4 The symmetric points of the columns of W gen-erated by letting b be odd have more unequal values than that generated by letting b be even.

Proof: For the ith and jth columns in W, the description

that the values of the symmetric points are the same is equivalent to the following condition:

wi[(( iΔ ))N] = wj[(( jΔ ))N]. (22) From Lemma 2 and (21), we can rewrite (22) as

e−jπ Nαi[iΔ]= e−jNπαj[jΔ] ≡ e−jNπ(αi[iΔ]−αj[jΔ])= 1, (23) where αi[iΔ] − αj[jΔ] = u1[i2(Δ − 1)2− j2(Δ − 1)2] + u2[i2Δ2− j2Δ2] = (i2− j2)[u 1(Δ − 1)2+ u2Δ2]. (24) From Proposition 1 and Lemma 3, u1(Δ−1)2+u2Δ2in (24) can be expressed as u1(Δ2− 2Δ + 1) + u 2Δ2 = Δ[(u1+ u2)Δ − u1] − u1(Δ − 1) = Δ[(u1+ u2)Δ − u1] − [(u1+ u2)Δ − u1] + u2Δ = gN 2 (2p) + 2b(2p + 1) = 2  pgN 2 + b(2p + 1)  . (25)

Let X(p, g, b) = pg(N/2) + b(2p + 1), from (25), we can express (23) as

e−jπ

N{αi[iΔ]−αj[jΔ]}= e−j2πN(i2−j2)X(p,g,b)= 1. (26)

If b is odd, X(p, g, b) must be odd. To satisfy (26), we have

i2− j2= cN, c ∈ Z. (27)

If b is even, p is even. The reason is that for N ≥ 4, (15) can be rewritten as gN4 − b = p(2a + 2b + 1). Since (2a + 2b + 1) is odd and gN4 is even, the integer value p must also be even if b is even. Therefore, X(p, g, b) must be even and (26) can be rewritten as

e−j2π

N(i2−j2)X(p,g,b) = e−jπpg(i2−j2)e−j2πN(i2−j2)b(2p+1)

= e−j2π

N(i2−j2)b(2p+1)= 1. (28)

To satisfy (28), the following condition holds

i2− j2= tN

b , t ∈ Z. (29)

Therefore, for the columns having the same value at their symmetric points, we can divide them into the following two cases according to if b is even or odd:

A =(i, j)|i2− j2= cN, c ∈ Z, if b is odd

B =(i, j)|i2− j2= t(N/b), t ∈ Z, if b is even. (30) Noted that t(N/b)∈ Z. Moreover, b is even and therefore the possible indices in B is larger than that in A, i.e., A ⊂ B. Therefore, letting b be odd can obtain more unequal values at the symmetric points than letting b be even.

Lemma 5 For the columns having the same value at their symmetric points, the indices i and j satisfy (30). In this case, if i is even, j is even; otherwise if i is odd, j is also odd.

Proof: When b is odd, from (30) we have i2− j2= cN, c ∈ Z.

Since N is even, cN is also even and therefore i and j must have the same parity.

When b is even, from (30) we have

i2− j2= tN

b , t ∈ Z.

Since b < N and t(N/b) ∈ Z, t(N/b) is even and i and j also have the same parity.

Theorem 4 For the i and jth columns having the same value at their symmetric points, i.e., wi[(( iΔ ))N] = wj[(( jΔ ))N]

in equation (22), the two columns are cyclically shifted. Proof: To prove that columns i and j are cyclically shifted

is to prove:

wi[(( iΔ + k ))N] = wj[(( jΔ + k ))N], 0 ≤ k ≤ N − 1 (31) From Lemma 2 and equation (21), the left side of equation (31) can be rewritten as

wi[(( iΔ + k ))N] = wi[iΔ + k] = e−j

π

Nαi[iΔ+k], (32)

where αi[iΔ + k] is expressed as

u1(iΔ + k − i)2+ u 2(iΔ + k)2 = u1(iΔ − i)2+ u 2(iΔ)2   X1(i,Δ) + 2ki[(u 1+ u2)Δ − u1] X2(i,Δ,k) + u1k2+ u 2k2   X3(k) . (33)

Therefore, from the condition that wi[iΔ] = wj[jΔ], wi[iΔ +

k] can be expressed as e−jπ

NX1(i,Δ)e−jNπX2(i,Δ,k)e−jNπX3(k)

= wj[jΔ]e−jNπX2(i,Δ,k)e−jNπX3(k). (34)

From Lemma 3, we have

e−jπ

NX2(i,Δ,k)= e−jNπ2ki[(u1+u2)Δ−u1] = e−jπkig. (35)

From Lemma 5, since i and j are positive integer and have same parity, it yields e−jπkig = e−jπkjg and e−jNπX2(i,Δ,k)

in (34) can be written as

e−jπ

NX2(i,Δ,k)= e−jNπ2ki[(u1+u2)Δ−u1]

= e−jπ

N2kj[(u1+u2)Δ−u1]= e−jNπX2(j,Δ,k).

(36) From (32), (34) and (36), wi[(( iΔ + k ))N] equals to

wi[iΔ + k] = wj[jΔ]e−jNπX2(i,Δ,k)e−jNπX3(k)

= wj[jΔ]e−j

π

NX2(j,Δ,k)e−jNπX3(k)

= wj[jΔ + k] = wj[(( jΔ + k ))N], (37) which completes the proof.

From Lemma 4, Thms. 3 and 4, we conclude the following proposition:

(6)

Proposition 2 If u1and u2are determined using Proposition

1, the number of non-cyclically shifted columns in W by

letting b be even is more than that by letting b be odd.  Fast algorithm to determine non-cyclically shifted columns. Based on the derived results in Lemma 4, Thms.

3 and 4, we propose a fast search algorithm to obtain the non-cyclically shifted columns in W. Instead of checking all elements of every column pair in W, the proposed search algorithm only needs to check whether the symmetric points of the column pair are equal, i.e., whether wi[(( iΔ ))N] =

wj[(( jΔ ))N]. If the symmetric points of the column pair are equal, the two columns are cyclically shifted. Note that the proposed algorithm can reduce the computational complexity from O(C2N × (N − 1) × N) to O(C2N). The proposed algorithm is summarized as follows:

Algorithm 1: Fast algorithm to determine non-cyclically

shifted columns

1: Initialization: Let b be odd.

2: Generate W and determine Δ according to

Proposition 1 and Lemma 3.

3: for i, j = 0 : N− 1, i = j do

4: if wi[(( iΔ ))N] = wj[(( jΔ ))N] then

5: The ith and jth columns are circular shifted;

6: end if

7: end for

IV. MULTI-CELLINTERFERENCEANALYSIS

In multi-cell environments, the received signal contains the signals from different cells. Under multipath fading channels, the autocorrelation property and orthogonality discussed in Section III may be destroyed and this therefore induces multi-cell interference (MCI). MCI makes channel estimation and synchronization in multi-cell environments more difficult than that in single-cell environments. In this section, we analyze the MCI of the proposed sequences in multipath channels, and show that by properly grouping the proposed sequences, zero autocorrelation and mutually orthogonal property can still be preserved. It is worth to mention that this result stands in contrast to the PSS in the LTE standard, i.e., the autocorrelation and orthogonality of the PSS are no longer valid in multipath channels. Without loss of generality for practical implementations, the sequence length is set to be

N = 2s, s ≥ 2 throughout the MCI analysis.

A. The MCI due to Multipath fading channels

Since the channel is not known to the receiver during coarse synchronization stage, the MCI analysis is different from that in [15] and [16]. Here we show that the number of interfering cells using the proposed sequences is L− 1 before channel compensation (usually called frequency-domain equalization in OFDM systems), and that is 2(L− 1) after the channel compensation.

1) MCI analysis before channel compensation: As

dis-cussed in Section II, the MCI is induced by the multipath channels and the CFO effect. In the following analysis we first derive the MCI without CFO, and then extend the results to CFO environment. According to (3), the MCI from the ith cell to the user who links to the jth cell can be expressed as

MCIj←i= (FHwj)HFHΩiFhi = wH j ΩiFhi= [FHΩ∗iΩj1]H IL 0 !   ρj,i hi, (38)

where 1 is an N × 1 vector whose entries are all 1, ρj,i C1×L. To have zero MCI for all nonzero hi,ρ

j,i must be a zero vector. Letμj,i= FHΩ∗iΩj1, and ρj,i is expressed as

ρj,i=

 μ

j,i(0), . . . , μ∗j,i(L − 1), . . . , μ∗j,i(N − 1)  IL 0

!

.

It is clear that ρj,i= 01×L if

μ∗ j,i(n) = 1 N N−1 k=0 wi[k]wj∗[k]e−j Nkn= 0, 0 ≤ n ≤ L−1. (39)

Theorem 5 Followed the assumptions in Sec.III-D that N =

2sand u

2= 2b. If the root u1 for generating W is odd, the user who links to the targeted cell j receives interference from only L− 1 interfering cells with indices i determined by the following equation:

(( u1(i − j) ))N = n, 1 ≤ n ≤ L − 1. (40)

Proof: From (5), μ∗j,iin (39) is expressed as

μ∗ j,i(n) = 1 N N−1 k=0 e−jπ Nαi[k]ejNπαj[k]e−j2πNkn =1 N N−1 k=0 ej2πN αj[k]−αi[k] 2 −kn  . (41)

Since N is even, from (6), we have

αj[k] − αi[k]

2 − kn =

u1[(k − j)2− (k − i)2]

2 − kn

= k[u1(i − j) − n] + u21(j2− i2). Therefore, μ∗j,i(n) in (41) can be represented as

1 Ne Nu1(j2−i2) N−1 k=0 ej2π Nk[u1(i−j)−n] =  √ Nejπ Nu1(j2−i2), if u1(i − j) − n = gN, g ∈ Z 0, otherwise. (42) Without loss of generality, let g = 0. The system has MCI if

μ∗

j,i(n) = 0, 1 ≤ n ≤ L − 1, which means that the column indices (i, j) satisfy u1(i − j) − n = gN, g ∈ Z. This is equivalent to say (( u1(i − j) ))N = n, 1 ≤ n ≤ L − 1. Moreover, the set consists of (( (i− j) ))N is equal to the set consists of (( u1(i − j) ))N, and they both have one-to-one mapping if u1is odd. More specifically, given u1and the

(7)

targeted cell index j, the L− 1 indices of i can be determined by varying the integer n from 1 to L− 1, and those indices i are all different in the region [0 N− 1], i.e., there are L − 1 interfering cells to the targeted cell.

2) MCI analysis after channel compensation: Similar to

the derivation in [15], the MCI after channel compensation can be expressed as MCIj←i= hHj FH0 Ω∗jΩiF0   Γj,i hi, (43) where Γj,i= ⎛ ⎜ ⎜ ⎜ ⎝ γj,i(0) . . . γj,i(N − L + 1) γj,i(1) . . . γj,i(N − L + 2) .. . . .. ... γj,i(L − 1) . . . γj,i(0) ⎞ ⎟ ⎟ ⎟ ⎠ L×L , (44) γj,i(n) = 1 N N−1 k=0 wi[k]w∗j[k]ej Nkn, (45) and F0= F I0L ! N×L

. Therefore, having zero MCIj←iis equivalent to let Γj,i= 0, i.e.,



γj,i(n) = 0, 0 ≤ n ≤ L − 1

γj,i(N − n) = 0, 1 ≤ n ≤ L − 1, (46)

Theorem 6 If the root u1for generating W is odd, the

num-ber of interfering cells is 2(L−1) after channel compensation. For the targeted cell j, the index of interfering cell i can be determined by



(( u1(i − j) ))N = n, 1 ≤ n ≤ L − 1.

(( u1(i − j) ))N = N − n, 1 ≤ n ≤ L − 1. (47)

Proof: The proof is similar to that of Thm. 5 and is

omitted.

Although the interfering cells of a targeted cell can be obtained through Thms. 5 and 6 in multipath channels, deter-mining the sequences that are mutually orthogonal is crucial because this property not only can mitigate the MCI effect, but also can simplify the design complexity of CFO estimation. In Thm. 2, we have proved the mutually orthogonal property of the proposed sequences in flat fading channels. In the following corollary we show that the proposed sequences can preserve the mutually orthogonal property in multipath channels if the sequence indices are appropriately selected.

Corollary 1 Let the root u1 for generating W be odd and

the sequence length N = 2s, s ≥ 2. Let the parameter G be G = 2s

≥ L, s ∈ N. The number of mutually orthogonal

cells is N/G. More specifically, if cell j is selected, the indices of the other mutually orthogonal cells are

i = (( j + oG ))N, o ∈ Z.

Proof: From Thm. 5, there are L− 1 interfering cells

to the cell j and the corresponding indices can be obtained through

(( (j − i) ))N = n, 1 ≤ n ≤ L − 1.

For u1= 1, the cell j is interfered by the cells with indices

i = (( j + τ ))N, 1 ≤ τ ≤ L − 1, i.e., the neighboring

L − 1 cell indices. Therefore, if we select the cell indices i that are uniformly separated by a period G ≥ L, i.e., i =

j + oG, o ∈ Z, these cells would not interfere with each

other. In other words, they are mutually orthogonal.

For odd number u1= 1, the interfering cell indices to the cell j can be obtained through i = j + (n + gN )/u1, 1 ≤

n ≤ L − 1, g ∈ Z. Since n+gN = n+g2s= n+g(2s−s

)G = u1oG, for 1 ≤ n ≤ L−1, the selected indices i would not become an interferer. More specifically, i = j + oG = j + (n + gN) = i, for 1 ≤ n ≤

L − 1. Therefore, they are still mutually orthogonal. B. The MCI of the proposed sequence due to CFO effect

In this subsection, we consider the MCI due to carrier frequency offset (CFO). In two-tier networks, the CFO effect makes the user difficult to synchronize. More specifically, the phase difference from different transmit branches in the time domain would complicate the CFO estimation and therefore degrade the synchronization performance. The MCI induced by the CFO can be divided into two terms, i.e., the dominant MCI and the residual MCI. We show that if the proposed sequences are used, the dominant MCI can be completely eliminated and the residual MCI is mitigated into a negligible level. Therefore, we can still apply the CFO estimation algorithm designed for single-user or single-cell environments to the multi-cell environments. As a result, not only the estimation performance can be improved but also the computational complexity can be greatly reduced. From (3), the MCIj←iwith CFO is expressed as

MCIj←i= dHj ΦiFHΩiFhi= dHj ΦiFHΩiλi. (48) (48) can be further expanded to (49), depicted at the top of the next page. According to [15], X(k, m) in (49) can be expressed as X(k, m) = αiλi[k]wi[k] + βi N−1 u=m,m=k λi[m]wi[m] e −jπm−k N N sinπ(m−k+i) N , where αi= N sinsin ππii N ejπiN −1N and βi= sin(πi)ejπiN −1N .

Therefore, MCIj←i can be divided into MCIj←i,domi and MCIj←i,resi, shown at the bottom of the next page. Note that when there is no CFO between the ith cell and the user, αi= 1 and βi = 0, and the MCIj←i reduces to MCIj←i,domi. This result gives us an intuition that the overall MCI is determined by MCIj←i,domi when the CFO is small. Therefore, the MCI information of the targeted cell with CFO is similar to that without CFO. Moreover, if we can eliminate the dominant MCI, the overall MCI can be sufficiently reduced. Similar to (38), MCIj←i,domi can be expressed as MCIj←i,domi =

αiej2πNNgiwH

j ΩiFhi. From Thm. 5, MCIj←i,domi can be completed eliminated if the proposed sequences are appropri-ately selected. This result motivates the proposed multi-cell CFO estimation algorithm in the following section.

(8)

MCIj←i= N−1 n=0 " 1 N N−1 k=0 wj[k]ej2πNnk  1 N N−1 m=0 wi[m]λi[m]ej2πNnmej2πN(n+Ng)i # =ej2π NNgi N−1 n=0 " 1 N N−1 k=0  w∗ j[k]e−j Nkn√1 N N−1 m=0 wi[m]λi[m]ej2πNnmej2πNni # =ej2π NNgi N−1 k=0 w∗ j[k] " 1 N N−1 n=0  1 Ne−j Nnk N−1 m=0 wi[u]λi[m]ej2πNnmej2πNni #   X(k,m) . (49)

V. CARRIERFREQUENCYOFFSETESTIMATION

Based on the derived MCI results for the proposed se-quences, we propose a multi-cell CFO estimation algorithm in this section. We first introduce the CFO estimation algorithm applied to this paper in single-cell environments, and then extend the algorithm to multi-cell environments. In multi-cell environments, the CFO estimation performance degrades due to MCI. By using the proposed sequences and algorithm, the MCI can be effectively mitigated and the CFO estimation in multi-cell environments is same as that in single-cell environments, which can greatly reduce the computational complexity. Moreover, we also compare the performance of CFO estimation between the proposed sequences and the PSS.

A. Single-cell CFO estimation

Let us take the 3GPP-LTE synchronization procedure as an instance. In this case, the CFO can be estimated by applying the Schmidl scheme [19], and the acquisition is achieved in two separate steps through the use of a two-symbol synchronization sequences. The Schmidl algorithm is explained as follows: Two consecutive received signals are expressed as

r(1)= Φ(1)FHΛw + n(1) and r(2) = Φ(2)FHΛw + n(2),

where Φ(1) and Φ(2) are diagonal CFO matrices whose ele-ments are respectively expressed as Φ(1)nn= ej

N(n+Ng)

andΦ(2)nn= ej2πN(n+N+2Ng), 0≤ n ≤ N − 1. Then the

systems perform the inner product of r(1) and r(2) to obtain

q, i.e., q is obtained through



r(1)Hr(2)=Φ(1)FHΛw + e(1)HΦ(2)FHΛw + e(2),

(50)

Under high SNR assumption, e(1) and e(2) can be ignored. Thus, (50) can be reduced to

q =$Φ(1)FH Λw %H$ Φ(2)FHΛw % = wH ΛHF $ Φ(1) %H Φ(2)FHΛw. (51) It is clear that Φ(2) = ej2π  1+NgN  Φ(1) and (51) can be further rewritten as q =ej2π  1+NgN  wHΛHF $ Φ(1) %H Φ(1)FHΛw =ej2π  1+NgN  Λw 2.

Therefore, the estimated CFO& can be obtained given by & = 1

2π(1 +Ng

N )

angle(q).

B. Multi-cell CFO estimation

In multi-cell environments, the MCI would affect the ac-curacy of CFO estimation. In this case, the Schmidl scheme may not be directly applied to estimate CFO. To overcome this issue, we propose an CFO estimation algorithm based on the proposed sequences for multi-cell environments. It is noted that this algorithm is modified from the Schmidl scheme. From (1), two consecutively received signals are expressed as

r(1)= I−1  i=0 Φ(1)i FHΛiwi   s(1)i +n(1) r(2)= I−1  i=0 Φ(2)i FHΛiwi   s(2) i +n(2),

where Φ(1)i and Φ(2)i are diagonal CFO matrices whose elements are respectively represented as

$ Φ(1)i % nn = ej2π N(n+Ng)i and $ Φ(2)i % nn = e j2π N(n+N+2Ng)i, 0 ≤ n ≤

N − 1. n(1) and n(2) are thermal noises and can be ignored at high SNR.

To explicitly explain why the Schmidl scheme may not work in multi-cell environments, we give an example which consists of three cells in the same frequency band. Moreover, we assume the user already determines which cell to link before the CFO estimation; this assumption is reasonable because cell ID is in general determined before CFO estimation. Also, we

MCIj←i= αiej2πNNgi N−1 k=0 λi[k]wi[k]wj∗[k]   MCIj←i,domi + βiej2πNNgi N−1 k=0 N−1 m=0,m=k λi[m]wi[m]w∗j[k] e−jπm−k N N sinπ(m−k+i) N   MCIj←i,resi .

(9)

consider the system is at high SNR. Therefore, the received signals can be expressed as

r(1) = s(1)1 + s(1)2 + s(1)3

r(2) = s(2)1 + s(2)2 + s(2)3 (52)

If the Schmidl algorithm in (50) is applied to estimate the CFO of cell 1, q is given by

q =$r(1)%Hr(2)=$s(1) 1 + s(1)2 + s(1)3 %H$ s(2)1 + s(2)2 + s(2)3 % =$s(1)1 %Hs(2)1 +$s(1)2 %Hs(2)2 +$s(1)3 %Hs(2)3 +3 j=1 3  i=1,i=j $ s(1)j %H s(2)i , (53)

where the term $

s(1)j

%H

s(2)i represents the MCI. With the proposed sequences, from Thm. 5,

$

s(1)j

%H

s(2)i = 0 by appro-priately grouping the sequences; while this term is not zero for the PSS. Thus, our proposed sequences have better CFO estimation accuracy than the PSS when the Schmidl algorithm is adopted. However, even using the proposed sequences in the Schmidl scheme, there still exists the interference terms $ s(1)2 %H s(2)2 and $ s(1)3 %H

s(2)3 . Therefore, we propose a method to mitigate the interferences to improve the CFO estimation accuracy. More specifically, r(1) and r(2) are both multiplied by the Hermitian of the time domain synchronization sequence for the targeted cell before performing inner product. Below we explain how to mitigate the MCI by applying the proposed method for CFO estimation:

The value q using the proposed method is expressed as

q =$dH j r(1) %H$ dHj r(2) % . (54)

From (1), (54) can be expressed to (55), shown at the bottom of the next page, and it can be manipulated as

⎣dH j Φ(1)j FHΛjwj+ I−1  i=0,i=j

MCI(1)j←i, domi+ MCI(1)j←i, resi ⎤ ⎦ H ·⎣dH j Φ(2)j FHΛjwj+ I−1  i=0,i=j

MCI(2)j←i, domi+ MCI(2)j←i, resi⎦ . (56) From the discussion in IV, with the proposed sequences, MCIj←i, resi is sufficiently small to be ignored when CFO is small. Moreover, MCIj←i, domi is zero by appropriately grouping the proposed sequences. Therefore, (56) can be approximated to q ≈$dHj Φ(1)j FHΛjwj %H$ dHj Φ(2)j FHΛjwj % = ej2πj  1+NgN  dH j Φ(1)j FHΛjwj 2.

Therefore, the estimated CFO &j of the targeted cell can be obtained by

&j = 1 2π(1 +Ng

N )

angle(q).

It is worth to emphasize that the proposed CFO estimation is modified from the Schmidl algorithm, which is designed for single cell environment. The proposed CFO estimation by using the designed sequences for multi-cell environments in concluded in Algorithm 2.

Algorithm 2: Proposed CFO estimation algorithm for

multi-cell environments.

1: Multiply the Hermitian of the time-domain

synchronization sequence of the targeted cell dj to the two consecutively received signals r(1) and r(2).

2: Calculate q =dHj r(1) H

dHj r(2)

 .

3: The CFO of the targeted cell j is obtained by &j= 1

2π(1+NgN )

angle(q).

VI. SIMULATION RESULTS

In this section, simulation results are provided to show the orthogonality and the MCI characteristics of the proposed sequences. Moreover, we compare the accuracy of the CFO estimation between the PSS [1] and the proposed sequences in single-cell and multi-cell environments. The sequence length

N is 64 and the roots for the proposed sequences are u1= 3 and u2= 2.

Example 1. Interfering cells of the proposed sequences:

This example investigates the number of interfering cells in Thms 5 and 6. Let the sequence length be N = 32 and the multipath length be L = 4. The MCI results before and after channel compensation are shown in Figs. 2(a) and 2(b), respectively. The black squares in the figures indicate that if the user links to the targeted cell j, he/she receives the interference from the interfering cells with index i. We observe that the number of interfering cells before channel compensation is L−1, which is consistent with the discussion in Section IV. On the other hand, the number of interfering cells is 2(L − 1) after channel compensation, which also matches the analytical results.

Example 2. MCI of the proposed sequences with CFO:

The MCI to the targeted cell for multipath length L = 4 is illustrated in Fig. 3. The simulation result is obtained by setting the distribution of the CFO be either uniform or Gaussian, which may represent the worst and the realistic CFO scenarios, respectively. More specifically, we let the CFO be uniformly distributed between −0.1 and 0.1 (sub-carrier spacing), or normally distributed with outage proba-bility Pr{|CFO| > 0.1} = 10−5. The MCI is normalized by |N−1k=0 λj[k]|wi[k]|2| and averaged for different channel realizations. Except for the dominant interfering cells, the gap between the desired signal and the most serious interfering cell are around 13 dB for uniform CFO and 18 dB for Gaussian CFO; in general the gap are around 18 dB for uniform CFO and 23 dB for Gaussian CFO. By carefully excluding the most serious interfering cells, the induced interference is small and ignorable. Therefore using the proposed sequences, the algorithms designed for single-cell environments can be used in multi-cell environments even if CFO exists.

(10)

(a) Before channel equalization.

(b) After channel equalization.

Fig. 2. The MCI of the proposed sequences with multipath lengthL = 4.

Example 3. CFO estimation in single-cell environments:

This example shows the accuracy of CFO estimation for the proposed sequences in single-cell environments. Let the length of CP Ng be 16, and the CFO distribution be either uniform or Gaussian like the settings in Example 2. To ensure the correctness of the simulation, first we let the channel be AWGN, where we can find a Cramer-Rao bound for the estimation error [19], which is

var  & 2π(1 +Ng N )  $ 1 2π(1 +Ng N ) %2 · N · SNR . (57) The estimation error of the primary sequence and the proposed sequence for AWGN channel is shown in Fig. 4. We see that when SNR is sufficiently high, both the PSS and the proposed sequences can achieve the Cramer-Rao bound in

0 10 20 30 40 50 60 -30 -25 -20 -15 -10 -5 0 5 i : Cell index MCI j← i (dB ) Uniform CFO Gaussian CFO

Fig. 3. The MCI of the proposed sequence with different CFO distributions.

-5 0 5 10 15 20 25 30 10-7 10-6 10-5 10-4 10-3 10-2 σ2w/N0 (dB)

Mean squared error

PSS, uniform CFO

Proposed sequence, uniform CFO PSS, Gaussian CFO

Proposed sequence, Gaussian CFO Cramer Rao bound

Fig. 4. Single-cell CFO estimation at AWGN channels.

AWGN environments. Now let the channel length L = 4, the estimation error is shown in Fig. 5. From the figure, the proposed sequence performs nearly the same with the PSS. Therefore in the single-cell environments, the two sequences have comparable estimation accuracy.

Example 4. CFO estimation in multi-cell environments:

This example shows the accuracy of CFO estimation for the proposed sequences in multi-cell environments. In this simu-lation setting, three cells are deployed in the same frequency

q =  dHj I−1  i=0 Φ(1)i FHΛiwi H dHj I−1  i=0 Φ(2)i FHΛqwq  = ⎡ ⎢ ⎢ ⎣dHj Φ(1)j FHΛjwj+ I−1  i=0,i=j dHj Φ(1)i FHΛiwi   MCIj←i ⎤ ⎥ ⎥ ⎦ H⎡ ⎢ ⎢ ⎣dHj Φ(2)j FHΛjwj+ I−1  i=0,i=j dHj Φ(2)i FHΛiwi   MCIj←i ⎤ ⎥ ⎥ ⎦ . (55)

(11)

-5 0 5 10 15 20 25 30 10-7 10-6 10-5 10-4 10-3 10-2 σ2w/N0 (dB)

Mean squared error

PSS, uniform CFO

Proposed sequence, uniform CFO PSS, Gaussian CFO

Proposed sequence, Gaussian CFO Cramer Rao bound

Fig. 5. Single-cell CFO estimation at multipath lengthL = 4.

&HOO (0, 20 3)

&HOO

(−20,0) (20,0)&HOO

Fig. 6. A multi-cell scenario.

band and its layout is shown in Fig. 6. User is located at different locations, i.e., Location 1 = (18, 0) and Location 3 = (0, 20/√3), for comparing the estimation accuracy between the PSS and the proposed sequences. The path loss model in this example is 38.5 + 20 log(r) dB [30]. Also, we consider both uniform and Gaussian CFO scenarios like that in Example 2. The column indices of the proposed sequences are {0, 4 , 8} chosen from W. The channel length L is 4.

The estimation accuracy between the proposed sequence and the PSS is shown in Fig. 7 for the user at Location 1, and in Fig. 8 at Location 3. Note that Location 3 is the boundary region of the three cells. Therefore the receiver needs to perform cell detection before CFO estimation.

From the simulation results we see that the estimation accuracy of the proposed sequence is much better than that of the PSS at both locations. The improved accuracy is due to that the proposed sequence can completely eliminate the dominant MCI arisen from the CFO, and only leave certain ignorable residual MCI. Moreover, we see from the figure that the performance improvement is more pronounced when the user is at the boundary region of different cells. In this case, the induced MCI is much stronger. Thus, using the proposed sequences can better overcome the MCI issue.

Example 5. Performance of linking to a cell: Using the

-5 0 5 10 15 20 25 30 10-7 10-6 10-5 10-4 10-3 10-2 10-1 σ2w/N0 (dB)

Mean squared error

PSS, uniform CFO PSS, Gaussian CFO

Proposed sequence, uniform CFO Proposed sequence, Gaussian CFO Proposed sequence, AWGN Cramer-Rao bound

Fig. 7. Multi-cell CFO estimation at Location 1.

-5 0 5 10 15 20 25 30 10-7 10-6 10-5 10-4 10-3 10-2 σ2 w/N0

Mean squared error

PSS, uniform CFO PSS, Gaussian CFO

Proposed sequence, uniform CFO Proposed sequence, Gaussian CFO Cramer Rao bound

Fig. 8. Multi-cell CFO estimation at Location 3.

same parameter setting as in Example 4, The CFO is normally distributed with outage probability Pr(|CFO| > 0.1) = 10−5. Without losing generality, let Cell 1 be the targeted cell to link. Fig. 9 shows the performance of linking in terms of detection error rate, i.e., the probability that the user fails linking to the targeted cell. Observe that the proposed sequences have better linking performance than the PSS applied in the LTE standard under multipath channels. This is a reasonable result because the proposed sequences do not have MCI under multipath environments.

VII. CONCLUSION

In this paper we proposed sequences for multi-cell environ-ments. We theoretically proved that the proposed sequences have good properties including constant amplitude, zero au-tocorrelation, and orthogonality in multipath channel environ-ments. Moreover, we analyzed the cyclic shift property of the proposed sequences and proposed a fast algorithm to identify which sequences are the cyclically shifted version of the

(12)

-5 0 5 10 15 20 25 10-4 10-3 10-2 10-1 100 σ2 w/N0 (dB) Det e ct

ion error rat

e PSS, L = 6 PSS, L = 4 PSS, L = 2 Proposed sequence, L = 6 Proposed sequence, L = 4 Proposed sequence, L = 2

Fig. 9. Performance of linking for the PSS and the proposed sequences.

others, so that the proposed sequences can be used to estimate integer CFO. Furthermore, we analyzed the induced MCI of the proposed sequences when there are fractional CFOs. The analytical results showed that the proposed sequence can com-pletely eliminate the dominate MCI, and only leave the resid-ual MCI, which is in general negligible. Hence, we can slightly modify the CFO estimation algorithms designed for single-user or single-cell environments and applied them in multi-cell environments. We took a popular CFO estimation for instance, modified and applied it in multi-cell environments. Finally, simulation results showed the analytical results are accurate, and the proposed sequences and CFO estimation algorithms outperform conventional schemes in multi-cell environments. The performance improvement of the proposed sequences is more pronounced when the users is at the boundary regions of several cells, because serious MCI appears in this case. We conclude that with low computational complexity, the proposed sequences and algorithms can efficiently overcome the MCI issue in multi-cell networks.

APPENDIX A. Proof of Lemma 1

If N is even, from (6), x[(( k− i ))N] is expressed as

x[(( k − i ))N] =x[k − i + cN] = e−jNπu1(k−i+cN)2

=e−jπ

N[u1(k−i+)2+2cNu1(k−i)+u1c2N2]

=x[k − i]e−j2πu1c(k−i)e−jπu1c2N

=x[k − i]e−jπu1c2N,

where c ∈ Z. Since N is even, e−jπu1c2N = 1. Therefore,

x[(( k − i ))N] = x[k − i].

If N is odd, from (6), x[((k− i))N] can be expressed as

x[((k − i))N] = x[k − i + cN] = e−jπ

Nu1(k−i+cN)(k−i+cN+1)

= e−jπ

N[u1(k−i)(k−i+1)+2cNu1(k−i)+u1cN(cN+1)]

= x[k − i]e−j2πu1c(k−i)e−jπu1c(cN+1)

= x[k − i]e−jπu1c(cN+1),

where c∈ Z. Since N is odd, e−jπu1c(cN+1)= 1. Therefore,

x[(( k − i ))N] = x[k − i]. 

B. Proof of Lemma 2

According to (5), wi[(( k − m ))N] is expressed as.

wi[((k − m))N] = wi[k − m + cN] = e−jNπα(k−m+cN)i, c ∈ Z.

If N is even, α(k−m+cN)i can be expressed as (58), shown at the top of the next page. Therefore,

wi[(( k − m ))N] = e−jπ

Nα(k−m)ie−j2πcY1(k,m,i)e−jπc2N(u1+u2)

= wi[k − m]e−jπc2N(u1+u2).

Since N is even, e−jπc2N(u1+u2)= 1 and wi[(( k−m ))N] =

wi[k − m].

If N is odd, α(k−m+cN)iis expressed as (59), shown at the top of the next page. Therefore,

wi[(( k − m ))N] = e−jπ

Nα(k−m)ie−j2πcY2(k,m,i)e−jπc(cN+1)(u1+u2)

= wi[k − m]e−jπc(cN+1)(u1+u2).

Since N is odd, e−jπc(cN+1)(u1+u2) = 1 and wi[(( k −

m ))N] = wi[k − m]. 

ACKNOWLEDGMENT

The authors would like to thank all the anonymous review-ers for their constructive suggestions, which have significantly improved the quality of this work.

REFERENCES

[1] 3GPP TS36.211 v8.9.0, Physical Channels and Modulation (Release 8), Dec. 2009.

[2] V. Chandrasekhar, J. G. Andrews, and A. Gatherer, “Femtocells net-works: a survey,” IEEE Commun. Mag., vol. 46, no. 9, pp. 59–67, Sept. 2008.

[3] A. Attar, V. Krishnamurthy, and O. N. Gharehshiran, “Interference man-agement using cognitive base station for UMTS LTE,” IEEE Commun. Mag., vol. 49, no. 8, pp. 152–159, Aug. 2011.

[4] J. G. Andrews, W. Choi, and R. W. Heath Jr., “Overcoming interfer-ence in spatial multiplexing MIMO cellular networks,” IEEE Wireless Commun., vol. 14, no. 6, pp. 95–104, Dec. 2007.

[5] S. Shim, J. S. Kwak, R. W. Heath, Jr., and J. G. Andrews, “Block diagonalization for multi-user MIMO with other-cell interference,” IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2671–2681, July 2008. [6] J. Zhang and J. G. Andrews, “Adaptive spatial intercell interference

can-cellation in multicell wireless networks,” IEEE J. Sel. Areas Commun., vol. 28, no. 9, pp. 1455–1468, Dec. 2010.

[7] A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative communica-tion in wireless networks,” IEEE Commun. Mag., vol. 42, no. 10, pp. 74–80, Oct. 2004.

[8] S. Jagannathan, H. Aghajan, and A. Goldsmith, “The effect of time syn-chronization errors on the performance of cooperative MISO systems,” in Proc. 2004 IEEE Globecom, pp. 102–107.

(13)

α(k−m+cN)i= u1(k − m + cN − i)2+ u 2(k − m + cN)2 = u1(k − m − i)2+ u 2(k − m)2+ u1[2cN(k − m − i)] + u2[2cN(k − m)] + u1c2N2+ u2c2N2 = α(k−m)i+ 2cN [u 1(k − m − i) + u 2(k − m)] Y1(k,m,i) +(u1+ u2)c2N2 (58) α(k−m+cN)i= u1(k − m + cN − i)(k − m + cN − i + 1) + u2(k − m + cN)(k − m + cN + 1) = u1(k − m − i)(k − m − i + 1) + u2(k − m)(k − m + 1) + u1[2cN(k − m − i)] + u2[2cN(k − m)] + u1cN(cN + 1) + u2cN(cN + 1) = α(k−m)i+ 2cN [u 1(k − m − i) + u 2(k − m)] Y2(k,m,i) +cN(cN + 1)(u1+ u2) (59)

[9] Q. Huang, M. Ghogho, J. Wei, and P. Ciblat, “Practical timing and frequency synchronization for OFDM-based cooperative systems,” IEEE Trans. Signal Process., vol. 58, no. 7, pp. 3706–3716, July 2010. [10] V. Chandrasekhar and J. G. Andrews, “Spectrum allocation in tiered

cellular networks,” IEEE Trans. Wireless Commun., vol. 57, no. 10, pp. 3059–3068, Oct. 2009.

[11] V. Chandrasekhar, J. G. Andrews, T. Muharemovic, Z. Shen, and A. Gatherer, “Power control in two-tier femtocell networks,” IEEE Trans. Wireless Commun., vol. 8, no. 8, pp. 4316–4328, Aug. 2009. [12] C. U. Saraydar, N. B Mandayam, and D. J. Goodman, “Pricing and

power control in a multicell wireless data network,” IEEE J. Sel. Areas Commun., vol. 19, no. 10, pp. 1883–1892, Oct. 2001.

[13] D. Gesbert, S. Kiani, and A. Gjendemsj, “Adaptation, coordination, and distributed resource allocation in interference-limited wireless net-works,” Proc. IEEE, vol. 95, no. 12, pp. 2393–2409, Dec. 2007. [14] B. M. Popovic, “Generalized chirp-like polyphase sequence with

opti-mum correlation properties,” IEEE Trans. Inf. Theory, vol. 38, no. 4, pp. 1406–1409, July 1992.

[15] S.-H. Tsai, Y.-P. Lin, and C.-C. J. Kuo, “MAI-free MC-CDMA systems based on Hadamard Walsh codes,” IEEE Trans. Signal Process., vol. 54, no. 8, pp. 3166–3179, Aug. 2006.

[16] L. Tadjpour, S.-H. Tsai, and C.-C. J.Kuo, “Simplified multiaccess interference reduction for MC-CDMA with carrier frequency offset,” IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2543–2555, June 2010. [17] L. Sanguinetti, L. Taponecco, and M. Morelli, “Interference-free code

design for MC-CDMA uplink transmissions,” IEEE Trans. Wireless Commun., vol. 8, no. 11, pp. 5461–5465, 2009.

[18] P. H. Moose, “A technique for orthogonal frequency division multiplex-ing frequency offset correction,” IEEE Trans. Commun., vol. 42, no. 10, pp. 2908–2914, Oct. 1994.

[19] T. M. Schmidl and D. C. Cox, “Robust frequency and timing synchro-nization for OFDM,” IEEE Trans. Commun., vol. 45, no. 12, pp. 1613– 1621, Dec. 1997.

[20] J.-J. van de Beek, M. Sandell, and P. O. Borjesson, “ML estimation of timing and frequency offset in OFDM systems,” IEEE Trans. Signal Process., vol. 45, no. 7, pp. 1800–1805, July 1997.

[21] LG Electronics, “Comparison of sequence and structure for P-SCH,” 3GPP Tech. Doc., Tdoc R1-071531, St. Julians, Malta 26 - 30, Mar. 2007.

[22] I. Kim, Y. Han, Y. Kim, and S. C. Bang, “Sequence hopping cell search scheme for OFDM cellular systems,” IEEE Trans. Wireless Commun., vol. 7, no. 5, pp. 1483–1489, May 2008.

[23] A. Roessler, “Cell search and cell selection in UMTs LTE,” Rohde and Schwarz Technology Report, Sept. 2009.

[24] K. Manolakis, D. M. Gutierrez Estevez, V. Jungnickel, X. Wen, and C. Drewes, “A closed concept for synchronization and cell search in 3GPP LTE systems,” in Proc. 2009 IEEE WCNC, pp. 1–6.

[25] Y. Tsai, G. Zhang, D. Grieco, F. Ozluturk, and X. Wang “Cell search in 3GPP long term evolution systems,” IEEE Veh. Technol. Mag., vol. 2, no. 2, pp. 23–29, June 2007.

[26] M. Moretti, A. Todini, A. Baiocchi, and G. Dainelli, “A layered architecture for fair resource allocation in multicellular multi-carrier systems,” IEEE Trans. Veh. Technol., vol. 60, no. 4, pp. 1788–1798, Apr. 2011.

[27] M. Morelli and M. Moretti, “Carrier frequency offset estimation for OFDM Direct-Conversion receivers,” IEEE Trans. Wireless Commun., vol. 11, no. 7, pp. 2670–2679, July 2012.

[28] K. Lee, S.-H. Moon, S. Kim, and I. Lee, “Sequence designs for robust consistent frequency-offset estimation in OFDM systems,” IEEE Trans. Veh. Technol., vol. 62, no. 3, pp. 1389–1394, Mar. 2013.

[29] T. Andreescu, D. Andrica, and I. Cucurezeanu, An Introduction to Diophantine Equations: A Problem-Based Approach. Springer, 2010. [30] H. Claussen, L. T. W. Ho, and L. G. Samuel, “An overview of the

femtocell concept,” Bell Labs Technical J., vol. 13, no. 1, pp. 221–245, Mar. 2008.

Ying-Che Hung was born in Taichung, Taiwan, in

1983. He received the B.S. degree in Power Mechan-ical Engineering from the National Tsing-Hua Uni-versity, Taiwan, in 2006. He is currently pursuing the Ph.D. degree with the Department of Electrical En-gineering, National Chiao-Tung University, Taiwan. His research interests mainly include digital signal processing, multiple-input-multiple-output (MIMO) wireless communications, and compressive sensing.

Sheng-Yuan Peng was born in Taipei, Taiwan, in

1988. He received the B.S. degree in Electronic and Computer Engineering from the National Tai-wan University of Science and Technology, TaiTai-wan, in 2010 and the M.S. degree in Communications Engineering from National Chiao-Tung University, Taiwan, in 2012. His research interests include signal processing for wireless communications and multiple-input-multiple-output (MIMO) systems.

Shang-Ho (Lawrence) Tsai (SM’12) was born in

Kaohsiung, Taiwan, 1973. He received the Ph.D. degree in Electrical Engineering from the Univer-sity of Southern California (USC), USA, in Aug. 2005. From June 1999 to July 2002, he was with the Silicon Integrated Systems Corp. (SiS), where he participated the VLSI design for DMT-ADSL systems. From Sep. 2005 to Jan. 2007, he was with the MediaTek Inc. (MTK) and participated the VLSI design for MIMO-OFDM systems. From Jun. 2013 to Dec. 2013, he was a visiting fellow in the department of Electrical Engineering at the Princeton University. Since Feb. 2007, he joined the Department of Electrical and Control Engineering (now Department of Electrical Engineering) at the National Chiao Tung University where he is now an associate professor. His research interests include signal processing for communications, statistical signal processing, and signal processing for VLSI designs. He was awarded a government scholarship for overseas study from the Ministry of Education, Taiwan, in 2002-2005.

數據

Fig. 1. The block diagram of a OFDM based multi-cell system.
Fig. 2. The MCI of the proposed sequences with multipath length L = 4.
Fig. 6. A multi-cell scenario.
Fig. 9. Performance of linking for the PSS and the proposed sequences.

參考文獻

相關文件

In addition, we successfully used unit resistors to construct the ratio of consecutive items of Fibonacci sequence, Pell sequence, and Catalan number.4. Minimum number

For periodic sequence (with period n) that has exactly one of each 1 ∼ n in any group, we can find the least upper bound of the number of converged-routes... Elementary number

Now given the volume fraction for the interface cell C i , we seek a reconstruction that mimics the sub-grid structure of the jump between 0 and 1 in the volume fraction

We do it by reducing the first order system to a vectorial Schr¨ odinger type equation containing conductivity coefficient in matrix potential coefficient as in [3], [13] and use

Wang, Unique continuation for the elasticity sys- tem and a counterexample for second order elliptic systems, Harmonic Analysis, Partial Differential Equations, Complex Analysis,

In this paper, we have shown that how to construct complementarity functions for the circular cone complementarity problem, and have proposed four classes of merit func- tions for

 The nanostructure with anisotropic transmission characteristics on ITO films induced by fs laser can be used for the alignment layer , polarizer and conducting layer in LCD cell.

At least one can show that such operators  has real eigenvalues for W 0 .   Æ OK. we  did it... For the Virasoro