• 沒有找到結果。

Baseband Transceiver Design for the IEEE 802.16a OFDM mode

N/A
N/A
Protected

Academic year: 2021

Share "Baseband Transceiver Design for the IEEE 802.16a OFDM mode"

Copied!
38
0
0

加載中.... (立即查看全文)

全文

(1)

NTU Confidential

Baseband Transceiver Design for the

Baseband Transceiver Design for the

IEEE 802.16a OFDM mode

IEEE 802.16a OFDM mode

Advisor : Tzi-Dar Chiueh

Student : Sang-Jung Yang

Date : December 15

th

, 2003

(2)

2

NTU Confidential

Outline

Outline

Review of 802.16a System

Review of 802.16a System

Channel Model

Channel Model

Transceiver Architecture

Transceiver Architecture

Coarse Symbol Boundary Detection

Coarse Symbol Boundary Detection

Fractional and Integer part CFO Estimation

Fractional and Integer part CFO Estimation

Tracking Residual CFO

Tracking Residual CFO

Tracking TFO

Tracking TFO

Encountered Problem

Encountered Problem

Conclusion

Conclusion

(3)

3

NTU Confidential

Scope of 802.16a (1/3)

Scope of 802.16a (1/3)

• 802.11 drives demand for 802.16a

(4)

4 NTU Confidential

Scope of 802.16a (2/3)

Scope of 802.16a (2/3)

Subscriber

Station

Base

Station

• 802.16a is an IEEE Standard for Local and metropolitan a

rea networks (MAN), and specifies an air interface for

f

ixed broadband wireless access

systems operating between

2 to 11 GHz.

• 802.16a defined 3 non-interoperable PHYs :

Single Carrie

r 、 OFDM and OFDMA

. The MAC is TDMA or FDMA.

(5)

5 NTU Confidential

Scope of 802.16a (3/3)

Scope of 802.16a (3/3)

RF frequency 2-11GHz FFT Size 256 Effective subcarriers 192 Bandwidth (MHz) BW

Guard time (us) Tg

Data time (us) Tb

Symbol time (us) Tg + Tb

Subcarrier spacing (kHz) ∆f

Sampling rate (MHz) Fs = BW x 8/7

Maximum data rate (Mbps)

(BW=28MHz, 64QAM, code rate 3/4) 104.73

• System specifications of 802.16a OFDM mode.

ETSI (fs/BW=8/7)

(6)

NTU Confidential

Channel Model for Simulation

(7)

7

NTU Confidential

Channel Model (1/3)

Channel Model (1/3)

• Channel profile :

Model Tap1 Tap2 Tap3 K factor

SUI-1

Delay (us) 0 0.4 0.9 3.3 Power (dB) 0 -15 -20 Doppler Frequency (Hz) 0.4 0.4 0.4

SUI-2

Delay (us) 0 0.4 1.1 1.6 Power (dB) 0 -12 -15 Doppler Frequency (Hz) 0.2 0.15 0.25

SUI-3

Delay (us) 0 0.4 0.9 0.5 Power (dB) 0 -5 -10 Doppler Frequency (Hz) 0.4 0.3 0.5

SUI-4

Delay (us) 0 1.5 4 0.2 Power (dB) 0 -4 -8 Doppler Frequency (Hz) 0.4 0.4 0.4

SUI-5

Delay (us) 0 4 10 0.1 Power (dB) 0 -5 -10 Doppler Frequency (Hz) 2 1.5 2.5

SUI-6

Delay (us) 0 14 20 0.1 Power (dB) 0 -10 -14 Doppler Frequency (Hz) 0.4 0.3 0.5

(8)

8

NTU Confidential

Channel Model (2/3)

Channel Model (2/3)

(9)

9

NTU Confidential

Channel Model (3/3)

(10)

1 0

NTU Confidential

Transceiver Block Diagram

(11)

1 1

NTU Confidential

Transceiver Block Diagram

Transceiver Block Diagram

-- Transmitter

-- Transmitter

Random Generator Random Generator QAM Mapper QAM Mapper Pilot Insertion Pilot Insertion Frame Shaping Frame Shaping IFFT (256-point) IFFT (256-point) Scrambler Scrambler RS Encoder RS

Encoder ConvolutionEncoder Convolution

Encoder InterleaverInterleaver

: Simulink : C++

802.16a OFDM mode Transmitter Block Diagram

802.16a OFDM mode Transmitter Block Diagram Use r Dat a To DA C Inner Transmitter

(12)

1 2

NTU Confidential

Transceiver Block Diagram

Transceiver Block Diagram

-- Receiver

-- Receiver

802.16a OFDM mode Receiver Block Diagram

802.16a OFDM mode Receiver Block Diagram Fro m AD C Long Preamble Extraction Long Preamble Extraction WLS Estimator WLS Estimator De-rotator

De-rotator (256-Point)(256-Point)FFTFFT

Coarse Symbol Boundary Detection

and Fractional Part CFO Acquisition

Coarse Symbol Boundary Detection

and Fractional Part CFO Acquisition

Fine Symbol Boundary Detection

and Integer part CFO Acquisition

Fine Symbol Boundary Detection

and Integer part

CFO Acquisition LPFLPF FFT Window

FFT

Window ExtractionPilot Pilot Extraction Channel Estimation Channel Estimation FEQ

FEQ SlicerSlicer

NCO NCO Integrator Integrator Interpolator Interpolator To FEC Scaling Scaling

(13)

1 3

NTU Confidential

Coarse Symbol Boundary Detection

Coarse Symbol Boundary Detection

and Fractional Part CFO Acquisition

and Fractional Part CFO Acquisition

Coarse Symbol Boundary Detection

and Fractional Part CFO Acquisition

Coarse Symbol Boundary Detection

and Fractional Part CFO Acquisition

(14)

1 4

NTU Confidential

Coarse Symbol Boundary Detection (1/3)

Coarse Symbol Boundary Detection (1/3)

Short Preamble

Guard

Interval IntervalGuard

64 64 64 64

Long Preamble

128

128

Signal Detection, AGC, ……

PN Sequence

period = 64 PN Sequenceperiod = 128

• Since the first several samples are used for Signal

detection, AGC, ……, we can not sure how many

periods(64 samples) of short preamble can be used for

symbol boundary detection.

• Assume that we can get at least 2 complete periods

(15)

1 5

NTU Confidential

Coarse Symbol Boundary Detection (2/3)

Coarse Symbol Boundary Detection (2/3)

• We can simply use delay correlator to detect the reception of shor t preamble. From [1], we compute the following equations:

• Where rn is the received signal, P(d) is the delay correlator of l

ength L (for our case, L=64 ), R(d) is the power sum of L consecut ive received samples, M(d) is the delay correlator normalized by R (d).

• The reason of computing M(d) is that, from [1], we have

So we can estimate SNR by computing this equation. (dopt is the opt

imum position for M(d). )

2 2 1 0 2 ) ( 2 2 1 0 1 0 * )) ( ( ) ( ) ( ) ( ) ( ) ( d R d P d M r d R e r r r d P L m d m L L T f j L m d m L m d L m d m s    

                  ) ( 1 ) ( ˆ opt opt d M d M R N S  

Normalized CFO

(16)

1 6

NTU Confidential

Fine Symbol Boundary Detection and

Fine Symbol Boundary Detection and

Integer Part CFO Acquisition

Integer Part CFO Acquisition

Fine Symbol Boundary Detection

and Integer part CFO Acquisition

Fine Symbol Boundary Detection

and Integer part CFO Acquisition

(17)

1 7

NTU Confidential

Fine Symbol Boundary Detection and

Fine Symbol Boundary Detection and

Integer Part CFO Acquisition (1/3)

Integer Part CFO Acquisition (1/3)

• For 802.16a, MAX CFO = 10.68GHz * ±4ppm = 85.44KHz

≒12.5*(minimum Subcarrier spacing 6.84KHz)

Need Integer part CFO Acquisition

• For 802.16a, CFO can be derived from the following equation:

) ( 4 1 2 256 , 64 1 ) ( 2 64 ) ( 2 ) 64 ( 2 ) ( i f i f s i f s N N T f T f d P of Phase                                 

Subcarrier spac

ing

Sample

time

Integer part

CFO

Fractional part

CFO

• If CFO=3.2 f∆ , Phase of P(d) will be 2πx 0.8 = 1.6π= -0.4π (∵tan-1 lies in (-π, π]

)

• ∴0.5πx (f + i ) = -0.4π, we have (f + i ) = -0.8 f, so we compensate 0.8 f∆ ∆

(18)

1 8

NTU Confidential

Fine Symbol Boundary Detection and

Fine Symbol Boundary Detection and

Integer Part CFO Acquisition (2/3)

Integer Part CFO Acquisition (2/3)

• Therefore, for CFO lies in [-2,2] ∆f, we compensate it

to

0 ∆f

and for CFO lies in [2,6] ∆f, we

compensate it to

4 ∆f

, and so on…

• The following figure illustrates the compensation of

fractional CFO :

• Since for 802.16a, the Maximum CFO can be ±12.5 f, the resulting Integer part CFO can be {-12,-8,-4,0,4,8,12} f∆ ∆ • We adopt correlator bank with 7 sets of correlator to find the correct integer part CFO.

(19)

1 9

NTU Confidential

Fine Symbol Boundary Detection and

Fine Symbol Boundary Detection and

Integer Part CFO Acquisition (3/3)

Integer Part CFO Acquisition (3/3)

• The procedure of Symbol Bound ary Detection and CFO Estimat ion is :

(i) Compute Normalized Delay Correlation M(d) and its moving average with length equals to guard interval.

(ii) Find the peak of the moving average, and from the phase of its corresponding delay correlati on, we find the Fractional CFO.

(iii) When the moving Average drops to half of the peak value , we set the position 128 sample s right to the peak position as the Coarse Sy

mbol Boundary

(iv) Start finding Fine Symbol Boundary at the pos ition of ±16 samples from Coarse Symbol Bo undary.

(v) Use Long Preamble Correlator Bank at the sear ching window. The set with peak occurs indic ates the correct Integer part CFO, and the pea k position is then the

Fine symbol boundary.

(vi) To handle the situation that “The first path is n ot the strongest path”, we use a threshold to find the peak. The threshold is set to be the “ half of R(d)”, which is half of the power sum o f 64 consecutive received samples.

(20)

2 0

NTU Confidential

Simulation Result of Symbol Boundary

Simulation Result of Symbol Boundary

Detection and CFO Estimation (1/2)

(21)

2 1

NTU Confidential

Simulation Result of Symbol Boundary

Simulation Result of Symbol Boundary

Detection and CFO Estimation (2/2)

(22)

2 2

NTU Confidential

Tracking Residual

Tracking Residual

CFO---WLS Estimator, LPF,NCO

WLS Estimator, LPF,NCO

WLS Estimator WLS Estimator De-rotator De-rotator LPF LPF NCO NCO

(23)

2 3 NTU Confidential

WLS Estimation

WLS Estimation

[4]

WLSE Block Diagram

k k

y : Phase Difference between 2 Symbols of k'th sub-carrier index w : Weighting factor of k ' th sub carrier index

GR : Guard Interval Ratio

• According to the Spec of 802.16a

[2]

, there’s only 1

oscillator in the receiver. Therefore, we can adopt

the Joint WLSE method

[3]

to find the residual CFO

(24)

2 4

NTU Confidential

Low Pass Filter (1/2)

Low Pass Filter (1/2)

• From [5], we adopt the PI control LPF. Its transfer

function is

• We can adjust the values of C1 and C2 to make a

trade-off between convergence speed and jitter.

• The block diagram of LPF is shown below:

1 2 1

1

)

(

z

C

C

z

F

X

X

D

C2 C1 Input Output

(25)

2 5

NTU Confidential

Low Pass Filter (2/3)

Low Pass Filter (2/3)

Without AWGN C1=0.5, C2=0.5 Without AWGN C1=0.5, C2=0.25 Without AWGN C1=0.5, C2=0.125 Without AWGN C1=0.25, C2=0.125

bes

t

(26)

2 6

NTU Confidential

Low Pass Filter (3/3)

Low Pass Filter (3/3)

• Simulation under SUI-3, CFO= -12.5 f, C1=0.25,C2=0.125, Residual CFO= -0.05 f∆ ∆

SNR=12dB SNR = 20dB

(27)

2 7 NTU Confidential Pilot Extraction Pilot Extraction FEQ

FEQ SlicerSlicer

Pilot Extraction, FEQ and Slicer

(28)

2 8

NTU Confidential

Simulation Result

Simulation Result

• Simulation under SUI-3, SNR=25dB, CFO= -0.68352 ∆f,

Residual CFO=0.05 ∆f, 16QAM, 500 OFDM Symbol

transmitted ( 384,000 data bits ), BER=4.87x10

-3

(29)

2 9 NTU Confidential Integrator Integrator Interpolator Interpolator Scaling Scaling

Tracking

Tracking

TFO---Scaling, Integrator, and Interpolator

(30)

3 0

NTU Confidential

Scaling CFO to get TFO

Scaling CFO to get TFO

• Since we have only 1 oscillator in receiver, we have

• If the total estimated CFO is ,we can get TFO () by scaling

, i.e.

• For 802.16a with ETSI channelization, we have the following 5

cases when TFO is fixed to -8ppm.

CFO

Spacing

Subcarrier

ppm

TFO

Frequency

Carrier

(

)

MOD

f

f

BW(MHz)

BW(MHz) Tb(us)Tb(us) ∆∆f(kHz)f(kHz) CFO (CFO (∆∆f)f) Case 1 Case 1 1.75 128 125*(2)-4 10.93632 Case 2 Case 2 3.5 64 125*(2)-3 5.46816 Case 3 Case 3 7 32 125*(2)-2 2.73408 Case 4 Case 4 14 16 125*(2)-1 1.36704 Case 5 Case 5 28 8 125 0.68352

(31)

3 1

NTU Confidential

Interpolator (1/4)

Interpolator (1/4)

• We use Farrow Structure piecewise parabolic

Interpolator to resample signal.

)

1

(

)

(

)

1

(

)

2

(

)

(

1 0 1 2

k k k k

m

x

c

m

x

c

m

x

c

m

x

c

k

y

Structure

Farrow

for

c

c

c

c

k k k k k k k k

5

.

0

1

)

1

(

)

1

(

2 1 2 0 2 1 2 2

 













(32)

3 2

NTU Confidential

Interpolator (2/4)

Interpolator (2/4)

• If TFO < 0, i.e. Receiver clock period < Transmitter

clock period)

(33)

3 3

NTU Confidential

Interpolator (3/4)

Interpolator (3/4)

• If TFO > 0, i.e. Receiver clock period > Transmitter

clock period)

(34)

3 4

NTU Confidential

Interpolator (4/4)

Interpolator (4/4)

• We can modify our interpolator as shown below :

If TFO < 0 and

k

Overflows

S

h

if

t

R

e

g

is

te

rs

k

If TFO > 0 and

not Overflow yet

k

Overflows

k TFO (m -1,m0,m1,m 2) 0~ 1 >0 <0 (d1,d2,d3, d4) >1 >0 (d2,d3,d4,d 5) <0 (d0,d1,d2,d 3)

(35)

3 5

NTU Confidential

Encountered Problem…

Encountered Problem…

• Since we use Farrow structure to model the effect of TFO, and

compensate TFO, the imperfect property of Farrow structure be

come serious especially when

k

≈ 0.5

(36)

3 6

NTU Confidential

Conclusion and Future Work

Conclusion and Future Work

• Several blocks of 802.16a Transceiver have been

introduced.

• The receiver seems work fine under SUI 1~6 with CFO

exists.

• However, the way we model TFO seems not ideal enough,

and we can’t have good performance when TFO exists.

• The short-term job is to find an appropriate way to model

TFO.

– Up-sampling or Using other kind of interpolator

• Other jobs including outer transceiver (in C++), other

imperfect channel effect, and OFDMA mode……

(37)

3 7

NTU Confidential

Thank you for your Attention!

(38)

3 8

NTU Confidential

Reference

Reference

• [1]Robust frequency and timing synchronization for OFDM

Schmidl, T.M.; Cox, D.C.; Communications, IEEE Transactions on , Volume: 45 Issue: 12 , Dec. 1997 , Page(s): 1613 -1621

• [2] IEEE 802.16a draft version 7.

• [3]Joint weighted least squares estimation of frequency and tim ing offset for OFDM systems over fading channels

Pei-Yun Tsai; Hsin-Yu Kang; Tzi-Dar Chiueh;

Vehicular Technology Conference, 2003. VTC 2003-Spring. The 57t h IEEE Semiannual , Volume: 4 , April 22-25, 2003

• [4]Design and Implementation of an MC-CDMA Baseband Transceiver Hsin-Yu Kang; July , 2003

• [5]  Interpolation in Digital Modems---Part II: Implementation and Performance

Lars Erup, Floyd M.Garden and RobertA. Harris, IEEE Trans. On Comm.1993

參考文獻

相關文件

On the other hand Chandra and Taniguchi (2001) constructed the optimal estimating function esti- mator (G estimator) for ARCH model based on Godambes optimal estimating function

Keywords: accuracy measure; bootstrap; case-control; cross-validation; missing data; M -phase; pseudo least squares; pseudo maximum likelihood estimator; receiver

We propose two types of estimators of m(x) that improve the multivariate local linear regression estimator b m(x) in terms of reducing the asymptotic conditional variance while

[r]

//Structural description of design example //See block diagram

An OFDM signal offers an advantage in a channel that has a frequency selective fading response.. As we can see, when we lay an OFDM signal spectrum against the

For MIMO-OFDM systems, the objective of the existing power control strategies is maximization of the signal to interference and noise ratio (SINR) or minimization of the bit

In this thesis, we have proposed a new and simple feedforward sampling time offset (STO) estimation scheme for an OFDM-based IEEE 802.11a WLAN that uses an interpolator to recover