• 沒有找到結果。

基於正交分頻多重進接之無線多媒體傳收機研究及設計---子計劃I:無線正交分頻多重進接頻道使用技術研究及全系統整合(I)

N/A
N/A
Protected

Academic year: 2021

Share "基於正交分頻多重進接之無線多媒體傳收機研究及設計---子計劃I:無線正交分頻多重進接頻道使用技術研究及全系統整合(I)"

Copied!
26
0
0

加載中.... (立即查看全文)

全文

(1)行政院國家科學委員會補助專題研究計畫成果報告 無線正交分頻多重進接頻道使用技術研究及全系統整合(I) Wireless OFDMA Channel Utilization Techniques Research and Full-System Integration 計畫編號:NSC 91-2219-E-009-008 執行期限:91 年 8 月 1 日至 92 年 7 月 31 日 主持人:林大衛 交通大學電子工程學系 教授 計畫參與人員:吳俊榮、林孟亭、何玉屏、李明哲、林筱晴、陳盈縈 交通大學電子工 程學系 研究生. 摘要 本計畫為一整合型計畫之子計畫,擬為期三年,其中最主要的工作是基於 IEEE 802.16a 標準,研究正交分頻多重進接(OFDMA)在作無線行動通訊服務之用時的傳收 技術,並將各子計畫之實現成果予以整合。此外亦對相關之多載波調變技術,從事基 礎性的研究。本報告係針對第一年之成果,其中我們除了了解 IEEE 802.16a 標準之相 關規範,並為了系統模擬與整合之需,探討了其中幾項主要的傳收技術,特別是同步 及通道編解碼技術。我們亦考慮了適用於系統實現的數位訊號處理平台。此外,在多 載波調變的基礎性研究方面,我們探討了使用奇值分解(SVD)的多載波調變在多路徑 淡化通道中的性能及其與使用離散傅立葉轉換(DFT)者的差異。. 關鍵詞:IEEE 802.16a、正交分頻多重進接、正交分頻多工調變、時間同步、頻率同 步、通道編解碼、基於奇值分解之多載波調變. I.

(2) Abstract This subproject is a part of an integrated project. It is intended for three years, wherein the major work is to base on the IEEE 802.16a standard and research into the OFDMA (orthogonal frequency-division multiple access) transceiving technologies for wireless mobile communication service. It is also responsible for integrating the implementation results of all the subprojects. Further, it also considers some fundamental issues concerning multicarrier modulation. This report is concerned with the first year’s results. In this year, besides understanding the specifications of IEEE 802.16a, we studied several key transceiving technologies for the need of system simulation and integration, which include, especially, synchronization and channel coding techniques. We also considered the digital signal processing platform suitable for system implementation. In addition, in fundamental research concerning multicarrier modulation we investigated the performance in multipath fading channel of SVD (singular value decomposition)-based multicarrier modulation and its difference with that based on DFT (discrete Fourier transform).. Keywords: IEEE 802.16a, Orthogonal Frequency-Division Multiple Access (OFDMA), Orthogonal Frequency-Division Multiplexing (OFDM), Time Synchronization, Frequency Synchronization, Channel Coding, SVD-Based Multicarrier Modulation. II.

(3) 目錄 Table of Contents 一、計畫緣由與目的 二、結果與討論 A. 資料組裝與解組裝(data framer/deframer)及位元映射與解映射(bit mapper/demapper) B. 通道模擬 C. 同步技術 D. 通道估計與等化 E. 通道編解碼 F. 數位訊號處理實現平台之考慮 G. 基於奇值分解之多載波調變 三、參考文獻 四、圖表 五、計畫成果自評 六、可供推廣之研發成果資料表 七、附錄. 1 1 1 2 2 3 3 4 4 5 6 8 8 11. III.

(4) 一、計畫緣由與目的 本計畫為一整合型計畫之子計畫,擬為期三年。該整合型計畫一主要目標是基於 IEEE 802.16a 標準,研究正交分頻多重進接(OFDMA)在作無線行動通訊服務之用時的 傳收技術,並將各分項技術作數位訊號處理器(DSP)軟體或 FPGA 硬體實現。本子計 畫負責其中若干傳收技術之研究,並負責將各子計畫之分項實現成果予以整合。此外, 本子計畫亦對多載波調變相關技術,從事較基礎性的研究。 IEEE 802.16a 標準容許 FDD (frequency-division duplexing)及 TDD (time-division duplexing)兩種雙工方式。鑒於未來的高速無線通訊很可能具有雙向不對稱的傳輸率, 我們決定考慮 TDD 雙工,並兼顧上行與下行(或稱上鏈與下鏈)兩方向傳輸技術的研 究。IEEE 802.16a 之 OFDMA 實體層(PHY layer)傳輸系統之基本架構,在上行與下行 二個方向相似,概略如圖一所示。圖中以陰影突顯之組件由本子計畫負責實現。由於 本子計畫要負責全系統的整合,也由於軟體(或硬體)實現的工作係於第二年度中 (92/8-93/7)才要陸續開始,故本子計畫在第一年的研究未限於陰影所示之組件,而是 求能對整個系統有所掌握。 以下我們分段陳述本年的研究結果,其中包括 IEEE 802.16a 傳收系統組件的研究、 系統實現平台的考慮、及多載波調變技術的基礎性研究。在傳收系統組件中,我們對 同步與通道編解碼技術作了特別深入的探討。. 二、結果與討論 A. 資料組裝與解組裝(data framer/deframer)及位元映射與解映射(bit mapper/demapper) 圖二所示為 IEEE 802.16a OFDMA TDD 訊框(frame)中,上下行時間的分配與資料 結構的示意。我們整理了標準中有關資料組裝與位元映射的規範。其中比較特別的是 子通道(subchannels)與嚮導載波(pilot carriers)的分配安排。 對下鏈傳輸而言,嚮導載波的安排比較簡單。在總共 2048 個次載波中,最左與最 右端共 345 個空載波(null carriers)。中間 1703 個次載波中,則包含 1536 個資料載波, 166 個嚮導載波與 1 個直流載波。嚮導載波中又可分為 32 個固定位置與其餘的浮動位 置。固定位置的安排可以查得知,浮動位置的安排則是透過公式計算,使嚮導載波在 不同的 OFDM 訊號中,平均的分散在不同的位置。這樣的安排有助於估計隨時間而變 的通道狀況。 上鏈的情況比較複雜。扣除左右端的空載波後,剩下的次載波先均分為 32 組子通 道。在每個子通道的 53 個次載波中,有 1 個固定位置嚮導載波及 4 個浮動位置嚮導載 波,其餘均為資料載波。 這些次載波安排的特性,對使用嚮導載波的運算,如同步與通道估計,是不可或缺 的資訊。至於資料組裝與解組裝及位元映射與解映射的實現,比之同步、等化、與通 1.

(5) 道解碼等,並無理論上的議題須先解決,且其功能似較宜以軟體達成。. B. 通道模擬 在 IEEE 802.16a 標準中提到幾個固定式無線傳輸的通道模型。但由於我們亦考慮 行動狀態下的傳輸,故需再自文獻中搜尋合用的模型。基本上,這些模型需適用於寬 頻傳輸。所以,如 3GPP WCDMA 等行動寬頻傳輸系統的通道模型就是可以在本研究 中考慮使用的。在 IEEE 802.16e 及 802.20 兩團體中,對於通道模型也有一些討論,我 們將繼續注意之。例如在下述關於同步的研究中,我們曾使用的 ESTI Vehicular A 通 道模型,亦是 802.16e 中被人提出的一個模型。 無線通道的模擬,其計算量極大。我們過去的經驗顯示,其 DSP 軟體模擬是相當 需花力氣來設計與完成的。由於 DSP 的速度在不斷提昇中,且具有高度可程式性,似 乎比 FPGA 容易來模擬不同的通道狀況,所以我們暫以使用 DSP 為優先。但我們預定 將在第二年的研究中,對使用 DSP 與使用 FPGA 的優劣,加以進一步的比較。. C. 同步技術 對 OFDM 系統而言,接收端收到的訊號如果在時間與頻率上與系統預期的值不同 時,都會造成解調動作的干擾。時間上的差異會造成解調訊號相位偏差,或甚至造成 相鄰段落訊號的干擾(ISI);而頻率的差異則會破壞次載波之間的正交性,並且導致次 載波間的相互干擾(ICI)。為了克服類似問題的技術通稱為同步技術。 一般而言,OFDM 系統採用的同步技術主要可分為三大類:利用間隔區間(guard interval)重複性、利用空載波不含訊號的特性、利用已知的前置(preample)或嚮導載波 (pilot carriers)。針對本計畫所依據的 IEEE 802.16a 系統特性,我們為上鏈與下鏈傳輸 設計了不同的同步動作,詳可見[1],另亦可參附錄 A(會議論文初稿)。 在下鏈傳輸的同步中,我們共設計四級的同步動作。第一、二級是用 OFDM 系統 特有的間隔區間估計到達時間與頻率差異的分數部分。這裡所謂的間隔區間,乃是由 OFDM 的段落訊號中,重複尾端部分的訊號並且置於段落訊號的起始位置。因此,間 隔區間本身在接收到的訊號列中即可呈現重複的特性。我們採用這樣的方法作為第 一、二級的處理,可以在不依靠任何已知訊號(如 pilot 或 preamble)的情況下,得到基 本的估計值。第三級利用 802.16a 規範的空載波及部分的 pilot carriers 判斷頻率差異的 整數部分。第四級則利用前置訊號判斷訊框(frame)開始時間。至此用戶端(subscriber) 應能的掌握訊框開始時間,OFDMA 符號(symbols)開始時間與頻率差異值。 至於上鏈的同步動作,我們針對 802.16a 規範的前置訊號,設計兩種不同的同步方 式:時域以及頻域相關性分析(time-domain or frequency-domain correlation)。上鏈的前 置與下鏈不同的地方在於,前者包含了所有的次載波,而後者僅包含部分次載波(參圖 二)。利用時域的同步是由基地端產生已知的前置訊號,並與接收到的訊號進行相關性 的分析,當相關性最高時,即為訊框大概的開始時間;而利用頻域的同步則是將收到 的訊號經過 DFT 處理,所得的結果再與已知的前置訊號頻域進行相關性的分析。我們 的模擬顯示,利用時域的同步方法,不但效果較好,複雜度也比較低。 2.

(6) D. 通道估計與等化 本計畫在第一年中,僅對通道估計與等化的方法進行 survey,將在第二年中,對通 道估計與等化技術及其實現,作深入的探討。在 IEEE 802.16a 規格中,上行與下行兩 方向的次載波使用方式相當不對稱,所以兩方向的通道估計與等化方法以及其 DSP 實 現,需要個別的研究與設計。一般而言,多載波傳輸之下的等化可並用時域等化與頻 域等化,但在通道的 impulse response 或 delay spread 較 OFDM symbol 的 guard interval 為短時,可省略時域等化。本計畫即考慮僅做頻域等化,此亦為一般無線 OFDM 傳輸 之研究所考慮者。. E. 通道編解碼 在 IEEE 802.16a 系統中,通道編解碼是由三個部分所構成:里德-所羅門碼 (Reed-Solomon code, or RS code)、迴旋碼(convolutional code)以及位元間插器(bit interleaver),如圖三所示。迴旋碼用於修復雜訊干擾造成的失真,RS code 用於修復相 連的錯誤(burst error),交換器則能更進一步的打散連續的錯誤。這些元件都是無線數 位通訊中常用的編解碼工具。 在通道碼的使用中,802.16a 還運用了三個特別的機制:縮短(shortening)、穿孔 (puncturing)與去尾(tail-biting)。實際上 802.16a 所用的迴旋碼與 RS code 都只有一種, 但透過這三種機制,就提供了六種不同的編碼速率,參表一。經過縮短與穿孔的 RS code 可提供不同的段落長度(block size)與除錯能力;經過穿孔與去尾的迴旋碼則提供了不 同的編碼速率,並保持段落的完整性。 我們已針對這些 802.16a 中的編碼規定,設計了相對應的解碼方法。縮短、穿孔、 以及 IEEE 802.16a 特別的 RS code 產生多項式(generator polynomial)都相當容易作對應 的解碼處理。比較困難的是去尾編碼與位元間插的處理。關於去尾編碼,最直接的解 碼法的對所有可能的開始與結束狀態(states)解碼,再從其中找到最佳者;其複雜度是 一般解碼法的 N 倍,其中 N 為狀態數目。我們採用[2]與[3]的思路,僅用一個開始狀 態,但將 trellis 延伸一段長度,其中延伸部分的內容係重複原始 trellis 的內容,如此 就可收斂到一個不錯的解碼結果。關於位元間插,對應的最佳解碼法之複雜度不可想 像。我們參考[4]-[6]的想法,設計了次佳解碼法,實驗顯示其與最佳解碼法間的效能 差異僅約 0.1-1.0 dB。 我們在加成性白色高斯通道下和淡化通道下分別模擬了里德-索羅門碼,迴旋碼, 和串接碼,並把模擬之結果與一些分析的結果做比較,包含在加成性白色高斯通道下 IEEE 802.16a 的編碼增益需求值,用 Shannon 極限求出的編碼極限值,及用最短碼字 間距求出的增益值。在加成性白色高斯通道下,里德-索羅門碼和迴旋碼的編碼增益值 幾乎達到理論值,但整體的編碼增益值離理論值或 IEEE 802.16a 的編碼增益需求值卻 有很大的差距。這與能找到的 802.16a Task Group 之文獻資料相吻合。我們預測在更 高的號雜比下,實際的編碼增益值會比較接近理論計算出的編碼增益值。詳可見[7], 另亦可參附錄 B(會議論文初稿)。. 3.

(7) F. 數位訊號處理實現平台之考慮 在系統整合方面,首先要完成的是實作平台的選定。其中牽涉的層面很廣︰如硬體 速度快慢、硬體資源是否充足、編譯與可程式化(programmable)的難易度、還有其價格 以及其與現有資源是否可整合等問題。在經過詳細的討論與調查之後,我們選擇了混 合 DSP 晶片與 FPGA 的系統,以提供具高度彈性的實現平台。這是因為我們的系統大 部分的運算是希望以高效能的 DSP 晶片完成,但某些高運算複雜度的傳收系統組件(如 無線通道模擬與通道解碼),可能須使用 FPGA 才能作較高速度的實現。 Innovative Integration 公司有一系列名為 Quixote 的系統。此系統同時包含具高運算 效能的 TI DSP 晶片 TMS320C6416 與 Xilinx FPGA 晶片 Virtex-II,並可與我們既有的 DSP 設備互連。我們將在第二年的計畫中,嘗試使用此設備。. G. 基於奇值分解之多載波調變 由圖一可知,目前一般的 OFDM 系統係以 DFT/IDFT 作為分頻的動作核心。這種 架構的好處是硬體結構規律,而且已有快速演算法的硬體實現。然而如一些研究所指 出[8],分頻的動作也可以使用其他的運算代替,例如 SVD(奇值分解)或 DWT(離散小 波轉換)。SVD 的運算量極大,且須隨通道變化而調整,故目前尚不實用。不過,隨 著數位電路的飛速發展,也許在不久的將來確可考慮使用 SVD。 我們考慮以 SVD 實現 OFDM 的架構,並以模擬來評量其效能。結果證實,在相同 的傳輸通道與傳輸訊雜比(SNR),採用 SVD 的傳輸錯誤率比傳統的架構還小;參圖四。 會得到這樣的結果最主要的原因是以 SVD 分頻後的次頻帶響應(subtone response),其 能量(absolute power)比起傳統的架構還高,這樣的現象在能量較低的次頻帶尤為明 顯。因此,採用 SVD 的 OFDM 架構,可以有效的降低錯誤率,或者等效於降低傳輸 能量(假定錯誤率和通道固定)。. 4.

(8) 三、參考文獻 [1] M.-T. Lin, “Fixed and mobile wireless communication based on IEEE 802.16a TDD OFDMA: transmission filtering and synchronization,” M.S. thesis, Dept. Electronics Engineering, National Chiao Tung University, June 2003. [2] Y.-P. E. Wang and R. Ramesh, “To bite or note to bite – a study of tail bits versus tail biting,” in Proc. IEEE Int. Symp. Personal Indoor Mobile Radio Commun., vol. 2, pp. 317-321, Oct. 1996. [3] W. Sung and I.-K. Kim, “Performance of a fixed delay decoding scheme for tail biting convolutional codes,” in IEEE Asilomar Conf. Signals Syst. Computers Conf Rec., vol. 1, pp. 704-708, Oct. 1996. [4] E. Zehavi, “8-PSK trellis codes for a Rayleigh channel,” IEEE Trans. Commun., vol. 40, pp. 873-884, May 1992. [5] M. Speth, A. Senst, and H. Meyr, “Low complexity space-frequency MLSE for multi-user COFDM,” in IEEE Global Telecommun. Conf. Rec., vol. 5, pp. 2395-2399, 1999. [6] F. Tosato and P. Bisaglia, “Simplified soft-output demapper for binary interleaved COFDM with application to HIPERLAN/2,” in IEEE Int. Conf. Commun. Conf. Rec., vol. 2, pp. 664-668, 2002. [7] Y.-P. Ho, “Study on OFDM signal description and channel coding in the IEEE 802.16a TDD OFDMA wireless communication standard,” M.S. thesis, Dept. Electronics Engineering, National Chiao Tung University, June 2003. [8] A. Scaglione, G. B. Giannakis and S. Barbarossa, “Redundant filterbank precoders and equalizers. I. Unification and optimal designs,” IEEE Trans. Signal Process., vol. 47, no. 2, pp. 1988–2006, July 1999.. 5.

(9) 四、圖表. 圖一:OFDMA 傳收系統簡圖. 圖二:IEEE 802.16a OFDMA TDD 訊框架構(取自 802.16a 標準 Figure 128av). RS coder. Convolutional coder. Bit interleaver. Modulation. RS decoder. Convolutional decoder. Bit deinterleaver. Demodulati on. 圖三:IEEE 802.16a 之通道編解碼架構 6.

(10) 圖四:使用 SVD 的系統與使用 DFT 的傳統 OFDM 傳輸錯誤率比較. Modulation. QPSK QPSK 16-QAM 16-QAM 64-QAM 64-QAM. Uncoded Block Size (bytes) 18 26 36 54 72 82. Overall Coding Rate. Coded Block Size (bytes). RS Code. CC Code Rate. 1/2 ~3/4 1/2 3/4 2/3 ~3/4. 36 36 72 72 108 108. (24,18,3) (30,26,2) (48,36,6) (60,54,3) (81,72,4) (90,82,4). 2/3 5/6 2/3 5/6 3/4 5/6. 表一:IEEE 802.16a 中六種不同的通道編碼組合(同 802.16a 標準 Table 116ce). 7.

(11) 五、計畫成果自評 研究內容與原計畫相符程度:本子計畫為一個整合型計畫之一部分,本年度之研究 達成了該整合型計畫之需求。 達成預期目標情況:本子計畫達成之貢獻形式,含創新之發現、理論之推導、技術 水準之提昇、計算機模擬軟體之建立、人才培育。 成果之學術與應用價值等:本子計畫達成之科技領域成果,主要為對 IEEE 802.16a OFDMA 標準規範之了解、其 TDD 下鏈與上鏈時間與頻率同步方法之設計與模擬結 果、其通道解碼方法之設計與模擬結果、以及對基於奇值分解之多載波調變效能研究。 另亦考慮了適用之數位訊號處理實現平台,並對適用之無線通道模型及通道估計與等 化方法作了初步研究。同步、通道解碼、與 SVD 多載波調變三方面之成果之學術價值 高,我們正陸續撰寫論文投稿中。應用價值方面,所提出的同步方法與通道解碼方法, 可為 IEEE 802.16a OFDMA 或相關傳收系統開發之參考。 綜合評估:本計畫獲得一些具有學術與應用價值的成果,並達人才培育之效。成效 良好。. 六、可供推廣之研發成果資料表 下頁起,共二頁。. 8.

(12) 可供推廣之研發成果資料表 □ 可申請專利. ■ 可技術移轉. 日期:92 年 8 月 26 日. 計畫名稱:無線正交分頻多重進接頻道使用技術研究及全系統整合 (I). 國科會補助計畫 計畫主持人:林大衛 計畫編號:NSC 91-2219-E-009-008 學門領域:電信國家型計畫. 技術/創作名稱 IEEE 802.16a OFDMA TDD 訊號同步方法 發明人/創作人 林孟亭、林大衛. 技術說明. 可利用之產業 及 可開發之產品. 技術特點. 中文:根據 IEEE 802.16a 標準中之 OFDMA TDD 規格設計的下鏈 及上鏈傳輸之同步方法。其下鏈同步包括 OFDM symbol 之時間同 步、頻率同步、及 TDD 訊框(frame)同步。上鏈同步則僅含時間同 步,因為 802.16a 規格中對上鏈頻率誤差有限制,而訊框同步已於 下鏈同步中達成。但不同用戶的上鏈 OFDM symbol 可有大至正負 25%的 guard interval 長度的時間差,是使其時間同步複雜之一大因 素。 英文: Downlink (DL) and uplink (UL) synchronization methods designed according to the IEEE 802.16a standard’s OFDMA TDD specifications. DL synchronization includes OFDM symbol time sync, frequency sync, and TDD frame sync. UL synchronization only includes time sync, for 802.16a specifies limit on UL frequency offset and frame sync is already achieved in DL sync. A major factor causing complexity in UL time sync is the allowed OFDM symbol time offset of up to plus-and-minus 25% of the guard interval length. 無線通訊器材產業,IEEE 802.16a 或相關傳輸設備產品。. 根據 IEEE 802.16a 標準中之 OFDMA TDD 規格設計的下鏈及上鏈 傳輸之同步方法。運算複雜度合理。. 可用於 IEEE 802.16a 或相關傳輸設備產品。. 推廣及運用的價值 ※ ※. 1.每項研發成果請填寫一式二份,一份隨成果報告送繳本會,一份送 貴單位 研發成果推廣單位(如技術移轉中心)。 2.本項研發成果若尚未申請專利,請勿揭露可申請專利之主要內容。. ※ 3.本表若不敷使用,請自行影印使用。 9.

(13) 可供推廣之研發成果資料表 □ 可申請專利. ■ 可技術移轉. 日期:92 年 8 月 26 日. 計畫名稱:無線正交分頻多重進接頻道使用技術研究及全系統整合 (I). 國科會補助計畫 計畫主持人:林大衛 計畫編號:NSC 91-2219-E-009-008 學門領域:電信國家型計畫. 技術/創作名稱 IEEE 802.16a OFDMA 通道碼解碼方法 發明人/創作人 何玉屏、林大衛 中文:根據 IEEE 802.16a 標準中之 OFDMA 規格設計的通道碼解 碼方法,其中包括在位元間插(bit interleaving)與 QAM 調變之後的 穿孔(punctured)去尾(tail-biting)迴旋碼之解碼法,及該標準特定之 產生多項式(generator polynomial)下的縮短(shortened)里德-索羅門 碼(RS code)之解碼法。以上迴旋碼係採軟式解碼,里德-所羅門碼 則如一般做法,採硬式解碼。. 技術說明. 可利用之產業 及 可開發之產品. 技術特點. 英文:Channel decoding method according to IEEE 802.16a standard’s OFDMA specifications, including decoding of punctured tail-biting convolutional codes after bit interleaving and QAM modulation, and decoding of shortened Reed-Solomon (RS) code with 802.16a-specific generator polynomial. The convolutional decoder does soft-decision decoding whereas the RS decoder, as usual, does hard-decision decoding. 無線通訊器材產業,IEEE 802.16a 或相關傳輸設備產品。. 根據 IEEE 802.16a 標準中之 OFDMA 規格設計的通道碼解碼方 法。其中迴旋碼解碼採軟式,而里德-所羅門碼解碼則為硬式。運 算複雜度合理。 可用於 IEEE 802.16a 或相關傳輸設備產品。. 推廣及運用的價值 ※ ※. 1.每項研發成果請填寫一式二份,一份隨成果報告送繳本會,一份送 貴單位 研發成果推廣單位(如技術移轉中心)。 2.本項研發成果若尚未申請專利,請勿揭露可申請專利之主要內容。. ※ 3.本表若不敷使用,請自行影印使用。 10.

(14) 七、附錄 本附錄共含二篇會議論文初稿,如下列: A. B.. M.-T. Lin and D. W. Lin, “Mobile wireless communication based on IEEE 802.16a TDD OFDMA: transmission filtering and synchronization” (6 pages). Y.-P. Ho and D. W. Lin, “Study on channel coding in the IEEE 802.16a OFDMA wireless communication standard” (6 pages).. 11.

(15) 附錄 A. Mobile Wireless Communication Based on IEEE 802.16a TDD OFDMA: Transmission Filtering and Synchronization Meng-Ting Lin and David W. Lin Department of Electronics Engineering and Center for Telecommunications Research National Chiao Tung University Hsinchu, Taiwan 30010, R.O.C. E-mails: mtlin.ee90g@nctu.edu.tw, dwlin@mail.nctu.edu.tw Abstract. The duplicates of the original spectrum after oversampling. dBr used carrier range 0. We consider the use of IEEE 802.16a TDD (timedivision duplex) OFDMA (orthogonal frequency division multiple access), originally developed for fixed wireless communication, for mobile communication. In particular, we consider the issues of transmission filtering and synchronization. For transmission filtering, in order to simulate multipath delays at non-integer sample spacing with ease, we design a four-times oversampled RRC (root-raised-cosine) filter that meets the power mask of the standard. For synchronization, we consider the DL (downlink) and the UL (uplink) separately. The designed DL synchronization method contains four stages. The first two use the guard interval to estimate the OFDM symbol start time and the fractional frequency offset, respectively. The third stage uses the guard bands and some pilot carriers to detect the integer frequency offset. And the final stage does frame synchronization using the information in the DL preamble. We consider two schemes for UL time synchronization by correlation of the received signal with the UL preamble. One does it in the time domain and the other in the frequency domain. Simulations are performed to investigate the performance.. power mask. −27 −28.6 −32. −50. 0. 0.208π 0.292π 0.23π. 0.5π. π. 1.5π. 2π. ω. Fig. 1: Frequency spectrum of signal after four-times oversampling and its relation to the power mask.. multiple carriers that form one unit in frequency allocation, and different subchannels can be used by different users. This is OFDMA (orthogonal frequency division multiple access). In this work, we consider using the IEEE 802.16a WirelessMAN TDD OFDMA system [1], originally developed for fixed wireless communication, for mobile communication. In particular, we consider the issues of transmission filtering and synchronization. Proper transmission filtering is required to contain the emitted power spectrum and to limit intersymbol interference. And proper synchronization is required for good signal reception. We discuss these subjects in separate sections, followed by simulation results and a conclusion.. 1. Introduction 2. Transmission Filtering OFDM (orthognal frequency division multiplexing) transmits data using a set of parallel low-bandwidth carriers. The carriers are independent of each other even though their spectra overlap, which results in bandwidth efficiency. High data rate systems are achieved by using a large number of carriers. OFDM symbols can be easily generated and received using inverse and forward fast Fourier transforms (IFFT and FFT), respectively. This technology has been used in several communication system standards. To support multiple access, the carriers can be divided into subchannels. Each subchannel can have. In order to be able to simulate path delays at noninteger sample spacing, we consider four-times oversampled transmitter filtering employing a root-raisedcosine (RRC) filter. The output needs to meet the power mask specified in IEEE 802.16a as shown in Fig. 1. The frequencies from 0.208 to 0.292 in Fig. 1 correspond to the guard bands, and therefore the RRC filter need not be concerned about this part. Thus the critical point in filter design is the lowest frequency of the first duplicate (0.292 ). The filter needs to have a smaller value than the power mask at this frequency. After some computation, we find that a 57-tap RRC. This work was supported by the National Science Council of R.O.C. under grant no. NSC 91-2219-E-009-008.. 1.

(16) Table 1: OFDMA Carrier Allocations. 0 power mask. dBr. −20. critical point. −40. Parameter Total number of carriers Number of DC carriers Number of guard carriers, left Number of guard carriers, right Total number of pilots Number of data carriers , number of used carriers (data carriers + pilot carriers). SRRC filter: α = 0.155, taps = 57. −60 −80 −100. 0. 0.2. 0.4. 0.6. 0.8. 1 π. 1.2. 1.4. 1.6. 1.8. !. Fig. 2: Frequency spectrum of 57-tap RRC filter with roll-off factor = 0.155..    . filter with can comply with the power mask requirement, as shown in Fig. 2. We consider using the same design for matched-filtering in the receiver. As the aliasing would be small after four-times downsampling over the filtered received signal, we can apply downsampling before synchronization to reduce the receiver complexity. The length of the combined impulse response of a 57-tap transmitter filter and a 57tap receiver filter is 29 nonoversampled samples. To account for non-integer-delay channel multipaths and possible sampling phase errors, therefore, the guard interval in the OFDM symbol that could be used to deal with multipath delays is reduced by 28 samples. For efficiency in computation, polyphase decomposition can be employed in both the transmitter filter and the receiver filter.. symbol time synchronization. symbol time synchronization. 3.2. Downlink Synchronization There are two DL synchronization conditions: initial synchronization and normal synchronization. If a subscriber wants to join the transmission network for the first time, both time and frequency need be synchronized. In our design, the initial DL synchronization is divided into 4 stages, as shown in Fig. 3(a). For normal synchronization, the frame (symbol) start time is already known roughly and the frequency has been synchronized. As a result, only two stages are needed to detect the symbol start time and to track the frequency offset, as shown in Fig. 3(b). Here we only focus on the initial synchronization. The first two stages of DL initial synchronization is based on the algorithm in [3] and [4] that employ the maximum likelihood approach to estimate time and frequency offsets. Under the assumption that the received samples are jointly Gaussian, symbol time offset and fractional frequency offset are given by. .               . frequency tracking. The pilots of the first three OFDM symbols is the DL preamble in the sense that they indicate where the OFDMA frame starts. UL preamble is the first symbol of the UL transmission and all used carriers in this symbol are pilots. For the DL preamble, the initialization vector of the pilot modulation PRBS is [01010101010]. Hence the preamble and other symbols may have the same pilot locations, but they can be recognized by different modulation values.. The carriers are divided into three types: data, pilot, and null (guard bands and DC carrier) which transmit nothing at all. Table 1 shows the specifications. The pilot carriers in DL (downlink) transmission are partitioned into fixed-location and variable-location pilots. The carrier indices of the fixed-location pilots never change. The variable-location pilots shift their locations every symbol depending on the value of ( cycles through ) periodically every 4 symbols. The PRBS generator is used to produce a sequence, , where corresponds to the carrier index. The value of the pilot modulation on carrier is then derived from . The initialization vector of the PRBS except for the in DL transmission is OFDMA DL PHY preamble. For the UL (uplink), the initialization vector is .. . frame synchronization. Fig. 3: Method of synchronization. (a) Initial synchronization. (b) Normal synchronization.. 3.1. Some IEEE 802.16a Specifications. . integer frequency synchronization. (b). Accurate demodulation and detection of an OFDM signal requires carrier orthogonality. Variations of the carrier oscillator, sample clock or the symbol time affect the orthogonality and the system performance. In this study, the sample clocks of the user station and the base station are assumed to be identical. Hence we only consider timing and frequency synchronization.. . FFT. UL Value 2048 1 176 175 160 1536 1696. (a). 3. Synchronization. 

(17) 

(18) 

(19) . fractional frequency synchronization. DL Value 2048 1 173 172 166 1536 1702. #". . and. 2. $" # " &%' (*)+%-,/.10 243 #5 076981:;3 #5=< $ "  6 ?> 2@37#-" 5

(20). (1). (2).

(21) r(k+2048). sliding sum (length=L =CP legnth). (.)*. Dealy 2048 samples. |.|. r(k). argmax. θ. − 1/(2 π). ε. Table 2: 7 Cases of Reference Information in Frame Synchronization DL preamble (  , PRBS) !!!!! !!!!! #!!!!!. Fig. 4: The stucture of the symbol time and frequency estimator.. where. 8 . . 2@3 #5   1' 3! 5 '

(22) -3  5

(23)    5  # 5 :;3    0 '13  0  0 '13  5 0 

(24). modulation PRBS with the reference data, the correlation of them will be larger than the other 6 cases. A frame is determined to start if there are three successive DL symbols with the maximum correlation corresponding to the preamble. However, the performance of this method goes down significantly when the time synchronization in stage I does not detect the correct location. To solve this problem, we apply the FFT for the region from to samples in offset with the detected symbol start location in stage I. In order to reduce the complexity of FFT, the conventional FFT is only applied to the location . When a new data value is received, the simplified FFT below is used:. (3). (4). and   with SNR being signal to noise ratio.  The symbol time offset estimator can be viewed as consisting of two parts: the correlation that correlates the received sampled baseband signal, , with a delayed version of itself, and a part that compensates for the difference in energy in the correlated samples. We drop the second part to reduce the complexity. The structure of this new estimator (guard interval correlator) is shown in Fig. 4. The third stage uses the guard bands and two pilot carriers (the edges of used carriers) to detect the integer frequency offset. The first step is to determine the received OFDM symbol is transmitted from the BS (DL) or other SSs (UL). The number of the UL guard carriers is larger than DL by 6 carriers. A threshold can be set and if any of these 6 carriers is larger than the threshold, the SS will regard the received symbol as the DL symbol. If there is no integer frequency offset, the FFT outputs of all the guard carriers will be small. So, all the guard carriers are checked to see if any of them exceeds the threshold. The checking direction is from higher frequency to lower frequency. If the carrier is detected to be larger than the threshold in the checking procedure, the check is stopped and the frequency is corrected. The check and correction take turns until all the guard carriers are checked to be smaller than the threshold. An additional check is added to see whether both edges of the used carriers (pilot carriers) are larger than the threshold. After these three checks, the integer synchronization finishes. The threshold is chosen to be 0.55 in our simulation. The fourth stage use the DL preamble to determine when a new frame starts. The same as stage III, the SS has to check whether the received signal is from the BS. Then, for a DL symbol, it is required to check whether the symbol is the beginning of a frame. The SS knows the values of DL preamble and pilots, so it can use them as the reference data, as shown in Table 2. The FFT outputs are correlated with these 7 possible cases of the reference data. If the received symbol has the same pilot locations and the same initial vector of. 2@3 #5. DL normal symbol (  , PRBS) " #" " $" . 6  . '. 6 -. 3  5   %'&  3  5 69, &    , & (*),+.0-"/

(25) (5) where  is the FFT size,  is the carrier index, 1 is & sample number, and , is the new incoming sample. %'&. After observing the correlation for 65 sample times, the location with peak correlation is assumed to be the real symbol start time. The maximum correlation of 7 cases is robust enough to be used. 3.3. Uplink Synchronization. Assuming a successful initial synchronization and ranging, the mobile enters the time and frequency grid with a low offset in time and frequency. No frequency synchronization is done in UL normal transmission. What the BS has to do is to detect the exact UL symbol arrival time. According to 802.16a, the SSs shall acquire and adjust their timing such that all uplink OFDM symbols arrival times coincident at the BS to ,3 an accuracy of 2 of the minimum guard-interval or better. The BS shall detect the arrival time of the first coming signal to keep the symbol ISI free. Two UL synchronization schemes are considered. One is using the correlation of the preamble in the frequency domain and the other is in the time domain. There are two stages in both schemes. The first stage uses the timing part of the joint ML estimator to detect roughly the symbol start time. The actual arrival time of the first arriving signal is likely before the detected time. As the user arriving time may vary as much as 50% of the guard interval, we apply the preamble correlation for the samples up to 50% of the guard interval earlier than the detected symbol start time. Figure 5 shows the UL synchronization stage II by frequency domain approach. The FFT outputs are corre-. . 3.

(26) From stage II start time to stop time. Table 4: Channel Impulse Response Model of ETSI “Vehicular A” Channel Environment. At stage II stop time. reference used carrier 1. samples within useful time. FFT. carriers of SS 1 are summed together. peak detector. carriers of SS k are summed together. peak detector. reference used carrier k. peak location and peak value compatator. tap 1 2 3 4 5 6. First arriving signal start time. Fig. 5: Illustration of UL stage II by frequency domain approach.. relative delay (nsec) 0 310 710 1090 1730 2510. average power (dB) 0. /1032 4 /562 4 /10.462 4 /10 782 4 /:9462 4. reference for SS 1 r1(0)~r1(2047) sum of 2048 samples. peak detector. start time of SS 1. sum of 2048 samples. peak detector. start time of SS k. r(k)~r(k+2047). reference for SS k rk(0)~rk(2047). Fig. 6: Illustration of UL stage II by time domain approach.. lated with the preamble reference values over all the subchannels used by each SS. For time domain approach, the received samples are correlated with reference data string which is the IFFT output according to the subchannels used by each SS. The UL synchronization stage II by time domain approach is shown in Fig. 6.. Fig. 7: Standard deviations of time offset estimation errors in AWGN channel by using ML estimator and guard interval correlator (stage I).. 4. Simulation Results. guard interval correlation. Figure 7 shows the standard deviation of these two methods. The standard deviation is a measure of ; how spread out <>=@ ? ? a distribu? ? ? ? BA . The ML tion is, and is defined as. 4.1. Downlink Synchronization. # 6 #". Table 3 specifies the transmission parameters of our simulation system based on IEEE 802.16a. We applied three channel environments in simulation of DL stage I and II: AWGN channel, one-path Rayleigh fading channel and multipath Rayleigh fading channel. The used multipath channel model is chosen from one of the channel environments defined by ETSI, as shown in Table 4 [2]. The SNR of additive noise is assumed to be 10 dB in the fading channels. As for the last two DL synchronization stages, the simulation is taken in the multipath channel. Note that the velocity 60 km/hr would result in the maximum Doppler shift  = (333 Hz) in our simulation condition. We have simulated the DL stage I, time synchronization, by using time part of the ML estimator and. estimator has better performance than the guard interval correlator in the AWGN channel. However, from Fig. 8, we can find that the guard interval correlator performs better in the fast fading channel. So we can use the guard interval correlator in the fading channel to reduce the complexity. Note that the time synchronization performance in one path channel is worse than multipath channel when the Doppler shift is not zero. The channel variation causing by Doppler spread destroys the autocorrelation property. However, the multipath channel in some sense provides the time divisity. For all paths, the fading conditions are different so that the autocorrelation property would be stronger than one path environment. The added frequency offset to simulate fractional frequency synchronization (stage II) is 0.1 carrier spacings. The standard deviation is defined by C <ED.   . Table 3: System Parameters Used in Simulation Number of carriers Center frequency Uplink / Downlink bandwidth Carrier spacing (   ) Sampling frequency (   ) OFDM symbol time (  ) Useful time (

(27) ) Cyclic prefix time ( '& ). 2048 6 GHz 6 MHz/ 6 MHz 3.348 kHz 6.86 MHz 336 sec 298 +  . 37 ( )( *

(28). 0 $ 6 $ " 0 BF .. The performance has no difference. by using two DL stage I schemes. The reason is that the value of the frequency estimation is almost the same for a small nearby range of the symbol start location. Thus we can know that this estimator is ro-.   ! $" #% . ! "$#% ,+-. 4.

(29) Table 5: Performance of DL Integer Frequency Synchronization (Stage III) at Different Maximum Doppler Shifts Doppler shift.  . 0 0.037 0.075 0.112 0.149 0.187 0.224. Integer synchronization failure probability estimation frames: 5000 0.26 % 0.11 % 0% 0% 0.08 % 0.32 % 1.22 %. Average required symbol delay to complete integer frequency synchronization 8.90 12.67 12.02 11.85 12.02 12.34 14.15. Table 6: Performance of DL Frame Synchronization (Stage IV) at Different Maximum Doppler Shifts Doppler shift. Fig. 8: Standard deviations of time offset estimation errors in one path channel and multipath channel by using ML estimator and guard interval correlator (stage I)..  . 0 0.037 0.075 0.112 0.149 0.187 0.224. Frame synchronization false alarm probability estimation frames: 5000 0% 0% 0% 0.004 % 0.004 % 0.019 % 0.01 %. Average required frame delay to complete frame synchronization 1.69 2.1 2.06 2.18 2.24 2.37 2.6. the simulation result, the useable information is really enough when the Doppler spread is small. But when the Doppler spread is large, we may need a better DL preamble format or additional MAC layer information to check the received signal after demodulation. 4.2. Uplink Synchronization We simulate the case with 3 SSs. UL burst1 is transmitted by SS1 using 8 subchannels. UL burst2 is transmitted by SS2 using 16 subchannels. UL burst3 is transmitted by SS3 using 8 subchannels. The arriving times of burst1 and burst2 differ by 25% of the guard interval, which is 64 sample time, while burst3 lags burst1 by 50% of the guard interval, which is 128 sample time. We only apply the multipath fading channel to simulate the UL synchronization. The time offset standard deviations for both UL synchronization schemes are shown in Fig. 10. If there is no Doppler shift, we can always detect the correct symbol start time of the first coming signal by both approaches. When the Doppler shift is not zero, the performance of frequency domain approach is decreased as the Doppler spread increases. As for the time domain approach, the Doppler shift has no obvious effects on the synchronization performance except when it is very small. The top plot in Fig. 11 represents the multipath channel model that is specified in non-oversampling sample numbers and with average power in normal scale. The synchronization error distributions for the signals from three different SSs are compared together with the channel model in the bottom plot of Fig. 11. Comparing the time error distribution with the channel. Fig. 9: Performance of DL fractional frequency offset synchronization in one-path and multipath Rayleigh fading channels (stage II).. bust. Figure 9 compares the frequency synchronization performance under one-path and multipath fading channels. The fractional frequency synchronization utilize the autocorrelation property of the OFDM symbol. The one-path channel destroys this property more seriously than multipath channel, so the performance is better in multipath channel. Table 5 shows the failure probabilty of the integer frequency synchronization (stage III) and the required DL symbol number to finish the synchronization from stage I to stage III. The needed time to sync the signal tends to be longer as the Doppler shift becomes larger. The integer frequency synchronization can cor rect the offset from to 172 carrier spacings which  is about KHz to 576 KHz in this simulation. The frame synchronization (stage IV) error probability is shown in Table 6. Note that IEEE 802.16a is designed for the fixed environments. Observing. 6. 6  7. 5.

(30) The standard deviation of the UL time synchronization errors under different Doppler shifts. signal. By the specification of the transmit spectral mask in 802.16a, a 57-taps RRC filter with roll-off factor 0.155 is designed to suppress the out-of-band power. We have designed the synchronization schemes for DL and UL receivers and analysed the performance under AWGN and fading channels. For DL, the time and fractional frequency synchronization would work well in the AWGN channel and the fading channel with the Doppler shift lower than 0.1    . The integer frequency synchronization ability to correct frequency offset is from to 172 carrier spacings   and the error probability were about  to  in the multipath fading channel. Frame synchronization is always correct when the Doppler shift was smaller  . In summary, the DL synchronization than 0.08   scheme was suitable for the environment that the max . imum Doppler shift was smaller than 0.1   As for UL, the correlation in the time domain has better performance. The time synchronization errors are in some degree correlated to the channel model. Thus the guard interval should be at least larger than two times of the delay spread. There are several possible extensions for our research. The synchronization performance can be analyzed for different guard interval lengths. We can try to do DL frame synchronization by using the correlation in the time domain. Further, the simulation so far has been done using floating-point arithmetic. If hardware implementation is in view, then fixed-point simulation should be considered for implementation efficiency.. 20 UL sync. scheme I: frequency domain approach UL sync. scheme II: time domain approach 15. Standard deviation. 15.179. 15.472. 15.579. 2.471. 2.609. 16.784. 13.675. 10. 5 3.659 2.402. 2.505. 2.379. 6  . 2.501. 0 0 0.00. 0.05. 0.10. 0.15. 0.20. Doppler shift (fdTs). Relative average power normalized scale. Fig. 10: Standard deviation of UL symbol time synchronization errors by using frequency and time domain approaches.. 0.5. The multipath delay spread and the relative average power (Channel model of the next Fig.). 0.4 0.3 0.2 0.1 0.0 -2. 0. 2. 4. 6. 8. 10. 12. 14. 16. 18. 20. Multipath delay (samples) The UL synchronization scheme II error distribution for three SSs 0.5 Channel model SS1 SS2 SS3. Probability. 0.4 0.3. . . 0.2 0.1. 6. References. 0.0 0. 5. 10. 15. Time error (samples). [1] IEEE Std 802.16a-2003, IEEE Standard for Local and Metropolitan Area Networks — Part 16: Air Interface for Fixed Broadband Wireless Access Systems — Amendment 2: Medium Access Control Modifications and Additional Physical Layer Specifications for 2–11GHz. New York: IEEE, April 1, 2003.. Fig. 11: Performance of UL time synchronization scheme II: errors of three signal with different arriving times, under different Doppler spreads.. model, we see that the different time offsets obtained at synchronizer output almost concur with the sample number of the multipath delays. Furthermore, the occurrence probabilities at the different time offsets are proportional to the relative average power of the paths. No matter when the signal arrives, the synchronization performance has no difference. Thus we can roughly detect the start time of all signals from different SSs and this information should be helpful for channel estimation.. [2] M. Goldhammer et al., “OFDM (FFT 256) fixed and mobile system considerations,” IEEE 802.16e contribution – 03/07. [3] J. J. van de Beek, et al., “ML estimation of time and frequency offset in OFDM systems,” IEEE Trans. Signal Processing, vol. 45, no. 7, pp. 1800– 1805, July 1997. [4] J. J. van de Beek, P. O. Borjesson, M. L. Boucheret, D. Landstrom, J. M. Arenas, P. Odling, C. Ostberg, M. Wahlqvist, and S. K. Wilson, “A time and frequency synchronization scheme for multiuser OFDM,” IEEE J. Select. Areas Commun., vol. 17, pp. 1900–914, Nov. 1999.. 5. Conclusion and Future Work In order to simulate non-integer multipath delays, we have applied 4-times oversampling to the transmitted. 6.

(31) 附錄 B STUDY ON CHANNEL CODING IN THE IEEE802.16A OFDMA WIRELESS COMMUNICATION STANDARD Yu-Ping Ho and David W. Lin Dept. of Electronics Engineering and Center for Telecommunications Research National Chiao Tung University Hsinchu, Taiwan 30010, R.O.C. E-mails: u860913@micro.ee.nthu.edu.tw, dwlin@mail.nctu.edu.tw ABSTRACT IEEE802.16a employs concatenated coding with Reed-Solomon (RS) outer code and convolutional (CC) inner code, followed by bit interleaving before -ary QAM modulation. The RS code is shortened and punctured, and the CC code is punctured and of the tail-biting type. In this paper, we consider the code properties, their decoding, and the associated decoding performance. For the tail-biting punctured CC codes, we propose a low-complexity decoder. It turns out that the bit interleaver and the -QAM modulation impact the design and the performance of the CC decoder significantly. We simulate the RS codes, the CC codes, and the concatenated codes respectively in AWGN channel, and compare the simulation results with theoretic coding gains calculated based on minimum codeword distances. We find that the performance of the RS codes and the CC codes almost achieves the theoretic values, which means that our decoders have good performance. The performance of the concatenated codes is worse at the  considered. We conjecture that their performance will also approach the theoretic values at high   /  . 1. INTRODUCTION In the wireless channel, channel coding is an important technique to reduce the bit error rate. The channel coding scheme used in IEEE802.16a [1], as shown in Fig. 1, is a concatenated code employing the Reed-Solomon (RS) code as outer code and convolutional (CC) code as inner code. Input data streams are divided into RS blocks, then each RS block is encoded by a tail-biting CC code, which can be viewed as a block code and hence makes the whole concatenated code a block-based coding scheme. In addition, between the CC coder and the modulator is a bit interleaver, which protects the CC code from severe impact of burst errors and increases overall coding performance. This approach has. Reed−Solomon Encoder. Convolutional Encoder. Interleaver. Modulation. Reed−Solomon Decoder. Convolutional Decoder. De−interleaver. Demodulation. Fig. 1: Channel coding structure.. been termed “bit-interleaver coded modulation (BICM)” in the literature [6]. The bit interleaver greatly complicates the branch metric for soft-decision CC decoding via the Viterbi algorithm. To make the system more flexibly adaptable to the channel condition, there are six coding-modulation schemes defined in IEEE 802.16a, as shown in Table 1. The different coding rates are made by shortening and puncturing the native RS code through one RS coder and with puncturing of the native tail-biting CC code through one CC coder. The organization of this paper is as follows: Section 2 analyzes coding gains of the six coding-modulation schemes based on minimum codeword distance. Section 3 designs decoders for the shortened and punctured RS code, tailbiting punctured CC code, and BICM. Section 4 compares the performance of the decoders we design with the analytic coding gains. Section 5 is our conclusion. 2. CODING GAIN ANALYSIS BASED ON MINIMUM CODEWORD DISTANCE 2.1. Reed-Solomon Coding Gain A crude estimate of a -error correcting RS coding gain with soft-decision in AWGN is.

(32)    "!$#. dB %. (1). where  is the code rate [9]. But since RS codes are usu ally decoded, the coding gains are reduced by &('+'*) )  hard-decision dB [12]. The results are listed in Table 2.. This work was supported by the National Science Council of R.O.C. under grant no. NSC 91-2219-E-009-008.. 1.

(33) ' is number of data bytes before encoding, and is number of data bytes which can be corrected. / 0 & The field generator polynomial is + ,+# $ , *.- , - , - , -  The generator polynomial for RS code can be generalized as )  ) &8:9  1 $ 4 6 3 5 4 6 3 5 7  3 5 +, # 2, # 2, #  

(34) 2, # % (3). Table 1: Six Channel Coding Schemes. Overall Scheme Modulation Code Rate 1 2 3 4 5 6. QPSK QPSK 16QAM 16QAM 64QAM 64QAM. .  .    .  . CC CC Code Code Rate . RS Code.   .  .  .  . %

(35) % % %  % $%  %  % %  % %  % .       .   . # # # # # #. where ; can be any integer. Usually, ;<$ However, . This. affects for the RS code in IEEE802.16a ;=$ the decoding algorithm, as shown later. This code then is shortened and punctured to enable variable block sizes and variable error-correction capability. The modified RS code is denoted as  ?> %'?> % @> # , listed in the Table 1. They are shortened to 'A> data bytes and punctured to permit @> bytes to be corrected. When a block is shortened to '?> data bytes, the first  CB '?> bytes of the encoder input blocks are zeros. When a codeword is punctured to permit @> bytes to be corrected, only the first  D>. of the total  parity bytes are employed. The Euclid’s algorithm is a common (hard-decision) decoding algorithm for RS codes [10]. It includes four steps:. . . . Table 2: Coding Gain Based on Minimum Codeword Distance HardDecision Scheme RS Coding Gain (dB) 1 2 3 4 5 6. .         ! ! . SoftDecision CC Coding Gain (dB). Concatenated Coding Gain (dB).             .

(36) . 1. Compute the syndrome value. 2. Compute the error location polynomial..  .   .

(37)  . 3. Compute the error location. 4. Compute the error value.. "  . The shortening does not affect the RS decoder because the RS code in IEEE802.16a is a systematic code and the initial zero bytes will not affect each step of the decoder. As for the puncturing, the punctured bytes can be viewed as erasures. in IEEE802.16a, step 1 and 4 of the By the use of ;E$ decoding algorithm need to be modified [11]. To see how, note that the syndrome value  computed in step 1 is) F  5 for the root of ,  $ 3 5 , F ) for the root ) & '.9 of , $ 3 5 ,   , 5 and F ) &(':9 for the root of , $ 3 5 . The error value 5 #  I computed in step 4 for any is the error value computed ; 9HG 9. J 5 for ;E$ multiplied by , where K denotes the error for the RS, code location. Since ;L$   in IEEE802.16a, the syndrome value is F  , F ,    , F & '.9 and the error  value is. multiplied by , J . the error value computed for ;E$. 2.2. Convolutional Coding Gain A rough estimate of soft-decision CC coding gain in AWGN is.   "     

(38)  # dB % (2)  . where  is the code rate and "# is the free distance [9]. The results are listed in Table 2. 2.3. Concatenated Coding Gain The theoretic concatenated coding gain is the product of the coding gain of the outer code and the inner code. It is a very loose upper-bound for most concatenated codes, except in the case of turbo codes. The results are listed in Table 2.. 3.2. Tail-Biting Punctured Convolutional Code Each RS block is encoded by a binary convolutional en. coder, which has native rate of  , a constraint length equal to  , and the generator polynomials for the two output bits. M.N ' and  MHN ' . are  This CC code is then punctured to allow different rates. Furthermore, tail-biting is performed, by initializing the encoder’s memory with the last data bits of the RS block. Puncturing does not affect the Viterbi decoding algorithm. 3. DECODER DESIGN 3.1. Shortened and Punctured Reed-Solomon Code The Reed-Solomon code in IEEE802.16a is derived from. a systematic RS (%$&  , '($&  , )$ ) code on GF( * ), where  is number of overall bytes after encoding,. 2.

(39) r1,r2,...,rL(n/k) Extend Received Sequence. r1,r2,...,rL(n/k) rL(n/k)+1,...,r(L+ α)(n/k) r(L+ α)(n/k)+1,...,r(L+α+β)(n/k). Viterbi Decoder. d1,d2,...,dL, dL+1,...,dL+ α , dL+α+1,...,dL+ α+β. S0. Take portion of decoded bits. d α +1,dα +2,...,dL,...,dL+α. Circular shift. Repeat Length (α+β). Information Length (L). S0. S1. dL+1,dL+2,...,dL+α ,dα +1,d α +2,...,dL. S0. S1. correct path. SP. S1. circularly repeat. SP. SP. Fig. 2: Tail-biting convolutional decoder. SM. SM. very significantly. The metrics associated with the punctured bits are simply disregarded in metric accumulation [2]. IEEE802.16a uses the tail-biting approach, which has better performance compare with direct-truncation CC code and does not lose rate compared with zero-tail CC code. However, we pay the cost of a complex decoder. The optimal decoder of tail-biting CC code, as suggested in [3], is to run   ( is register length, and is 6 here.) parallel Viterbi decoders, each decoder postulating a different starting and ending state. The Viterbi decoder that produces the globally best metric gives the maximum likelihood estimate of the transmitted bits. The obvious disadvantage of this method is the   times complexity compared to decoding for the code with tail bits. Therefore, combined [4] and [5], we propose a suboptimal decoder which can reduce the complexity to less than 2 times the normal Viterbi algorithm. The performance is shown in Section 4. Our suboptimal tail-biting CC decoder is depicted in Fig. 2. We first extend the received sequence by repeat  ing the first  #  K # received bits, where  and are two important parameters that we have to set. In the Viterbi decoder, the trellis is initialized by making all states equally likely (i.e., setting the a priori probabilities of all survivors equal), and the Viterbi algorithm is executed for the extended received sequence. A traceback is performed from the best state at the end of the extended received sequence, and a portion of the data in the decoded block, from position  on for the length of information bits, is chosen as the estimate of the data block. This scheme relies on the fact that if the received sequence is circularly repeated, the trellis of the extended received sequence can be considered circular since tail-biting code starts and ends in the same state. The trellis of the tailbiting CC decoder is depicted in Fig. 3. Because the starting state is unknown, the first  surviving paths of the decoder may not be the correct paths. Only after enough depth can the surviving paths approach the correct ones. Thus the later part of the decoded block will be more like to the information data. Furthermore, we need to consider the traceback mechanism. The surviving path will be almost unique after some depth into the trellis. Therefore, the trellis can be truncated and the traceback mechanism performs after some delay, say  . The conventional value of  is 5 times the register. SM−1. SM−1. Length α. SM. non−unique surviving paths. incorrect path. SM−1. Length β. Length L (the valid decoded bits). Fig. 3: Trellis of tail-biting convolutional code. Soft−Decision Convolutional code with 64QAM modulation. −1. 10. Uncoded 64QAM Rate 3/4 CC Coded 64QAM α=30 β=30 Rate 3/4 CC Coded 64QAM α=60 β=60 Rate 3/4 CC Coded 64QAM α=90 β=90 Rate 5/6 CC Coded 64QAM α=30 β=30 Rate 5/6 CC Coded 64QAM α=60 β=60 Rate 5/6 CC Coded 64QAM α=90 β=90. −2. 10. −3. 10. −4. BER. 10. −5. 10. −6. 10. −7. 10. 8. 9. 10. 11. 12. 13. 14. 15 16 Eb/No(dB). 17. 18. 19. 20. 21. 22. 23. Fig. 4: Soft-decision CC decoding performance in AWGN  $ 30, 60, and 90 of the six coding schemes. with  $ length [2]. Since the ending state of the trellis for the extended received data is unknown and the decision depths for the latest decoded data are not long enough to make the surviving paths unique, the latest decoded data will not be reliable and can’t be chosen as the decoded data. The un reliable data length is set to , which is related (actually equal) to  .  To decide the values of  and , we run simulation un ,  $  $  , and     $ $. der different / for  . $ $  for the six coding schemes in AWGN. We  show simulation results of scheme 5 and 6 in Fig. 4; other schemes have similar simulation results.  We find the perfor mance is almost the same for  $  $  and  $ $  , and both are better than  $ $ . Considering the trade-off between performance and decoder complexity, we . adopt  $  and $ in the Viterbi decoder.. 3.

(40) 3.3. Bit-Interleaved Coded Modulation Code. Table 3: Bit Metric for Method-ML and Method-LLR. For optimal soft-decision Viterbi decoding in AWGN channel, the metric is the Euclidean distance between each trellis path and the soft-output of the demodulator. The problem now is that there is a bit interleaver between the CC encoder and the modulator in the transmitter. Thus, we adopt a suboptimal decoder based on bit-by-bit metric computation, which is proposed in  [6], [7], and [8].      $    denote the QAM symbol transLet -  .  mitted in the th sub-carrier of OFDM symbol and

(41)   ,    ,  J ,    ,   ,   ,   ,   J ,   ,    be the corresponding bit sequence. Assuming that the ISI (inter OFDM symbol interference) and ICI (inter channel interference) are completely eliminated, then the received signal of the sub-carrier can be written as   .  . 5. $.  .  . . %.  . -.  . and  $J  5 equivalent to.  . $.  . -.  . !  5.  .  . $. (4). - >.  . %. (5). &. . where &  >   & is still complex AWGN noise with variance .>  # $  #"   5 " .   Assuming that   is known to the receiver and that 5 the transmitted bits are i.i.d, the following maximization is performed to estimate the encoded bit sequence $ according to the ML (maximum likelihood) criterion: %. $. $. &('. ). .. &(* , +-. . "$. . (6). For each in-phase(  J ) and quadrature(  / J ) bit, two metrics are derived corresponding to the two possible values and ,respectively. For bit  J , first the QAM constellation namely G  I is split into two partitions of complex ” insymbols, the symbols with a “ position F  J comprising 0 %K # G #I and F  J , which is complementary. Then the two metrics are obtained by. >.   J # $. 1 243654<>798;= ? : ). @. & * ( 243654<>798;= ? :. "  +  .  . "  +  .  . +. Since the conditional pdf of . .    ".  . $ . # $. C. !DEGF. *4HI

(42).   ".   ".  . B. $ . #. $ . # %BA. %. U. . ".   . B . . & 5.   . ". . J $.

(43). . Method-LLR . B #  B # B.   . /.  . 5. & ".  2P3654<R7Q8= ? : )MLON.    ". B. " . & . )MLWN ". 2P365<R7QX= ? :.   . B. &. " . )MLWN. B. 2P365<R7OY;= ? :.    ". B . ". &. . . & $. $ ". . . B. [\. B   .   . B . .   . ". %. . .    . B . -. B. #%. #% . . ". . . . . .  # "]   _# ^  _# `.   . (11) (12). 4. PERFORMANCE AND ANALYSIS We simulate the six Reed-Solomon codes, convolutional codes, . and concatenated codes with  $  and $  respectively in AWGN channel. We show simulation results of. % (8). 4. #. (9). The same observation holds for QPSK and 64-QAM constellations.. . . &. #&. , the metrics defined in Eq. (7) are. $K" . Z.   U. ( 7). &.   . . / . can be simplified as follows.. is complex Gaussian. . Finally,  these metrics are de-interleaved, i.e., each couple  % # is assigned to the bit position in the decoded sequence according to the de-interleaver map, and fed to the Viterbi decoder which selects the binary sequence with the smallest cumulative sum of metrics. We name this method Method-ML in the following discussion. From the concept of Log-Likelihood Ratio (LLR), a method named Method-LLR is proposed in [8]. Because of the Graycoding used in the -ary QAM constellation, this method can reduce the complexity of Method-ML. It defines STS    J # as follows (the following applies to the quadrature part, too).   J STS    J # $      & J # B  # #  J (10) $ "  " U   5 The metrics sent to the Viterbi decoder of the two methods are defined in Table 3. Note that the difference between the. bit metrics for the decided “ ” and “ ” is the same for the two methods, namely V   B # . Thus the decoded bit sequence are the same for the two methods. G  I G #I Fig. 5 shows the partitions  F  J %F  J # for the generic bit  J in the case of the 16-QAM constellation. As a consequence,. U. $.  . 

(44)   J #. where   is the channel frequency response complex co  5 is the complex Adefficient for the th sub-carrier and  & ditive White Gaussian Noise (AWGN) with variance  $   . If the channel estimate is error free, the output of the one-tap equalizer is given by   . . Method-ML Bit metric (decided “0”) Bit metric (decided “1”).

(45) Q. Q. −1. Rate 1/2 Concatenated RS and Soft−Decision Convolutional code with QPSK modulation, α=60 β=60. 10. x. x. Uncoded QPSK (24,18,3) RS Coded QPSK Rate 2/3 Soft−Decision CC Coded QPSK Rate 1/2 Concatenated Coded QPSK. −2. I. I −3 (11). S I,11. 3 (01). 1 (00). S I,10. −3(11). −1(10). S I,21. S I,20. 1 (00). 3 (01). S I,21. −3. 10. BI,2. −4. 10 BER. BI,1. −1(10). 10. −5. 10. Fig. 5: Metric partitions of the 16-QAM constellation.. −6. 10. −7. 10. scheme 1 (QPSK), 3 (16QAM), and 5 (64QAM)in Fig. 6; other schemes have similar simulation results. The axes present energy per information bit (   /   ) and information bit error rate (BER). The coding gains are obtained from reduction   /   in coded BER curve compared to the curve of uncoded transmission with coherent demodulation. We find that in AWGN channel, the performance of the concatenated code is worse than a single CC code under low   /  . We conjecture that the reason is, the errors exceed the correction capability of outer RS code under low   /  , yet the codeword energy of the concatenated code is inverse of RS code rate times of a single CC code. Table 4 lists coding gains of the six9 concatenated codes.

(46) . Comparing with obtained from simulation at BER= the theoretic coding gains based on minimum codeword distance in Table 2, we find the RS coding gains are less than the theoretic values by 2 to 3.5 dB and the CC coding gains are less than the theoretic values by 1 dB, which means that our low-complexity tail-biting suboptimal decoder have good performance and BICM mechanism only have little impact on the CC code. However, the overall coding gains under low   /  are far away from the theoretic values, and we conjecture that the performance will more achieve above values under high   /  .. −8. 10. 0. −1. 1. 2. 3. 4. 5. 6. 7 8 Eb/No(dB). 9. 10. 11. 12. 13. 14. 15. Rate 1/2 Concatenated RS and Soft−Decision Convolutional code with 16QAM modulation, α=60 β=60. 10. Uncoded 16QAM (48,36,6) RS Coded 16QAM Rate 2/3 Soft−Decision CC Coded 16QAM Rate 1/2 Concatenated Coded 16QAM. −2. 10. −3. 10. −4. BER. 10. −5. 10. −6. 10. −7. 10. −8. 10. 4. −1. 5. 6. 7. 8. 9. 10. 11 12 Eb/No(dB). 13. 14. 15. 16. 17. 18. 19. Rate 2/3 Concatenated RS and Soft−Decision Convolutional code with 64QAM modulation, α=60 β=60. 10. Uncoded 64QAM (81,72,4) RS Coded 64QAM Rate 3/4 Soft−Decision CC Coded 64QAM Rate 2/3 Concatenated Coded 64QAM. −2. 10. −3. 10. 5. CONCLUSION. −4. BER. 10. In this paper, we designed the decoding algorithm for the shortened and punctured RS codes and proposed a low-complexity decoder for the tail-biting punctured CC codes under the BICM arrangement. From the simulation results in AWGN channel, we found that the coding gains of the RS codes and the CC codes almost achieved the theoretic values calculated based on minimum codeword distances, which means that our low-complexity suboptimal tail-biting decoder has good performance and the BICM mechanism only has little impact on the CC decoding performance. The performance of the concatenated codes is worse at the     considered. We conjecture that their performance will also approach the. 5. −5. 10. −6. 10. −7. 10. 8. 9. 10. 11. 12. 13. 14. 15 16 Eb/No(dB). 17. 18. 19. 20. 21. 22. Fig. 6: Concatenated code performance in AWGN.. 23.

(47) [7] M. Speth, A. Senst, and H. Meyr, “Low complexity space-frequency MLSE for multi-user COFDM,” in IEEE Global Telecommun. Conf. Rec., vol. 5, pp. 2395–2399, 1999.. Table9 4: Coding Gain from Simulation, in AWGN at BER.

(48) = RS Coding Gain from Scheme Simulation (dB). 1 2 3 4 5 6.        "  ! . ! . SoftDecision CC Coding Gain from Simulation (dB).    !    !     ! . Concatenated Coding Gain from Simulaton (dB). [8] F. Tosato and P. Bisaglia, “Simplified soft-output demapper for binary interleaved COFDM with application to HIPERLAN/2,” in IEEE Int. Conf. Commun. Conf. Rec., vol. 2, pp. 664–668, 2002. [9] J. G. Proakis, Digital Communication, 4th ed. New York: McGraw-Hill, 2001..   ! . ! .  . ! .  . [10] S. Lin and D. J. Costello, Jr., Error Control Coding — Fundamentals and Applications. New Jersey: Prentice-Hall, 1983. [11] C.-Y. Chen, “Software implementation and performance analyses for cable modem FEC code,” M.S. thesis, Department of Electrical Engineering, Chung Hua University, Hsinchu, Taiwan, R.O.C., June 2000.. theoretic values at high  /   . These results can provide a basis for various further studies. For example, they can be used in guiding the work towards a practical hardware implementation.. [12] D. W. Lin, Digital Communication. Course notes, Department of Electronics Engineering, National Chiao Tung University, Hsinchu, Taiwan, R.O.C., Fall 2000.. 6. REFERENCES [1] IEEE Std 802.16a-2003, IEEE Standard for Local and Metropolitan Area Networks — Part 16: Air Interface for Fixed Broadband Wireless Access Systems — Amendment 2: Medium Access Control Modifications and Additional Physical Layer Specifications for 2–11 GHz. New York: IEEE, April 2003. [2] I. S. Reed and X. Chen, Error-Control Coding for Data Network. Boston: Kluwer Academic Publishers, 1999. [3] H. H. Ma and J. K. Wolf, “On tail biting convolutional codes,” IEEE Trans. Commun., vol. 34, pp. 104–111, 1986. [4] Y.-P. E. Wang and R. Ram´esh, “To bite or not to bite — a study of tail bits versus tail-biting,” in Proc. IEEE Int. Symp. Personal Indoor Mobile Radio Commun., vol. 2, pp. 317–321, Oct. 1996. [5] W. Sung and I.-K. Kim, “Performance of a fixed delay decoding scheme for tail biting convolutional codes,” in IEEE Asilomar Signals Sys. Computers Conf. Rec., vol. 1, pp. 704–708, Oct. 1996. [6] E. Zehavi, “8-PSK trellis codes for a Rayleigh channel,” IEEE Trans. Commun., vol. 40, pp. 873–884, May 1992.. 6.

(49)

參考文獻

相關文件

電機工程學系暨研究所( EE ) 光電工程學研究所(GIPO) 電信工程學研究所(GICE) 電子工程學研究所(GIEE) 資訊工程學系暨研究所(CS IE )

目前 RFID 技術已列為 21 世紀十大重要技術及各大企業熱門產業投資項 目。零售業龍頭美國沃爾瑪(Wal-Mart)百貨公司在部分的零售點,已應用無線

4.1 多因子變異數分析 多因子變異數分析 多因子變異數分析 多因子變異數分析與線性迴歸 與線性迴歸 與線性迴歸 與線性迴歸 4.1.1 統計軟體 統計軟體 統計軟體 統計軟體 SPSS 簡介 簡介

傳統的 RF front-end 常定義在高頻無線通訊的接收端電路,例如類比 式 AM/FM 通訊、微波通訊等。射頻(Radio frequency,

我們分別以兩種不同作法來進行模擬,再將模擬結果分別以圖 3.11 與圖 3.12 來 表示,其中,圖 3.11 之模擬結果是按照 IEEE 802.11a 中正交分頻多工符碼(OFDM symbol)的安排,以

本研究主要以 But-for 崩塌竣工時程分析技術為基礎進行理論推導,確認此延遲分析技術 計算邏輯之問題與完整性,之後提出修正之計算邏輯,使

通常在研究賽格威這類之平衡系統時在於機構之設計是十分的昂貴,本論文

本研究旨在使用 TI-Nspire CAS 計算機之輔助教學模式,融入基礎 統計學的應用,及研究如何使用 TI-Nspire CAS